{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:31:37Z","timestamp":1774621897153,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2021YFA0716600"],"award-info":[{"award-number":["2021YFA0716600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171455"],"award-info":[{"award-number":["62171455"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017607","name":"Shenzhen Municipal Fundamental Research Program","doi-asserted-by":"publisher","award":["JCYJ20180307151430655"],"award-info":[{"award-number":["JCYJ20180307151430655"]}],"id":[{"id":"10.13039\/501100017607","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["KQTD20190929172704911"],"award-info":[{"award-number":["KQTD20190929172704911"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tvt.2024.3470832","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T17:47:05Z","timestamp":1729705625000},"page":"2871-2883","source":"Crossref","is-referenced-by-count":7,"title":["A Cognitive Jamming Decision-Making Method Based on Heuristic Improved A2C Algorithm"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-3908","authenticated-orcid":false,"given":"Chudi","family":"Zhang","sequence":"first","affiliation":[{"name":"Intelligent Game and Decision Laboratory, Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3304-7007","authenticated-orcid":false,"given":"Biao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-Sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5695-5509","authenticated-orcid":false,"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-Sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4925-5372","authenticated-orcid":false,"given":"Wenshuai","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-Sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6796-2533","authenticated-orcid":false,"given":"Lulu","family":"Wang","sequence":"additional","affiliation":[{"name":"Intelligent Game and Decision Laboratory, Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4235-7986","authenticated-orcid":false,"given":"Shiyou","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-Sen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MOMUC.1999.819467"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1593335"},{"key":"ref3","volume-title":"Cognitive Electronic Warfare: An Artificial Intelligence Approach","author":"Haigh","year":"2021"},{"issue":"12","key":"ref4","first-page":"1603","article-title":"Cognitive electronic warfare architecture and technology","volume":"48","author":"Shafei","year":"2018","journal-title":"Chin. Sci.: Inf. Sci."},{"key":"ref5","volume-title":"Introduction to Artificial Intelligence","author":"Ertel","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511819346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3197425"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894960"},{"issue":"1","key":"ref9","first-page":"103","article-title":"Reinforcement learning: An introduction","volume":"21","author":"Thrun","year":"2000","journal-title":"AI Mag."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3267068"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418283"},{"issue":"11","key":"ref12","article-title":"Cognitive radar adversarial process design based on Q-learning algorithm","volume":"35","author":"Yunjie","year":"2015","journal-title":"J. Beijing Inst. Technol."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2017.8242558"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIAPP.2017.8167262"},{"issue":"008","key":"ref15","article-title":"Markov-based cognitive jamming decision modeling for multi-functional radar","author":"Zhu","year":"2022","journal-title":"Syst. Eng. Electron."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP48821.2019.8958575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8647386"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9781119699057.ch4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2018.8567751"},{"issue":"4","key":"ref20","article-title":"A dqn cognitive jamming decision-making approach for multifunctional radars","volume":"42","author":"Bakai","year":"2020","journal-title":"Syst. Eng. Electron."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2020.0410"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2016.0277"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2023.103952"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22010145"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3261318"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3312231"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3272307"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/rs15123108"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD57460.2023.10152833"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3214842"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VRHCIAI57205.2022.00010"},{"key":"ref32","article-title":"Behavioral Learning for Adaptive Electronic Warfare","author":"Darpa","year":"2010"},{"key":"ref33","volume-title":"ND Communications Under Extreme RF Spectrum Conditions (Commex)","author":"Phoel","year":"2016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2019.2953762"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3260876"},{"key":"ref36","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. 2016 Int. Conf. Mach. Learn.","author":"Wang","year":"2016"},{"key":"ref37","first-page":"278","article-title":"Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ng","year":"1999"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/25\/10887097\/10730796.pdf?arnumber=10730796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:15:52Z","timestamp":1740082552000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10730796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":37,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2024.3470832","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}