2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN) 2017
DOI: 10.1109/iccsn.2017.8230289
|View full text |Cite
|
Sign up to set email alerts
|

A novel jamming strategy-greedy bandit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Researches relied on that of previous article proves that it is possible to base only on standard rewards for all types of environment (e.g. civilian, military) [151]. They find two new kinds of reward, which are the change of power and the enduring time.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Researches relied on that of previous article proves that it is possible to base only on standard rewards for all types of environment (e.g. civilian, military) [151]. They find two new kinds of reward, which are the change of power and the enduring time.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
“…Also, experiments have demonstrated that the proposed algorithm converges faster to the optimal solution than that used with e-greedy, except when the discriminating parameter of the e-greedy algorithm is optimal (M) [150]. The objective thus becomes finding the optimal discriminant parameter (M) in the first time, in order to apply the e-greedy resolution algorithm in a second step [151]. Thanks to simulation, they compare their results with the 'Jamming bandit'algorithm and show that their method converges faster towards an optimal jamming solution.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
“…The signaling scheme they use might be binary phase‐shift keying, quadrature phase‐shift keying, multilevel quadrature amplitude modulation, or others, which could be recognized by the jammer that adopts the theory of modulation recognition. For the purpose of denying communications, the jammer aims to learn a jamming strategy using the RL algorithms proposed in other works, and the jamming actions are selected and executed according to the learned policy. When adversarial communicators are experiencing persistent jamming, they must employ some strategies to resist the effects of jamming, such as increasing the power of the transmitted signal, changing signal modulations, switching channels, or adopting antijamming strategies.…”
Section: System Modelmentioning
confidence: 99%
“…Fortunately, many approaches have also been proposed to learn how to act in an unknown communication environment. The classical theory of reinforcement learning (RL), in which an agent learns and adapts its strategy by using the feedback of its actions that have been used in the past, has received much attention. Specifically, this theory learns an optimal strategy by repeatedly interacting with the environment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation