Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication
暂无分享,去创建一个
Xiang-Yang Li | Ping Xu | Kui Ren | Qian Wang | Xiangyang Li | K. Ren | Ping Xu | Qian Wang
[1] P. Whittle. Restless Bandits: Activity Allocation in a Changing World , 1988 .
[2] Xiang-Yang Li,et al. Delay-bounded adaptive UFH-based anti-jamming wireless communication , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[4] Baruch Awerbuch,et al. Adaptive routing with end-to-end feedback: distributed learning and geometric approaches , 2004, STOC '04.
[5] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[6] Avrim Blum,et al. Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary , 2004, COLT.
[7] Tamás Linder,et al. The On-Line Shortest Path Problem Under Partial Monitoring , 2007, J. Mach. Learn. Res..
[8] Tao Jin,et al. Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.
[9] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[10] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[11] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[12] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[13] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Xiang-Yang Li,et al. Multiple Round Random Ball Placement: Power of Second Chance , 2009, COCOON.
[15] P. Maymounkov. Online codes , 2002 .
[16] Nicolò Cesa-Bianchi,et al. Gambling in a rigged casino: The adversarial multi-armed bandit problem , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[17] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[18] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[19] Marwan Krunz,et al. Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors , 2009, MobiCom '09.
[20] J. Gittins. Bandit processes and dynamic allocation indices , 1979 .
[21] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[22] Srdjan Capkun,et al. Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.
[23] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[24] Santosh S. Vempala,et al. Efficient algorithms for online decision problems , 2005, J. Comput. Syst. Sci..
[25] Radha Poovendran,et al. A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.
[26] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).