{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T07:16:03Z","timestamp":1766128563676,"version":"3.48.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/pimrc62392.2025.11275524","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:33:25Z","timestamp":1765564405000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Bait Tactics: Misleading DRL-Based Cognitive Anti-Jamming Communications via Adversarial Learning"],"prefix":"10.1109","author":[{"given":"Muhammad Shahzad","family":"Arif","sequence":"first","affiliation":[{"name":"Khalifa University,Department of Computer and Information Engineering,Abu Dhabi,UAE"}]},{"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[{"name":"Khalifa University,KU 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE"}]},{"given":"Paschalis C.","family":"Sofotasios","sequence":"additional","affiliation":[{"name":"Khalifa University,KU C2PS and 6G Center,Department of Computer and Information Engineering,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/OJCOMS.2021.3103735"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1062689.1062697"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JPROC.2016.2558521"},{"volume-title":"EW 102: a second course in electronic warfare","year":"2004","author":"Adamy","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/PIMRC.2007.4394775"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SURV.2009.090404"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1998412.1998430"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TVT.2018.2889336"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ACCESS.2021.3117563"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2018.2841921"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1002\/9781119562306"},{"volume-title":"Reinforcement learning: An introduction","year":"2018","author":"Sutton","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/LCOMM.2018.2815018"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JSAC.2019.2933889"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TWC.2021.3078439"}],"event":{"name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2025,9,1]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,9,4]]}},"container-title":["2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11274530\/11274549\/11275524.pdf?arnumber=11275524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T07:12:47Z","timestamp":1766128367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11275524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pimrc62392.2025.11275524","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}