{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:30:36Z","timestamp":1772908236513,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,1]]},"DOI":"10.1109\/ict52184.2021.9511465","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T21:54:53Z","timestamp":1629755693000},"page":"174-179","source":"Crossref","is-referenced-by-count":21,"title":["A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G"],"prefix":"10.1109","author":[{"given":"K. N.","family":"Vaishnavi","sequence":"first","affiliation":[]},{"given":"Shubham Dashrath","family":"Khorvi","sequence":"additional","affiliation":[]},{"given":"Rajalekshmi","family":"Kishore","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Gurugopinath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/1161089.1161107","article-title":"Robust rate adaptation for 802.11 wireless networks","author":"wong","year":"2006","journal-title":"Proc Mobicom"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378615"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.082310.100113"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2009.5291621"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2492556"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2051454"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381700"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185452"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161132"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2955743"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2020.9170261"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019590"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app9163348"},{"key":"ref23","article-title":"Improving physical layer security for reconfigurable intelligent surface aided NOMA 6G networks","author":"zhang","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050958"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355563"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954531"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364117"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref10","article-title":"Intelligent physical layer security approach for V2X communication","author":"furqan","year":"2020","journal-title":"ArXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/e20100730"},{"key":"ref40","article-title":"Bit-rate selection in wireless networks","author":"bicket","year":"2006","journal-title":"Ph D dissertation Universidade Sao Judas Tadeu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900141"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2419634"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130908"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2510502"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s16111908"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3003946"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2919685"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref3","article-title":"Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey","author":"pirayesh","year":"2021","journal-title":"ArXiv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005481"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3019960"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933889"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2856854"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2019.8812778"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2622002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451072"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2815018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893459"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2841964"},{"key":"ref41","article-title":"IEEE 802.11 rate control algorithms: Experimentation and performance evaluation in infrastructure mode","author":"pal","year":"0","journal-title":"Proc PAM"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120650"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2947417"}],"event":{"name":"2021 28th International Conference on Telecommunications (ICT)","location":"London, United Kingdom","start":{"date-parts":[[2021,6,1]]},"end":{"date-parts":[[2021,6,3]]}},"container-title":["2021 28th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9511499\/9511457\/09511465.pdf?arnumber=9511465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T22:32:50Z","timestamp":1673130770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9511465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,1]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/ict52184.2021.9511465","relation":{},"subject":[],"published":{"date-parts":[[2021,6,1]]}}}