{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:11:18Z","timestamp":1774627878746,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195819","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T22:26:40Z","timestamp":1337898400000},"page":"738-746","source":"Crossref","is-referenced-by-count":3,"title":["Joint UFH and power control for effective wireless anti-jamming communication"],"prefix":"10.1109","author":[{"family":"Kaihe Xu","sequence":"first","affiliation":[]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120103"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089079"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934927"},{"key":"15","first-page":"64","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser","year":"2008","journal-title":"Proc of IEEE S&P'08"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530778"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2009.5291621"},{"key":"14","first-page":"231","article-title":"Jamming-resistant broadcast communication without shared keys","author":"po?pper","year":"2009","journal-title":"Proc of the USENIX'09 Security Symposium"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/25.892577"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"key":"21","first-page":"241","article-title":"Transmitter power control for co-channel interference management in cellular radio systems","author":"zander","year":"1993","journal-title":"Proc of WINLAB Workshop'93"},{"key":"3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/1080829.1080849","article-title":"Self-management in chaotic wireless deployments","author":"akella","year":"2005","journal-title":"Proc of ACM MobiCom'05"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"2","year":"2007","journal-title":"Users Fear Wireless Networks for Control"},{"key":"1","year":"2003","journal-title":"An Introduction to Direct-Sequence Spread-Spectrum Communications"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/26.864173"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.221"},{"key":"6","author":"iii","year":"2007","journal-title":"Jam-resistant communication without shared secrets through the use of concurrent codes"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379818"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920315"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","location":"Orlando, FL, USA","start":{"date-parts":[[2012,3,25]]},"end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195819.pdf?arnumber=6195819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:14:10Z","timestamp":1497986050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195819\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195819","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}