Results 11 to 20 of about 16,950 (276)

Wireless communications “N + 1 dimensionality” endogenous anti-jamming: theory and techniques

open access: yesSecurity and Safety, 2023
The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace ...
Yao Fuqiang   +3 more
doaj   +1 more source

Communication Anti-jamming Technique Based on Enhanced Oblique Projection Operator in Polarization Domain [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the anti-jamming and interference suppression in wireless communication,this paper proposes a communication anti-jamming method in polarization domain.It uses oblique projection polarization filter in the signal polarization domain to overcome ...
ZHANG Xiaokai,ZHANG Bangning,GUO Daoxing,WANG Yaowen
doaj   +1 more source

A cross‐layer anti‐jamming method in satellite Internet

open access: yesIET Communications, 2023
In view of the diverse jamming environment, the single‐level anti‐jamming method faces some challenges such as poor timeliness, high cost and poor effect.
Peijie Yan   +3 more
doaj   +1 more source

Covert Anti-Jamming Communication Based on Gaussian Coded Modulation

open access: yesApplied Sciences, 2021
In several wireless communication systems, robustness against jammers and covertness against eavesdroppers are required simultaneously. In this paper, we propose a novel covert anti-jamming communication system.
Haeung Choi, Sangjun Park, Heung-No Lee
doaj   +1 more source

Anti-Jamming Communication Using Slotted Cross Q Learning

open access: yesElectronics, 2023
Most of the existing intelligent anti-jamming communication algorithms model sensing, learning, and transmission as a serial process, and ideally assume that the duration of sensing and learning timeslots is very short, almost negligible. However, when the jamming environment changes rapidly, the sensing and learning time can no longer be ignored, and ...
Yingtao Niu   +3 more
openaire   +1 more source

Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks [PDF]

open access: yes, 2013
In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power ...
He, Zhitao, Voigt, Thiemo
core   +2 more sources

Retroactive Anti-Jamming for MISO Broadcast Channels [PDF]

open access: yes, 2013
Jamming attacks can significantly impact the performance of wireless communication systems. In addition to reducing the capacity, such attacks may lead to insurmountable overhead in terms of re-transmissions and increased power consumption. In this paper,
Amuru, SaiDhiraj   +3 more
core   +2 more sources

Fast Reinforcement Learning for Anti-jamming Communications

open access: yes, 2020
This letter presents a fast reinforcement learning algorithm for anti-jamming communications which chooses previous action with probability $ $ and applies $ $-greedy with probability $(1- )$. A dynamic threshold based on the average value of previous several actions is designed and probability $ $ is formulated as a Gaussian-like function to guide
Ye, Pei-Gen   +3 more
openaire   +2 more sources

An Intelligent Access Channel Algorithm Based on Distributed Double Q Learning

open access: yesApplied Sciences, 2022
Aiming at the problem of mutual interference between nodes and external malicious jamming in wireless communication networks, this paper proposes an intelligent communication anti-jamming algorithm based on distributed double Q-learning.
Guoliang Zhang   +3 more
doaj   +1 more source

Exploding iconography: The Mindbomb Project [PDF]

open access: yes, 2006
The Mindbomb project was started by a group of young artists, journalists and writers, rich in creative resources. Together they created the social poster.
Mercea, D.
core   +1 more source

Home - About - Disclaimer - Privacy