-
1
-
-
84953747030
-
A systematic learning method for optimal jamming
-
Jun.
-
S. Amuru, C. Tekin, M. van der Schaar, and R. M. Buehrer, "A systematic learning method for optimal jamming," in Proc. Int. Conf. Commun. (ICC), Jun. 2015, pp. 2822-2827.
-
(2015)
Proc. Int. Conf. Commun. (ICC)
, pp. 2822-2827
-
-
Amuru, S.1
Tekin, C.2
Van Der-Schaar, M.3
Buehrer, R.M.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1335-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1335-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai Shitz, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 7, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.7
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
5
-
-
0020497622
-
The Gaussian test channel with an intelligent jammer
-
Jan.
-
T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inf. Theory, vol. IT-29, no. 1, pp. 152-157, Jan. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.1
, pp. 152-157
-
-
Basar, T.1
-
6
-
-
4143137728
-
Capacity of correlated jamming channels
-
Monticello, IL, USA
-
M. Medard, "Capacity of correlated jamming channels," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, 1997, pp. 1043-1052.
-
(1997)
Proc. Allerton Conf. Commun. Control Comput.
, pp. 1043-1052
-
-
Medard, M.1
-
7
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
Sep.
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
8
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 62, no. 1, pp. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.62
, Issue.1
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
9
-
-
84890423904
-
To obtain or not to obtain CSI in the presence of hybrid adversary
-
Istanbul, Turkey, Jan.
-
Y. O. Basciftci, C. E. Koksal, and F. Ozguner, "To obtain or not to obtain CSI in the presence of hybrid adversary," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jan. 2013, pp. 2865-2869.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2865-2869
-
-
Basciftci, Y.O.1
Koksal, C.E.2
Ozguner, F.3
-
10
-
-
0030195612
-
Convexity properties in binary detection problems
-
Jul.
-
M. Azizoglu, "Convexity properties in binary detection problems," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1316-1321, Jul. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.4
, pp. 1316-1321
-
-
Azizoglu, M.1
-
11
-
-
84865426812
-
Optimum power allocation for average power constrained jammers in the presence of non-Gaussian noise
-
Aug.
-
S. Bayram et al., "Optimum power allocation for average power constrained jammers in the presence of non-Gaussian noise," IEEE Commun. Lett., vol. 16, no. 8, pp. 1153-1156, Aug. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.8
, pp. 1153-1156
-
-
Bayram, S.1
-
12
-
-
84988306011
-
Optimal jamming strategies in digital communications-impact of modulation
-
Austin, TX, USA, Dec.
-
S. Amuru and R. M. Buehrer, "Optimal jamming strategies in digital communications-impact of modulation," in Proc. Global Commun. Conf., Austin, TX, USA, Dec. 2014, pp. 1619-1624.
-
(2014)
Proc. Global Commun. Conf.
, pp. 1619-1624
-
-
Amuru, S.1
Buehrer, R.M.2
-
13
-
-
84940675700
-
Optimal jamming against digital modulation
-
Oct.
-
S. Amuru and R. M. Buehrer, "Optimal jamming against digital modulation," IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2212-2224, Oct. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.10
, pp. 2212-2224
-
-
Amuru, S.1
Buehrer, R.M.2
-
14
-
-
84905251124
-
A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios
-
Florence, Italy, May
-
K. Dabcevic, A. Betancourt, L. Marcenaro, and C. S. Regazzoni, "A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), Florence, Italy, May 2014, pp. 8158-8162.
-
(2014)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP)
, pp. 8158-8162
-
-
Dabcevic, K.1
Betancourt, A.2
Marcenaro, L.3
Regazzoni, C.S.4
-
15
-
-
80051717392
-
Jamming games in wireless networks with incomplete information
-
Aug.
-
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., vol. 49, no. 8, pp. 112-118, Aug. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.8
, pp. 112-118
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
16
-
-
0019664290
-
An information theoretic study of communication in the presence of jamming
-
R. McEliece and W. Stark, "An information theoretic study of communication in the presence of jamming," in Proc. Int. Conf. Commun., 1981, pp. 45.3.1-45.3.5.
-
(1981)
Proc. Int. Conf. Commun.
, pp. 1-5
-
-
McEliece, R.1
Stark, W.2
-
17
-
-
0026913942
-
Worst-case power constrained noise for binary-input channels
-
Sep.
-
S. Shamai Shitz and S. Verdú, "Worst-case power constrained noise for binary-input channels," IEEE Trans. Inf. Theory, vol. 38, no. 5, pp. 1494-1511, Sep. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.5
, pp. 1494-1511
-
-
Shamai Shitz, S.1
Verdú, S.2
-
18
-
-
77956920943
-
Cognitive engine design for link adaptation: An application to multi-antenna systems
-
Sep.
