2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7248754
|View full text |Cite
|
Sign up to set email alerts
|

A systematic learning method for optimal jamming

Abstract: Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that disrupts the communication between a victim transmitter-receiver pair. We formalize the problem using a novel multi-armed bandit framework where the jammer can choose various physical layer parameters such as signaling scheme, power level and the on-off/pulsing duration in an attempt to obtain power efficient jamm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Additional literature on antijamming using a RL framework that was published after the material in this chapter includes [131][132][133][134].…”
Section: Related Workmentioning
confidence: 99%
“…Additional literature on antijamming using a RL framework that was published after the material in this chapter includes [131][132][133][134].…”
Section: Related Workmentioning
confidence: 99%
“…Without loss of generality, the average energy of g(t) and modulated symbols E(|x m | 2 ) are normalized to unity. 1 …”
Section: System Modelmentioning
confidence: 99%
“…In order to prove that S E R i.e., p e is uniformly locally Lipschitz, we show that | p e ( j, SNR, JNR 1 …”
Section: Appendix a Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…that is difficult to obtain in the actual environment. Other researchers solve the jamming problem with repeatedly interacting with the victim transmitter-receiver pair [23], combining optimization, game-theoretic theories and other theoretical tools. But these only take the situation that the user has a fixed strategy into consideration, or choose a strategy from a strategy set.…”
Section: Introductionmentioning
confidence: 99%