{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:31:28Z","timestamp":1757309488728,"version":"3.38.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s12243-024-01034-4","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T10:20:22Z","timestamp":1713435622000},"page":"251-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0236-6738","authenticated-orcid":false,"given":"Anil Kumar","family":"Kamboj","sequence":"first","affiliation":[]},{"given":"Poonam","family":"Jindal","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"issue":"2","key":"1034_CR1","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"JM Hamamreh","year":"2018","unstructured":"Hamamreh JM, Furqan HM, Arslan H (2018) Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun Surv Tutorials 21(2):1773","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"5","key":"1034_CR2","doi-asserted-by":"publisher","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","volume":"6","author":"N Wang","year":"2019","unstructured":"Wang N, Wang P, Alipour-Fanid A, Jiao L, Zeng K (2019) Physical-layer security of 5g wireless networks for iot: Challenges and opportunities. IEEE Internet Things J 6(5):8169","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1034_CR3","doi-asserted-by":"publisher","first-page":"2734","DOI":"10.1109\/COMST.2018.2865607","volume":"21","author":"F Jameel","year":"2018","unstructured":"Jameel F, Wyne S, Kaddoum G, Duong TQ (2018) A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun Surv Tutorials 21(3):2734","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1034_CR4","doi-asserted-by":"publisher","first-page":"5351","DOI":"10.1007\/s11276-021-02781-1","volume":"27","author":"AK Kamboj","year":"2021","unstructured":"Kamboj AK, Jindal P, Verma P (2021) Machine learning-based physical layer security: techniques, open challenges, and applications. Wirel Netw 27:5351","journal-title":"Wirel Netw"},{"key":"1034_CR5","doi-asserted-by":"crossref","unstructured":"Wang D,\u00a0Bai B,\u00a0Zhao W,\u00a0Han Z (2018) A survey of optimization approaches for wireless physical layer security. IEEE Commun Surv Tutorials 21(2):1878","DOI":"10.1109\/COMST.2018.2883144"},{"key":"1034_CR6","doi-asserted-by":"crossref","unstructured":"Kamboj AK,\u00a0Jindal P,\u00a0Verma P (2023) Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. J Supercomput pp. 1\u201321","DOI":"10.1504\/IJWMC.2024.10066106"},{"issue":"2","key":"1034_CR7","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-019-06430-x","volume":"108","author":"S Pahuja","year":"2019","unstructured":"Pahuja S, Jindal P (2019) Cooperative communication in physical layer security: Technologies and challenges. Wirel Pers Commun 108(2):811","journal-title":"Wirel Pers Commun"},{"key":"1034_CR8","doi-asserted-by":"crossref","unstructured":"Kamboj AK,\u00a0Jindal P,\u00a0Verma P (2021) Physical layer security-based relay selection for wireless cooperative networks: A reinforcement learning approach. Intell Comput Commun Syst, pp. 115\u2013122","DOI":"10.1007\/978-981-16-1295-4_12"},{"issue":"7","key":"1034_CR9","doi-asserted-by":"publisher","first-page":"3341","DOI":"10.1109\/TWC.2009.071306","volume":"8","author":"MM Fareed","year":"2009","unstructured":"Fareed MM, Uysal M (2009) On relay selection for decode-and-forward relaying. IEEE Trans Wirel Commun 8(7):3341","journal-title":"IEEE Trans Wirel Commun"},{"issue":"10","key":"1034_CR10","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis I, Thompson JS, McLaughlin S (2009) Relay selection for secure cooperative networks with jamming. IEEE Trans Wirel Commun 8(10):5003","journal-title":"IEEE Trans Wirel Commun"},{"issue":"1","key":"1034_CR11","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TIFS.2011.2166386","volume":"7","author":"J Chen","year":"2011","unstructured":"Chen J, Zhang R, Song L, Han Z, Jiao B (2011) Joint relay and jammer selection for secure two-way relay networks. IEEE Trans Inf Forensic Sec 7(1):310","journal-title":"IEEE Trans Inf Forensic Sec"},{"issue":"12","key":"1034_CR12","doi-asserted-by":"publisher","first-page":"6076","DOI":"10.1109\/TWC.2013.110813.121671","volume":"12","author":"VNQ Bao","year":"2013","unstructured":"Bao VNQ, Linh-Trung N, Debbah M (2013) Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans Wirel Commun 12(12):6076","journal-title":"IEEE Trans Wirel Commun"},{"issue":"8","key":"1034_CR13","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.1109\/TWC.2015.2418316","volume":"14","author":"N Zhang","year":"2015","unstructured":"Zhang N, Cheng N, Lu N, Zhang X, Mark JW, Shen X (2015) Partner selection and incentive mechanism for physical layer security. IEEE Trans Wirel Commun 14(8):4265","journal-title":"IEEE Trans Wirel Commun"},{"issue":"2","key":"1034_CR14","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TIFS.2014.2374356","volume":"10","author":"H Deng","year":"2014","unstructured":"Deng H, Wang HM, Guo W, Wang W (2014) Secrecy transmission with a helper: To relay or to jam. IEEE Trans Inf Forensic Sec 10(2):293","journal-title":"IEEE Trans Inf Forensic Sec"},{"issue":"8","key":"1034_CR15","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/LSP.2014.2387860","volume":"22","author":"H Hui","year":"2015","unstructured":"Hui H, Swindlehurst AL, Li G, Liang J (2015) Secure relay and jammer selection for physical layer security. IEEE Signal Process Lett 22(8):1147","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"1034_CR16","doi-asserted-by":"publisher","first-page":"6259","DOI":"10.1109\/TVT.2015.2478029","volume":"65","author":"L Wang","year":"2015","unstructured":"Wang