{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T05:34:38Z","timestamp":1773552878872,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3619817","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:56:24Z","timestamp":1760032584000},"page":"9287-9303","source":"Crossref","is-referenced-by-count":3,"title":["PCA-Featured Transformer for Jamming Detection in 5G UAV Networks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4191-3127","authenticated-orcid":false,"given":"Joseanne","family":"Viana","sequence":"first","affiliation":[{"name":"Signal Processing and Communications Department, Universidad Carlos III de Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2620-260X","authenticated-orcid":false,"given":"Hamed","family":"Farkhari","sequence":"additional","affiliation":[{"name":"ISCTE&#x2013;Instituto Universit&#x00E1;rio de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7729-4033","authenticated-orcid":false,"given":"Pedro","family":"Sebasti\u00e3o","sequence":"additional","affiliation":[{"name":"ISCTE&#x2013;Instituto Universit&#x00E1;rio de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7029-1710","authenticated-orcid":false,"given":"V\u00edctor P. Gil","family":"Jim\u00e9nez","sequence":"additional","affiliation":[{"name":"Signal Processing and Communications Department, Universidad Carlos III de Madrid, Madrid, Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900556"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700451"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2910112"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC49280.2020.9152338"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3171135"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800250"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570825"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283656"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800431"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2785414"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2853723"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3385630"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3302814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3132381"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"issue":"4","key":"ref16","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/info10040122","article-title":"A survey of deep learning methods for cyber security","volume":"10","author":"Berman","year":"2019","journal-title":"Information"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2846401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.10.028"},{"key":"ref19","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"Chollet","year":"2016","journal-title":"arXiv:1610.02357"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2017.01.18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-019-00619-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3504729"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891535"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2016.163"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575412"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348579"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016462"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2025.3533427"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3426511"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297290"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3199038"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860623"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3451288"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/9781119293071"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.499"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/EuCAP57121.2023.10132977"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2200001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2020.000015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2866382"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1038\/s43586-022-00184-w"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008757"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2887086"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2947918"},{"key":"ref48","article-title":"Accurate and reliable methods for 5G UAV jamming identification with calibrated uncertainty","volume-title":"arXiv:2211.02924","author":"Farkhari","year":"2022"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT50939.2020.9295902"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP49896.2020.9339393"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"ref53","first-page":"258","article-title":"Jamming and jamming mitigation for selected 5G military scenarios","volume-title":"Proc. ICMCIS","author":"Skokowski"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS52405.2021.9486402"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911675"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3184804"},{"issue":"17","key":"ref57","doi-asserted-by":"crossref","first-page":"4377","DOI":"10.3390\/rs14174377","article-title":"Joint flying relay location and routing optimization for 6G UAV\u2013IoT networks: A graph neural network-based approach","volume":"14","author":"Wang","year":"2022","journal-title":"Remote Sens."},{"key":"ref58","article-title":"A synthetic dataset for 5G UAV attacks based on observable network parameters","volume-title":"arXiv:2211.09706","author":"Viana","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref60","first-page":"12375","article-title":"Root mean square layer normalization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Zhang"},{"key":"ref61","article-title":"GLU variants improve transformer","author":"Shazeer","year":"2020","journal-title":"arXiv:2002.05202"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.12.012"},{"key":"ref63","first-page":"1","article-title":"Differential transformer","volume-title":"Proc. 13th Int. Conf. Learn. Represent.","author":"Ye"},{"key":"ref64","article-title":"Coupling adaptive batch sizes with learning rates","author":"Balles","year":"2017","journal-title":"arXiv:1612.05086"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1137\/0330046"},{"key":"ref66","first-page":"1","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Haarnoja"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295309"},{"key":"ref68","first-page":"1","article-title":"Regularizing neural networks by penalizing confident output distributions","volume-title":"Proc. ICLR","author":"Pereyra"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3214969"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11197321.pdf?arnumber=11197321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:08:11Z","timestamp":1764839291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11197321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3619817","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}