{"id":"https://openalex.org/W2958231826","doi":"https://doi.org/10.1109/icc.2019.8761848","title":"Deep Reinforcement Learning Based Multi-User Anti-Jamming Strategy","display_name":"Deep Reinforcement Learning Based Multi-User Anti-Jamming Strategy","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2958231826","doi":"https://doi.org/10.1109/icc.2019.8761848","mag":"2958231826"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009378480","display_name":"Yue Bi","orcid":"https://orcid.org/0009-0001-6220-7475"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I190752583","display_name":"ParisTech","ror":"https://ror.org/05c2qg481","country_code":"FR","type":"education","lineage":["https://openalex.org/I190752583"]}],"countries":["CN","FR"],"is_corresponding":true,"raw_author_name":"Yue Bi","raw_affiliation_strings":["SJTU-ParisTech, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"SJTU-ParisTech, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930","https://openalex.org/I190752583"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024861962","display_name":"Yue Wu","orcid":"https://orcid.org/0000-0002-7454-0451"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Wu","raw_affiliation_strings":["National Engineering Laboratory for Information Content Analysis Technology, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Information Content Analysis Technology, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044004251","display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["National Engineering Laboratory for Information Content Analysis Technology, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Information Content Analysis Technology, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009378480"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I190752583"],"apc_list":null,"apc_paid":null,"fwci":2.5943,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.90554543,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.853986382484436},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8246949911117554},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.707905650138855},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.604545533657074},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5636613368988037},{"id":"https://openalex.org/keywords/q-learning","display_name":"Q-learning","score":0.5627583265304565},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5051780343055725},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4881211221218109},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.4579850435256958},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4539766311645508},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.44361573457717896},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2616180181503296},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08288124203681946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.853986382484436},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8246949911117554},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.707905650138855},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.604545533657074},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5636613368988037},{"id":"https://openalex.org/C188116033","wikidata":"https://www.wikidata.org/wiki/Q2664563","display_name":"Q-learning","level":3,"score":0.5627583265304565},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5051780343055725},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4881211221218109},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.4579850435256958},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4539766311645508},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.44361573457717896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2616180181503296},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08288124203681946},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W170281260","https://openalex.org/W1514713802","https://openalex.org/W1520511141","https://openalex.org/W2047399268","https://openalex.org/W2064675550","https://openalex.org/W2101018825","https://openalex.org/W2124280970","https://openalex.org/W2125969373","https://openalex.org/W2145339207","https://openalex.org/W2167230435","https://openalex.org/W2288458277","https://openalex.org/W2291922685","https://openalex.org/W2612365756"],"related_works":["https://openalex.org/W3096874164","https://openalex.org/W2166117066","https://openalex.org/W2357975469","https://openalex.org/W2136202932","https://openalex.org/W3087814763","https://openalex.org/W2361647908","https://openalex.org/W2937181779","https://openalex.org/W2537866915","https://openalex.org/W2089415692","https://openalex.org/W4294873804"],"abstract_inverted_index":{"The":[0,52,125],"threat":[1],"of":[2,100,103,130],"radio":[3,9],"frequency":[4,85],"jamming":[5,90],"attack":[6,91],"to":[7,30],"cognitive":[8],"network":[10,111,116],"is":[11,23],"an":[12],"issue":[13],"that":[14],"has":[15],"been":[16],"discussed":[17],"for":[18],"a":[19,24,71,93],"long":[20,120],"time.":[21],"Q-learning":[22,37,57],"widely":[25],"used":[26],"anti-jamming":[27,39],"algorithm":[28,83],"due":[29],"its":[31],"model-free":[32],"characteristic.":[33],"However,":[34],"the":[35,65,80,98,108,113,119,128,131,136,140],"traditional":[36],"based":[38,67],"algorithms":[40],"suffer":[41],"from":[42],"some":[43],"limitations":[44],"when":[45],"dealing":[46],"with":[47,70,84],"high-dimensional":[48],"or":[49],"continuous":[50],"inputs.":[51],"recently":[53],"proposed":[54],"double":[55,81,132],"Deep":[56],"Network":[58],"(DQN)":[59],"overcomes":[60],"this":[61,76],"weakness":[62],"by":[63],"approximating":[64],"table":[66],"Q":[68],"function":[69],"deep":[72],"neural":[73,104,115],"network.":[74],"In":[75],"paper,":[77],"we":[78],"apply":[79],"DQN":[82,133],"hopping":[86],"strategy":[87],"against":[88],"RF":[89],"in":[92],"multi-user":[94],"environment.":[95],"We":[96],"test":[97],"performances":[99],"three":[101],"types":[102],"networks":[105],"which":[106],"are":[107],"fully":[109],"connected":[110],"(FCN),":[112],"convolutional":[114],"(CNN)":[117],"and":[118],"short":[121],"term":[122],"memory":[123],"(LSTM).":[124],"simulation":[126],"shows":[127],"effectiveness":[129],"algorithm.":[134],"Meanwhile,":[135],"FCN":[137],"agent":[138],"gives":[139],"best":[141],"result":[142],"concerning":[143],"stability.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
