{"id":"https://openalex.org/W4404809885","doi":"https://doi.org/10.1109/tmc.2024.3505206","title":"Smart Shield: Prevent Aerial Eavesdropping via Cooperative Intelligent Jamming Based on Multi-Agent Reinforcement Learning","display_name":"Smart Shield: Prevent Aerial Eavesdropping via Cooperative Intelligent Jamming Based on Multi-Agent Reinforcement Learning","publication_year":2024,"publication_date":"2024-11-28","ids":{"openalex":"https://openalex.org/W4404809885","doi":"https://doi.org/10.1109/tmc.2024.3505206"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3505206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3505206","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042649772","display_name":"Qubeijian Wang","orcid":"https://orcid.org/0000-0002-6768-3016"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qubeijian Wang","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018420088","display_name":"Shiyue Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiyue Tang","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032266950","display_name":"Wen Sun","orcid":"https://orcid.org/0000-0001-7086-4910"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Sun","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343712","display_name":"Yin Zhang\u22c6","orcid":"https://orcid.org/0000-0002-1772-0763"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Zhang","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085514719","display_name":"Geng Sun","orcid":"https://orcid.org/0000-0001-7802-4908"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Geng Sun","raw_affiliation_strings":["College of Computer Science and Technology, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I4210134929","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computer Science, Hong Kong Baptist University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong Baptist University, Hong Kong","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE","Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), UAE"],"affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]},{"raw_affiliation_string":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5042649772"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":3.7772,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94052806,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"24","issue":"4","first_page":"2995","last_page":"3011"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.8727999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.8727999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.8673999905586243,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.8456000089645386,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9425413608551025},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.816209614276886},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7832427024841309},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7768362760543823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5895726084709167},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3324573040008545},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23998939990997314}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9425413608551025},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.816209614276886},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7832427024841309},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7768362760543823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5895726084709167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3324573040008545},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23998939990997314},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3505206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3505206","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3045756018","display_name":null,"funder_award_id":"62402391","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7251765679","display_name":null,"funder_award_id":"62272391","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2566769952","https://openalex.org/W2746553466","https://openalex.org/W2890006332","https://openalex.org/W2912241863","https://openalex.org/W2972828441","https://openalex.org/W2980965333","https://openalex.org/W2981262799","https://openalex.org/W2991046523","https://openalex.org/W3006762012","https://openalex.org/W3029840414","https://openalex.org/W3045557320","https://openalex.org/W3051352583","https://openalex.org/W3082622020","https://openalex.org/W3132105662","https://openalex.org/W3145159167","https://openalex.org/W3156032009","https://openalex.org/W3161037238","https://openalex.org/W3168685397","https://openalex.org/W3169147363","https://openalex.org/W3181869286","https://openalex.org/W3188481277","https://openalex.org/W3195333310","https://openalex.org/W4210448983","https://openalex.org/W4213165131","https://openalex.org/W4226478636","https://openalex.org/W4280586962","https://openalex.org/W4283372584","https://openalex.org/W4285210647","https://openalex.org/W4285236861","https://openalex.org/W4285276323","https://openalex.org/W4288062306","https://openalex.org/W4323065882","https://openalex.org/W4380839160","https://openalex.org/W4392397280","https://openalex.org/W6685444567","https://openalex.org/W6730111887","https://openalex.org/W6766805167"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2801712179","https://openalex.org/W3045882672","https://openalex.org/W4313315695","https://openalex.org/W2560615025","https://openalex.org/W2995805091","https://openalex.org/W2064946300","https://openalex.org/W4211070069","https://openalex.org/W3198833577"],"abstract_inverted_index":{"The":[0],"spotlight":[1],"on":[2],"autonomous":[3],"aerial":[4],"vehicles":[5],"(AAVs)":[6],"is":[7,62],"to":[8,23,34,68,141,157,160,173],"enhance":[9],"wireless":[10,36],"communications":[11],"while":[12],"ignoring":[13],"the":[14,39,48,95,108,111,175,190,193,199],"potential":[15],"risk":[16],"of":[17,110,177,196],"AAVs":[18],"acting":[19],"as":[20,97],"adversaries.":[21],"Due":[22],"their":[24],"mobility":[25],"and":[26,50,80,93,115,133,181,198],"flexibility,":[27],"AAV":[28,52,71,78],"eavesdroppers":[29,79],"pose":[30],"an":[31],"immeasurable":[32],"threat":[33],"legitimate":[35,81],"transmissions.":[37],"However,":[38],"existing":[40],"fixed":[41],"jamming":[42,60,75,155],"scheme":[43,61,180],"without":[44,164],"cooperation":[45],"cannot":[46],"counter":[47],"flexible":[49],"dynamic":[51],"eavesdropping.":[53],"In":[54],"this":[55,84],"article,":[56],"a":[57,88,98,123,130,148],"cooperative":[58],"intelligent":[59],"proposed,":[63],"authorizing":[64],"ground":[65],"jammers":[66],"(GJs)":[67],"interfere":[69],"with":[70,118,129],"eavesdroppers,":[72],"generating":[73],"specific":[74],"shields":[76],"between":[77,192],"users.":[82],"Toward":[83],"end,":[85],"we":[86,121,146,169],"formulate":[87],"secrecy":[89,201],"capacity":[90],"maximization":[91],"problem":[92,96],"model":[94],"decentralized":[99],"partially":[100],"observable":[101],"Markov":[102],"decision":[103],"process":[104],"(Dec-POMDP).":[105],"To":[106],"address":[107],"challenge":[109],"huge":[112],"state":[113],"space":[114,117],"action":[116],"network":[119,132,151],"dynamics,":[120],"leverage":[122],"deep":[124,139],"reinforcement":[125],"learning":[126,135],"(DRL)":[127],"algorithm":[128,156],"dueling":[131,137],"double-Q":[134],"(i.e.,":[136],"double":[138],"Q-network)":[140],"train":[142],"policy":[143],"networks.":[144],"Then,":[145],"propose":[147],"multi-agent":[149],"mixing":[150],"framework":[152],"(QMIX)-based":[153],"collaborative":[154],"enable":[158],"GJs":[159,197],"independently":[161],"make":[162],"decisions":[163],"sharing":[165],"local":[166],"information.":[167],"Additionally,":[168],"perform":[170],"extensive":[171],"simulations":[172],"validate":[174],"superiority":[176],"our":[178],"proposed":[179],"present":[182],"useful":[183],"insights":[184],"into":[185],"practical":[186],"implementation":[187],"by":[188],"elucidating":[189],"relationship":[191],"deployment":[194],"settings":[195],"instantaneous":[200],"capacity.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
