{"id":"https://openalex.org/W4396919388","doi":"https://doi.org/10.1145/3649403.3656489","title":"Wireless-Powered Multi-Channel Backscatter Communications Under Jamming: A Cooperative Reinforcement Learning Approach","display_name":"Wireless-Powered Multi-Channel Backscatter Communications Under Jamming: A Cooperative Reinforcement Learning Approach","publication_year":2024,"publication_date":"2024-05-15","ids":{"openalex":"https://openalex.org/W4396919388","doi":"https://doi.org/10.1145/3649403.3656489"},"language":"en","primary_location":{"id":"doi:10.1145/3649403.3656489","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649403.3656489","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3649403.3656489","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041208780","display_name":"Dara Ron","orcid":"https://orcid.org/0000-0001-6838-3763"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dara Ron","raw_affiliation_strings":["Wireless Cyber Center, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Cyber Center, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078480632","display_name":"Kai Zeng","orcid":"https://orcid.org/0000-0003-3279-0695"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kai Zeng","raw_affiliation_strings":["Wireless Cyber Center, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Cyber Center, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041208780"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.4449,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60545725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8630058169364929},{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.7108696699142456},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.704275369644165},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6718447208404541},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6657871007919312},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5974351763725281},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44490674138069153},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.39557555317878723},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17064130306243896}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8630058169364929},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.7108696699142456},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.704275369644165},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6718447208404541},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6657871007919312},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5974351763725281},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44490674138069153},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.39557555317878723},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17064130306243896},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3649403.3656489","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649403.3656489","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3649403.3656489","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649403.3656489","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2160593627","https://openalex.org/W2336227589","https://openalex.org/W2966621310","https://openalex.org/W3024681024","https://openalex.org/W3088859046","https://openalex.org/W4312542648","https://openalex.org/W4362513798","https://openalex.org/W4362563530","https://openalex.org/W4364856264","https://openalex.org/W4378194960","https://openalex.org/W4385267189","https://openalex.org/W4386113723","https://openalex.org/W4391952726","https://openalex.org/W4392309291"],"related_works":["https://openalex.org/W4200319726","https://openalex.org/W1984793747","https://openalex.org/W4312547492","https://openalex.org/W3197729047","https://openalex.org/W1624160917","https://openalex.org/W1987034598","https://openalex.org/W2370486284","https://openalex.org/W2143847498","https://openalex.org/W3131810941","https://openalex.org/W4367296854"],"abstract_inverted_index":{"Wireless-Powered":[0],"Backscatter":[1],"Communication":[2],"(WPBC)":[3],"is":[4,151],"emerging":[5],"as":[6,245],"a":[7,32,46,125],"promising":[8],"technology":[9],"for":[10],"battery-less":[11],"solutions":[12],"to":[13,65,83,95,135,143,152,171,228],"many":[14],"Internet-of-Things":[15],"(IoT)":[16],"applications.":[17],"In":[18],"this":[19,119],"paper,":[20],"we":[21,103],"study":[22],"the":[23,57,81,86,93,99,105,133,154,174,179,221,225,250,253,257],"channel":[24,197,206,211],"selection":[25],"and":[26,61,76,113,158,189,201,210,242,265,268],"operation":[27],"mode":[28],"control":[29],"problem":[30],"in":[31,178,270],"multi-channel":[33],"WPBC":[34],"system":[35],"that":[36,52,163,184,232,256],"turns":[37],"jamming":[38,68,74,100,199,208,217,222],"signal":[39],"into":[40,121],"energy":[41,97,115,147,159,175],"harvesting":[42,160],"opportunities.":[43],"We":[44],"propose":[45],"cooperative":[47,126,193],"reinforcement":[48],"learning":[49,72],"(RL)":[50],"approach":[51],"enables":[53,80,224],"multiple":[54],"agents,":[55],"namely":[56],"access":[58],"point":[59],"(AP)":[60],"backscatter":[62],"device":[63],"(BD),":[64],"exploit":[66],"unknown":[67],"pattern":[69],"present.":[70],"The":[71,214,236],"of":[73,107,124,216,249,272],"channels":[75],"patterns":[77],"not":[78],"only":[79,185],"AP":[82,226],"communicate":[84],"with":[85,88],"BD":[87,94,134],"interference-free":[89],"but":[90],"also":[91],"empowers":[92,132],"harvest":[96,114],"from":[98,220],"signals.":[101],"Additionally,":[102],"address":[104],"limitation":[106],"BDs,":[108],"which":[109],"cannot":[110],"decode":[111],"information":[112],"simultaneously,":[116],"by":[117],"incorporating":[118],"constraint":[120,172],"our":[122,191],"design":[123],"RL":[127,194],"approach.":[128],"This":[129],"innovative":[130],"strategy":[131],"make":[136],"intelligent":[137],"decisions":[138],"regarding":[139],"its":[140],"operational":[141],"mode-whether":[142],"prioritize":[144],"communication":[145],"or":[146],"harvesting.":[148],"Our":[149],"aim":[150],"optimize":[153],"trade-off":[155],"between":[156],"throughput":[157],"efficiency,":[161],"ensuring":[162],"data":[164],"reception":[165],"requirements":[166],"are":[167],"met":[168],"while":[169],"adhering":[170],"on":[173],"level":[176],"stored":[177],"battery.":[180],"Unlike":[181],"traditional":[182],"approaches":[183],"consider":[186],"paired":[187],"states":[188],"actions,":[190],"proposed":[192,237,258],"algorithm":[195],"incorporates":[196],"state,":[198,200],"action.":[202],"These":[203],"elements":[204],"represent":[205],"operation,":[207],"experience,":[209],"selection,":[212],"respectively.":[213],"awareness":[215],"experience":[218],"derived":[219],"state":[223],"agent":[227],"select":[229],"an":[230,246],"action":[231],"can":[233],"evade":[234],"jamming.":[235,274],"scheme":[238],"experienced":[239],"low":[240],"computation":[241],"storage":[243],"overhead":[244],"inherent":[247],"feature":[248],"algorithm.":[251],"Remarkably,":[252],"results":[254],"show":[255],"method":[259],"achieves":[260],"optimal":[261],"performance":[262],"under":[263],"static":[264],"round-robin":[266],"jamming,":[267],"even":[269],"scenarios":[271],"random":[273]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
