{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T15:34:49Z","timestamp":1775662489445,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/gcwkshps58843.2023.10465104","type":"proceedings-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T17:52:58Z","timestamp":1711043578000},"page":"1838-1843","source":"Crossref","is-referenced-by-count":5,"title":["Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Sayed Amir","family":"Hoseini","sequence":"first","affiliation":[{"name":"School of Systems and Computing"}]},{"given":"Faycal","family":"Bouhafs","sequence":"additional","affiliation":[{"name":"School of Systems and Computing"}]},{"given":"Neda","family":"Aboutorab","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, University of New South Wales,Canberra,Australia"}]},{"given":"Parastoo","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, University of New South Wales,Canberra,Australia"}]},{"given":"Frank den","family":"Hartog","sequence":"additional","affiliation":[{"name":"School of Systems and Computing"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700672"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367399"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9912975"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31764-5_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4352"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473865"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2018.2880457"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016462"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.22667\/JOWUA.2020.12.31.049"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918964"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02781-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2022.101896"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3159282"},{"key":"ref17","first-page":"1861","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","volume-title":"International conference on machine learning","author":"Haarnoja"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417141"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946684"},{"key":"ref20","first-page":"107","article-title":"Mobile radio propagation: Large-scale path loss","author":"Rappaport","year":"2002","journal-title":"Wireless communications: principles and practice"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2111370"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3190362"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655530"},{"key":"ref26","volume-title":"Soft actor-critic (sac)"}],"event":{"name":"2023 IEEE Globecom Workshops (GC Wkshps)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2023,12,4]]},"end":{"date-parts":[[2023,12,8]]}},"container-title":["2023 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10464388\/10464393\/10465104.pdf?arnumber=10465104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:49:46Z","timestamp":1711486186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10465104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps58843.2023.10465104","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}