Jamming-resistant communication without pre-shared secrets has received extensive attention recently and is commonly tackled by utilizing the technique of uncoordinated frequency hopping (UFH). However, existing approaches exhibit signi cant performance constraints due to the use of UFH at both the sender and the receiver sides. To improve the state of the art, in this paper we aim to signi cantly improve the performance of the anti-jamming system in the presence of a power-limited jammer. Speci cally, we for the rst time jointly consider UFH and power control and pose these two techniques into a uniform framework. The proposed approach utilizes online learning theory to determine both the hopping channels and the transmitting powers based ...
The topic of physical layer key agreement in Gaussian block fading channels in the presence of activ...
Abstract — As compared to its wired counterpart, wireless network is relatively new and is exposed t...
Malicious jamming launched by smart jammers can attack legitimate transmissions, which has been rega...
Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research intere...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
We consider the problem of a transmitter transmitting to its receiver over a wireless link subject t...
Abstract—Jamming-resistant communication is crucial for safety-critical applications such as emergen...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
Abstract — Uncoordinated Frequency Hopping (UFH) is a vi-able anti-jamming solution without dependen...
We study the problem of jamming in a fixed-rate wireless system over fast fading channels. Both tran...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
Abstract—This work proposes a framework for jamming wire-less networks that incorporates probabilist...
Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scen...
In this article, we adopt outage probability (λ-capacity) in fastfading channels as a pay-off functi...
The topic of physical layer key agreement in Gaussian block fading channels in the presence of activ...
Abstract — As compared to its wired counterpart, wireless network is relatively new and is exposed t...
Malicious jamming launched by smart jammers can attack legitimate transmissions, which has been rega...
Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research intere...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
We consider the problem of a transmitter transmitting to its receiver over a wireless link subject t...
Abstract—Jamming-resistant communication is crucial for safety-critical applications such as emergen...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
Abstract — Uncoordinated Frequency Hopping (UFH) is a vi-able anti-jamming solution without dependen...
We study the problem of jamming in a fixed-rate wireless system over fast fading channels. Both tran...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
Abstract—This work proposes a framework for jamming wire-less networks that incorporates probabilist...
Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scen...
In this article, we adopt outage probability (λ-capacity) in fastfading channels as a pay-off functi...
The topic of physical layer key agreement in Gaussian block fading channels in the presence of activ...
Abstract — As compared to its wired counterpart, wireless network is relatively new and is exposed t...
Malicious jamming launched by smart jammers can attack legitimate transmissions, which has been rega...