{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:12:36Z","timestamp":1774627956184,"version":"3.50.1"},"reference-count":28,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.031200","type":"journal-article","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T06:02:31Z","timestamp":1660802551000},"page":"3757-3784","source":"Crossref","is-referenced-by-count":6,"title":["Generative Adversarial Networks for Secure Data Transmission in Wireless Network"],"prefix":"10.32604","volume":"35","author":[{"given":"E.","family":"Jayabalan","sequence":"first","affiliation":[]},{"given":"R.","family":"Pugazendi","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.32604\/csse.2022.024950","article-title":"A real-time cutting model based on finite element order reduction","volume":"43","author":"Zhang","year":"2022","journal-title":"Computer Systems Science and Engineering"},{"key":"ref2","series-title":"Proc. ISIT","first-page":"1818","article-title":"Jamming games for power controlled medium access with dynamic traffic","author":"Sagduyu","year":"2010"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"30803","DOI":"10.1007\/s11042-020-09171-3","article-title":"Fine-grained vehicle type classification using lightweight convolutional neural network with feature optimization and joint learning","volume":"80","author":"Sun","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"ref4","series-title":"Proc. 8th Int. Symp. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","first-page":"303","article-title":"Wireless jamming attacks under dynamic traffic uncertainty","author":"Sagduyu","year":"2010"},{"key":"ref5","first-page":"1931","article-title":"On efficient processing of continuous reverse skyline queries in wireless sensor networks","volume":"11","author":"Yin","year":"2017","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2957","DOI":"10.1109\/TIFS.2017.2725823","article-title":"Jamming a TDD point-to-point link using reciprocity-based MIMO","volume":"12","author":"Karlsson","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"913497","DOI":"10.1155\/2013\/913497","article-title":"A self-adaptive regression-based multivariate data compression scheme with error bound in wireless sensor networks","volume":"9","author":"Zhang","year":"2013","journal-title":"International Journal of Distributed Sensor Network"},{"key":"ref8","series-title":"Proc. Annual Allerton Conf. on Communication Control and Computing, University of Illinois","first-page":"1043","article-title":"Capacity of correlated jamming channels","volume":"35","author":"Medard","year":"1997"},{"key":"ref9","first-page":"433","article-title":"A PSO based energy efficient coverage control algorithm for wireless networks","volume":"56","author":"Wang","year":"2018","journal-title":"Computers, Materials & Continua"},{"key":"ref10","series-title":"Proc. IEEE MILCOM","first-page":"218","article-title":"Capacity of multiple access channels with correlated jamming","author":"Shafiee","year":"2005"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.comcom.2021.03.001","article-title":"AdS: An adaptive spectrum sensing technique for survivability under jamming attack in cognitive radio networks","volume":"172","author":"Amjad","year":"2021","journal-title":"Computer Communications"},{"key":"ref12","first-page":"73","article-title":"Developing malevolent node-based protection system against jamming attack in agent assisted CRN","volume":"13","author":"Saini","year":"2020","journal-title":"International Journal of Information and Computer Society"},{"key":"ref13","first-page":"1","article-title":"Primary user emulation and jamming attack detection in cognitive radio via sparse coding","volume":"1","author":"Furqan","year":"2020","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/TCCN.2021.3070582","article-title":"Fast-forward mitigation schemes for cognitive adversary","volume":"7","author":"Chaudhary","year":"2021","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"102035","DOI":"10.1016\/j.adhoc.2019.102035","article-title":"Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks","volume":"98","author":"Salmeh","year":"2020","journal-title":"Ad Hoc Networks"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-019-0179-4","article-title":"An empower Hamilton loop based data collection algorithm with mobile agent for WSNs","volume":"9","author":"Wang","year":"2019","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"695","DOI":"10.32604\/cmc.2020.08674","article-title":"Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs","volume":"62","author":"Wang","year":"2020","journal-title":"Computers, Materials & Continua"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"711","DOI":"10.32604\/cmc.2019.05450","article-title":"An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor network","volume":"58","author":"Wang","year":"2019","journal-title":"Computers, Materials & Continua"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/9472075","article-title":"An enhanced PEGASIS algorithm with mobile skin support for wireless sensor networks","volume":"2018","author":"Wang","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1186\/1687-1499-2012-83","article-title":"An energy efficient MCDS construction algorithm for wireless sensor networks","volume":"2012","author":"Tang","year":"2012","journal-title":"EURASIP Journal on Wireless Communication and Networking"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1109\/TPDS.2014.2333011","article-title":"Minimizing movement for target coverage and network connectivity in mobile sensor networks","volume":"26","author":"Liao","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/JCN.2018.000028","article-title":"Mitigating stealthy jamming attacks in low-power and lossy wireless networks","volume":"20","author":"Heo","year":"2018","journal-title":"Journal of Communications and Networks"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"Xi","year":"2018","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TCCN.2018.2884910","article-title":"Deep learning for launching and mitigating wireless jamming attacks","volume":"5","author":"Erpek","year":"2018","journal-title":"IEEE Transaction on Cognitive Communications and Networking"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1504\/IJHPCN.2019.102128","article-title":"A jamming detection method for multi-hop wireless networks based on association graph","volume":"14","author":"Wei","year":"2019","journal-title":"Int. J. High Performance Computing and Networking"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"202563","DOI":"10.1109\/ACCESS.2020.3036027","article-title":"An intelligent anti-jamming scheme for cognitive radio based on deep reinforcement learning","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2599","DOI":"10.1109\/TCYB.2020.3006095","article-title":"Resilient control for wireless cyber-physical systems subject to jamming attacks: A cross-layer dynamic game approach","volume":"52","author":"Zhao","year":"2020","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref28","first-page":"1","article-title":"Deep learning model-based of jamming attacks in low-power and lossy wireless networks","author":"Jayabalan","year":"2021","journal-title":"Soft Computing, Springer"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-3\/TSP_IASC_31200\/TSP_IASC_31200.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:31:07Z","timestamp":1733520667000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n3\/49418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.031200","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}