{"id":"https://openalex.org/W4313555763","doi":"https://doi.org/10.1109/tcomm.2023.3234197","title":"Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks","display_name":"Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks","publication_year":2023,"publication_date":"2023-01-05","ids":{"openalex":"https://openalex.org/W4313555763","doi":"https://doi.org/10.1109/tcomm.2023.3234197"},"language":"en","primary_location":{"id":"doi:10.1109/tcomm.2023.3234197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2023.3234197","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057650416","display_name":"Shaodi Wang","orcid":"https://orcid.org/0000-0002-1366-0775"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shao-Di Wang","raw_affiliation_strings":["School of Information and Communication Engineering, Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["School of Information and Communication Engineering, Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["Key Laboratory of Hunan Province for Internet of Things and Information Security, Hunan International Scientific and Technological Cooperation Base of Intelligent Network, School of Computer Science, Xiangtan University, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Hunan Province for Internet of Things and Information Security, Hunan International Scientific and Technological Cooperation Base of Intelligent Network, School of Computer Science, Xiangtan University, Xiangtan, China","institution_ids":["https://openalex.org/I4610292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, Canada"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057650416"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.7955,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70106364,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"71","issue":"2","first_page":"1226","last_page":"1238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.7597372531890869},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7281185388565063},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6374712586402893},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6077754497528076},{"id":"https://openalex.org/keywords/multiuser-detection","display_name":"Multiuser detection","score":0.5409767031669617},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.5363854765892029},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47240036725997925},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.4633142948150635},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4591924250125885},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42858487367630005},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.26526308059692383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2445957064628601},{"id":"https://openalex.org/keywords/code-division-multiple-access","display_name":"Code division multiple access","score":0.13254734873771667}],"concepts":[{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.7597372531890869},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7281185388565063},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6374712586402893},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6077754497528076},{"id":"https://openalex.org/C2777104032","wikidata":"https://www.wikidata.org/wiki/Q16324514","display_name":"Multiuser detection","level":3,"score":0.5409767031669617},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.5363854765892029},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47240036725997925},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.4633142948150635},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4591924250125885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42858487367630005},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26526308059692383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2445957064628601},{"id":"https://openalex.org/C47696715","wikidata":"https://www.wikidata.org/wiki/Q233394","display_name":"Code division multiple access","level":2,"score":0.13254734873771667},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcomm.2023.3234197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2023.3234197","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[{"id":"https://openalex.org/G5135885775","display_name":null,"funder_award_id":"61941118","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8836389263","display_name":null,"funder_award_id":"Grants 62171364","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1426280032","https://openalex.org/W1989125213","https://openalex.org/W2043053235","https://openalex.org/W2044762091","https://openalex.org/W2068300001","https://openalex.org/W2074609004","https://openalex.org/W2107831657","https://openalex.org/W2114316404","https://openalex.org/W2137853299","https://openalex.org/W2154249783","https://openalex.org/W2254069717","https://openalex.org/W2291479726","https://openalex.org/W2313096159","https://openalex.org/W2341724900","https://openalex.org/W2342932645","https://openalex.org/W2706056020","https://openalex.org/W2732830997","https://openalex.org/W2784331297","https://openalex.org/W2884955443","https://openalex.org/W2885760060","https://openalex.org/W2913562617","https://openalex.org/W2952432856","https://openalex.org/W2968945630","https://openalex.org/W3042406116","https://openalex.org/W3054609304","https://openalex.org/W3080804940","https://openalex.org/W3098681289","https://openalex.org/W3123686504","https://openalex.org/W3129615542","https://openalex.org/W3133692331","https://openalex.org/W3199884432","https://openalex.org/W4206563096","https://openalex.org/W4213251304","https://openalex.org/W4253000868","https://openalex.org/W4285297491","https://openalex.org/W4293733481","https://openalex.org/W4312258136","https://openalex.org/W4315605918"],"related_works":["https://openalex.org/W2548963335","https://openalex.org/W2159941915","https://openalex.org/W1995129237","https://openalex.org/W1761601995","https://openalex.org/W4300468626","https://openalex.org/W2904599916","https://openalex.org/W2097713053","https://openalex.org/W2909457694","https://openalex.org/W4321608401","https://openalex.org/W3040536194"],"abstract_inverted_index":{"For":[0],"mission-critical":[1],"massive":[2],"machine-type":[3,29],"communications":[4],"(mMTC)":[5],"applications,":[6],"the":[7,19,25,35,48,57,77,87,103,108,117,121,138,149,164,172,176,182,186,197],"messages":[8],"are":[9,105,132],"required":[10],"to":[11,18],"be":[12,91],"delivered":[13],"in":[14,34,116,143,185],"real-time.":[15],"However,":[16],"due":[17],"weak":[20],"security":[21],"protection":[22],"capabilities":[23],"of":[24,50,102,175,199],"low-cost":[26],"and":[27,53,65,107,195],"low-complexity":[28],"devices,":[30],"active":[31,106],"jamming":[32,44],"attack":[33],"uplink":[36],"access":[37,43],"is":[38,85,114,141],"a":[39,70,99,136,144],"serious":[40],"threat.":[41],"Uplink":[42],"(UAJ)":[45],"can":[46,156],"increase":[47],"number":[49],"dropped/retransmitted":[51],"packets":[52],"restrict":[54],"or":[55],"prevent":[56],"normal":[58,118],"device":[59,113],"access.":[60],"To":[61],"tackle":[62],"this":[63],"vital":[64],"challenging":[66],"problem,":[67],"we":[68],"propose":[69],"novel":[71],"UAJ":[72,95,158],"detection":[73,123,140],"method":[74,167],"based":[75],"on":[76,171,189],"joint":[78],"space-time":[79],"sparsity":[80],"(JSTS).":[81],"Our":[82],"key":[83],"insight":[84],"that":[86],"JSTS-based":[88,139,166,187],"feature":[89,188],"will":[90],"significantly":[92],"impacted":[93],"if":[94],"happens,":[96],"since":[97,178],"only":[98,180],"small":[100],"fraction":[101],"devices":[104],"traffic":[109],"pattern":[110],"for":[111],"each":[112,190],"sporadic":[115],"state.":[119],"Unlike":[120],"existing":[122],"methods":[124],"under":[125],"batch":[126],"mode":[127],"(i.e.,":[128],"all":[129],"sample":[130],"observations":[131],"collected":[133],"before":[134],"making":[135],"decision),":[137],"performed":[142],"sequential":[145],"manner":[146],"by":[147,153],"processing":[148],"received":[150],"signals":[151],"one":[152],"one,":[154],"which":[155],"detect":[157],"as":[159,161],"quickly":[160],"possible.":[162],"Moreover,":[163],"proposed":[165],"does":[168],"not":[169],"rely":[170],"prior":[173],"knowledge":[174],"attackers,":[177],"it":[179],"cares":[181],"abrupt":[183],"change":[184],"frame.":[191],"Numerical":[192],"results":[193],"evaluate":[194],"confirm":[196],"effectiveness":[198],"our":[200],"method.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
