“…In general, the jammer's strategy depends on its objective and its available information. Accordingly, in [5], [6], [11], [12], [15], the authors suppose that the pilot jamming attack is a combination of several pilot sequences of the pilot set, while in [4], [7]− [10], [14], [16]− [18], the jammer selects a target user's pilot sequence as the jamming pilot.…”