{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,11]],"date-time":"2025-05-11T04:01:41Z","timestamp":1746936101314,"version":"3.40.5"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978694","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Jamming Waveform Generation Utilizing Denoising Diffusion Probability Models"],"prefix":"10.1109","author":[{"given":"Lujia","family":"Zhou","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]},{"given":"Shuo","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]},{"given":"Shun","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]},{"given":"Zhipeng","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]},{"given":"Sai","family":"Huang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2014.066419"},{"volume-title":"Principle and technologies of electronic warfare system","year":"2014","author":"Zhou","key":"ref2"},{"volume-title":"Modern Communications Jamming Principles and Techniques","year":"2011","author":"Poisel","key":"ref3"},{"volume-title":"Introduction to communication electronic warfare system","year":"2008","author":"Poisel","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2451081"},{"issue":"3","key":"ref6","first-page":"518","article-title":"Jamming strategy learning based on positive reinforcement learning and orthogonal decomposition","volume":"40","author":"Zhang","year":"2018","journal-title":"Systems Engineering and Electronics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2510643"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017637"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403655"},{"issue":"2","key":"ref11","first-page":"133","article-title":"Smart Jamming: Purpose, Method and Feedback","volume":"8","author":"Han","year":"2022","journal-title":"Journal of Command and Control"},{"issue":"4","key":"ref12","first-page":"1080","article-title":"Communication jamming waveform generation technology based on GAN","volume":"43","author":"Fan","year":"2021","journal-title":"Systems Engineering and Electronics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3010330"},{"key":"ref14","first-page":"1","article-title":"Learning End-to-End Channel Coding with Diffusion Models","volume-title":"Proc. WSA SCC - Int. ITG Workshop Smart Antennas Conf. Syst., Commun., Coding","author":"Kim","year":"2023"},{"key":"ref15","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3306614"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978694.pdf?arnumber=10978694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:29:23Z","timestamp":1746858563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978694","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}