Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions
L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
Learning k for kNN Classification
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …
mining and machine learning due to its simple implementation and distinguished …
A statistical approach to detect jamming attacks in wireless sensor networks
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising
network solutions with a wide variety of applications in the areas of agriculture, environment …
network solutions with a wide variety of applications in the areas of agriculture, environment …
Detection, estimation, and compensation of false data injection attack for UAVs
The safety issues of unmanned aerial vehicles (UAVs) are ever increasing in focus due to
the vulnerability to attack. This paper investigates the safety problem for UAVs under the …
the vulnerability to attack. This paper investigates the safety problem for UAVs under the …
Data collection for attack detection and security measurement in mobile ad hoc networks: A survey
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
Securing ZigBee communications against constant jamming attack using neural network
ZigBee is a wireless communication technology that has been widely used to provide low-
bandwidth wireless services for Internet-of-Things applications, such as building automation …
bandwidth wireless services for Internet-of-Things applications, such as building automation …
Jammer localization in multi-hop wireless network: A comprehensive survey
X Wei, Q Wang, T Wang, J Fan - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Various security threats and corresponding countermeasures has been a major concern of
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …
6G networks physical layer security using RGB visible light communications
Visible Light Communication (VLC) is a key technology for the sixth-generation (6G)
wireless communication thanks to the possibility of using artificial environmental lights as a …
wireless communication thanks to the possibility of using artificial environmental lights as a …
Index modulation based frequency hop**: Anti-jamming design and analysis
Y Shi, K An, Y Li - IEEE Transactions on Vehicular Technology, 2021 - ieeexplore.ieee.org
Reactive symbol-level jammer has attracted attention due to its low energy cost and high
jamming efficiency. With the development of software-defined radio (SDR), the …
jamming efficiency. With the development of software-defined radio (SDR), the …