2018
DOI: 10.1109/tvt.2017.2785414
|View full text |Cite
|
Sign up to set email alerts
|

User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 133 publications
(92 citation statements)
references
References 32 publications
0
88
0
Order By: Relevance
“…2) Proposed Analytical Approximation: Here, we propose an approximate closed-form solution for P ⋆ J for the asymptotic case with γ SU ≫ 1 and γ AU ≫ 1 along with P J ≫ P ft [7]. Under these approximations, using (4) and (5), objective function of (P3) can be reduced to:…”
Section: Optimal Jamming Powermentioning
confidence: 99%
See 1 more Smart Citation
“…2) Proposed Analytical Approximation: Here, we propose an approximate closed-form solution for P ⋆ J for the asymptotic case with γ SU ≫ 1 and γ AU ≫ 1 along with P J ≫ P ft [7]. Under these approximations, using (4) and (5), objective function of (P3) can be reduced to:…”
Section: Optimal Jamming Powermentioning
confidence: 99%
“…Recent studies have shown interest on optimizing the EE of jamming attacker [3], [4]. Whereas optimal attacking strategies for hybrid attacker are designed in [5], [6] to achieve maximum degradation in the secrecy rate, however EE aspect has been neglected. Further, decoding-based energy-expenditures in eavesdropping and practical circuit-level consumption during jamming have been ignored while considering energy consumption at attacker [3]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…LMI conditions are derived for parameter estimation in the attack design. It is important to note that the model‐based (deep, Nash) Q ‐learning technique has been well used in the secure defense against network threat, outside of the data‐driven DoS attack design.…”
Section: Resultsmentioning
confidence: 99%
“…The simulation results in [118] show that the proposed DQL can improve the UAV's utility up to 13% compared with the baseline scheme [119] which uses the Win or Learn Faster-Policy Hill Climbing (WoLF-PHC) to prevent the attack. Also, the safe rate of the UAV, i.e., the probability that the UAV is attacked, obtained by the proposed DQL is 7% higher than that of the baseline.…”
Section: A Network Securitymentioning
confidence: 99%