{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:18:41Z","timestamp":1742966321180,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030667849"},{"type":"electronic","value":"9783030667856"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-66785-6_55","type":"book-chapter","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T15:03:07Z","timestamp":1611414187000},"page":"519-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches"],"prefix":"10.1007","author":[{"given":"Yijie","family":"Luo","sequence":"first","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sixuan","family":"An","sequence":"additional","affiliation":[]},{"given":"Zhibin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,24]]},"reference":[{"issue":"6","key":"55_CR1","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/MNET.2019.1900029","volume":"33","author":"K-I Ahmed","year":"2019","unstructured":"Ahmed, K.-I., Tabassum, H., Hossain, E.: Deep learning for radio resource allocation in multi-cell networks. IEEE Network Early Access 33(6), 188\u2013195 (2019)","journal-title":"IEEE Network Early Access"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"46317","DOI":"10.1109\/ACCESS.2019.2909490","volume":"7","author":"S-J Nawaz","year":"2019","unstructured":"Nawaz, S.-J., Sharma, S.-K., Wyne, S., Patwary, M.-N., Asaduzzaman, M.: Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future. IEEE Access 7, 46317\u201346350 (2019)","journal-title":"IEEE Access"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Alrowaily, M., Lu, Z.: Secure edge computing in IoT systems: review and case studies. In: 2018 IEEE\/ACM Symposium on Edge Computing (SEC), Seattle, WA, pp. 440\u2013444 (2018)","DOI":"10.1109\/SEC.2018.00060"},{"issue":"1","key":"55_CR4","first-page":"141","volume":"40","author":"P Zhang","year":"2019","unstructured":"Zhang, P., Niu, K., Tian, H., Nie, G.-F., Qi, Q., Zhang, J.: Technology prospect of 6G mobile communications. J. Commun. 40(1), 141\u2013148 (2019)","journal-title":"J. Commun."},{"issue":"6","key":"55_CR5","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1109\/TNET.2018.2869244","volume":"26","author":"G-H Sim","year":"2018","unstructured":"Sim, G.-H., Klos, S., Asadi, A., Klein, A., Hollick, M.: An online context-aware machine learning algorithm for 5G mmWave vehicular communications. IEEE\/ACM Trans. Networking 26(6), 2487\u20132500 (2018)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"9","key":"55_CR6","doi-asserted-by":"publisher","first-page":"6190","DOI":"10.1109\/TWC.2018.2855163","volume":"17","author":"J-M Hamamreh","year":"2018","unstructured":"Hamamreh, J.-M., Arslan, H.: Joint PHY\/MAC layer security design using ARQ with MRC and null-space independent, PAPR-aware artificial noise in SISO systems. IEEE Trans. Wireless Communications 17(9), 6190\u20136204 (2018)","journal-title":"IEEE Trans. Wireless Communications"},{"issue":"20","key":"55_CR7","doi-asserted-by":"publisher","first-page":"4962","DOI":"10.1109\/TSP.2013.2269049","volume":"61","author":"G Zheng","year":"2013","unstructured":"Zheng, G., Krikidis, I., Li, J., Petropulu, A.P., Ottersten, B.: Improving physical layer secrecy using full-duplex jamming receivers. IEEE Trans. Signal Process. 61(20), 4962\u20134974 (2013)","journal-title":"IEEE Trans. Signal Process."},{"issue":"11","key":"55_CR8","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TCOMM.2012.072612.110686","volume":"60","author":"G Geraci","year":"2012","unstructured":"Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.-B.: Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472\u20133482 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"55_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TCOMM.2014.2377239","volume":"63","author":"Y-L Zou","year":"2015","unstructured":"Zou, Y.-L., Champagne, B., Zhu, W.-P., Hanzo, L.: Relay-selection improves the security-reliability tradeoff in cognitive radio systems. IEEE Trans. Commun. 63(1), 215\u2013228 (2015)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"55_CR10","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1109\/TCOMM.2016.2645679","volume":"65","author":"X Tang","year":"2017","unstructured":"Tang, X., Ren, P.-R., Wang, Y.-C., Han, Z.: Combating full-duplex active eavesdropper: a hierarchical game perspective. IEEE Trans. Commun. 65(3), 1379\u20131395 (2017)","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"55_CR11","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TWC.2016.2633336","volume":"16","author":"M-R Abedi","year":"2017","unstructured":"Abedi, M.-R., Mokari, N., Saeedi, H., Yanikomeroglu, H.: Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: active adversary. IEEE Trans. Wireless Commun. 