{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:11:31Z","timestamp":1774530691823,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Union under the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on \u201cTelecommunications of the Future\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tcomm.2023.3281467","type":"journal-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T17:21:16Z","timestamp":1685467276000},"page":"4793-4806","source":"Crossref","is-referenced-by-count":19,"title":["Detection of Jamming Attacks via Source Separation and Causal Inference"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6488-1487","authenticated-orcid":false,"given":"Luca","family":"Arcangeloni","sequence":"first","affiliation":[{"name":"Department of Electrical, Electronic, and Information Engineering &#x201C;Guglielmo Marconi&#x201D; (DEI), CNIT, University of Bologna, Bologna, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2238-9160","authenticated-orcid":false,"given":"Enrico","family":"Testi","sequence":"additional","affiliation":[{"name":"Department of Electrical, Electronic, and Information Engineering &#x201C;Guglielmo Marconi&#x201D; (DEI), CNIT, University of Bologna, Bologna, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6341-3927","authenticated-orcid":false,"given":"Andrea","family":"Giorgetti","sequence":"additional","affiliation":[{"name":"Department of Electrical, Electronic, and Information Engineering &#x201C;Guglielmo Marconi&#x201D; (DEI), CNIT, University of Bologna, Bologna, Italy"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1","article-title":"Jamming detection mechanisms for wireless sensor networks","author":"\u00e7akiroglu","year":"2008","journal-title":"Proc 3rd Int ICST Conf Scalable Inf Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2859327"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.63"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2926080"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1824766.1824772"},{"key":"ref37","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.013014.131037"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2729022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.102011.100708"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.461"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2466550"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090922"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486343"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.1.1.38-47"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900516"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2769650"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2413384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICL-GNSS.2015.7217161"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3221185"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102035"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CoSeRa.2015.7330276"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016462"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1137\/060657704"},{"key":"ref23","first-page":"49","article-title":"Detection and classification of radio frequency jamming attacks using machine learning","volume":"11","author":"kasturi","year":"2020","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref45","first-page":"1179","article-title":"Blind source separation antijamming technology based on pade-FastICA algorithm","author":"xiyuan","year":"2020","journal-title":"Proc IEEE 20th Int Conf Commun Technol (ICCT)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986294"},{"key":"ref25","first-page":"1","article-title":"A robust jamming signal classification and detection approach based on multi-layer perceptron neural network","volume":"7","author":"ujan","year":"2020","journal-title":"International Journal of Research Studies in Computer Science and Engineering (IJRSCSE)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2014.00011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900530"},{"key":"ref42","first-page":"1","year":"2017","journal-title":"LoRaWAN 1 1 Specification"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2919151"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469041"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s16091466"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328788"},{"key":"ref43","year":"2020","journal-title":"LoRaWAn 1 0 2 Regional Parameters"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2889454"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.861743"},{"key":"ref29","first-page":"303","article-title":"Causality, feedback and directed information","author":"massey","year":"1990","journal-title":"Proc Int Symp Inf Theory Appl (ISITA)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070864"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2785414"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3036058"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2020.101973"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0437847100"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10219032\/10138559.pdf?arnumber=10138559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T17:59:28Z","timestamp":1693850368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":47,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3281467","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}