{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T05:34:25Z","timestamp":1773552865481,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The National Science Foundation of China","award":["U19bB2014"],"award-info":[{"award-number":["U19bB2014"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s00521-023-09136-1","type":"journal-article","created":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T06:02:27Z","timestamp":1702965747000},"page":"7823-7840","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A novel algorithm of joint frequency\u2013power domain anti-jamming based on PER-DQN"],"prefix":"10.1007","volume":"37","author":[{"given":"Boyu","family":"Wan","sequence":"first","affiliation":[]},{"given":"Yingtao","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Changxing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhanyang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,19]]},"reference":[{"issue":"5","key":"9136_CR1","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOM.001.00496","volume":"60","author":"L Jia","year":"2022","unstructured":"Jia L, Qi N, Chu F et al (2022) Game-theoretic learning anti-jamming approaches in wireless networks. IEEE Commun Mag 60(5):60\u201366","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"9136_CR2","first-page":"3333","volume":"13","author":"C Han","year":"2019","unstructured":"Han C, Niu Y (2019) Multi-regional anti-jamming communication scheme based on transfer learning and q learning. KSII Trans Internet Inf Syst 13(7):3333\u20133350","journal-title":"KSII Trans Internet Inf Syst"},{"key":"9136_CR3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCOM.001.2000627","volume":"59","author":"G Boquet","year":"2021","unstructured":"Boquet G, Tuset-Peir\u00f3 P, Adelantado F et al (2021) LR-FHSS: overview and performance analysis. IEEE Commun Mag 59:30\u201336","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"9136_CR4","first-page":"90","volume":"17","author":"SK Gharkan","year":"2013","unstructured":"Gharkan SK, Mohammed SL, Abdul-ElahNoori A (2013) Performance comparison of two codes in direct sequence spread spectrum (DSSS) system under the effect of jamming. J Eng Dev 17(5):90\u2013106","journal-title":"J Eng Dev"},{"issue":"6","key":"9136_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MWC.2017.1700363","volume":"25","author":"L Jia","year":"2018","unstructured":"Jia L, Xu Y et al (2018) Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wirel Commun 25(6):120\u2013128","journal-title":"IEEE Wirel Commun"},{"issue":"2","key":"9136_CR6","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSMCC.2007.913919","volume":"38","author":"L Busoniu","year":"2008","unstructured":"Busoniu L, Babuska R, De Schutter B (2008) A comprehensive survey of multiagent reinforcement learning. IEEE Trans Syst Man Cybern Part C (Applications and Reviews) 38(2):156\u2013172","journal-title":"IEEE Trans Syst Man Cybern Part C (Applications and Reviews)"},{"issue":"2","key":"9136_CR7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.13052\/jcsm2245-1439.325","volume":"3","author":"M Lichtman","year":"2014","unstructured":"Lichtman M, Reed JH (2014) Reinforcement learning for reactive jamming mitigation. J Cyber Secur Mobil 3(2):213\u2013230","journal-title":"J Cyber Secur Mobil"},{"key":"9136_CR8","doi-asserted-by":"crossref","unstructured":"Slimeni F, Scheers B, Chtourou Z et al (2015) Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm. In: International conference on military communications and information systems (ICMCIS), Cracow, Poland, pp 1\u20137","DOI":"10.1109\/ICMCIS.2015.7158697"},{"key":"9136_CR9","doi-asserted-by":"crossref","first-page":"72702","DOI":"10.1109\/ACCESS.2021.3080283","volume":"9","author":"Q Zhai","year":"2021","unstructured":"Zhai Q, Boli\u0107 M, Li Y et al (2021) A Q-learning-based resource allocation for downlink non-orthogonal multiple access systems considering QoS. IEEE Access 9:72702\u201372711","journal-title":"IEEE Access"},{"key":"9136_CR10","doi-asserted-by":"crossref","first-page":"97164","DOI":"10.1109\/ACCESS.2020.2996804","volume":"8","author":"Q Zhou","year":"2020","unstructured":"Zhou Q, Li Y, Niu Y (2020) A countermeasure against random pulse jamming in time domain based on reinforcement learning. IEEE Access 8:97164\u201397174","journal-title":"IEEE Access"},{"issue":"9","key":"9136_CR11","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.3390\/electronics11091456","volume":"11","author":"Y Chen","year":"2022","unstructured":"Chen Y, Niu Y, Chen C et al (2022) Conservative but Stable: a SARSA-based algorithm for random pulse jamming in the time domain. Electronics 11(9):1456","journal-title":"Electronics"},{"key":"9136_CR12","doi-asserted-by":"crossref","unstructured":"Geng S, Li P, Yin X et al (2022) The study on anti-jamming power control strategy based on Q-learning. In: 7th International conference on intelligent computing and signal processing (ICSP), Xi'an, China, pp 182\u2013185","DOI":"10.1109\/ICSP54964.2022.9778818"},{"key":"9136_CR13","unstructured":"Volodymyr M, Kavukcuoglu K, Silver D et al Playing atari with deep reinforcement learning. arXiv:abs \/1312.5602"},{"key":"9136_CR14","volume":"77","author":"X Su","year":"2021","unstructured":"Su X et al (2021) Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches. Pervasive Mob Comput 77:101463","journal-title":"Pervasive Mob Comput"},{"key":"9136_CR15","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1109\/TIFS.2023.3236788","volume":"18","author":"Y Yao","year":"2023","unstructured":"Yao Y, Zhao J, Li Z, Cheng X, Wu L (2023) Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks. IEEE Trans Inf Forensics Secur 18:1211\u20131224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9136_CR16","doi-asserted-by":"crossref","first-page":"202563","DOI":"10.1109\/ACCESS.2020.3036027","volume":"8","author":"J Xu","year":"2020","unstructured":"Xu J, Lou H, Zhang W, Sang G et al (2020) An intelligent anti-jamming scheme for cognitive radio based on deep reinforcement learning. IEEE Access 8:202563\u2013202572","journal-title":"IEEE Access"},{"key":"9136_CR17","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1049\/cmu2.12257","volume":"15","author":"H Yuan","year":"2021","unstructured":"Yuan H, Song F, Chu X et al (2021) Joint relay and channel selection against mobile and smart jammer: a deep reinforcement learning approach. IET Commun 15:2237\u20132251","journal-title":"IET Commun"},{"issue":"2","key":"9136_CR18","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/TVT.2022.3212966","volume":"72","author":"H Sharma","year":"2023","unstructured":"Sharma H, Kumar N, Tekchandani R (2023) Mitigating jamming attack in 5g heterogeneous networks: a federated deep reinforcement learning approach. IEEE Trans Veh Technol 72(2):2439\u20132452","journal-title":"IEEE Trans Veh Technol"},{"key":"9136_CR19","doi-asserted-by":"crossref","unstructured":"Jia K, Chen D, Sun X et al (2023) Soft actor-critic based power control algorithm for anti-jamming in D2D communication. In; IEEE international conference on control, electronics and computer technology (ICCECT), Jilin, China, pp 1\u20135","DOI":"10.1109\/ICCECT57938.2023.10140869"},{"key":"9136_CR20","doi-asserted-by":"crossref","unstructured":"Bi Y, Wu Y, Hua C, Hua C et al (2019) Deep reinforcement learning based multi-user anti-jamming strategy. In: ICC 2019\u20132019 IEEE international conference on communications (ICC), Shanghai, China, pp 1\u20136","DOI":"10.1109\/ICC.2019.8761848"},{"key":"9136_CR21","doi-asserted-by":"crossref","first-page":"47887","DOI":"10.1109\/ACCESS.2021.3068129","volume":"9","author":"HT Thien","year":"2021","unstructured":"Thien HT, Vu V-H, Koo I (2021) A transfer games actor-critic learning framework for anti-jamming in multi-channel cognitive radio networks. IEEE Access 9:47887\u201347900","journal-title":"IEEE Access"},{"key":"9136_CR22","doi-asserted-by":"crossref","first-page":"43081","DOI":"10.1109\/ACCESS.2022.3169618","volume":"10","author":"A Dash","year":"2022","unstructured":"Dash A, Muduli UR, Prakash S, Hosani KA et al (2022) Modified proportionate affine projection algorithm based adaptive DSTATCOM control with increased convergence speed. IEEE Access 10:43081\u201343092","journal-title":"IEEE Access"},{"key":"9136_CR23","first-page":"3333","volume":"13","author":"C Han","year":"2019","unstructured":"Han C, Niu Y (2019) Multi-regional anti-jamming communication scheme based on transfer learning and Q learning. KSII Trans Internet Inf Syst 13:3333\u20133350","journal-title":"KSII Trans Internet Inf Syst"},{"key":"9136_CR24","first-page":"1","volume":"99","author":"Z Quan","year":"2023","unstructured":"Quan Z, Yingtao N, Peng X et al (2023) Intra-domain knowledge reuse assisted reinforcement learning for fast anti-jamming communication. IEEE Trans Inf Forensics Secur 99:1\u20131","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"9136_CR25","doi-asserted-by":"crossref","first-page":"4960","DOI":"10.3390\/app12104960","volume":"12","author":"Y Niu","year":"2022","unstructured":"Niu Y, Feng X, Kou S et al (2022) A novel anti-jamming decision-making algorithm based on knowledge graph technology. Appl Sci 12(10):4960","journal-title":"Appl Sci"},{"key":"9136_CR26","first-page":"551","volume":"294","author":"X Pei","year":"2019","unstructured":"Pei X, Wang X, Ruan L et al (2019) Joint power and channel selection for anti-jamming communications: a reinforcement learning approach. Int Conf Mach Learn Intell Commun 294:551\u2013562","journal-title":"Int Conf Mach Learn Intell Commun"},{"key":"9136_CR27","first-page":"1","volume":"5","author":"L Wang","year":"2023","unstructured":"Wang L, Li G, Song F et al (2023) A DRL-based intelligent jamming approach for joint channel and power optimization. Wirel Commun Mobile Comput 5:1\u201315","journal-title":"Wirel Commun Mobile Comput"},{"issue":"2","key":"9136_CR28","first-page":"4","volume":"7","author":"T Patra","year":"2017","unstructured":"Patra T, Sil S (2017) Bit error rate performance evaluation of different digital modulation and coding techniques with varying channels. 8th Ann Ind Autom Electromech Eng Confer (IEMECON) 7(2):4\u201310","journal-title":"8th Ann Ind Autom Electromech Eng Confer (IEMECON)"},{"key":"9136_CR29","doi-asserted-by":"crossref","unstructured":"Qiang H, Xue-cheng, Z Shi-min S (2006) ASN.1 application in parsing ISUP PDUs. In: International symposium on communications and information technologies, Bangkok, Thailand, pp 78\u201381","DOI":"10.1109\/ISCIT.2006.339891"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09136-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09136-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09136-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T01:28:53Z","timestamp":1743902933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09136-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["9136"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09136-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"14 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors do not have any conflicts.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}