16(2), 885\u2013899 (2017)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"10","key":"55_CR12","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TIFS.2017.2705618","volume":"12","author":"L Li","year":"2017","unstructured":"Li, L., Petropulu, A.-P., Chen, Z.: MIMO secret communications against an active eavesdropper. IEEE Trans. Inf. Forensics Secur. 12(10), 2387\u20132401 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"55_CR13","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s12243-016-0515-x","volume":"71","author":"J Qu","year":"2016","unstructured":"Qu, J., Cai, Y., Zheng, J., Yang, W., Wu, D., Hu, Y.: Power allocation for device-to-device communication underlaying cellular networks under a probabilistic eavesdropping scenario. Ann. Telecommun. 71(7), 389\u2013398 (2016). https:\/\/doi.org\/10.1007\/s12243-016-0515-x","journal-title":"Ann. Telecommun."},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Mei, W.-D., Chen, Z., Fang, J., Fu, B.: Secure D2D-enabled cellular communication against selective eavesdropping. In: IEEE ICC 2017 Communication and Information System Security Symposium, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7996937"},{"issue":"1","key":"55_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TSP.2012.2222386","volume":"61","author":"A Mukherjee","year":"2013","unstructured":"Mukherjee, A., Swindlehurst, A.-L.: Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Trans. Signal Process. 61(1), 82\u201391 (2013)","journal-title":"IEEE Trans. Signal Process."},{"key":"55_CR16","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-00557-3_12","volume-title":"Machine Learning and Intelligent Communications","author":"Y Luo","year":"2018","unstructured":"Luo, Y., Yang, Y., Duan, Y., Yang, Z.: Joint D2D cooperative relaying and friendly jamming selection for physical layer security. In: Meng, L., Zhang, Y. (eds.) MLICOM 2018. LNICST, vol. 251, pp. 115\u2013126. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00557-3_12"},{"key":"55_CR17","doi-asserted-by":"publisher","first-page":"41324","DOI":"10.1109\/ACCESS.2019.2906845","volume":"7","author":"Y-L Luo","year":"2019","unstructured":"Luo, Y.-L., Feng, Z., Jiang, H., Yang, Y., Huang, Y., Yao, J.: Game-theoretic learning approaches for secure D2D communications against full-duplex active eavesdropper. IEEE Access 7, 41324\u201341335 (2019)","journal-title":"IEEE Access"},{"issue":"8","key":"55_CR18","doi-asserted-by":"publisher","first-page":"4038","DOI":"10.1109\/TWC.2013.071913121570","volume":"12","author":"D Yang","year":"2013","unstructured":"Yang, D., Xue, G., Zhang, J., Richa, A., Fang, X.: Coping with a smart jammer in wireless networks: a Stackelberg game approach. IEEE Trans. Wireless Commun. 12(8), 4038\u20134047 (2013)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"55_CR19","doi-asserted-by":"publisher","first-page":"21697","DOI":"10.1109\/ACCESS.2018.2828033","volume":"6","author":"Y Xu","year":"2018","unstructured":"Xu, Y., et al.: A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks. IEEE Access 6, 21697\u201321709 (2018)","journal-title":"IEEE Access"},{"issue":"5","key":"55_CR20","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1007\/s11276-018-1664-9","volume":"25","author":"L Yu","year":"2018","unstructured":"Yu, L., Wu, Q., Xu, Y., Ding, G., Jia, L.: Power control games for multi-user anti-jamming communications. Wireless Netw. 25(5), 2365\u20132374 (2018). https:\/\/doi.org\/10.1007\/s11276-018-1664-9","journal-title":"Wireless Netw."},{"key":"55_CR21","doi-asserted-by":"crossref","unstructured":"Tang, X., Ren, P., Wang, Y., Du, Q., Sun, L.: Securing wireless transmission against reactive jamming: a Stackelberg game framework. In: Proceeding of IEEE GLOBECOM, pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417368"},{"issue":"1","key":"55_CR22","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/JSAC.2012.120102","volume":"30","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Wang, B., Liu, K.J.R., Clancy, T.C.: Anti-jamming games in multi-channel cognitive radio networks. IEEE J. Sel. Areas Commun. 30(1), 4\u201315 (2012)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"55_CR23","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/LCOMM.2018.2815018","volume":"22","author":"X Liu","year":"2018","unstructured":"Liu, X., Xu, Y., Jia, L., Wu, Q., Anpalagan, A.: Anti-jamming communications using spectrum waterfall: a deep reinforcement learning approach. IEEE Commun. Lett. 22(5), 998\u20131001 (2018)","journal-title":"IEEE Commun. Lett."},{"key":"55_CR24","doi-asserted-by":"publisher","first-page":"14623","DOI":"10.1109\/ACCESS.2019.2893459","volume":"7","author":"Z-B Feng","year":"2019","unstructured":"Feng, Z.