-
H. I. Volos and R. M. Buehrer, "Cognitive engine design for link adaptation: An application to multi-antenna systems," IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2902-2913, Sep. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.9
, pp. 2902-2913
-
-
Volos, H.I.1
Buehrer, R.M.2
-
19
-
-
84870545360
-
Cognitive radio engine training
-
Nov.
-
H. I. Volos and R. M. Buehrer, "Cognitive radio engine training," IEEE Trans. Wireless Commun., vol. 11, no. 11, pp. 3878-3889, Nov. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.11
, pp. 3878-3889
-
-
Volos, H.I.1
Buehrer, R.M.2
-
20
-
-
79953200186
-
An anti-jamming stochastic game in cognitive radio networks
-
Apr.
-
B. Wang, Y. Wu, and K. J. R. Liu, "An anti-jamming stochastic game in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, Apr. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
-
21
-
-
84855466075
-
Anti-jamming games in multi-channel cognitive radio networks
-
Jan.
-
Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, Jan. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
Clancy, T.C.4
-
22
-
-
84893605474
-
Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning
-
Washington, DC, USA, Oct.
-
Y. L. Gwon, S. Dastangoo, C. E. Fossa, and H. T. Kung, "Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning," in Proc. Commun. Netw. Security, Washington, DC, USA, Oct. 2013, pp. 28-36.
-
(2013)
Proc. Commun. Netw. Security
, pp. 28-36
-
-
Gwon, Y.L.1
Dastangoo, S.2
Fossa, C.E.3
Kung, H.T.4
-
23
-
-
79960884459
-
Online learning in opportunistic spectrum access: A restless bandit approach
-
Shanghai, China, Apr.
-
C. Tekin and M. Liu, "Online learning in opportunistic spectrum access: A restless bandit approach," in Proc. Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 2462-2470.
-
(2011)
Proc. Int. Conf. Comput. Commun.
, pp. 2462-2470
-
-
Tekin, C.1
Liu, M.2
-
24
-
-
69449100462
-
Optimality of myopic sensing in multichannel opportunistic access
-
Sep.
-
S. Ahmad, M. Liu, T. Javidi, Q. Zhao, and B. Krishnamachari, "Optimality of myopic sensing in multichannel opportunistic access," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4040-4050, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4040-4050
-
-
Ahmad, S.1
Liu, M.2
Javidi, T.3
Zhao, Q.4
Krishnamachari, B.5
-
25
-
-
77953180719
-
Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation
-
Singapore, Apr.
-
Y. Gai, B. Krishnamachari, and R. Jain, "Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation," in Proc. New Front. Dyn. Spectr. (DYSPAN), Singapore, Apr. 2010, pp. 1-9.
-
(2010)
Proc. New Front. Dyn. Spectr. (DYSPAN)
, pp. 1-9
-
-
Gai, Y.1
Krishnamachari, B.2
Jain, R.3
-
26
-
-
84855425212
-
Towards optimal adaptive UFH-based anti-jamming wireless communication
-
Jan.
-
Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Towards optimal adaptive UFH-based anti-jamming wireless communication," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 16-30, Jan. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 16-30
-
-
Wang, Q.1
Xu, P.2
Ren, K.3
Li, X.-Y.4
-
27
-
-
84896335089
-
Learning state selection for reconfigurable antennas: A multi-armed bandit approach
-
Mar.
-
N. Gulati and K. R. Dandekar, "Learning state selection for reconfigurable antennas: A multi-armed bandit approach," IEEE Trans. Antenna Propag., vol. 62, no. 3, pp. 1027-1038, Mar. 2014.
-
(2014)
IEEE Trans. Antenna Propag.
, vol.62
, Issue.3
, pp. 1027-1038
-
-
Gulati, N.1
Dandekar, K.R.2
-
28
-
-
0036568025
-
Finite-time analysis of the multi-armed bandit problem
-
May
-
P. Auer, N. Cesa-Bianchi, and P. Fischer, "Finite-time analysis of the multi-armed bandit problem," Mach. Learn., vol. 47, no. 2, pp. 235-256, May 2002.
-
(2002)
Mach. Learn.
, vol.47
, Issue.2
, pp. 235-256
-
-
Auer, P.1
Cesa-Bianchi, N.2
Fischer, P.3
-
29
-
-
0037709910
-
The nonstochastic multi-armed bandit problem
-
Jan.
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "The nonstochastic multi-armed bandit problem," SIAM J. Comput., vol. 32, no. 1, pp. 48-77, Jan. 2002.
