{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:31:18Z","timestamp":1774621878790,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019538","name":"Science Fund for Distinguished Young Scholars of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC1970"],"award-info":[{"award-number":["2023NSFSC1970"]}],"id":[{"id":"10.13039\/501100019538","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Aerosp. Electron. Syst."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/taes.2023.3312231","type":"journal-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T18:05:13Z","timestamp":1693937113000},"page":"8782-8799","source":"Crossref","is-referenced-by-count":26,"title":["Jamming Policy Generation via Heuristic Programming Reinforcement Learning"],"prefix":"10.1109","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7627-381X","authenticated-orcid":false,"given":"Yujie","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6136-0147","authenticated-orcid":false,"given":"Weibo","family":"Huo","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-9323","authenticated-orcid":false,"given":"Yulin","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6432-1984","authenticated-orcid":false,"given":"Cui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4616-6642","authenticated-orcid":false,"given":"Jifang","family":"Pei","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6761-2269","authenticated-orcid":false,"given":"Yin","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4726-8384","authenticated-orcid":false,"given":"Jianyu","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1978.308584"},{"key":"ref2","volume-title":"Electronic Warfare in the Information Age.","author":"Schleher","year":"1999"},{"key":"ref3","article-title":"Cognitive jammer","year":"2010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/SBRA021E"},{"key":"ref5","volume-title":"Adaptive Radar Resource Management","author":"Moo","year":"2015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1593335"},{"key":"ref7","volume-title":"Principle and Technology of Cognitive Electronic Warfare.","author":"Wang","year":"2018"},{"key":"ref8","first-page":"153","article-title":"A radar emitter identification method based on pulse match template sequence","volume-title":"Proc. IEEE 2nd Int. Conf. Signal Process. Syst.","volume":"3","author":"Gong","year":"2010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2169251"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289088"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2841921"},{"key":"ref13","first-page":"218","article-title":"Jamming design selection based on DS theory projectiles","volume":"S 2","author":"Sun","year":"2003","journal-title":"Rockets, Missiles, Guid."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nbt0106-51"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/s1004-4132(08)60142-5"},{"issue":"2","key":"ref16","first-page":"298","article-title":"Jamming decision under condition of unknown jamming rule base","volume":"41","author":"Qiang","year":"2019","journal-title":"J. Syst. Eng. Electron."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2022.3175517"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3241141"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2856854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2945951"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3007742"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2930247"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2789466"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900207"},{"issue":"11","key":"ref25","first-page":"1194","article-title":"Design of cognitive radar jamming based on Q-learning algorithm","volume":"35","author":"Li","year":"2015","journal-title":"Trans. Beijing Inst. Technol."},{"key":"ref26","first-page":"471","article-title":"Research on method of intelligent radar confrontation based on reinforcement learning","volume-title":"Proc. IEEE 2nd Int. Conf. Comput. Intell. Appl.","author":"Xing","year":"2017"},{"issue":"2","key":"ref27","first-page":"129","article-title":"Cognitive jamming decision method for multifunctional radar based on Q-learning","volume":"60","author":"Zhang","year":"2019","journal-title":"Telecommun. Eng."},{"issue":"4","key":"ref28","first-page":"819","article-title":"DQN based decision-making method of cognitive jamming against multifunctional radar","volume":"42","author":"Zhang","year":"2020","journal-title":"J. Syst. Eng. Electron."