{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:31:22Z","timestamp":1774621882882,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["2023NSFSC1970"],"award-info":[{"award-number":["2023NSFSC1970"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2441229"],"award-info":[{"award-number":["U2441229"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012130","name":"Chinese Aeronautical Establishment","doi-asserted-by":"publisher","award":["2024Z073080003"],"award-info":[{"award-number":["2024Z073080003"]}],"id":[{"id":"10.13039\/501100012130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Aerosp. Electron. Syst."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/taes.2025.3538716","type":"journal-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:55:21Z","timestamp":1738695321000},"page":"7543-7564","source":"Crossref","is-referenced-by-count":2,"title":["FlexiRL: An Integrated Jamming Strategy Framework for Hybrid Mode and Parameter Decision-Making"],"prefix":"10.1109","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7627-381X","authenticated-orcid":false,"given":"Yujie","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6432-1984","authenticated-orcid":false,"given":"Cui","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6136-0147","authenticated-orcid":false,"given":"Weibo","family":"Huo","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-9323","authenticated-orcid":false,"given":"Yulin","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9940-2641","authenticated-orcid":false,"given":"Rundong","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4616-6642","authenticated-orcid":false,"given":"Jifang","family":"Pei","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6761-2269","authenticated-orcid":false,"given":"Yin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1978.308584"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3267068"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3323441"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/joe.2019.0486"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119749097"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/0165-1684(92)90052-X","article-title":"Recognition, inference and prediction of advanced multi-function radar system behaviors: Overview and prospects","volume":"40","author":"Wang","year":"2024","journal-title":"J. Signal Process."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1593335"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/joe.2019.0916"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC46631.2019.8960757"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2022.3175517"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/taes.2024.3514593"},{"key":"ref12","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3197425"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-05732-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3208865"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3034800"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3470832"},{"key":"ref18","first-page":"471","article-title":"Research on method of intelligent radar confrontation based on reinforcement learning","volume-title":"Proc. IEEE 2nd Int. Conf. Comput. Intell. Appl.","author":"Xing","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2019.8835788"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RadarConf2351548.2023.10149662"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s21237931"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RadarConf2458775.2024.10548932"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3312231"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3261318"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3272307"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3270858"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2017.0421"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICEICT57916.2023.10245826"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s22010145"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref31","volume-title":"Algorithms for Decision Making","author":"Kochenderfer","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9944-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/SBRA101E"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081549"},{"issue":"2","key":"ref35","first-page":"200","article-title":"Inverse inference of radar emitter work mode recognition method based on HMM","volume":"44","author":"Zhu","year":"2024","journal-title":"Trans. Beijing Inst. Technol."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/7.250412"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(00)00136-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1987.310875"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2023.3286913"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101140"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.23919\/JSEE.2021.000048"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2024.3361905"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.3044259"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2775898"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3019605"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00190-015-0883-4"},{"key":"ref47","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"Puterman","year":"2014"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3241141"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1629\/1\/012001"},{"issue":"3","key":"ref50","first-page":"42","article-title":"A method of real-time electronic attack effectiveness evaluation based on state transition of radar","volume":"31","author":"Zhao","year":"2016","journal-title":"Electron. Inf. Warfare Technol."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2021.0697"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/EEISS62553.2024.00040"},{"issue":"7","key":"ref53","first-page":"691","article-title":"Online evaluation index system and method for jamming effect of radar","author":"Lei","year":"2020","journal-title":"J. China Acad. Electron. Inf. Technol."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS52108.2023.10283215"},{"issue":"16","key":"ref55","first-page":"4102","article-title":"Review of data preprocessing techniques in data mining","volume":"12","author":"Alasadi","year":"2017","journal-title":"J. Eng. Appl. Sci."},{"issue":"7","key":"ref56","first-page":"24","article-title":"Using the method of maximizing deviation to make decision for multiindices","volume":"20","author":"Wang","year":"1998","journal-title":"J. Syst. Eng. Electron."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.106.620"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref60","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Wang","year":"2016"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.12794\/metadc1505267"},{"key":"ref62","first-page":"1","article-title":"High-dimensional continuous control using generalized advantage estimation","volume-title":"Proc. 4th Int. Conf. Learn. Representation","author":"Schulman","year":"2016"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898717570"},{"key":"ref64","first-page":"1","article-title":"Continuous control with deep reinforcement learning","volume-title":"Proc. 4th Int. Conf. Learn. Representations","author":"Lillicrap","year":"2016"},{"key":"ref65","first-page":"1889","article-title":"Trust region policy optimization","volume-title":"Proc. 32nd Int. Conf. Mach. Learn.","author":"Schulman","year":"2015"}],"container-title":["IEEE Transactions on Aerospace and Electronic Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7\/11031113\/10870414.pdf?arnumber=10870414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T17:46:07Z","timestamp":1749750367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10870414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":65,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/taes.2025.3538716","relation":{},"ISSN":["0018-9251","1557-9603","2371-9877"],"issn-type":[{"value":"0018-9251","type":"print"},{"value":"1557-9603","type":"electronic"},{"value":"2371-9877","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}