{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:33Z","timestamp":1767339513317},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T00:00:00Z","timestamp":1428537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11227-015-1420-1","type":"journal-article","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T07:56:52Z","timestamp":1428479812000},"page":"3237-3257","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Power control with reinforcement learning in cooperative cognitive radio networks against jamming"],"prefix":"10.1007","volume":"71","author":[{"given":"Liang","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinliang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yifeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,9]]},"reference":[{"issue":"1","key":"1420_CR1","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/TIFS.2011.2165948","volume":"7","author":"L Xiao","year":"2012","unstructured":"Xiao L, Dai H, Ning P (2012) Jamming-resistant collaborative broadcast using uncoordinated frequency hopping. IEEE Trans Inf Forensics Secur 7(1):297\u2013309","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"1420_CR2","doi-asserted-by":"crossref","first-page":"4038","DOI":"10.1109\/TWC.2013.071913121570","volume":"12","author":"D Yang","year":"2013","unstructured":"Yang D, Xue G, Zhang J, Richa A, Fang X (2013) Coping with a smart jammer in wireless networks: a stackelberg game approach. IEEE Trans Wirel Commun 12(8):4038\u20134047","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"1420_CR3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MNET.2013.6523804","volume":"27","author":"C Chen","year":"2013","unstructured":"Chen C, Song M, Xin C, Backens J (2013) A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw 27(3):22\u201327","journal-title":"IEEE Netw"},{"key":"1420_CR4","doi-asserted-by":"crossref","unstructured":"Zhu Q, Li H, Han Z, Basar T (2010) A stochastic game model for jamming in multi-channel cognitive radio systems. In: Proceedings of the IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2010.5502451"},{"key":"1420_CR5","doi-asserted-by":"crossref","unstructured":"El-Bardan R, Brahma S, Varshney P (2014) Power control with jammer location uncertainty: a game theoretic perspective. In: Proceedings of the annual conference on information sciences and systems (CISS), pp 1\u20136","DOI":"10.1109\/CISS.2014.6814091"},{"issue":"4","key":"1420_CR6","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/JSAC.2011.110418","volume":"29","author":"B Wang","year":"2011","unstructured":"Wang B, Wu Y, Liu K, Clancy T (2011) An anti-jamming stochastic game for cognitive radio networks. IEEE J Sel Areas Commun 29(4):877\u2013889","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"1420_CR7","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/SURV.2012.100412.00017","volume":"15","author":"M Bkassiny","year":"2013","unstructured":"Bkassiny M, Li Y, Jayaweera S (2013) A survey on machine-learning techniques in cognitive radios. IEEE Commun Surv Tutor 15(3):1136\u20131159","journal-title":"IEEE Commun Surv Tutor"},{"key":"1420_CR8","doi-asserted-by":"crossref","unstructured":"Amuru S, Buehrer RM (2014) Optimal jamming using delayed learning. In: Proceedings of the IEEE military communications conference (MILCOM), pp 1528\u20131533","DOI":"10.1109\/MILCOM.2014.252"},{"key":"1420_CR9","doi-asserted-by":"crossref","unstructured":"Bhunia S, Sengupta S, Vazquez-Abad F (2014) Cr-honeynet: a learning and decoy based sustenance mechanism against jamming attack in CRN. In: Proceedings of the IEEE military communications conference (MILCOM), pp 1173\u20131180","DOI":"10.1109\/MILCOM.2014.197"},{"key":"1420_CR10","doi-asserted-by":"crossref","unstructured":"Li Y, Xiao L, Liu J, Tang Y (2014) Power control stackelberg game in cooperative anti-jamming communications. In: Proceedings of the international conference on game theory for networks, pp 93\u201398","DOI":"10.1109\/GAMENETS.2014.7043719"},{"issue":"3\u20134","key":"1420_CR11","first-page":"279","volume":"8","author":"C Watkins","year":"1992","unstructured":"Watkins C, Dayan P (1992) Q-learning. Mach Learn 8(3\u20134):279\u2013292","journal-title":"Mach