2021
DOI: 10.1109/tvt.2021.3049653
|View full text |Cite
|
Sign up to set email alerts
|

A Learning-Based Spectrum Access Stackelberg Game: Friendly Jammer-Assisted Communication Confrontation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 34 publications
0
30
0
Order By: Relevance
“…And the optimization problem in these works is often difficult to resolve with traditional optimization methods. Hence, to solve the above problem, we exploit secure channel access by channel switching [27][28][29][30] and propose a two-stage task and resource assignment method that exploits convex optimization theory [31] and fading memory joint strategy fictitious play with inertia (FM-JSFP) [32] to formulate the problem and resolve it.…”
Section: Researchmentioning
confidence: 99%
“…And the optimization problem in these works is often difficult to resolve with traditional optimization methods. Hence, to solve the above problem, we exploit secure channel access by channel switching [27][28][29][30] and propose a two-stage task and resource assignment method that exploits convex optimization theory [31] and fading memory joint strategy fictitious play with inertia (FM-JSFP) [32] to formulate the problem and resolve it.…”
Section: Researchmentioning
confidence: 99%
“…Various methods have been proposed to implement the anti‐jamming communications such as game theory [28, 29], optimization theory [30] and machine learning[21, 32–34]. Stackelberg game was used to model users and the jammer into the leader and follower [28].…”
Section: Related Workmentioning
confidence: 99%
“…Various methods have been proposed to implement the anti-jamming communications such as game theory [28,29], optimization theory [30] and machine learning [21,[32][33][34].…”
Section: Related Workmentioning
confidence: 99%
“…While considering the existence of malicious jamming attacks, the Stackelberg game [15][16][17][18][19][20][21][22][23][24][25][26][27] is a suitable game model to formulate the competitive interactions between the user-side and the jammer-side as it can well depict the sequential decision-making relationship between two countermeasure sides. For example, Yang et al formulated the anti-jamming power control problem using the Stackelberg game [15,16].…”
mentioning
confidence: 99%
“…Considering the multi-user anti-jamming scenario, in [20], a one-leader multi-follower Bayesian Stackelberg game was formulated, and the influence of observation error as well as mobility of unmanned aerial vehicles (UAVs) were investigated. Moreover, authors in [21] investigated the communication confrontation scenario, and modeled the interactions in the confrontation scenario as a Stackelberg game, with each player seeking for maximizing their utility respectively. However, there exist some main challenges to extend the above game approaches to the multi-user coordinated channel access scenario in the clustering networks with dynamic wide-band jamming attacks.…”
mentioning
confidence: 99%