“…These works have considered different attacks, such as constant jamming attacks [6], [7], in which the jammer is permanently transmitting, as well as other types of attacks in which the jammer transmits only at specific time instances, e.g., when the UEs transmit [6], or during pilot transmission [8]. Moreover, given the complexity of the jammer problem, some works have devoted themselves only to detecting the presence of a jammer [8], [9], while other works have proposed methods to suppress the impact of the detected jammer [6], [7], [10]- [15].…”