메뉴 건너뛰기




Volumn 15, Issue 4, 2016, Pages 2792-2808

Jamming Bandits - A Novel Learning Method for Optimal Jamming

Author keywords

convergence; Jamming; learning; multiarmed bandits; optimal; regret

Indexed keywords

ALGORITHMS; ELECTRONIC WARFARE; JAMMING; NETWORK LAYERS; REINFORCEMENT LEARNING; TRANSMITTERS;

EID: 84963864066     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2510643     Document Type: Conference Paper
Times cited : (97)

References (43)
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1335-1387, Jan. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1335-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 5
    • 0020497622 scopus 로고
    • The Gaussian test channel with an intelligent jammer
    • Jan.
    • T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inf. Theory, vol. IT-29, no. 1, pp. 152-157, Jan. 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.IT-29 , Issue.1 , pp. 152-157
    • Basar, T.1
  • 6
    • 4143137728 scopus 로고    scopus 로고
    • Capacity of correlated jamming channels
    • Monticello, IL, USA
    • M. Medard, "Capacity of correlated jamming channels," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, 1997, pp. 1043-1052.
    • (1997) Proc. Allerton Conf. Commun. Control Comput. , pp. 1043-1052
    • Medard, M.1
  • 7
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • Sep.
    • A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.9 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 8
    • 84897584002 scopus 로고    scopus 로고
    • Jamming games in the MIMO wiretap channel with an active eavesdropper
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 62, no. 1, pp. 82-91, Jan. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.62 , Issue.1 , pp. 82-91
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 9
    • 84890423904 scopus 로고    scopus 로고
    • To obtain or not to obtain CSI in the presence of hybrid adversary
    • Istanbul, Turkey, Jan.
    • Y. O. Basciftci, C. E. Koksal, and F. Ozguner, "To obtain or not to obtain CSI in the presence of hybrid adversary," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jan. 2013, pp. 2865-2869.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory , pp. 2865-2869
    • Basciftci, Y.O.1    Koksal, C.E.2    Ozguner, F.3
  • 10
    • 0030195612 scopus 로고    scopus 로고
    • Convexity properties in binary detection problems
    • Jul.
    • M. Azizoglu, "Convexity properties in binary detection problems," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1316-1321, Jul. 1996.
    • (1996) IEEE Trans. Inf. Theory , vol.42 , Issue.4 , pp. 1316-1321
    • Azizoglu, M.1
  • 11
    • 84865426812 scopus 로고    scopus 로고
    • Optimum power allocation for average power constrained jammers in the presence of non-Gaussian noise
    • Aug.
    • S. Bayram et al., "Optimum power allocation for average power constrained jammers in the presence of non-Gaussian noise," IEEE Commun. Lett., vol. 16, no. 8, pp. 1153-1156, Aug. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.8 , pp. 1153-1156
    • Bayram, S.1
  • 12
    • 84988306011 scopus 로고    scopus 로고
    • Optimal jamming strategies in digital communications-impact of modulation
    • Austin, TX, USA, Dec.
    • S. Amuru and R. M. Buehrer, "Optimal jamming strategies in digital communications-impact of modulation," in Proc. Global Commun. Conf., Austin, TX, USA, Dec. 2014, pp. 1619-1624.
    • (2014) Proc. Global Commun. Conf. , pp. 1619-1624
    • Amuru, S.1    Buehrer, R.M.2
  • 13
    • 84940675700 scopus 로고    scopus 로고
    • Optimal jamming against digital modulation
    • Oct.
    • S. Amuru and R. M. Buehrer, "Optimal jamming against digital modulation," IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2212-2224, Oct. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.10 , pp. 2212-2224
    • Amuru, S.1    Buehrer, R.M.2
  • 15
    • 80051717392 scopus 로고    scopus 로고
    • Jamming games in wireless networks with incomplete information
    • Aug.
    • Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., vol. 49, no. 8, pp. 112-118, Aug. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.8 , pp. 112-118
    • Sagduyu, Y.E.1    Berry, R.A.2    Ephremides, A.3
  • 16
    • 0019664290 scopus 로고
    • An information theoretic study of communication in the presence of jamming
