期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology
1
作者 Yi Shen Zhiwen Pan +1 位作者 Nan Liu Xiaohu You 《Digital Communications and Networks》 SCIE CSCD 2022年第5期853-863,共11页
We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the ... We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring.Three schemes are considered for a Multiple-Input Multiple-Output(MIMO)UAV:surveilling followed by jamming;jamming followed by surveilling;and two-stage surveilling.For each scheme,a closed-form expression of surveilling non-outage probability is derived,and surveilling performance under different system configurations is analyzed.Monte Carlo(MC)simulation validates derivation correctness. 展开更多
关键词 UAV legitimate surveillance Proactive surveilling Suspicious relay network HALF-DUPLEX
下载PDF
Cooperative Proactive Eavesdropping over Two-Hop Suspicious Communication Based on Reinforcement Learning 被引量:1
2
作者 Yaxin Yang Baogang Li +2 位作者 Shue Zhang Wei Zhao Libin Jiao 《Journal of Communications and Information Networks》 CSCD 2021年第2期166-174,共9页
Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious c... Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE. 展开更多
关键词 legitimate surveillance two-hop dynamic decision-making expected EEE MADDPG
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部