{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:41:20Z","timestamp":1773330080454,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796674","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T17:18:49Z","timestamp":1655745529000},"page":"1139-1148","source":"Crossref","is-referenced-by-count":8,"title":["JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile Networks"],"prefix":"10.1109","author":[{"given":"Caner","family":"Kilinc","sequence":"first","affiliation":[{"name":"The University of Edinburgh"}]},{"given":"Mahesh K.","family":"Marina","sequence":"additional","affiliation":[{"name":"The University of Edinburgh"}]},{"given":"Muhammad","family":"Usama","sequence":"additional","affiliation":[{"name":"The University of Edinburgh"}]},{"given":"Salih","family":"Ergut","sequence":"additional","affiliation":[{"name":"Oredata"}]},{"given":"Jon","family":"Crowcroft","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute"}]},{"given":"Tugrul","family":"Gundogdu","sequence":"additional","affiliation":[{"name":"Turkcell"}]},{"given":"Ilhan","family":"Akinci","sequence":"additional","affiliation":[{"name":"Turkcell"}]}],"member":"263","reference":[{"key":"ref39","article-title":"How to build robust anomaly detectors with machine learning","author":"butakov","year":"2020"},{"key":"ref38","year":"0","journal-title":"Grubbs&#x2019; Test for Outliers"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326527"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403654"},{"key":"ref31","first-page":"abs\/1611.00301","article-title":"Recurrent neural radio anomaly detection","volume":"corr","author":"o\u2019shea","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2017-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2911524"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794573"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790127"},{"key":"ref10","author":"talbot","year":"2012","journal-title":"One Simple Trick Could Disable a City&#x2019;s 4G Phone Network"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"ref12","author":"dudek","year":"0","journal-title":"Modmobjam Jam tomorrow jam yesterday but also jam today"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref15","article-title":"A review on outlier\/anomaly detection in time series data","volume":"abs 2002 4236","author":"bl\u00e1zquez-garc\u00eda","year":"2020","journal-title":"CoRR"},{"key":"ref16","article-title":"A comprehensive survey on transfer learning","author":"zhuang","year":"2020","journal-title":"Proceedings of the IEEE"},{"key":"ref17","article-title":"Time Series Anomaly Detection: Detection of Anomalous Drops with Limited Features and Sparse Examples in Noisy Highly Periodic Data","author":"shipmon","year":"2017","journal-title":"arXiv preprint arXiv 1708 03359"},{"key":"ref18","article-title":"Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation","author":"pu\u00f1al","year":"2014","journal-title":"Proceedings of IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556709"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"ref4","year":"0","journal-title":"Radio Frequency Jammers"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838305"},{"key":"ref3","year":"2020","journal-title":"Jammer enforcement"},{"key":"ref6","article-title":"FCC formalizes massive fines for selling, using cell-phone jammers","author":"mcnamara","year":"2016"},{"key":"ref29","first-page":"2108e","article-title":"Design, implementation, and evaluation of learning algorithms for dynamic real-time network monitoring","author":"mijumbi","year":"2020","journal-title":"International Journal of Network Management"},{"key":"ref5","author":"kastrenakes","year":"2014","journal-title":"FCC issues largest fine in history to company selling signal jammers"},{"key":"ref8","year":"0","journal-title":"RF Jammers"},{"key":"ref7","year":"0","journal-title":"4G Cell Phone Jammers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref9","year":"0","journal-title":"The GSM Jammers"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851633"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref48","year":"2012","journal-title":"NIST\/SEMATECH e-Handbook of Statistical Methods"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016462"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.199"},{"key":"ref21","article-title":"Jammer detection based on artificial neural networks: A measurement study","author":"selen","year":"2019","journal-title":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning - WiseML 2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2014.066419"},{"key":"ref24","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052563"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2011.6032998"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref43","article-title":"Effective and robust detection of jamming attacks","author":"fragkiadakis","year":"2010","journal-title":"Future Network Mobile Summit"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/aic.690370209"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796674.pdf?arnumber=9796674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T16:00:57Z","timestamp":1657555257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796674","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}