Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement Learning
暂无分享,去创建一个
[1] Loukas Lazos,et al. Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems , 2016, IEEE Transactions on Mobile Computing.
[2] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[3] Ian F. Akyildiz,et al. Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[4] Martin Hoefer,et al. Jamming-Resistant Learning in Wireless Networks , 2016, IEEE/ACM Transactions on Networking.
[5] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[6] Yan Li,et al. Power control with reinforcement learning in cooperative cognitive radio networks against jamming , 2015, The Journal of Supercomputing.
[7] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[8] Andrey Garnaev,et al. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown , 2016, IEEE Transactions on Signal and Information Processing over Networks.
[9] Sridhar Mahadevan,et al. Deep Reinforcement Learning With Macro-Actions , 2016, ArXiv.
[10] H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[11] Marwan Krunz,et al. Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems , 2016, IEEE Transactions on Mobile Computing.
[12] Peng Ning,et al. Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry , 2016, IEEE Transactions on Signal Processing.
[13] R. Sutton,et al. Macro-Actions in Reinforcement Learning: An Empirical Analysis , 1998 .
[14] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[15] Sisi Liu,et al. Thwarting Control-Channel Jamming Attacks from Inside Jammers , 2012, IEEE Transactions on Mobile Computing.
[16] Zhuo Lu,et al. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.
[17] Jeffrey H. Reed,et al. A Colonel Blotto Game for Anti-Jamming in the Internet of Things , 2014, GLOBECOM 2014.
[18] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[19] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[20] Guey-Yun Chang,et al. Anti-Jamming Rendezvous Scheme for Cognitive Radio Networks , 2017, IEEE Transactions on Mobile Computing.
[21] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[22] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[23] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.