In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy to deal with reactive jamming attacks. In particular, for a smart and reactive jamming attack, the jammer is able to sense the channel and attack the channel if it detects communications from the legitimate transmitter. To deal with such attacks, we propose an intelligent deception strategy which allows the legitimate transmitter to transmit 'fake' signals to attract the jammer. Then, if the jammer attacks the channel, the transmitter can leverage the strong jamming signals to transmit data by using ambient backscatter communication technology or harvest energy from the strong jamming signals for future use. By doing so, we can not only underm...
This letter introduces a novel idea to defend jamming attacks for wireless communications. In partic...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
The threat of a malicious user interfering with network traffic so as to deny access to resources is...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy ...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdiffi...
With the development of access technologies and artificial intelligence, a deep reinforcement learni...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
This letter introduces a novel idea to defend jamming attacks for wireless communications. In partic...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
The threat of a malicious user interfering with network traffic so as to deny access to resources is...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy ...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdiffi...
With the development of access technologies and artificial intelligence, a deep reinforcement learni...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
This letter introduces a novel idea to defend jamming attacks for wireless communications. In partic...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
The threat of a malicious user interfering with network traffic so as to deny access to resources is...