A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 10 Issue 7
Jul.  2023

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
C. F. Wang, Z. C. Bi, and Y. P. Wan, “Secure underwater distributed antenna systems: A multi-agent reinforcement learning approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 7, pp. 1622–1624, Jul. 2023. doi: 10.1109/JAS.2023.123366
Citation: C. F. Wang, Z. C. Bi, and Y. P. Wan, “Secure underwater distributed antenna systems: A multi-agent reinforcement learning approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 7, pp. 1622–1624, Jul. 2023. doi: 10.1109/JAS.2023.123366

Secure Underwater Distributed Antenna Systems: A Multi-Agent Reinforcement Learning Approach

doi: 10.1109/JAS.2023.123366
More Information
  • loading
  • [1]
    Z. Wang, S. Zhou, and Z. Wang, “Underwater distributed antenna systems: Design opportunities and challenges,” IEEE Commun. Mag., vol. 56, no. 10, pp. 178–185, 2018. doi: 10.1109/MCOM.2017.1601071
    [2]
    M. Xu, Y. Fan, and L. Liu, “Multi-party secret key generation over underwater acoustic channels,” IEEE Wireless Commun. Lett., vol. 9, no. 7, pp. 1075–1079, 2020.
    [3]
    Y. Huang, P. Xiao, S. Zhou, and Z. Shi, “A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels,” IEEE Sensors J., vol. 16, no. 11, pp. 4100–4109, 2015.
    [4]
    Z. Peng, X. Han, and Y. Ye, “Enhancing underwater sensor network security with coordinated communications,” in Proc. IEEE Int. Conf. Commun., 2021, pp. 1–6.
    [5]
    C. Wang and Z. Wang, “Signal alignment for secure underwater coordinated multipoint transmissions,” IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6360–6374, 2016. doi: 10.1109/TSP.2016.2601281
    [6]
    Y. Yang, B. Li, S. Zhang, W. Zhao, and H. Zhang, “Cooperative proactive eavesdropping based on deep reinforcement learning,” IEEE Wireless Commun. Lett., vol. 10, no. 9, pp. 1857–1861, 2021. doi: 10.1109/LWC.2021.3084213
    [7]
    Y. Zhang, Z. Mou, F. Gao, J. Jiang, R. Ding, and Z. Han, “UAV-enabled secure communications by multi-agent deep reinforcement learning,” IEEE Trans. Veh. Technol., vol. 69, no. 10, pp. 11599–11611, 2020. doi: 10.1109/TVT.2020.3014788
    [8]
    H. Sharma, I. Budhiraja, N. Kumar, and R. K. Tekchandani, “Secrecy rate maximization for THz-enabled femto edge users using deep reinforcement learning in 6G,” in Proc. IEEE Int. Conf. Comput. Commun., 2022, pp. 1–6.
    [9]
    J. Yan, Y. Meng, X. Yang, X. Luo, and X. Guan, “Privacy-preserving localization for underwater sensor networks via deep reinforcement learning,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1880–1895, 2021. doi: 10.1109/TIFS.2020.3045320
    [10]
    L. Xiao, D. Jiang, Y. Chen, W. Su, and Y. Tang, “Reinforcement learning-based relay mobility and power allocation for underwater sensor networks against jamming,” IEEE J. Ocean. Eng., vol. 45, no. 3, pp. 1148–1156, 2020. doi: 10.1109/JOE.2019.2910938
    [11]
    R. Lowe, Y. Wu, A. Tamar, J. Harb, P. Abbeel, and I. Mordatch, “Multi-agent actor-critic for mixed cooperative-competitive environments,” in Proc. Conf. Neural Inf. Process. Syst., 2017, pp. 6382–6393.
    [12]
    X. Ye, Y. Yu, and L. Fu, “Deep reinforcement learning based MAC protocol for underwater acoustic networks,” IEEE Trans. Mobile Comput., vol. 21. no. 5, pp. 1625–1638. 2022.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(1)

    Article Metrics

    Article views (401) PDF downloads(88) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return