Y Xu, J Xia, H Wu, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we consider a Q-learning-based power allocation strategy for a secure physical-layer system under dynamic radio environments. In such a system, the transmitter …
C Li, Y Xu, J Xia, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends some confidential message to one receiver, under the smart attack from one unmanned …
S Lai, J Xia, D Zou, L Fan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we study an intelligent secure communication scheme for cognitive networks with multiple primary transmit power, where a secondary Alice transmits its secrecy data to a …
Y Li, L Xiao, H Dai, HV Poor - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Multiple-input multiple-output (MIMO) systems are threatened by smart attackers, who apply programmable radio devices such as software defined radios to perform multiple types of …
C Zhao, Q Wang, X Liu, C Li, L Shi - Digital Signal Processing, 2021 - Elsevier
Smart jammer and smart anti-jammer have always been attacked and defensed in a contradictory way. In fact, there exists fundamental trade-off between all evolved parties. It is …
L Jia, Y Xu, Y Sun, S Feng… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
This article investigates the anti-jamming communications problem in wireless networks from a Stackelberg game perspective. By exploring and analyzing the inherent …
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the …
J Xia, Y Xu, D Deng, Q Zhou, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the power control strategy of intelligent secure communication with statistic channel state information (CSI) for Internet of Things (IoT) networks, where a …
F Yao, L Jia, Y Sun, Y Xu, S Feng, Y Zhu - Wireless Networks, 2019 - Springer
This paper investigates the channel selection problem for anti-jamming defense in an adversarial environment. In our work, we simultaneously consider malicious jamming and co …