Applications of multi-agent reinforcement learning in future internet: A comprehensive survey

T Li, K Zhu, NC Luong, D Niyato, Q Wu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Future Internet involves several emerging technologies such as 5G and beyond 5G
networks, vehicular networks, unmanned aerial vehicle (UAV) networks, and Internet of …

Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

Secure transmission scheme based on joint radar and communication in mobile vehicular networks

Y Yao, F Shu, Z Li, X Cheng… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security
and privacy since all types of possible breaches are common in connected and autonomous …

Dynamic beam pattern and bandwidth allocation based on multi-agent deep reinforcement learning for beam hopping satellite systems

Z Lin, Z Ni, L Kuang, C Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the non-uniform geographic distribution and time-varying characteristics of the
ground traffic request, how to make full use of the limited beam resources to serve users …

GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network

M Chen, W Liu, N Zhang, J Li, Y Ren, M Yi… - Expert Systems with …, 2022 - Elsevier
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable
to interference attacks by malicious jammers, which endangers the communication quality of …

Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach

H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …

Outage constrained robust beamforming optimization for multiuser IRS-assisted anti-jamming communications with incomplete information

Y Sun, K An, J Luo, Y Zhu, G Zheng… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Malicious jamming attacks have been regarded as a serious threat to Internet of Things (IoT)
networks, which can significantly degrade the Quality of Service (QoS) of users. This article …

Dynamic spectrum anti-jamming communications: Challenges and opportunities

X Wang, J Wang, Y Xu, J Chen, L Jia… - IEEE …, 2020 - ieeexplore.ieee.org
Due to the openness of the transmission medium, it is necessary for radio systems to have
anti-jamming abilities. Traditional anti-jamming methods such as sequence-based …

Beam-domain anti-jamming transmission for downlink massive MIMO systems: A Stackelberg game perspective

Z Shen, K Xu, X Xia - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this paper, beam-domain (BD) anti-jamming transmission in a downlink massive multiple-
input multiple-output (MIMO) system is investigated. A smart jammer with multiple antennas …

Safe exploration in wireless security: A safe reinforcement learning algorithm with hierarchical structure

X Lu, L Xiao, G Niu, X Ji, Q Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most safe reinforcement learning (RL) algorithms depend on the accurate reward that is
rarely available in wireless security applications and suffer from severe performance …