{"id":"https://openalex.org/W4417284642","doi":"https://doi.org/10.1109/pimrc62392.2025.11275524","title":"Bait Tactics: Misleading DRL-Based Cognitive Anti-Jamming Communications via Adversarial Learning","display_name":"Bait Tactics: Misleading DRL-Based Cognitive Anti-Jamming Communications via Adversarial Learning","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417284642","doi":"https://doi.org/10.1109/pimrc62392.2025.11275524"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11275524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101970885","display_name":"Muhammad Arif","orcid":"https://orcid.org/0000-0003-0513-9872"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Muhammad Shahzad Arif","raw_affiliation_strings":["Khalifa University,Department of Computer and Information Engineering,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,Department of Computer and Information Engineering,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004034156","display_name":"Sami Muhaidat","orcid":"https://orcid.org/0000-0003-4649-9399"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Sami Muhaidat","raw_affiliation_strings":["Khalifa University,KU 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,KU 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061981044","display_name":"Paschalis C. Sofotasios","orcid":"https://orcid.org/0000-0001-8389-0966"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Paschalis C. Sofotasios","raw_affiliation_strings":["Khalifa University,KU C2PS and 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,KU C2PS and 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101970885"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47553409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.6794000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.6794000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.06909999996423721,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.04780000075697899,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7398999929428101},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7174000144004822},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.682200014591217},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6503999829292297},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5141000151634216},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.47200000286102295},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.46480000019073486},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.4406999945640564},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.428600013256073}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7398999929428101},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7174000144004822},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.682200014591217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6805999875068665},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6503999829292297},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5141000151634216},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.47200000286102295},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.46480000019073486},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.4406999945640564},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.428600013256073},{"id":"https://openalex.org/C32542511","wikidata":"https://www.wikidata.org/wiki/Q5141225","display_name":"Cognitive network","level":4,"score":0.4156999886035919},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4083000123500824},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.3617999851703644},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.34860000014305115},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.32519999146461487},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32010000944137573},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29190000891685486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2888000011444092},{"id":"https://openalex.org/C126388530","wikidata":"https://www.wikidata.org/wiki/Q1131737","display_name":"Imitation","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.26350000500679016},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11275524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W1977742072","https://openalex.org/W2030714532","https://openalex.org/W2118521282","https://openalex.org/W2124280970","https://openalex.org/W2765492968","https://openalex.org/W2806121278","https://openalex.org/W2906540740","https://openalex.org/W2969129261","https://openalex.org/W3163676048","https://openalex.org/W3192787793","https://openalex.org/W3203498076","https://openalex.org/W4252108511"],"related_works":[],"abstract_inverted_index":{"Reinforcement":[0],"learning":[1,177],"(RL)":[2],"has":[3],"emerged":[4],"as":[5,60],"a":[6,57,76,103,152,163],"promising":[7],"tool":[8],"for":[9,174],"enabling":[10],"adaptive":[11],"and":[12,50,94,117,170],"autonomous":[13],"behavior":[14],"in":[15,156,166,179],"cognitive":[16,40,168],"wireless":[17,37,181],"networks,":[18],"where":[19],"online":[20],"decision-making":[21],"is":[22],"required":[23],"under":[24],"partial":[25],"or":[26],"no":[27],"prior":[28],"knowledge":[29],"of":[30,92,147],"the":[31,36,112,129,135,157,172],"environment.":[32],"By":[33],"interacting":[34],"with":[35],"environment,":[38],"RL-based":[39,78],"links":[41],"can":[42,133],"dynamically":[43],"optimize":[44],"transmission":[45],"strategies":[46],"to":[47,66,140,145,151],"mitigate":[48],"interference":[49],"improve":[51],"throughput.":[52],"However,":[53],"this":[54,72,99],"adaptability":[55],"introduces":[56],"critical":[58,164],"vulnerability":[59,73,165],"RL":[61],"agents":[62],"are":[63],"inherently":[64],"sensitive":[65],"deception.":[67],"The":[68],"present":[69],"contribution":[70],"exposes":[71],"by":[74,85,101,138],"analyzing":[75],"deep":[77],"anti-jamming":[79],"link":[80],"that":[81,128],"enhances":[82],"its":[83],"performance":[84],"exploiting":[86],"jamming":[87,105,148,155],"energy":[88,95],"through":[89,121],"intelligent":[90],"use":[91],"backscattering":[93],"harvesting.":[96],"We":[97],"counter":[98],"advantage":[100],"proposing":[102],"deception-based":[104],"strategy,":[106],"termed":[107],"\"bait":[108],"tactics,\"":[109],"which":[110],"manipulates":[111],"agent\u2019s":[113],"perceived":[114],"state":[115],"transitions":[116],"increases":[118],"reward":[119],"variance":[120],"targeted":[122],"environment":[123],"manipulations.":[124],"Simulation":[125],"results":[126],"demonstrate":[127],"proposed":[130],"adversarial":[131],"strategy":[132],"reduce":[134],"victim\u2019s":[136],"throughput":[137],"up":[139,144],"72%":[141],"while":[142],"conserving":[143],"67%":[146],"power":[149],"compared":[150],"standard":[153],"reactive":[154],"considered":[158],"scenario.":[159],"These":[160],"findings":[161],"reveal":[162],"RL-driven":[167],"networks":[169],"highlight":[171],"need":[173],"robust,":[175],"deception-resilient":[176],"frameworks":[178],"future":[180],"systems.":[182]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
