2018
DOI: 10.1049/iet-com.2018.0059
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding multiuser communication using full‐duplex jamming and Q‐learning algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…The prologue to AI based lightweight physical layer security is introduced [30], managing numerical models. Also, to ensure the security of wireless communication medium, a feedforward neural system is introduced in [31,32,33] to group adversarial attackers. In the meantime, during the time spent while preparing and processing data, the program isolates the trust of the devices into various levels and assess its performance.…”
Section: Related Workmentioning
confidence: 99%
“…The prologue to AI based lightweight physical layer security is introduced [30], managing numerical models. Also, to ensure the security of wireless communication medium, a feedforward neural system is introduced in [31,32,33] to group adversarial attackers. In the meantime, during the time spent while preparing and processing data, the program isolates the trust of the devices into various levels and assess its performance.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, unlike [11][12][13][14][15] where unsupervised and supervised learning are used, we implement the system model based on reinforcement learning, as shown in Figure 2.…”
Section: Reinforcement Learning For Multi-agentmentioning
confidence: 99%
“…Whereas in [14,15], the authors present a novel deep reinforcement learning-based joint spectrum sensing and power control algorithm for downlink communications in a cognitive small cell. Regrettably, the authors did not investigate the outage probability for the whole system.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, as the amount of data has grown and computing power has increased, many new artificial intelligence methods have emerged, including reinforcement learning, transfer learning, and deep learning. Reinforcement learning can operate with only limited knowledge of the environment and with limited feedback on the quality of the decisions, and it is widely used in smart grid networks [11], communication networks [12], etc. Transfer learning can migrate the model for big data to small data and realize personalized migration, which is the direction of future development.…”
Section: Introductionmentioning
confidence: 99%