-B., et al.: Power control in relay-assisted anti-Jamming systems: a Bayesian three-layer Stackelberg game approach. IEEE Access 7, 14623\u201314636 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"55_CR25","first-page":"136","volume":"21","author":"L Song","year":"2014","unstructured":"Song, L., Niyato, D., Han, Z., Hossain, E.: Game-theoretic resource allocation methods for device-to-device communication. IEEE Commun. Mag. 21(3), 136\u2013144 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Wang, F., Song, L., Han, Z., Zhao, Q., Wang, X.: Joint scheduling and resource allocation for device-to-device underlay communication. In: IEEE Wireless Communication and Networking Conference (WCNC), pp. 1\u20136 (2013)","DOI":"10.1109\/ICC.2013.6655574"},{"key":"55_CR27","doi-asserted-by":"crossref","unstructured":"Chu, Z., et al.: Game theory based secure wireless powered D2D communications with cooperative jamming. In: Wireless Days, pp. 95\u201398 (2017)","DOI":"10.1109\/WD.2017.7918122"},{"issue":"1","key":"55_CR28","first-page":"119","volume":"34","author":"Y-J Luo","year":"2018","unstructured":"Luo, Y.-J., Yang, Y., Cui, L.: Research on physical layer security in D2D enabled cellular networks with an active eavesdropper. Sig. Process. 34(1), 119\u2013125 (2018)","journal-title":"Sig. Process."},{"key":"55_CR29","doi-asserted-by":"publisher","first-page":"24632","DOI":"10.1109\/ACCESS.2017.2767283","volume":"5","author":"X Tang","year":"2017","unstructured":"Tang, X., Ren, P., Han, Z.: Power-efficient secure transmission against full-duplex active eavesdropper: a game-theoretic framework. IEEE Access 5, 24632\u201324645 (2017)","journal-title":"IEEE Access"},{"issue":"8","key":"55_CR30","doi-asserted-by":"publisher","first-page":"7658","DOI":"10.1109\/TVT.2018.2837037","volume":"67","author":"W Huang","year":"2018","unstructured":"Huang, W., Chen, W., Bai, B., Han, Z.: Wiretap channel with full-duplex proactive eavesdropper: a game theoretic approach. IEEE Trans. Veh. Technol. 67(8), 7658\u20137663 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"55_CR31","doi-asserted-by":"publisher","first-page":"10788","DOI":"10.1109\/TVT.2018.2868900","volume":"67","author":"H Fang","year":"2018","unstructured":"Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.R.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788\u201310799 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"55_CR32","doi-asserted-by":"crossref","unstructured":"Luo, Y.-J., Yang, Y.: D2D friendly jamming and cooperative relaying for combating a full-duplex active eavesdropper. In: ICCT 2019, pp. 1\u20136 (2019)","DOI":"10.1109\/ICCT46805.2019.8947265"},{"issue":"10","key":"55_CR33","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/LCOMM.2016.2598808","volume":"20","author":"L Jia","year":"2016","unstructured":"Jia, L., Yao, F., Sun, Y., et al.: Bayesian Stackelberg game for anti-jamming transmission with incomplete information. IEEE Commun. Lett. 20(10), 1991\u20131994 (2016)","journal-title":"IEEE Commun. Lett."},{"key":"55_CR34","doi-asserted-by":"crossref","unstructured":"Li, Y., Xiao, L., Liu, J., et al.: Power control Stackelberg game in cooperative anti-jamming communications. In: International Conference on Game Theory for Networks, pp. 1\u20136 (2015)","DOI":"10.1109\/GAMENETS.2014.7043719"},{"issue":"6","key":"55_CR35","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/LWC.2017.2747543","volume":"6","author":"L Jia","year":"2017","unstructured":"Jia, L., Yao, F., Sun, Y., et al.: A hierarchical learning solution for anti-jamming Stackelberg game with discrete power strategies. IEEE Wirel. Commun. Lett. 6(6), 818\u2013821 (2017)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"55_CR36","first-page":"1","volume":"9","author":"Z Feng","year":"2019","unstructured":"Feng, Z., et al.: An anti-Jamming hierarchical optimization approach in relay communication system via Stackelberg game. Appl. Sci. 9, 1\u201314 (2019)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Machine Learning and Intelligent Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66785-6_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T01:43:17Z","timestamp":1670895797000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-66785-6_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030667849","9783030667856"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66785-6_55","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLICOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Intelligent Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mlicom2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mlicom.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"133","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}