{"id":"https://openalex.org/W3025968523","doi":"https://doi.org/10.1109/twc.2021.3078439","title":"DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers","display_name":"DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers","publication_year":2021,"publication_date":"2021-05-17","ids":{"openalex":"https://openalex.org/W3025968523","doi":"https://doi.org/10.1109/twc.2021.3078439","mag":"3025968523"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2021.3078439","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2021.3078439","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2005.07034","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085560176","display_name":"Nguy\u1ec5n V\u0103n Huynh","orcid":"https://orcid.org/0000-0002-7696-0521"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Nguyen Van Huynh","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992576","display_name":"Dinh Thai Hoang","orcid":"https://orcid.org/0000-0002-9528-0863"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697893","display_name":"Diep N. Nguyen","orcid":"https://orcid.org/0000-0003-2659-8648"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep N. Nguyen","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063537942","display_name":"Eryk Dutkiewicz","orcid":"https://orcid.org/0000-0002-4268-9286"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eryk Dutkiewicz","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"[School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia]","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085560176"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.7111,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.68514443,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"10","first_page":"6898","last_page":"6914"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.922126293182373},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.825446605682373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7821325063705444},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.699295163154602},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6572678089141846},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5394999980926514},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44256991147994995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42484188079833984},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3733689785003662},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3136597275733948},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0743820071220398}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.922126293182373},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.825446605682373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7821325063705444},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.699295163154602},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6572678089141846},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5394999980926514},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44256991147994995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42484188079833984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3733689785003662},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3136597275733948},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0743820071220398},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/twc.2021.3078439","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2021.3078439","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2005.07034","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.07034","pdf_url":"https://arxiv.org/pdf/2005.07034","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:3025968523","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/2005.07034","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2005.07034","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2005.07034","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2005.07034","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.07034","pdf_url":"https://arxiv.org/pdf/2005.07034","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8900174045","display_name":null,"funder_award_id":"DE210100651","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W32403112","https://openalex.org/W1496590343","https://openalex.org/W1977742072","https://openalex.org/W1987380770","https://openalex.org/W2030714532","https://openalex.org/W2031211320","https://openalex.org/W2056908430","https://openalex.org/W2063726406","https://openalex.org/W2065154528","https://openalex.org/W2069589115","https://openalex.org/W2089332106","https://openalex.org/W2099461393","https://openalex.org/W2106673869","https://openalex.org/W2118521282","https://openalex.org/W2122285088","https://openalex.org/W2122311135","https://openalex.org/W2124280970","https://openalex.org/W2145339207","https://openalex.org/W2146886176","https://openalex.org/W2156288624","https://openalex.org/W2335626951","https://openalex.org/W2341724900","https://openalex.org/W2402144811","https://openalex.org/W2486702221","https://openalex.org/W2557283755","https://openalex.org/W2566281500","https://openalex.org/W2767825073","https://openalex.org/W2768557755","https://openalex.org/W2775135700","https://openalex.org/W2806121278","https://openalex.org/W2886461156","https://openalex.org/W2893939120","https://openalex.org/W2951799221","https://openalex.org/W2963674932","https://openalex.org/W2963685604","https://openalex.org/W2969129261","https://openalex.org/W2972498561","https://openalex.org/W2985849463","https://openalex.org/W3035667171","https://openalex.org/W4242781462","https://openalex.org/W6685444567","https://openalex.org/W6713134421","https://openalex.org/W6754028052"],"related_works":["https://openalex.org/W3188908595","https://openalex.org/W2934443491","https://openalex.org/W2868713745","https://openalex.org/W2086174184","https://openalex.org/W3087690822","https://openalex.org/W2124280970","https://openalex.org/W2514890051","https://openalex.org/W2220687515","https://openalex.org/W2905555929","https://openalex.org/W2189326560","https://openalex.org/W2783021657","https://openalex.org/W2919315121","https://openalex.org/W2317207298","https://openalex.org/W2018814664","https://openalex.org/W2465623226","https://openalex.org/W2468382972","https://openalex.org/W2182130938","https://openalex.org/W2188707421","https://openalex.org/W2182266848","https://openalex.org/W2792532322"],"abstract_inverted_index":{"In":[0,19],"this":[1],"paper,":[2],"we":[3,53,110,145],"introduce":[4],"DeepFake,":[5],"a":[6,22,147],"novel":[7,148],"deep":[8,149,155],"reinforcement":[9,150,174],"learning-based":[10],"deception":[11,57],"strategy":[12,58],"to":[13,32,64,68,87,126,137,160,187],"deal":[14,49],"with":[15,50,165],"reactive":[16,25],"jamming":[17,26,85,102,124,143],"attacks.":[18],"particular,":[20],"for":[21,104],"smart":[23],"and":[24,36,135,140,197],"attack,":[27],"the":[28,34,38,45,61,70,74,77,79,83,100,115,119,128,138,154,162,172],"jammer":[29,75],"is":[30,185],"able":[31],"sense":[33],"channel":[35,39],"attack":[37,116],"if":[40,73],"it":[41],"detects":[42],"communications":[43],"from":[44,99,134],"legitimate":[46,62],"transmitter.":[47],"To":[48,131],"such":[51],"attacks,":[52,144],"propose":[54],"an":[55],"intelligent":[56],"which":[59],"allows":[60],"transmitter":[63,80],"transmit":[65,88],"\u201cfake\u201d":[66],"signals":[67,86,103,125],"attract":[69],"jammer.":[71],"Then,":[72],"attacks":[76],"channel,":[78],"can":[81,111],"leverage":[82],"strong":[84,101],"data":[89],"by":[90],"using":[91,153],"ambient":[92],"backscatter":[93],"communication":[94],"technology":[95],"or":[96],"harvest":[97],"energy":[98],"future":[105],"use.":[106],"By":[107],"doing":[108],"so,":[109],"not":[112],"only":[113],"undermine":[114],"ability":[117],"of":[118,142,171,193],"jammer,":[120],"but":[121],"also":[122],"utilize":[123],"improve":[127],"system":[129],"performance.":[130],"effectively":[132],"learn":[133],"adapt":[136],"dynamic":[139],"uncertainty":[141],"develop":[146],"learning":[151,198],"algorithm":[152],"dueling":[156],"neural":[157],"network":[158],"architecture":[159],"obtain":[161],"optimal":[163],"policy":[164],"thousand":[166],"times":[167],"faster":[168],"than":[169],"those":[170],"conventional":[173],"algorithms.":[175],"Extensive":[176],"simulation":[177],"results":[178],"reveal":[179],"that":[180],"our":[181],"proposed":[182],"DeepFake":[183],"framework":[184],"superior":[186],"other":[188],"anti-jamming":[189],"strategies":[190],"in":[191],"terms":[192],"throughput,":[194],"packet":[195],"loss,":[196],"rate.":[199]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
