{"id":"https://openalex.org/W2344737609","doi":"https://doi.org/10.1109/tdsc.2015.2501288","title":"Learning-Based Jamming Attack against Low-Duty-Cycle Networks","display_name":"Learning-Based Jamming Attack against Low-Duty-Cycle Networks","publication_year":2015,"publication_date":"2015-11-17","ids":{"openalex":"https://openalex.org/W2344737609","doi":"https://doi.org/10.1109/tdsc.2015.2501288","mag":"2344737609"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2501288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2501288","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018052697","display_name":"Zequ Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zequ Yang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018052697"],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":2.9954,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.92434665,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"14","issue":"6","first_page":"650","last_page":"663"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8327820301055908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8307686448097229},{"id":"https://openalex.org/keywords/duty-cycle","display_name":"Duty cycle","score":0.7147390842437744},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5282363295555115},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4936905801296234},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4891107678413391},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.47712019085884094},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45935678482055664},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.4152714014053345},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33464720845222473},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15355786681175232},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09970134496688843}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8327820301055908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8307686448097229},{"id":"https://openalex.org/C199822604","wikidata":"https://www.wikidata.org/wiki/Q557120","display_name":"Duty cycle","level":3,"score":0.7147390842437744},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5282363295555115},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4936905801296234},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4891107678413391},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47712019085884094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45935678482055664},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.4152714014053345},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33464720845222473},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15355786681175232},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09970134496688843},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2015.2501288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2501288","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G6076887803","display_name":null,"funder_award_id":"U1401253","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8528546779","display_name":null,"funder_award_id":"61429301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1539762044","https://openalex.org/W1594885208","https://openalex.org/W1601563802","https://openalex.org/W1865410070","https://openalex.org/W1965587326","https://openalex.org/W1972792640","https://openalex.org/W2005497978","https://openalex.org/W2007356426","https://openalex.org/W2007917848","https://openalex.org/W2010202902","https://openalex.org/W2069088696","https://openalex.org/W2081531839","https://openalex.org/W2084314197","https://openalex.org/W2094636498","https://openalex.org/W2098236660","https://openalex.org/W2098290609","https://openalex.org/W2107831657","https://openalex.org/W2108245550","https://openalex.org/W2115073281","https://openalex.org/W2115513651","https://openalex.org/W2124280970","https://openalex.org/W2134959123","https://openalex.org/W2136032111","https://openalex.org/W2140372921","https://openalex.org/W2141825620","https://openalex.org/W2153526702","https://openalex.org/W2155492251","https://openalex.org/W2157752629","https://openalex.org/W2161313783","https://openalex.org/W2170121143","https://openalex.org/W2313622824","https://openalex.org/W2340384825","https://openalex.org/W3015681923","https://openalex.org/W3136981673","https://openalex.org/W3148392934","https://openalex.org/W4236592612","https://openalex.org/W6674214069","https://openalex.org/W6677562957","https://openalex.org/W6683704888","https://openalex.org/W7071056248"],"related_works":["https://openalex.org/W4200319726","https://openalex.org/W1984793747","https://openalex.org/W3197729047","https://openalex.org/W4312547492","https://openalex.org/W1987034598","https://openalex.org/W2370486284","https://openalex.org/W2143847498","https://openalex.org/W2354671671","https://openalex.org/W4388214506","https://openalex.org/W2757085934"],"abstract_inverted_index":{"Jamming":[0],"is":[1,122],"a":[2,72,177],"typical":[3,184],"attack":[4,22,45,76],"by":[5],"exploiting":[6],"the":[7,24,29,41,53,60,83,88,99,103,114,127,137,147,151,171],"nature":[8],"of":[9,13,20,39,43,87,120,129,153,166],"wireless":[10,31],"communication.":[11],"Lots":[12],"researchers":[14,148],"are":[15],"working":[16],"on":[17],"improving":[18],"energy-efficiency":[19],"jamming":[21,44,75,185],"from":[23,58],"attacker\u2019s":[25],"view.":[26],"Whereas,":[27],"in":[28,95,176],"low-duty-cycle":[30,79,154,179],"sensor":[32],"networks":[33],"where":[34],"nodes":[35],"stay":[36],"asleep":[37],"most":[38],"time,":[40],"design":[42,85,161],"becomes":[46],"even":[47],"more":[48],"challenging":[49],"especially":[50,175],"when":[51],"considering":[52],"stochastic":[54],"transmission":[55],"pattern":[56],"arising":[57],"both":[59],"clock":[61],"drift":[62],"and":[63,91,169],"other":[64],"uncertainties.":[65],"In":[66],"this":[67],"paper,":[68],"we":[69,133],"propose":[70],"LearJam,":[71,143],"novel":[73],"learning-based":[74],"strategy":[77],"against":[78,142],"networks,":[80],"which":[81,144],"features":[82],"two-phase":[84],"consisting":[86],"learning":[89],"phase":[90],"attacking":[92],"phase.":[93],"Then":[94],"order":[96],"to":[97,102,113,125,149],"degrade":[98],"network":[100],"throughput":[101,173],"maximal":[104],"degree,":[105],"LearJam":[106],"jointly":[107],"optimizes":[108],"these":[109],"two":[110],"phases":[111],"subject":[112],"energy":[115],"constraint.":[116],"Moreover,":[117],"such":[118],"process":[119],"optimization":[121],"operated":[123],"iteratively":[124],"accommodate":[126],"requirement":[128],"practical":[130],"implementation.":[131],"Conversely,":[132],"also":[134],"discuss":[135],"how":[136],"state-of-the-art":[138],"mechanisms":[139],"can":[140],"defend":[141],"will":[145],"aid":[146],"improve":[150],"security":[152],"networks.":[155],"Extensive":[156],"simulations":[157],"show":[158],"that":[159],"our":[160],"achieves":[162],"significantly":[163],"higher":[164],"number":[165],"successful":[167],"attacks":[168],"reduces":[170],"network\u2019s":[172],"considerably,":[174],"sparse":[178],"network,":[180],"compared":[181],"with":[182],"some":[183],"strategies.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5},{"year":2016,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