    • R. McEliece and W. Stark, "An information theoretic study of communication in the presence of jamming," in Proc. Int. Conf. Commun., 1981, pp. 45.3.1-45.3.5.
    • (1981) Proc. Int. Conf. Commun. , pp. 1-5
    • McEliece, R.1    Stark, W.2
  • 17
    • 0026913942 scopus 로고
    • Worst-case power constrained noise for binary-input channels
    • Sep.
    • S. Shamai Shitz and S. Verdú, "Worst-case power constrained noise for binary-input channels," IEEE Trans. Inf. Theory, vol. 38, no. 5, pp. 1494-1511, Sep. 1992.
    • (1992) IEEE Trans. Inf. Theory , vol.38 , Issue.5 , pp. 1494-1511
    • Shamai Shitz, S.1    Verdú, S.2
  • 18
    • 77956920943 scopus 로고    scopus 로고
    • Cognitive engine design for link adaptation: An application to multi-antenna systems
    • Sep.
    • H. I. Volos and R. M. Buehrer, "Cognitive engine design for link adaptation: An application to multi-antenna systems," IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2902-2913, Sep. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.9 , pp. 2902-2913
    • Volos, H.I.1    Buehrer, R.M.2
  • 19
    • 84870545360 scopus 로고    scopus 로고
    • Cognitive radio engine training
    • Nov.
    • H. I. Volos and R. M. Buehrer, "Cognitive radio engine training," IEEE Trans. Wireless Commun., vol. 11, no. 11, pp. 3878-3889, Nov. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.11 , pp. 3878-3889
    • Volos, H.I.1    Buehrer, R.M.2
  • 20
    • 79953200186 scopus 로고    scopus 로고
    • An anti-jamming stochastic game in cognitive radio networks
    • Apr.
    • B. Wang, Y. Wu, and K. J. R. Liu, "An anti-jamming stochastic game in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, Apr. 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.4 , pp. 877-889
    • Wang, B.1    Wu, Y.2    Liu, K.J.R.3
  • 21
    • 84855466075 scopus 로고    scopus 로고
    • Anti-jamming games in multi-channel cognitive radio networks
    • Jan.
    • Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, Jan. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.1 , pp. 4-15
    • Wu, Y.1    Wang, B.2    Liu, K.J.R.3    Clancy, T.C.4
  • 22
    • 84893605474 scopus 로고    scopus 로고
    • Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning
    • Washington, DC, USA, Oct.
    • Y. L. Gwon, S. Dastangoo, C. E. Fossa, and H. T. Kung, "Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning," in Proc. Commun. Netw. Security, Washington, DC, USA, Oct. 2013, pp. 28-36.
    • (2013) Proc. Commun. Netw. Security , pp. 28-36
    • Gwon, Y.L.1    Dastangoo, S.2    Fossa, C.E.3    Kung, H.T.4
  • 23
    • 79960884459 scopus 로고    scopus 로고
    • Online learning in opportunistic spectrum access: A restless bandit approach
    • Shanghai, China, Apr.
    • C. Tekin and M. Liu, "Online learning in opportunistic spectrum access: A restless bandit approach," in Proc. Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 2462-2470.
    • (2011) Proc. Int. Conf. Comput. Commun. , pp. 2462-2470
    • Tekin, C.1    Liu, M.2
  • 24
    • 69449100462 scopus 로고    scopus 로고
    • Optimality of myopic sensing in multichannel opportunistic access
    • Sep.
    • S. Ahmad, M. Liu, T. Javidi, Q. Zhao, and B. Krishnamachari, "Optimality of myopic sensing in multichannel opportunistic access," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4040-4050, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4040-4050
    • Ahmad, S.1    Liu, M.2    Javidi, T.3    Zhao, Q.4    Krishnamachari, B.5
  • 25
    • 77953180719 scopus 로고    scopus 로고
    • Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation
    • Singapore, Apr.
    • Y. Gai, B. Krishnamachari, and R. Jain, "Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation," in Proc. New Front. Dyn. Spectr. (DYSPAN), Singapore, Apr. 2010, pp. 1-9.
    • (2010) Proc. New Front. Dyn. Spectr. (DYSPAN) , pp. 1-9
    • Gai, Y.1    Krishnamachari, B.2    Jain, R.3
  • 26
    • 84855425212 scopus 로고    scopus 로고
    • Towards optimal adaptive UFH-based anti-jamming wireless communication
    • Jan.
    • Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Towards optimal adaptive UFH-based anti-jamming wireless communication," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 16-30, Jan. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.1 , pp. 16-30
    • Wang, Q.1    Xu, P.2    Ren, K.3    Li, X.-Y.4
  • 27
    • 84896335089 scopus 로고    scopus 로고