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s22010145"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8647386"},{"key":"ref32","volume-title":"Microwave Receivers with Electronic Warfare Applications.","author":"Tsui","year":"1986"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2023.3286913"},{"key":"ref34","article-title":"Adaptive radar countermeasures (ARC)","year":"2012"},{"key":"ref35","first-page":"1","article-title":"Deep reinforcement learning in parameterized action space","volume-title":"Proc. 4th Int. Conf. Learn. Representations","author":"Hausknecht","year":"2016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2514\/6.1986-9798"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/SBRA101E"},{"key":"ref38","volume-title":"Radar Handbook.","author":"Skolnik","year":"2008"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2019.8835788"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1201\/b16698-122"},{"key":"ref41","article-title":"7 improvements the APG-68 offered the F-16 Fighting Falcon.","year":"2015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2014.7000737"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/7.395232"},{"issue":"5","key":"ref44","first-page":"753","article-title":"A review of synthetic aperture radar jamming technique","volume":"9","author":"Li","year":"2020","journal-title":"J. Radars"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2015.287"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3032197"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3107328"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS47720.2021.9553753"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2670958"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2021.3129645"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6715-2"},{"issue":"11","key":"ref52","first-page":"1371","article-title":"An air combat jamming style selection method based on Double","volume":"61","author":"Chen","year":"2021","journal-title":"DQN Telecommun. Eng."},{"key":"ref53","volume-title":"EW 101: A First Course in Electronic Warfare.","author":"Adamy","year":"2001"},{"key":"ref54","volume-title":"EW 102: A Second Course in Electronic Warfare.","author":"Adamy","year":"2004"},{"key":"ref55","volume-title":"EW 104: Electronic Warfare Against a New Generation of Threats.","author":"Adamy","year":"2015"},{"issue":"3","key":"ref56","first-page":"150","article-title":"Jamming effectiveness evaluation based on radar detection probability","volume":"37","author":"Liu","year":"2018","journal-title":"Meas. Control Technol."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/RadarConf2351548.2023.10149662"},{"issue":"3","key":"ref58","first-page":"89","article-title":"Approach of radar against deception jamming based on target power model","volume":"43","author":"Wang","year":"2021","journal-title":"Command Control Simul."},{"issue":"9","key":"ref59","first-page":"98","article-title":"Study of the effect of barrage and deception jamming on a radar system along with their mitigation technique","volume":"4","author":"Khadka","year":"2015","journal-title":"Int. J. Sci. Res."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2014.7000737"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/483"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/icspcc.2017.8242558"},{"issue":"5","key":"ref63","first-page":"1031","article-title":"Intelligent radar countermeasure based on Q-learning","volume":"40","author":"Xing","year":"2018","journal-title":"J. Syst. Eng. Electron."},{"key":"ref64","first-page":"2613","article-title":"Double Q-learning","volume-title":"Proc. 24th Adv. Neural Inf. Process. Syst.","author":"Hasselt","year":"2010"},{"key":"ref65","volume-title":"Reinforcement Learning: An Introduction.","author":"Sutton","year":"2018"},{"key":"ref66","volume-title":"Dynamic Programming.","author":"Bellman","year":"2012"},{"issue":"3","key":"ref67","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF00992698","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref68","volume-title":"Bandit Algorithms for Website Optimization.","author":"White","year":"2012"},{"key":"ref69","first-page":"278","article-title":"Policy invariance under reward transformations: Theory and application to reward shaping","volume-title":"Proc. ACM 16th Int. Conf. Mach. Learn.","volume":"99","author":"Ng","year":"1999"},{"key":"ref70","first-page":"1357","article-title":"Social reward shaping in the prisoners dilemma","volume-title":"Proc. 7th Int. Joint Conf. Auton. Agents Multiagent Syst.","volume":"3","author":"Babes","year":"2008"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525911002998"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273572"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6451-2_4"},{"key":"ref74","first-page":"463","article-title":"Learning to drive a bicycle using reinforcement learning and shaping","volume-title":"Proc. 15th Int. Conf. Mach. Learn.","volume":"98","author":"Randlov","year":"1999"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/301136.301195"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1049\/sbra011e"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2012.6204592"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2019.2953762"},{"key":"ref79","volume-title":"Radar Anti-Jamming Techniques.","author":"Maksimov","year":"1979"}],"container-title":["IEEE Transactions on Aerospace and Electronic Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7\/10353051\/10239491.pdf?arnumber=10239491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:59:37Z","timestamp":1722362377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10239491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":79,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/taes.2023.3312231","relation":{},"ISSN":["0018-9251","1557-9603","2371-9877"],"issn-type":[{"value":"0018-9251","type":"print"},{"value":"1557-9603","type":"electronic"},{"value":"2371-9877","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}