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
30
-
-
38049011420
-
Nearly tight bounds for the continuum-armed bandit problem
-
R. Kleinberg, "Nearly tight bounds for the continuum-armed bandit problem," in Proc. Neural Inf. Proc. Syst., 2004, pp. 201-208.
-
(2004)
Proc. Neural Inf. Proc. Syst.
, pp. 201-208
-
-
Kleinberg, R.1
-
31
-
-
57049185311
-
Multi-armed bandits in metric spaces
-
R. Kleinberg et al.., "Multi-armed bandits in metric spaces," in Proc. Symp. Theory Comput. (STOC), 2008, pp. 681-690.
-
(2008)
Proc. Symp. Theory Comput. (STOC)
, pp. 681-690
-
-
Kleinberg, R.1
-
32
-
-
84939604123
-
Lipschtiz bandits: Regret lower bounds and optimal algorithms
-
S. Magureanu et al., "Lipschtiz bandits: Regret lower bounds and optimal algorithms," in Proc. Conf. Learn. Theory (COLT), 2014, pp. 975-999.
-
(2014)
Proc. Conf. Learn. Theory (COLT)
, pp. 975-999
-
-
Magureanu, S.1
-
33
-
-
77952027689
-
Online optimization in X-armed bandits
-
S. Bubeck et al., "Online optimization in X-armed bandits," in Proc. Neural Inf. Proc. Syst. (NIPS), 2008, pp. 201-208.
-
(2008)
Proc. Neural Inf. Proc. Syst. (NIPS)
, pp. 201-208
-
-
Bubeck, S.1
-
34
-
-
84892931731
-
Contextual bandits with similarity information
-
A. Slivkins, "Contextual bandits with similarity information," in Proc. Conf. Learn. Theory (COLT), 2011, pp. 2533-2568.
-
(2011)
Proc. Conf. Learn. Theory (COLT)
, pp. 2533-2568
-
-
Slivkins, A.1
-
36
-
-
84912572500
-
Optimal jamming using delayed learning
-
Baltimore, MD, USA, Oct.
-
S. Amuru and R. M. Buehrer, "Optimal jamming using delayed learning," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Oct. 2014. pp. 1528-1533.
-
(2014)
Proc. Mil. Commun. Conf.
, pp. 1528-1533
-
-
Amuru, S.1
Buehrer, R.M.2
-
38
-
-
62949181077
-
Exploration-exploitation trade-off using variance estimates in multi-armed bandits
-
Apr.
-
J.-Y. Audibert, R. Munos, and C. Szepesvari, "Exploration-exploitation trade-off using variance estimates in multi-armed bandits," Theor. Comput. Sci., vol. 410, no. 19, pp. 1876-1902, Apr. 2009.
-
(2009)
Theor. Comput. Sci.
, vol.410
, Issue.19
, pp. 1876-1902
-
-
Audibert, J.-Y.1
Munos, R.2
Szepesvari, C.3
-
39
-
-
84963910004
-
-
arXiv preprint arXiv:1411.3652, Nov.
-
S. Amuru, C. Tekin, M. van der Schaar, and R. M. Buehrer, "Jamming bandits," in arXiv preprint arXiv:1411.3652, Nov. 2014.
-
(2014)
Jamming Bandits
-
-
Amuru, S.1
Tekin, C.2
Van Der-Schaar, M.3
Buehrer, R.M.4
-
41
-
-
77957337199
-
UCB revisited: Improved regret bounds for the stochastic multi-armed bandit problem
-
P. Auer and R. Ortner, "UCB revisited: Improved regret bounds for the stochastic multi-armed bandit problem," Period. Math. Hung., vol. 61, pp. 55-65, 2010.
-
(2010)
Period. Math. Hung.
, vol.61
, pp. 55-65
-
-
Auer, P.1
Ortner, R.2
-
42
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
Oakland, CA, USA, May
-
M. Strasser, S. Čapkun, and M. Čagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security Privacy, Oakland, CA, USA, May 2008, pp. 64-78.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 64-78
-
-
Strasser, M.1
Čapkun, S.2
Čagalj, M.3
-
43
-
-
84946688369
-
Context adaptive big data stream mining
-
Monticello, IL, USA, Oct.
-
C. Tekin, L. Canzian, and M. van der Schaar, "Context adaptive big data stream mining," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, Oct. 2014, pp. 483-490.
-
(2014)
Proc. Allerton Conf. Commun. Control Comput.
, pp. 483-490
-
-
Tekin, C.1
Canzian, L.2
Van Der-Schaar, M.3
|