{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:46:31Z","timestamp":1749793591758,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1217206","ECCS-1232109"],"award-info":[{"award-number":["CNS-1217206","ECCS-1232109"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/tcomm.2016.2597148","type":"journal-article","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T18:14:16Z","timestamp":1470161656000},"page":"4013-4027","source":"Crossref","is-referenced-by-count":28,"title":["Optimal Multiband Transmission Under Hostile Jamming"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3228-017X","authenticated-orcid":false,"given":"Tianlong","family":"Song","sequence":"first","affiliation":[]},{"given":"Wayne E.","family":"Stark","sequence":"additional","affiliation":[]},{"given":"Tongtong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jitendra K.","family":"Tugnait","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.821988"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2012.6223460"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.120312.111707"},{"key":"ref34","first-page":"1665","article-title":"On constant power water-filling","volume":"6","author":"yu","year":"2001","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2068576"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523802"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056602"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.959289"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.2642"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/0323011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/26.864173"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.907807"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.852826"},{"key":"ref19","first-page":"41","article-title":"A Bayesian jamming game in an OFDM wireless network","author":"garnaev","year":"2012","journal-title":"Proc Int Symp Modeling Optim Mobile Ad Hoc Wireless Netw"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00533053"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298317"},{"journal-title":"Game Theory and Strategy","year":"1993","author":"straffin","key":"ref27"},{"key":"ref3","first-page":"1043","article-title":"Capacity of correlated jamming channels","author":"m\u00e9dard","year":"1997","journal-title":"Proc Allerton Conf on Comm Cont and Comp"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.120312.111706"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.720535"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1986.1057190"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2585089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037426"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1984.272204"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472063"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.842181"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2014275"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2002.1187060"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/452907","article-title":"Physical layer security game: Interaction between source, eavesdropper, and friendly jammer","volume":"2009","author":"han","year":"2010","journal-title":"EURASIP J Wireless Commun Netw"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2013.6810544"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.358854"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.979"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127473"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/26\/7567606\/7529087-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/7567606\/07529087.pdf?arnumber=7529087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:56:30Z","timestamp":1649444190000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":34,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2016.2597148","relation":{},"ISSN":["0090-6778"],"issn-type":[{"type":"print","value":"0090-6778"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}