{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:00Z","timestamp":1750221000207,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618727"],"award-info":[{"award-number":["CNS-1618727"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["A8750-15-3-6001-NU"],"award-info":[{"award-number":["A8750-15-3-6001-NU"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3323679.3326504","type":"proceedings-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:07:11Z","timestamp":1559664431000},"page":"61-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Jam Sessions"],"prefix":"10.1145","author":[{"given":"Liyang","family":"Zhang","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA and Google LLC"}]},{"given":"Francesco","family":"Restuccia","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Tommaso","family":"Melodia","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Scott M.","family":"Pudlewski","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory, Rome, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2510643"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262745"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.863008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962467"},{"key":"e_1_3_2_1_6_1","unstructured":"Richard Dearden Nir Friedman and Stuart Russell. 1998. Bayesian Q-learning. In AAAI\/IAAI. 761--768.   Richard Dearden Nir Friedman and Stuart Russell. 1998. Bayesian Q-learning. In AAAI\/IAAI. 761--768."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627406"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6645021"},{"key":"e_1_3_2_1_9_1","volume-title":"Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey. arXiv preprint arXiv:1901.07947","author":"Jagannath Jithin","year":"2019","unstructured":"Jithin Jagannath , Nicholas Polosky , Anu Jagannath , Francesco Restuccia , and Tommaso Melodia . 2019. Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey. arXiv preprint arXiv:1901.07947 ( 2019 ). Jithin Jagannath, Nicholas Polosky, Anu Jagannath, Francesco Restuccia, and Tommaso Melodia. 2019. Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey. arXiv preprint arXiv:1901.07947 (2019)."},{"volume-title":"Proc. of IEEE Military Communications Conference (MILCOM)","author":"La Pan Matthew J.","key":"e_1_3_2_1_10_1","unstructured":"Matthew J. La Pan , T. Charles Clancy , and Robert W . McGwier. 2012. Jamming Attacks against OFDM Timing Synchronization and Signal Acquisition . In Proc. of IEEE Military Communications Conference (MILCOM) . Orlando, FL, USA, 1--7. Matthew J. La Pan, T. Charles Clancy, and Robert W. McGwier. 2012. Jamming Attacks against OFDM Timing Synchronization and Signal Acquisition. In Proc. of IEEE Military Communications Conference (MILCOM). Orlando, FL, USA, 1--7."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.833474"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of Annual Allerton Conference on Communication, Control and Computing","volume":"37","author":"Marzetta Thomas L","year":"1999","unstructured":"Thomas L Marzetta . 1999 . BLAST Training: Estimating Channel Characteristics for High Capacity Space-Time Wireless . In Proc. of Annual Allerton Conference on Communication, Control and Computing , Vol. 37 . 958--966. Thomas L Marzetta. 1999. BLAST Training: Estimating Channel Characteristics for High Capacity Space-Time Wireless. In Proc. of Annual Allerton Conference on Communication, Control and Computing, Vol. 37. 958--966."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2487960"},{"key":"e_1_3_2_1_16_1","volume-title":"Digital Communications","author":"Proakis John G.","unstructured":"John G. Proakis . 2007. Digital Communications 5 th Edition. McGraw Hill . John G. Proakis. 2007. Digital Communications 5th Edition. McGraw Hill.","edition":"5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2456916"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846040"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2657"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/551283"},{"volume-title":"Proc. of IEEE Military Communications Conference (MILCOM)","author":"David","key":"e_1_3_2_1_21_1","unstructured":"David J. Thuente and Mithun Acharya. 2006. Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks . In Proc. of IEEE Military Communications Conference (MILCOM) . Washington, DC, USA, 1075--1081. David J. Thuente and Mithun Acharya. 2006. Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks. In Proc. of IEEE Military Communications Conference (MILCOM). Washington, DC, USA, 1075--1081."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05384"},{"key":"e_1_3_2_1_23_1","volume-title":"Tsiftsis","author":"Wang Hui-Ming","year":"2018","unstructured":"Hui-Ming Wang , Ke-Wen Huang , and Theodoros A . Tsiftsis . 2018 . Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack. IEEE Journal on Selected Areas in Communications (JSAC) ( 2018). Hui-Ming Wang, Ke-Wen Huang, and Theodoros A. Tsiftsis. 2018. Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack. IEEE Journal on Selected Areas in Communications (JSAC) (2018)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120102"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2782726"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2535906"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346847"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228631"},{"key":"e_1_3_2_1_31_1","volume-title":"Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning Approach","author":"Zhang Liyang","year":"2018","unstructured":"Liyang Zhang , Francesco Restuccia , Tommaso Melodia , and Scott Puldlewski . 2018. Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning Approach . IEEE Transactions on Mobile Computing ( 2018 ). Liyang Zhang, Francesco Restuccia, Tommaso Melodia, and Scott Puldlewski. 2018. Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning Approach. IEEE Transactions on Mobile Computing (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2837641"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.810646"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2017.8230289"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"}],"event":{"name":"Mobihoc '19: The Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Catania Italy","acronym":"Mobihoc '19"},"container-title":["Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326504","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:40Z","timestamp":1750206340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326504"}},"subtitle":["Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":35,"alternative-id":["10.1145\/3323679.3326504","10.1145\/3323679"],"URL":"https:\/\/doi.org\/10.1145\/3323679.3326504","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}