    • Learning state selection for reconfigurable antennas: A multi-armed bandit approach
    • Mar.
    • N. Gulati and K. R. Dandekar, "Learning state selection for reconfigurable antennas: A multi-armed bandit approach," IEEE Trans. Antenna Propag., vol. 62, no. 3, pp. 1027-1038, Mar. 2014.
    • (2014) IEEE Trans. Antenna Propag. , vol.62 , Issue.3 , pp. 1027-1038
    • Gulati, N.1    Dandekar, K.R.2
  • 28
    • 0036568025 scopus 로고    scopus 로고
    • Finite-time analysis of the multi-armed bandit problem
    • May
    • P. Auer, N. Cesa-Bianchi, and P. Fischer, "Finite-time analysis of the multi-armed bandit problem," Mach. Learn., vol. 47, no. 2, pp. 235-256, May 2002.
    • (2002) Mach. Learn. , vol.47 , Issue.2 , pp. 235-256
    • Auer, P.1    Cesa-Bianchi, N.2    Fischer, P.3
  • 29
    • 0037709910 scopus 로고    scopus 로고
    • The nonstochastic multi-armed bandit problem
    • Jan.
    • P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "The nonstochastic multi-armed bandit problem," SIAM J. Comput., vol. 32, no. 1, pp. 48-77, Jan. 2002.
    • (2002) SIAM J. Comput. , vol.32 , Issue.1 , pp. 48-77
    • Auer, P.1    Cesa-Bianchi, N.2    Freund, Y.3    Schapire, R.E.4
  • 30
    • 38049011420 scopus 로고    scopus 로고
    • Nearly tight bounds for the continuum-armed bandit problem
    • R. Kleinberg, "Nearly tight bounds for the continuum-armed bandit problem," in Proc. Neural Inf. Proc. Syst., 2004, pp. 201-208.
    • (2004) Proc. Neural Inf. Proc. Syst. , pp. 201-208
    • Kleinberg, R.1
  • 31
    • 57049185311 scopus 로고    scopus 로고
    • Multi-armed bandits in metric spaces
    • R. Kleinberg et al.., "Multi-armed bandits in metric spaces," in Proc. Symp. Theory Comput. (STOC), 2008, pp. 681-690.
    • (2008) Proc. Symp. Theory Comput. (STOC) , pp. 681-690
    • Kleinberg, R.1
  • 32
    • 84939604123 scopus 로고    scopus 로고
    • Lipschtiz bandits: Regret lower bounds and optimal algorithms
    • S. Magureanu et al., "Lipschtiz bandits: Regret lower bounds and optimal algorithms," in Proc. Conf. Learn. Theory (COLT), 2014, pp. 975-999.
    • (2014) Proc. Conf. Learn. Theory (COLT) , pp. 975-999
    • Magureanu, S.1
  • 33
    • 77952027689 scopus 로고    scopus 로고
    • Online optimization in X-armed bandits
    • S. Bubeck et al., "Online optimization in X-armed bandits," in Proc. Neural Inf. Proc. Syst. (NIPS), 2008, pp. 201-208.
    • (2008) Proc. Neural Inf. Proc. Syst. (NIPS) , pp. 201-208
    • Bubeck, S.1
  • 34
    • 84892931731 scopus 로고    scopus 로고
    • Contextual bandits with similarity information
    • A. Slivkins, "Contextual bandits with similarity information," in Proc. Conf. Learn. Theory (COLT), 2011, pp. 2533-2568.
    • (2011) Proc. Conf. Learn. Theory (COLT) , pp. 2533-2568
    • Slivkins, A.1
  • 36
    • 84912572500 scopus 로고    scopus 로고
    • Optimal jamming using delayed learning
    • Baltimore, MD, USA, Oct.
    • S. Amuru and R. M. Buehrer, "Optimal jamming using delayed learning," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Oct. 2014. pp. 1528-1533.
    • (2014) Proc. Mil. Commun. Conf. , pp. 1528-1533
    • Amuru, S.1    Buehrer, R.M.2
  • 38
    • 62949181077 scopus 로고    scopus 로고
    • Exploration-exploitation trade-off using variance estimates in multi-armed bandits
    • Apr.
    • J.-Y. Audibert, R. Munos, and C. Szepesvari, "Exploration-exploitation trade-off using variance estimates in multi-armed bandits," Theor. Comput. Sci., vol. 410, no. 19, pp. 1876-1902, Apr. 2009.
    • (2009) Theor. Comput. Sci. , vol.410 , Issue.19 , pp. 1876-1902
    • Audibert, J.-Y.1    Munos, R.2    Szepesvari, C.3
  • 41
    • 77957337199 scopus 로고    scopus 로고
    • UCB revisited: Improved regret bounds for the stochastic multi-armed bandit problem
    • P. Auer and R. Ortner, "UCB revisited: Improved regret bounds for the stochastic multi-armed bandit problem," Period. Math. Hung., vol. 61, pp. 55-65, 2010.
    • (2010) Period. Math. Hung. , vol.61 , pp. 55-65
    • Auer, P.1    Ortner, R.2
  • 42
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • Oakland, CA, USA, May
    • M. Strasser, S. Čapkun, and M. Čagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security Privacy, Oakland, CA, USA, May 2008, pp. 64-78.
    • (2008) Proc. IEEE Symp. Security Privacy , pp. 64-78
    • Strasser, M.1    Čapkun, S.2    Čagalj, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.