{"id":"https://openalex.org/W2983824697","doi":"https://doi.org/10.1109/icnc47757.2020.9049826","title":"Defeating Jamming Attacks with Ambient Backscatter Communications","display_name":"Defeating Jamming Attacks with Ambient Backscatter Communications","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W2983824697","doi":"https://doi.org/10.1109/icnc47757.2020.9049826","mag":"2983824697"},"language":"en","primary_location":{"id":"doi:10.1109/icnc47757.2020.9049826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049826","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://opus.lib.uts.edu.au/bitstream/10453/136519/4/Draft2%2bICNC1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085560176","display_name":"Nguy\u1ec5n V\u0103n Huynh","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Nguyen Van Huynh","raw_affiliation_strings":["University of Technology Sydney,School of Electrical and Data Engineering,Australia","School of Electrical and Data Engineering, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Electrical and Data Engineering,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697893","display_name":"Diep N. Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep N. Nguyen","raw_affiliation_strings":["University of Technology Sydney,School of Electrical and Data Engineering,Australia","School of Electrical and Data Engineering, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Electrical and Data Engineering,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992576","display_name":"Dinh Thai Hoang","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["University of Technology Sydney,School of Electrical and Data Engineering,Australia","School of Electrical and Data Engineering, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Electrical and Data Engineering,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063537942","display_name":"Eryk Dutkiewicz","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eryk Dutkiewicz","raw_affiliation_strings":["University of Technology Sydney,School of Electrical and Data Engineering,Australia","School of Electrical and Data Engineering, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Electrical and Data Engineering,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053527850","display_name":"Markus Mueck","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158342","display_name":"Intel (United Kingdom)","ror":"https://ror.org/058cxws58","country_code":"GB","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210158342"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Markus Mueck","raw_affiliation_strings":["Intel Corporation"],"affiliations":[{"raw_affiliation_string":"Intel Corporation","institution_ids":["https://openalex.org/I4210158342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113908985","display_name":"Srikathyayani Srikanteswara","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158342","display_name":"Intel (United Kingdom)","ror":"https://ror.org/058cxws58","country_code":"GB","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210158342"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Srikathyayani Srikanteswara","raw_affiliation_strings":["Intel Corporation"],"affiliations":[{"raw_affiliation_string":"Intel Corporation","institution_ids":["https://openalex.org/I4210158342"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085560176"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.849,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81484512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"405","last_page":"409"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.9034600853919983},{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.8433548808097839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5520711541175842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48601871728897095},{"id":"https://openalex.org/keywords/remote-sensing","display_name":"Remote sensing","score":0.4269995391368866},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.363460898399353},{"id":"https://openalex.org/keywords/environmental-science","display_name":"Environmental science","score":0.3436221480369568},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.2025989294052124},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1093134880065918},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09411579370498657}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.9034600853919983},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.8433548808097839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5520711541175842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48601871728897095},{"id":"https://openalex.org/C62649853","wikidata":"https://www.wikidata.org/wiki/Q199687","display_name":"Remote sensing","level":1,"score":0.4269995391368866},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.363460898399353},{"id":"https://openalex.org/C39432304","wikidata":"https://www.wikidata.org/wiki/Q188847","display_name":"Environmental science","level":0,"score":0.3436221480369568},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.2025989294052124},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1093134880065918},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09411579370498657},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icnc47757.2020.9049826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049826","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/136519","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/136519","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/136519/4/Draft2%2bICNC1.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:opus.lib.uts.edu.au:10453/136519","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/136519","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/136519/4/Draft2%2bICNC1.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2983824697.pdf","grobid_xml":"https://content.openalex.org/works/W2983824697.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W32403112","https://openalex.org/W1496590343","https://openalex.org/W1990011673","https://openalex.org/W2049516452","https://openalex.org/W2065154528","https://openalex.org/W2069589115","https://openalex.org/W2099461393","https://openalex.org/W2146886176","https://openalex.org/W2156288624","https://openalex.org/W2173564293","https://openalex.org/W2486702221","https://openalex.org/W2762495169","https://openalex.org/W2765492968","https://openalex.org/W2775135700","https://openalex.org/W2951799221","https://openalex.org/W4242781462","https://openalex.org/W6685444567"],"related_works":["https://openalex.org/W1984793747","https://openalex.org/W4312547492","https://openalex.org/W3197729047","https://openalex.org/W3016692377","https://openalex.org/W1624160917","https://openalex.org/W2370486284","https://openalex.org/W2143847498","https://openalex.org/W2354671671","https://openalex.org/W1987034598","https://openalex.org/W3005169718"],"abstract_inverted_index":{"While":[0],"the":[1,8,19,33,41,50,53,55,58,65,70,87,92,96,99,132,140,146,158,166],"existing":[2],"anti-jamming":[3,174],"solutions":[4],"tend":[5],"to":[6,28,36,61,64,90,139,162,172],"\u201cescape\u201d":[7],"attacks":[9,20,52,74],"by":[10,31,169],"finding":[11],"another":[12],"communication":[13,47],"channel":[14],"or":[15],"adapting,":[16],"waiting":[17],"until":[18],"cease,":[21],"this":[22],"work":[23],"proposes":[24],"an":[25],"unprecedented":[26],"method":[27],"combat":[29],"jammers":[30],"leveraging":[32],"jamming":[34,59,73],"signals":[35,60],"transmit":[37],"data":[38],"based":[39,130],"on":[40,131],"recent":[42],"advances":[43],"in":[44],"ambient":[45],"backscatter":[46,62],"technology.":[48],"When":[49],"jammer":[51],"channels,":[54],"transmitter":[56],"modulates":[57],"information":[63],"receiver.":[66],"To":[67],"deal":[68],"with":[69,86,112],"uncertainty":[71],"of":[72,116],"and":[75,164],"environment":[76],"conditions,":[77],"we":[78,122],"first":[79],"develop":[80,123],"a":[81,113,124],"Markov":[82],"decision":[83],"process":[84],"framework":[85],"Q-learning":[88,100],"algorithm":[89,101,129],"obtain":[91],"optimal":[93,141],"policy":[94,142],"for":[95,105,110],"system.":[97],"However,":[98],"is":[102],"widely":[103],"known":[104],"its":[106],"slow":[107],"convergence,":[108],"especially":[109],"systems":[111],"large":[114],"number":[115],"states":[117],"and/or":[118],"actions.":[119],"For":[120],"that,":[121],"novel":[125],"deep":[126],"reinforcement":[127],"learning":[128],"dueling":[133],"neural":[134],"network":[135],"architecture":[136],"that":[137,152],"converges":[138],"much":[143],"faster":[144],"than":[145],"conventional":[147],"Q-learning.":[148],"Extensive":[149],"simulations":[150],"show":[151],"our":[153],"proposed":[154],"solution":[155],"can":[156],"improve":[157],"average":[159],"throughput":[160],"up":[161],"426%":[163],"reduce":[165],"packet":[167],"loss":[168],"24%":[170],"compared":[171],"other":[173],"solutions.":[175]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-01-28T23:14:49.684275","created_date":"2025-10-10T00:00:00"}
