Sign Up to like & get
recommendations!
0
Published in 2018 at "Cluster Computing"
DOI: 10.1007/s10586-018-2822-7
Abstract: Nowadays, the utilization of mobile phones has increased rapidly. Due to this evolution schools, mosques, prisons, etc., require silence and security. This is achieved by using the mobile phone jammers. An intelligent mobile jammer is…
read more here.
Keywords:
detection;
machine learning;
using machine;
jammer ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2017.08.1278
Abstract: Abstract This paper considers the problem of designing a Network such that a set of dynamic rules converges as fast as possible to the Nash equilibrium in a class of repeated games, despite the attempt…
read more here.
Keywords:
network;
sum game;
zero sum;
network design ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2793280
Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming…
read more here.
Keywords:
iot;
game;
transmission;
legitimate user ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3230004
Abstract: To deal with the smart jammer which can sense the legitimate communication and adjust its jamming policy, an anti-jamming game scheme is proposed in this paper to jointly optimize the transmission power and frequency hopping…
read more here.
Keywords:
domain;
game;
scheme;
imperfect information ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2016.2615900
Abstract: The complexity and sophistication of communications jamming will continue to increase over time. The traditional approach to jammer mitigation is to harden radios, often sacrificing communications performance for more advanced jamming protection. To provide an…
read more here.
Keywords:
based reactive;
fsk based;
reactive jammer;
jammer piggybacking ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2018.2886025
Abstract: This letter investigates secure transmission with imperfect channel state information (CSI) in multi-input single-output downlink wireless networks that consist of a transmitter, a desired receiver, one eavesdropper, and an assisting jammer. Specifically, only rough first-…
read more here.
Keywords:
secure transmission;
downlink;
assisting jammer;
distributionally robust ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2020.3003472
Abstract: This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it…
read more here.
Keywords:
cognitive jammer;
communication cognitive;
jammer;
covert communication ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3219434
Abstract: We investigate the problem of dynamic spectrum anti-jamming access against intelligent jammer using game theory and opponent modeling. Previous work has formulated the interaction between the user and the intelligent jammer as an adversarial game,…
read more here.
Keywords:
equilibrium solutions;
beyond equilibrium;
opponent modeling;
jamming ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2023.3277520
Abstract: Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer (Jammer) tries to attract a multi-antenna adversary (Willie) and degrade the adversary's reception ability for the signal from a transmitter (Alice). For…
read more here.
Keywords:
cooperative deception;
deception strategy;
multi antenna;
strategy ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2023.3245722
Abstract: Secure communication in a potentially hostile environment is becoming more and more critical. The Arbitrarily Varying Wiretap Channel (AVWC) provides information-theoretical bounds on how much information can be exchanged even in the presence of an…
read more here.
Keywords:
information;
causal side;
non causal;
side information ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24111595
Abstract: This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any…
read more here.
Keywords:
wiretap channel;
presence;
jammer;
wiretap ... See more keywords