Defend Jamming Attacks: How to Make Enemies Become Friends
暂无分享,去创建一个
[1] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[2] Marwan Krunz,et al. Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems , 2016, IEEE Transactions on Mobile Computing.
[3] Victor C. M. Leung,et al. Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks , 2017, IEEE Transactions on Wireless Communications.
[4] Eryk Dutkiewicz,et al. “Jam Me If You Can:” Defeating Jammer With Deep Dueling Neural Network Architecture and Ambient Backscattering Augmented Communications , 2019, IEEE Journal on Selected Areas in Communications.
[5] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[6] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[7] David Wetherall,et al. Ambient backscatter: wireless communication out of thin air , 2013, SIGCOMM.
[8] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[9] Deniz Gündüz,et al. A Learning Theoretic Approach to Energy Harvesting Communication System Optimization , 2012, IEEE Transactions on Wireless Communications.
[10] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[11] Dong In Kim,et al. Ambient Backscatter Communications: A Contemporary Survey , 2017, IEEE Communications Surveys & Tutorials.
[12] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.