{"id":"https://openalex.org/W7117874726","doi":"https://doi.org/10.1109/tifs.2025.3650410","title":"A Fast Jamming Strategy Optimization Method With Imperfect Experience","display_name":"A Fast Jamming Strategy Optimization Method With Imperfect Experience","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7117874726","doi":"https://doi.org/10.1109/tifs.2025.3650410"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3650410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3650410","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121712075","display_name":"Jianxin Li","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianxin Li","raw_affiliation_strings":["School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419150","display_name":"Tian Tian","orcid":"https://orcid.org/0009-0004-8418-1802"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Tian","raw_affiliation_strings":["School of Aerospace Science and Technology, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Aerospace Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121702818","display_name":"Jingjing Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Cai","raw_affiliation_strings":["School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108889664","display_name":"Weiwei Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Fan","raw_affiliation_strings":["School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100894242","display_name":"Yunan Sun","orcid":"https://orcid.org/0009-0000-1579-1253"},"institutions":[{"id":"https://openalex.org/I2799773085","display_name":"Nanjing General Hospital of Nanjing Military Command","ror":"https://ror.org/04kmpyd03","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I2799773085"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunan Sun","raw_affiliation_strings":["Nanjing Military Representative Bureau, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Military Representative Bureau, Nanjing, China","institution_ids":["https://openalex.org/I2799773085"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121113433","display_name":"Feng Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Zhou","raw_affiliation_strings":["School of Aerospace Science and Technology, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Aerospace Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5121712075"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00841687,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"992","last_page":"1005"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.5562999844551086,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.5562999844551086,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.3156999945640564,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.013500000350177288,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8406000137329102},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.5138000249862671},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47189998626708984},{"id":"https://openalex.org/keywords/radar","display_name":"Radar","score":0.4652999937534332},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.40450000762939453},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.39590001106262207},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.37599998712539673},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.366100013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8456000089645386},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8406000137329102},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.5138000249862671},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47189998626708984},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.4652999937534332},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.40450000762939453},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.39590001106262207},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.334199994802475},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2971000075340271},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C176381164","wikidata":"https://www.wikidata.org/wiki/Q1486507","display_name":"Radar jamming and deception","level":5,"score":0.28519999980926514},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2535000145435333},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3650410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3650410","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W169931978","https://openalex.org/W1598668352","https://openalex.org/W2007824028","https://openalex.org/W2076337359","https://openalex.org/W2108777121","https://openalex.org/W2130953180","https://openalex.org/W2145042174","https://openalex.org/W2145339207","https://openalex.org/W2146578666","https://openalex.org/W2340258819","https://openalex.org/W2426774832","https://openalex.org/W2576693436","https://openalex.org/W2742305982","https://openalex.org/W2746553466","https://openalex.org/W2760983843","https://openalex.org/W2767526384","https://openalex.org/W2952298682","https://openalex.org/W2962787969","https://openalex.org/W2962792006","https://openalex.org/W2967727187","https://openalex.org/W2979589930","https://openalex.org/W3094399866","https://openalex.org/W3123694393","https://openalex.org/W3124489138","https://openalex.org/W3127561923","https://openalex.org/W3156093604","https://openalex.org/W3217470494","https://openalex.org/W4200523872","https://openalex.org/W4210358405","https://openalex.org/W4210466571","https://openalex.org/W4285108887","https://openalex.org/W4285237038","https://openalex.org/W4298002693","https://openalex.org/W4304128224","https://openalex.org/W4312371549","https://openalex.org/W4316022144","https://openalex.org/W4319265158","https://openalex.org/W4367721878","https://openalex.org/W4380680527","https://openalex.org/W4383347217","https://openalex.org/W4385756480","https://openalex.org/W4386453595","https://openalex.org/W4386989208","https://openalex.org/W4388944924","https://openalex.org/W4392086325","https://openalex.org/W4399185318","https://openalex.org/W4399311040"],"related_works":[],"abstract_inverted_index":{"The":[0],"primary":[1],"objective":[2],"of":[3,28,42,122,159],"jamming":[4,17,43,67,90,96,109,123],"strategy":[5,18,44,68,110,145,171],"optimization":[6,69,120],"is":[7],"to":[8,117,126],"ensure":[9],"that":[10,155],"a":[11,58,65,82,106,141,147],"jammer":[12],"timely":[13],"finds":[14],"an":[15],"effective":[16],"against":[19],"the":[20,26,40,47,77,89,95,99,119,157],"multifunction":[21],"radar":[22,78],"(MFR),":[23],"thereby":[24],"ensuring":[25],"safety":[27],"targets.":[29],"Deep":[30],"reinforcement":[31],"learning":[32,55],"(DRL)":[33],"has":[34],"been":[35],"widely":[36],"applied":[37],"in":[38],"solving":[39],"problem":[41],"optimization.":[45],"However,":[46],"process":[48,80,85],"still":[49],"faces":[50],"challenges":[51],"such":[52],"as":[53,81],"low":[54],"efficiency":[56,121,129],"and":[57,87,98,130,146,169],"heavy":[59],"memory":[60],"burden.":[61],"Therefore,":[62],"we":[63,75,104,138],"propose":[64],"fast":[66],"method":[70,164],"with":[71,174],"imperfect":[72,115,160],"experience.":[73],"Firstly,":[74],"model":[76],"countermeasure":[79],"Markov":[83],"decision":[84],"(MDP),":[86],"formulate":[88],"reward":[91],"function":[92],"by":[93,134],"combining":[94],"effectiveness":[97],"jammer\u2019s":[100],"operational":[101],"intent.":[102],"Secondly,":[103],"design":[105],"novel":[107],"hybrid":[108],"choice":[111],"module,":[112],"which":[113],"uses":[114],"experience":[116],"improve":[118,127],"strategy.":[124],"Furthermore,":[125],"sample":[128],"reduce":[131],"forgetting":[132],"caused":[133],"small":[135],"replay":[136,143],"buffer,":[137],"respectively":[139],"employ":[140],"mixed":[142],"buffer":[144],"knowledge":[148],"consolidation":[149],"technique.":[150],"Finally,":[151],"extensive":[152],"experiments":[153],"demonstrate":[154],"under":[156],"guidance":[158],"experience,":[161],"our":[162],"proposed":[163],"achieves":[165],"faster":[166],"convergence":[167],"speed":[168],"higher":[170],"accuracy":[172],"compared":[173],"existing":[175],"DRL-based":[176],"methods.":[177]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-01T00:00:00"}