Learn"},{"issue":"2","key":"1420_CR12","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S0004-3702(02)00121-2","volume":"136","author":"M Bowling","year":"2002","unstructured":"Bowling M, Veloso M (2002) Multiagent learning using a variable learning rate. Artif Intell 136(2):215\u2013250","journal-title":"Artif Intell"},{"key":"1420_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-72709-5_1","volume":"4465","author":"E Altman","year":"2007","unstructured":"Altman E, Avrachenkov K, Garnaev A (2007) A jamming game in wireless networks with transmission cost. Netw Control Optim Lect Notes Comput Sci 4465:1\u201312","journal-title":"Netw Control Optim Lect Notes Comput Sci"},{"key":"1420_CR14","doi-asserted-by":"crossref","unstructured":"DeBruhl B, Kroer C, Datta A, Sandholm T, Tague P (2014) Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. In: Proceedings of the ACM conference on security and privacy in wireless and mobile networks, pp 117\u2013128","DOI":"10.1145\/2627393.2627406"},{"issue":"3","key":"1420_CR15","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1007\/s11227-012-0769-7","volume":"63","author":"M Seredynski","year":"2013","unstructured":"Seredynski M, Bouvry P (2013) Analysing the development of cooperation in manets using evolutionary game theory. J Supercomput 63(3):854\u2013870","journal-title":"J Supercomput"},{"issue":"3","key":"1420_CR16","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s11227-009-0329-y","volume":"55","author":"S Khan","year":"2011","unstructured":"Khan S (2011) Mosaic-net: a game theoretical method for selection and allocation of replicas in ad hoc networks. J Supercomput 55(3):321\u2013366","journal-title":"J Supercomput"},{"issue":"1","key":"1420_CR17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/JSAC.2012.120102","volume":"30","author":"Y Wu","year":"2012","unstructured":"Wu Y, Wang B, Liu K, Clancy T (2012) Anti-jamming games in multi-channel cognitive radio networks. IEEE J Sel Areas Commun 30(1):4\u201315","journal-title":"IEEE J Sel Areas Commun"},{"key":"1420_CR18","doi-asserted-by":"crossref","unstructured":"Gwon Y, Dastangoo S, Fossa C, Kung H (2013) Competing mobile network game: embracing antijamming and jamming strategies with reinforcement learning. In: Proceedings of the IEEE conference on communications and network security, pp 28\u201336","DOI":"10.1109\/CNS.2013.6682689"},{"key":"1420_CR19","doi-asserted-by":"crossref","unstructured":"Lo B, Akyildiz I (2012) Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks. In: Proceedings of the IEEE international conference on communications, pp 1821\u20131826","DOI":"10.1109\/ICC.2012.6364117"},{"issue":"2","key":"1420_CR20","first-page":"16","volume":"20","author":"S Dastangoo","year":"2014","unstructured":"Dastangoo S, Fossa C, Gwon Y (2014) Competing cognitive tactical networks. Linc Lab J 20(2):16\u201335","journal-title":"Linc Lab J"},{"key":"1420_CR21","doi-asserted-by":"crossref","unstructured":"Conley W, Miller A (2013) Cognitive jamming game for dynamically countering ad hoc cognitive radio networks. In: Proceedings of the IEEE military communications conference (MILCOM), pp 1176\u20131182","DOI":"10.1109\/MILCOM.2013.201"},{"issue":"2","key":"1420_CR22","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSMCC.2007.913919","volume":"38","author":"L Busoniu","year":"2008","unstructured":"Busoniu L, Babuska R, Schutter B (2008) A comprehensive survey of multiagent reinforcement learning. IEEE Trans Syst Man Cybern Part C: Appl Rev 38(2):156\u2013172","journal-title":"IEEE Trans Syst Man Cybern Part C: Appl Rev"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1420-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-015-1420-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1420-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:40:39Z","timestamp":1559385639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-015-1420-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,9]]},"references-count":22,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1420"],"URL":"https:\/\/doi.org\/10.1007\/s11227-015-1420-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,9]]}}}