2022
DOI: 10.1109/lwc.2021.3125337
|View full text |Cite
|
Sign up to set email alerts
|

Primary-User-Friendly Dynamic Spectrum Anti-Jamming Access: A GAN-Enhanced Deep Reinforcement Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Only effective with simple channel models Use GAN to learn the probability distribution functions of wireless channels, resulting in better channel response approximation [ from legitimate signals. Similarly, the authors in [90] and [82] aim to prevent jamming attacks as well as interference from secondary users in cognitive radio networks. They first highlight that conventional DL-based anti-jamming approaches give poor performance when spectrum data is not sufficient.…”
Section: Channel Equalizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Only effective with simple channel models Use GAN to learn the probability distribution functions of wireless channels, resulting in better channel response approximation [ from legitimate signals. Similarly, the authors in [90] and [82] aim to prevent jamming attacks as well as interference from secondary users in cognitive radio networks. They first highlight that conventional DL-based anti-jamming approaches give poor performance when spectrum data is not sufficient.…”
Section: Channel Equalizationmentioning
confidence: 99%
“…Incorporating an encoder network into the original GAN to reconstruct the spectrogram [94] Most detection methods cannot effectively detect spoofing jamming if spoofing signals are similar to authentic signals Design a GAN network that is trained on a large dataset of authentic satellite signals to accurately learn their distribution [103] Cannot effectively use to perform attacks Use GAN to construct synthetic RF signals that are similar to legitimate signals [95] Difficult to apply to the key generation in the physical layer Propose a key generation method based on GAN to extract features efficiently between legitimate nodes [104] Not effective in anomaly detection as GAI Use GAN to identify unrecognized patterns on the model outputs and associated sequenced metadata [90] Poor performance when spectrum data is not sufficient Use GAN to generate synthetic spectrum data that can help DRL to effectively learn and obtain the optimal dynamic spectrum anti-jamming access policy [92] Lack of labeled data Use GAN to learn the distribution of collected signals [86] Need attackers' information for training Use VAEs to extract valuable features of high-dimensional channel impulse responses for authentication GAN network to augment the training dataset of the classifier with adversarial samples generated from adversaries' GAN networks. Simulation results then show that by augmenting the training data with GAN the authors can effectively improve the classification accuracy under GAN-based adversarial attacks.…”
Section: Channel Equalizationmentioning
confidence: 99%
“…In the virtual environment, a CDN is trained to learn the best spectrum access strategy. Finally, under the supervision of the skilled CDN, SU accesses the spectrum environment 48–50 . However, the data‐based strategy is more significant for learning the process through historical data monitoring in semiconductor industries to meet the higher power requirements related to the flow of data generated using different IoT and sensor‐related devices 51 .…”
Section: Literature Surveymentioning
confidence: 99%
“…Finally, under the supervision of the skilled CDN, SU accesses the spectrum environment. [48][49][50] However, the data-based strategy is more significant for learning the process through historical data monitoring in semiconductor industries to meet the higher power requirements related to the flow of data generated using different IoT and sensor-related devices. 51 Furthermore, the knowledge-based method frequently necessitates trained competence and domain knowledge to generate a suitable judgment based on the flawed data correlation structure.…”
Section: Literature Surveymentioning
confidence: 99%
“…With the continuous development of artificial intelligence technology, machine learning technology represented by reinforcement learning has also begun to be used in the field of communication anti-jamming [11,12]. A time-domain anti-pulse jamming algorithm (TDAA) based on reinforcement learning is proposed in [13]; this algorithm has a higher time utilization ratio and normalized throughput.…”
Section: Introductionmentioning
confidence: 99%