Delay-bounded adaptive UFH-based anti-jamming wireless communication
暂无分享,去创建一个
Xiang-Yang Li | Ping Xu | Kui Ren | Qian Wang | Xiangyang Li | K. Ren | Ping Xu | Qian Wang
[1] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[4] Srdjan Capkun,et al. Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.
[5] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[6] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[7] Avrim Blum,et al. Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary , 2004, COLT.
[8] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Magyar Tud. The On-Line Shortest Path Problem Under Partial Monitoring , 2007 .
[10] Xiang-Yang Li,et al. Multiple Round Random Ball Placement: Power of Second Chance , 2009, COCOON.
[11] Nicolò Cesa-Bianchi,et al. Gambling in a rigged casino: The adversarial multi-armed bandit problem , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[12] Santosh S. Vempala,et al. Efficient algorithms for online decision problems , 2005, Journal of computer and system sciences (Print).
[13] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[14] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[15] Baruch Awerbuch,et al. Adaptive routing with end-to-end feedback: distributed learning and geometric approaches , 2004, STOC '04.
[16] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[17] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[18] Radha Poovendran,et al. A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.
[19] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Tao Jin,et al. Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.