This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdifficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budgetand is equipped with the self-interference suppression capability to simultaneously attack and listen tothe transmitter’s activities. Consequently, dealing with super-reactive jammers is very challenging. Thus,we introduce a smart deception mechanism to attract the jammer to continuously attack the channel andthen leverage jamming signals to transmit data based on the ambient backscatter communication whichis resilient to radio interference/jamming. To decode the backscattered signals, the maximum likelihood(ML) detector can be adopted. Howeve...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
AbstractDue to shared nature of wireless communication any malicious user can easily monitored commu...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scen...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
Malicious attacks such as jamming can cause significant disruption or complete denial of service (Do...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
AbstractDue to shared nature of wireless communication any malicious user can easily monitored commu...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy t...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scen...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
Malicious attacks such as jamming can cause significant disruption or complete denial of service (Do...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
AbstractDue to shared nature of wireless communication any malicious user can easily monitored commu...