{"id":"https://openalex.org/W2917486450","doi":"https://doi.org/10.1109/nana.2018.8648749","title":"Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network","display_name":"Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2917486450","doi":"https://doi.org/10.1109/nana.2018.8648749","mag":"2917486450"},"language":"en","primary_location":{"id":"doi:10.1109/nana.2018.8648749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nana.2018.8648749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Networking and Network Applications (NaNA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100625169","display_name":"Yan Gao","orcid":"https://orcid.org/0000-0002-0167-6649"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Gao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101932355","display_name":"Yong Zeng","orcid":"https://orcid.org/0000-0003-2551-7009"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Zeng","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102724893","display_name":"Zhihong Liu","orcid":"https://orcid.org/0000-0003-3314-4943"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Liu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038086837","display_name":"Yeqiu Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yeqiu Xiao","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019 an, China","School of Computer Science and Technology, Xidian University, Xi' an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019 an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi' an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100625169"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.2575,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59898825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"74","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.9401042461395264},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8170907497406006},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7910149097442627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7470744848251343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6436018943786621},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4847809672355652},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.46378931403160095},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44447293877601624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4128822088241577},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.26656103134155273},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10222458839416504}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.9401042461395264},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8170907497406006},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7910149097442627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7470744848251343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6436018943786621},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4847809672355652},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.46378931403160095},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44447293877601624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4128822088241577},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.26656103134155273},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10222458839416504},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nana.2018.8648749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nana.2018.8648749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Networking and Network Applications (NaNA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1680452241","https://openalex.org/W1928747060","https://openalex.org/W1979550826","https://openalex.org/W1992535127","https://openalex.org/W2010535747","https://openalex.org/W2054496355","https://openalex.org/W2056944867","https://openalex.org/W2091682073","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2113706820","https://openalex.org/W2141432745","https://openalex.org/W2261717057","https://openalex.org/W2318893574","https://openalex.org/W2527624719","https://openalex.org/W2591436624","https://openalex.org/W2612039558","https://openalex.org/W6727447527"],"related_works":["https://openalex.org/W3010011315","https://openalex.org/W2006247891","https://openalex.org/W1680452241","https://openalex.org/W2102851649","https://openalex.org/W2889153935","https://openalex.org/W2781545787","https://openalex.org/W2069544599","https://openalex.org/W2783100162","https://openalex.org/W2910353675","https://openalex.org/W2169847658"],"abstract_inverted_index":{"Cooperative":[0],"jamming":[1,55],"is":[2,11,45,56,87,100,109,118],"a":[3,30,35,39,59],"popular":[4],"technique":[5],"for":[6,140,157],"physical":[7,40,75],"layer":[8],"security,":[9],"which":[10],"helpful":[12,119],"to":[13,89,102,120],"increase":[14],"the":[15,22,47,74,79,90,135,147,154],"secrecy":[16,122,155],"of":[17,24,34,53,65,84,92,105,125,137],"communication":[18,41,76,126,158],"networks.":[19,127,159],"To":[20],"enhance":[21,153],"performance":[23,156],"cooperative":[25,106,141],"jamming,":[26],"this":[27],"paper":[28],"proposed":[29,130,148],"two-layer":[31,131],"network":[32,37,49,77,132],"consisting":[33],"social":[36,48,85,113],"and":[38,50,68,97,115,150],"network.":[42],"Each":[43],"user":[44,67],"in":[46,73],"their":[51,69],"willingness":[52],"providing":[54],"modeled":[57],"by":[58],"susceptible-infective-recovery(SIR)":[60],"spreading":[61],"model,":[62],"while":[63],"devices":[64],"each":[66],"connection":[70],"are":[71],"presented":[72],"as":[78],"lower":[80],"layer.":[81],"The":[82],"concept":[83],"tie":[86,114],"introduced":[88],"description":[91],"connections":[93],"between":[94],"two":[95],"layers,":[96],"game":[98],"theory":[99],"used":[101],"model":[103,117,149],"processes":[104],"jamming.":[107,142],"It":[108],"discovered":[110],"that":[111],"stronger":[112],"SIR":[116],"decrease":[121],"outage":[123],"probability":[124],"Furthermore,":[128],"our":[129],"can":[133],"raise":[134],"efficiency":[136],"designing":[138],"strategies":[139],"Simulation":[143],"results":[144],"also":[145],"demonstrate":[146],"algorithms":[151],"successfully":[152]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