L, Cai Y, Zou Y, Yang W, Hanzo L (2015) Joint relay and jammer selection improves the physical layer security in the face of csi feedback delays. IEEE Trans Veh Technol 65(8):6259","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"1034_CR17","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1007\/s13369-021-05935-7","volume":"47","author":"K Ho-Van","year":"2022","unstructured":"Ho-Van K, Do-Dac T (2022) Relay-and-jammers selection for performance improvement of energy harvesting underlay cognitive networks. Arab J Sci Eng 47(3):2649","journal-title":"Arab J Sci Eng"},{"issue":"13","key":"1034_CR18","doi-asserted-by":"publisher","first-page":"7863","DOI":"10.3390\/app13137863","volume":"13","author":"N Zamir","year":"2023","unstructured":"Zamir N, Ali B, Butt MFU, Javed MA, Lee BM, Ng SX (2023) Cooperative jamming-assisted untrusted relaying based on game theory for next-generation communication systems. Appl Sci 13(13):7863","journal-title":"Appl Sci"},{"key":"1034_CR19","doi-asserted-by":"crossref","unstructured":"Gao C,\u00a0Yang B,\u00a0Zheng D,\u00a0Jiang X,\u00a0Taleb T (2023) Cooperative jamming and relay selection for covert communications in wireless relay systems. IEEE Trans Commun","DOI":"10.1109\/TCOMM.2023.3327272"},{"key":"1034_CR20","doi-asserted-by":"crossref","unstructured":"Ghourab EM,\u00a0Bariah L,\u00a0Muhaidat S, Sofotasios PC,\u00a0Al-Qutayri M,\u00a0Damiani E (2023) Secure relay selection with outdated csi in cooperative wireless vehicular networks: A dqn approach. IEEE Access","DOI":"10.36227\/techrxiv.21779915.v1"},{"issue":"5","key":"1034_CR21","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/LWC.2019.2917907","volume":"8","author":"P Zhang","year":"2019","unstructured":"Zhang P, Kang X, Li X, Liu Y, Wu D, Wang R (2019) Overlapping community deep exploring-based relay selection method toward multi-hop d2d communication. IEEE Wirel Commun Lett 8(5):1357","journal-title":"IEEE Wirel Commun Lett"},{"key":"1034_CR22","doi-asserted-by":"publisher","first-page":"12105","DOI":"10.1109\/ACCESS.2020.2965963","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang X, Liu F (2020) Data-driven relay selection for physical-layer security: A decision tree approach. IEEE Access 8:12105","journal-title":"IEEE Access"},{"issue":"7","key":"1034_CR23","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1049\/iet-com.2016.1046","volume":"11","author":"MA Jadoon","year":"2017","unstructured":"Jadoon MA, Kim S (2017) Relay selection algorithm for wireless cooperative networks: a learning-based approach. Iet Communications 11(7):1061","journal-title":"Iet Communications"},{"issue":"20","key":"1034_CR24","doi-asserted-by":"publisher","first-page":"9561","DOI":"10.1109\/JSEN.2019.2925719","volume":"19","author":"Y Su","year":"2019","unstructured":"Su Y, Lu X, Zhao Y, Huang L, Du X (2019) Cooperative communications with relay selection based on deep reinforcement learning in wireless sensor networks. IEEE Sensors J 19(20):9561","journal-title":"IEEE Sensors J"},{"key":"1034_CR25","doi-asserted-by":"publisher","first-page":"133653","DOI":"10.1109\/ACCESS.2019.2941229","volume":"7","author":"B Jang","year":"2019","unstructured":"Jang B, Kim M, Harerimana G, Kim JW (2019) Q-learning algorithms: A comprehensive classification and applications. IEEE access 7:133653","journal-title":"IEEE access"},{"key":"1034_CR26","doi-asserted-by":"publisher","first-page":"2449","DOI":"10.1007\/s11277-021-08458-4","volume":"120","author":"AK Kamboj","year":"2021","unstructured":"Kamboj AK, Jindal P, Verma P (2021) Intelligent physical layer secure relay selection for wireless cooperative networks with multiple eavesdroppers. Wirel Pers Commun 120:2449","journal-title":"Wirel Pers Commun"},{"key":"1034_CR27","unstructured":"Sutton RS, Barto AG et\u00a0al (1998) Introduction to reinforcement learning, vol. 135 (MIT press Cambridge)"},{"issue":"10","key":"1034_CR28","doi-asserted-by":"publisher","first-page":"2239","DOI":"10.1109\/JSAC.2019.2933973","volume":"37","author":"YS Nasir","year":"2019","unstructured":"Nasir YS, Guo D (2019) Multi-agent deep reinforcement learning for dynamic power allocation in wireless networks. IEEE J Sel Areas Commun 37(10):2239","journal-title":"IEEE J Sel Areas Commun"},{"issue":"9","key":"1034_CR29","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/LCOMM.2018.2859392","volume":"22","author":"W Lee","year":"2018","unstructured":"Lee W (2018) Resource allocation for multi-channel underlay cognitive radio network based on deep neural network. IEEE Commun Lett 22(9):1942","journal-title":"IEEE Commun Lett"},{"issue":"2","key":"1034_CR30","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MNET.2018.1700293","volume":"32","author":"JB Wang","year":"2018","unstructured":"Wang JB, Wang J, Wu Y, Wang JY, Zhu H, Lin M, Wang J (2018) A machine learning framework for resource allocation assisted by cloud computing. IEEE Network 32(2):144","journal-title":"IEEE Network"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01034-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-024-01034-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01034-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T06:58:37Z","timestamp":1741676317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-024-01034-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":30,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["1034"],"URL":"https:\/\/doi.org\/10.1007\/s12243-024-01034-4","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"16 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}