{"id":"https://openalex.org/W4288388738","doi":"https://doi.org/10.1109/spawc51304.2022.9833927","title":"Eavesdropping Game Based on Multi-Agent Deep Reinforcement Learning","display_name":"Eavesdropping Game Based on Multi-Agent Deep Reinforcement Learning","publication_year":2022,"publication_date":"2022-07-04","ids":{"openalex":"https://openalex.org/W4288388738","doi":"https://doi.org/10.1109/spawc51304.2022.9833927"},"language":"en","primary_location":{"id":"doi:10.1109/spawc51304.2022.9833927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spawc51304.2022.9833927","pdf_url":null,"source":{"id":"https://openalex.org/S4363607144","display_name":"2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035534606","display_name":"Delin Guo","orcid":"https://orcid.org/0000-0002-8725-6804"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Delin Guo","raw_affiliation_strings":["Nanjing University,Nanjing","Nanjing University, Nanjing"],"affiliations":[{"raw_affiliation_string":"Nanjing University,Nanjing","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"Nanjing University, Nanjing","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041083348","display_name":"Lan Tang","orcid":"https://orcid.org/0000-0002-1646-8455"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lan Tang","raw_affiliation_strings":["Nanjing University,Nanjing","Nanjing University, Nanjing"],"affiliations":[{"raw_affiliation_string":"Nanjing University,Nanjing","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"Nanjing University, Nanjing","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045457613","display_name":"L\u00fcxi Yang","orcid":"https://orcid.org/0000-0003-1474-1806"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lvxi Yang","raw_affiliation_strings":["Southeast University,Nanjing,China","Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007832415","display_name":"Ying\u2010Chang Liang","orcid":"https://orcid.org/0000-0003-2671-5090"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying-Chang Liang","raw_affiliation_strings":["University of Electronic Science and Technology of China,Chengdu,China","University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035534606"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0734502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.909452497959137},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8640875220298767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7937575578689575},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7855044603347778},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5800656080245972},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.522678554058075},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.5191682577133179},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4200096130371094},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38944947719573975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3253978490829468},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.317535400390625},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.282479852437973},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28154271841049194},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09480851888656616}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.909452497959137},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8640875220298767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7937575578689575},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7855044603347778},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5800656080245972},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.522678554058075},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.5191682577133179},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4200096130371094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38944947719573975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3253978490829468},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.317535400390625},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.282479852437973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28154271841049194},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09480851888656616},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spawc51304.2022.9833927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spawc51304.2022.9833927","pdf_url":null,"source":{"id":"https://openalex.org/S4363607144","display_name":"2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2007529001","https://openalex.org/W2009204314","https://openalex.org/W2080147975","https://openalex.org/W2099618002","https://openalex.org/W2144274908","https://openalex.org/W2219510568","https://openalex.org/W2313875766","https://openalex.org/W2597120500","https://openalex.org/W2781726626","https://openalex.org/W2803897411","https://openalex.org/W2962792006","https://openalex.org/W2964164283","https://openalex.org/W2976396018","https://openalex.org/W4255047891","https://openalex.org/W6681187623","https://openalex.org/W6696772115","https://openalex.org/W6747473740"],"related_works":["https://openalex.org/W2772112465","https://openalex.org/W2801712179","https://openalex.org/W3045882672","https://openalex.org/W4313315695","https://openalex.org/W2560615025","https://openalex.org/W2995805091","https://openalex.org/W2064946300","https://openalex.org/W3198833577","https://openalex.org/W4211070069","https://openalex.org/W3201696010"],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"an":[3,113],"adversarial":[4],"scenario":[5],"between":[6,97],"a":[7,11,28,129,150,191],"legitimate":[8],"eavesdropper":[9,66,99],"and":[10,84,94,100,168,172],"suspicious":[12,46,77,102],"communication":[13,36],"pair.":[14],"All":[15],"three":[16],"nodes":[17],"are":[18],"equipped":[19],"with":[20,139,149,166],"multiple":[21],"antennas.":[22],"The":[23,156,175],"eavesdropper,":[24],"which":[25,48],"operates":[26],"in":[27,104],"full-duplex":[29],"model,":[30],"aims":[31,59],"to":[32,54,60,70,162,190],"wiretap":[33,57,73],"the":[34,42,45,56,65,72,76,81,88,91,98,101,110,119,124,145,164,180,195,205],"dubious":[35],"pair":[37,103],"via":[38],"proactive":[39],"jamming.":[40],"On":[41],"other":[43],"hand,":[44],"transmitter,":[47],"can":[49],"send":[50],"artificial":[51],"noise":[52,85],"(AN)":[53],"disturb":[55],"channel,":[58],"guarantee":[61],"secrecy.":[62],"More":[63],"specifically,":[64],"adjusts":[67],"jamming":[68],"power":[69,83,86,181],"enhance":[71],"rate,":[74],"while":[75,194],"transmitter":[78],"jointly":[79],"adapts":[80],"transmit":[82],"against":[87],"eavesdropping.":[89],"Considering":[90],"partial":[92],"observation":[93,171],"complicated":[95],"interactions":[96],"unknown":[105],"system":[106],"dynamics,":[107],"we":[108,127],"model":[109],"problem":[111],"as":[112],"imperfect-information":[114],"stochastic":[115],"game.":[116],"To":[117],"approach":[118],"Nash":[120,192],"equilibrium":[121],"solution":[122],"of":[123,158],"eavesdropping":[125],"game,":[126],"develop":[128],"multi-agent":[130],"reinforcement":[131,152,197],"learning":[132,153,198,206],"(MARL)":[133],"algorithm,":[134,154],"termed":[135],"neural":[136],"fictitious":[137,146],"self-play":[138,147],"soft":[140],"actor-critic":[141],"(NFSP-SAC),":[142],"by":[143,185],"combining":[144],"(FSP)":[148],"deep":[151],"SAC.":[155],"introduction":[157],"SAC":[159],"enables":[160],"FSP":[161],"handle":[163],"problems":[165],"continuous":[167],"high":[169],"dimension":[170],"action":[173],"space.":[174],"simulation":[176],"results":[177],"demonstrate":[178],"that":[179],"allocation":[182],"policies":[183],"learned":[184],"our":[186],"method":[187],"empirically":[188],"converge":[189],"equilibrium,":[193],"compared":[196],"algorithms":[199],"suffer":[200],"from":[201],"severe":[202],"fluctuations":[203],"during":[204],"process.":[207]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
