Home > Research > Browse

Results for Jamming

Publications & Outputs

  1. Random linear network coding based physical layer security for relay-aided device-to-device communication

    Saeed Khan, A., Chatzigeorgiou, I., Zheng, G., Basulti, B., Chuma, J. & Lambotharan, S., 22/04/2020, In: IET Communications. 14, 7, p. 1155-1161 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Impersonation detection in line-of-sight underwater acoustic sensor networks

    Aman, W., Rahman, M. M. U., Qadir, J., Pervaiz, H. & Ni, Q., 6/08/2018, In: IEEE Access. 6, p. 44459-44472 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review