- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources1
- Resource Type
-
0000000001000000
- More
- Availability
-
10
- Author / Contributor
- Filter by Author / Creator
-
-
Dandekar, Kapil_R (1)
-
Jacovic, Marko (1)
-
Mainland, Geoffrey (1)
-
Rey, Xaime_Rivas (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
& Arnett, N. (0)
-
& Arya, G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Abstract Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day lives. Jamming mitigation techniques are predominately evaluated through simulation or with hardware for very specific jamming conditions. In this paper, an experimental software defined radio‐based RF jamming mitigation platform which performs online jammer classification and leverages reconfigurable beam‐steering antennas at the physical layer is introduced. A ray‐tracing emulation system is presented and validated to enable hardware‐in‐the‐loop jamming experiments of complex outdoor and mobile site‐specific scenarios. Random forests classifiers are trained based on over‐the‐air collected data and integrated into the platform. The mitigation system is evaluated for both over‐the‐air and ray‐tracing emulated environments. The experimental results highlight the benefit of using the jamming mitigation system in the presence of active jamming attacks.more » « less
An official website of the United States government
