Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitable for proactive jammers are not effective in dealing with reactive jammers. These advanced jammers with recent advances in signal detection can discern the activities of legitimate radios then attack them as soon as the transmission is detected. To combat this type of jammer, we develop an intelligent deception strategy in which the transmitter generates "fake" transmissions to attract the jammer. After that, the transmitter can either harvest energy from the jamming signals or backscatter the jamming signals to transmit data. As such, we can leverage jamming signals to improve the average throughput and reduce the packet loss. To effectively...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
On-the-fly reconfigurability capabilities and learning prospectives of Cognitive Radios inherently b...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdiffi...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
For wireless networks under jamming attacks, suppressing the jammer is essential to guarantee a reha...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
On-the-fly reconfigurability capabilities and learning prospectives of Cognitive Radios inherently b...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdiffi...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
For wireless networks under jamming attacks, suppressing the jammer is essential to guarantee a reha...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
On-the-fly reconfigurability capabilities and learning prospectives of Cognitive Radios inherently b...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...