2022
DOI: 10.1109/tcomm.2022.3178755
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement Learning-Based Intelligent Reflecting Surface Assisted Communications Against Smart Attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…In [21], the authors propose a RIS-assisted key generation scheme by intervening in the propagation in harsh environments. In [22], the authors exploit the noncooperative game to model the interaction between a RISassisted legitimate user and a smart attacker with learningbased security solutions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [21], the authors propose a RIS-assisted key generation scheme by intervening in the propagation in harsh environments. In [22], the authors exploit the noncooperative game to model the interaction between a RISassisted legitimate user and a smart attacker with learningbased security solutions.…”
Section: Related Workmentioning
confidence: 99%
“…by comparing the elements in ∆H JRk and ∆ Hk , with Υ JRk similarly introduced. For the inequalities in ( 20), (22), and (24) with quadratic forms on the left-hand side, we can adopt general S-procedure [36] to derive the following inequality in (25), where {η 1,k } k∈K and {η 2,k } k∈K are the introduced non-negative variables associated with the condition in ( 22) and ( 24) in the general S-procedure, respectively.…”
Section: By Invoking the Equality Trmentioning
confidence: 99%
“…Artificial Intelligence (AI) has introduced a new way to solve PLS problems through RL. Recent studies in [ 20 , 21 ] have considered PLS problems concerning smart attackers conducting jamming, eavesdropping, and spoofing attacks. For instance, prospect theory (PT) in an unmanned aerial vehicle (UAV) transmission system is investigated in [ 20 ], where the attacker is considered to be selfish and subjective.…”
Section: Related Workmentioning
confidence: 99%
“…To enhance the secrecy performance and the utility of the legitimate UAV, a power allocation approach utilizing deep Q-networks (DQN) is put forth to determine the optimal policy, in cases where the attack and channel models are unknown. RL techniques are studied in [ 21 ] to configure IRS beamforming design. The authors first establish the interaction between the base station (BS) and the smart attacker as a non-cooperative game and derive the Nash equilibrium of the game.…”
Section: Related Workmentioning
confidence: 99%
“…The findings indicated that the DQN algorithm was more suitable than the Q-learning algorithm for systems with huge action and state spaces. In [294], the security of RIS-enabled wireless networks was investigated in the presence of intelligent attackers. DQN was introduced to enable adaptive modulation of BS and RIS reflection beamforming.…”
Section: A Deep Reinforcement Learningmentioning
confidence: 99%