2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996709
|View full text |Cite
|
Sign up to set email alerts
|

Jamming resiliency and mobility management in cognitive communication networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…When the jamming information was unavailable, authors in [25] proposed a method based on maximum likelihood estimation to obtain the parameter of jamming. RL techniques can be used to achieve an optimal communication policy via trial-and-error without being aware of the jamming and network model [26]. A two-dimensional anti-jamming mobile communication scheme has been proposed by applying RL techniques in [27] to obtain an optimal policy without any knowledge about the jamming models.…”
Section: Related Workmentioning
confidence: 99%
“…When the jamming information was unavailable, authors in [25] proposed a method based on maximum likelihood estimation to obtain the parameter of jamming. RL techniques can be used to achieve an optimal communication policy via trial-and-error without being aware of the jamming and network model [26]. A two-dimensional anti-jamming mobile communication scheme has been proposed by applying RL techniques in [27] to obtain an optimal policy without any knowledge about the jamming models.…”
Section: Related Workmentioning
confidence: 99%
“…Rending to their high ability in learning, predicting patterns, and taking decisions accordingly, AI techniques, on the other hand, lead to enhancing wireless network performance in situations where legacy techniques fail to [15], [41], [42].…”
Section: Intelligence Of Future Network and Autonomymentioning
confidence: 99%
“…In the works of Adem et al, 2 jamming mitigation techniques for CRNs, where mobile nodes are assumed to have no access to multiple channels during jamming, are provided. Both techniques rely on time‐based hopping and time evasion when jamming happens.…”
Section: Related Workmentioning
confidence: 99%