{"id":"https://openalex.org/W3185210057","doi":"https://doi.org/10.23919/jcin.2021.9475126","title":"Cooperative Proactive Eavesdropping over Two-Hop Suspicious Communication Based on Reinforcement Learning","display_name":"Cooperative Proactive Eavesdropping over Two-Hop Suspicious Communication Based on Reinforcement Learning","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3185210057","doi":"https://doi.org/10.23919/jcin.2021.9475126","mag":"3185210057"},"language":"en","primary_location":{"id":"doi:10.23919/jcin.2021.9475126","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2021.9475126","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036192125","display_name":"Yaxin Yang","orcid":"https://orcid.org/0000-0003-4024-0327"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaxin Yang","raw_affiliation_strings":["Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034341370","display_name":"Baogang Li","orcid":"https://orcid.org/0000-0001-5165-4037"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baogang Li","raw_affiliation_strings":["Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057629414","display_name":"Shu-E Zhang","orcid":"https://orcid.org/0000-0002-9122-0097"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shue Zhang","raw_affiliation_strings":["Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047196187","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0003-2407-7312"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China. Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding 071003, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075825541","display_name":"Libin Jiao","orcid":"https://orcid.org/0000-0001-5285-652X"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libin Jiao","raw_affiliation_strings":["The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, China. Science and Technology on Communication Networks Laboratory, Shijiazhuang 050081, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, China. Science and Technology on Communication Networks Laboratory, Shijiazhuang 050081, China","institution_ids":["https://openalex.org/I2800372957"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036192125"],"corresponding_institution_ids":["https://openalex.org/I153473198"],"apc_list":null,"apc_paid":null,"fwci":0.2034,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50817762,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"2","first_page":"166","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9580000042915344,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9277999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9770470261573792},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7683769464492798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7558049559593201},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7237564325332642},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6985116004943848},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5505774021148682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5205557942390442},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.44824841618537903},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.4316139221191406},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32011622190475464},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.29875844717025757},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1860007345676422},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.12000557780265808}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9770470261573792},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7683769464492798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7558049559593201},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7237564325332642},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6985116004943848},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5505774021148682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5205557942390442},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.44824841618537903},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.4316139221191406},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32011622190475464},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.29875844717025757},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1860007345676422},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.12000557780265808},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/jcin.2021.9475126","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2021.9475126","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8799999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W2801712179","https://openalex.org/W3045882672","https://openalex.org/W4313315695","https://openalex.org/W2560615025","https://openalex.org/W2995805091","https://openalex.org/W2064946300","https://openalex.org/W3198833577","https://openalex.org/W4211070069","https://openalex.org/W3010964467"],"abstract_inverted_index":{"Legitimate":[0],"surveillance":[1],"has":[2],"attracted":[3],"more":[4,6],"and":[5,8,61,66,87,102],"concern,":[7],"effective":[9],"proactive":[10],"intervention":[11],"can":[12,187],"eavesdrop":[13],"the":[14,51,57,62,68,72,157,166,176,178],"illegitimate":[15],"information.":[16],"In":[17,48,175],"this":[18],"paper,":[19],"we":[20,109],"propose":[21],"legitimate":[22,33],"eavesdropping":[23,103,112,123],"over":[24,116],"a":[25,105,117,140,144,151],"two-hop":[26],"suspicious":[27,52,58,73,85],"communication":[28],"link":[29],"by":[30],"two":[31,46,79,127],"full-duplex":[32],"monitors":[34],"(LMs)":[35],"based":[36],"on":[37],"multi-agent":[38,152],"deep":[39],"deterministic":[40],"policy":[41],"gradient":[42],"(MADDPG)":[43],"algorithm":[44],"in":[45,75,139],"phases.":[47],"phase":[49,76],"1,":[50],"transmitter":[53],"sends":[54],"information":[55],"to":[56,71,84,97,121,130,164],"assistant":[59,63],"relay,":[60],"relay":[64,86],"decodes":[65],"forwards":[67],"received":[69],"message":[70],"receiver":[74,88],"2.":[77],"Meanwhile,":[78],"LMs":[80],"cooperatively":[81,131],"emit":[82],"jamming":[83,133,169,185],"during":[89],"each":[90,93,137,173],"phase.":[91],"Particularly,":[92],"LM":[94],"is":[95,104,143,162],"considered":[96],"be":[98],"an":[99],"energy-limited":[100],"device,":[101],"long-term":[106],"process,":[107],"so":[108],"adopt":[110],"expected":[111,190],"energy":[113],"efficiency":[114],"(EEE)":[115],"period":[118],"of":[119,159,168],"time":[120],"evaluate":[122],"performance.":[124],"However,":[125],"for":[126,172],"LMs,":[128],"how":[129],"make":[132],"power":[134,170],"decision":[135,171],"at":[136],"hop":[138],"dynamic":[141,160],"environment":[142],"huge":[145],"challenge.":[146],"Therefore,":[147],"MADDPG":[148],"algorithm,":[149],"as":[150],"reinforcement":[153],"learning":[154],"approach":[155],"with":[156],"advantage":[158],"decision-making,":[161],"utilized":[163],"solve":[165],"issue":[167],"LM.":[174],"simulation,":[177],"results":[179],"show":[180],"that":[181],"our":[182],"proposed":[183],"cooperative":[184],"scheme":[186],"obtain":[188],"higher":[189],"EEE.":[191]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-10-10T00:00:00"}
