{"id":"https:\/\/openalex.org\/W4361895376","doi":"https:\/\/doi.org\/10.1051\/sands\/2023003","title":"Wireless communications \u201c<i>N<\/i>\u2005+\u20051 dimensionality\u201d endogenous anti-jamming: theory and techniques","display_name":"Wireless communications \u201c<i>N<\/i>\u2005+\u20051 dimensionality\u201d endogenous anti-jamming: theory and techniques","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https:\/\/openalex.org\/W4361895376","doi":"https:\/\/doi.org\/10.1051\/sands\/2023003"},"language":"en","primary_location":{"id":"doi:10.1051\/sands\/2023003","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1051\/sands\/2023003","pdf_url":"https:\/\/sands.edpsciences.org\/articles\/sands\/pdf\/forth\/sands20220020.pdf","source":{"id":"https:\/\/openalex.org\/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https:\/\/openalex.org\/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https:\/\/sands.edpsciences.org\/articles\/sands\/pdf\/forth\/sands20220020.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5083082332","display_name":"Fuqiang Yao","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I170215575","display_name":"National University of Defense Technology","ror":"https:\/\/ror.org\/05d2yfz11","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fuqiang Yao","raw_affiliation_strings":["The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China"],"affiliations":[{"raw_affiliation_string":"The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China","institution_ids":["https:\/\/openalex.org\/I170215575"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100311855","display_name":"Yonggang Zhu","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I170215575","display_name":"National University of Defense Technology","ror":"https:\/\/ror.org\/05d2yfz11","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonggang Zhu","raw_affiliation_strings":["The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China"],"affiliations":[{"raw_affiliation_string":"The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China","institution_ids":["https:\/\/openalex.org\/I170215575"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5075553304","display_name":"Yifu Sun","orcid":"https:\/\/orcid.org\/0000-0003-4924-9387"},"institutions":[{"id":"https:\/\/openalex.org\/I170215575","display_name":"National University of Defense Technology","ror":"https:\/\/ror.org\/05d2yfz11","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifu Sun","raw_affiliation_strings":["The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China"],"affiliations":[{"raw_affiliation_string":"The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China","institution_ids":["https:\/\/openalex.org\/I170215575"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5040287289","display_name":"Wenlong Guo","orcid":"https:\/\/orcid.org\/0000-0002-5473-0266"},"institutions":[{"id":"https:\/\/openalex.org\/I170215575","display_name":"National University of Defense Technology","ror":"https:\/\/ror.org\/05d2yfz11","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenlong Guo","raw_affiliation_strings":["The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China"],"affiliations":[{"raw_affiliation_string":"The 63th Research Institution, National University of Defense Technology, Nanjing, 210007, China","institution_ids":["https:\/\/openalex.org\/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https:\/\/openalex.org\/A5083082332"],"corresponding_institution_ids":["https:\/\/openalex.org\/I170215575"],"apc_list":null,"apc_paid":null,"fwci":1.0697,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.76020062,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2","issue":null,"first_page":"2023003","last_page":"2023003"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10964","display_name":"Wireless Communication Security Techniques","score":0.9958000183105469,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10964","display_name":"Wireless Communication Security Techniques","score":0.9958000183105469,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9926999807357788,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11133","display_name":"UAV Applications and Optimization","score":0.941100001335144,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2202","display_name":"Aerospace Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/jamming","display_name":"Jamming","score":0.8535585999488831},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.5949702858924866},{"id":"https:\/\/openalex.org\/keywords\/wireless","display_name":"Wireless","score":0.5550518035888672},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.4795489013195038},{"id":"https:\/\/openalex.org\/keywords\/communication-theory","display_name":"Communication theory","score":0.42365384101867676},{"id":"https:\/\/openalex.org\/keywords\/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.41942548751831055},{"id":"https:\/\/openalex.org\/keywords\/key","display_name":"Key (lock)","score":0.4180733561515808},{"id":"https:\/\/openalex.org\/keywords\/telecommunications","display_name":"Telecommunications","score":0.3464784622192383},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.2605208158493042},{"id":"https:\/\/openalex.org\/keywords\/mathematics","display_name":"Mathematics","score":0.18017834424972534},{"id":"https:\/\/openalex.org\/keywords\/physics","display_name":"Physics","score":0.09673434495925903}],"concepts":[{"id":"https:\/\/openalex.org\/C2779079576","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q17092823","display_name":"Jamming","level":2,"score":0.8535585999488831},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.5949702858924866},{"id":"https:\/\/openalex.org\/C555944384","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q249","display_name":"Wireless","level":2,"score":0.5550518035888672},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.4795489013195038},{"id":"https:\/\/openalex.org\/C3716254","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q83966","display_name":"Communication theory","level":2,"score":0.42365384101867676},{"id":"https:\/\/openalex.org\/C111030470","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.41942548751831055},{"id":"https:\/\/openalex.org\/C26517878","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228039","display_name":"Key (lock)","level":2,"score":0.4180733561515808},{"id":"https:\/\/openalex.org\/C76155785","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q418","display_name":"Telecommunications","level":1,"score":0.3464784622192383},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2605208158493042},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0.18017834424972534},{"id":"https:\/\/openalex.org\/C121332964","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q413","display_name":"Physics","level":0,"score":0.09673434495925903},{"id":"https:\/\/openalex.org\/C97355855","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11473","display_name":"Thermodynamics","level":1,"score":0},{"id":"https:\/\/openalex.org\/C105795698","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q12483","display_name":"Statistics","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1051\/sands\/2023003","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1051\/sands\/2023003","pdf_url":"https:\/\/sands.edpsciences.org\/articles\/sands\/pdf\/forth\/sands20220020.pdf","source":{"id":"https:\/\/openalex.org\/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https:\/\/openalex.org\/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org\/article:9d007f8ce62d410e8e8bc53e6fab7da9","is_oa":true,"landing_page_url":"https:\/\/doaj.org\/article\/9d007f8ce62d410e8e8bc53e6fab7da9","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Safety, Vol 2, p 2023003 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1051\/sands\/2023003","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.1051\/sands\/2023003","pdf_url":"https:\/\/sands.edpsciences.org\/articles\/sands\/pdf\/forth\/sands20220020.pdf","source":{"id":"https:\/\/openalex.org\/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https:\/\/openalex.org\/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https:\/\/openalex.org\/licenses\/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https:\/\/metadata.un.org\/sdg\/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https:\/\/content.openalex.org\/works\/W4361895376.pdf"},"referenced_works_count":52,"referenced_works":["https:\/\/openalex.org\/W1995875735","https:\/\/openalex.org\/W2098853801","https:\/\/openalex.org\/W2101840010","https:\/\/openalex.org\/W2104057862","https:\/\/openalex.org\/W2107929242","https:\/\/openalex.org\/W2107936477","https:\/\/openalex.org\/W2121607567","https:\/\/openalex.org\/W2124164696","https:\/\/openalex.org\/W2128716731","https:\/\/openalex.org\/W2145878582","https:\/\/openalex.org\/W2163167025","https:\/\/openalex.org\/W2345604706","https:\/\/openalex.org\/W2588993347","https:\/\/openalex.org\/W2765492968","https:\/\/openalex.org\/W2810052468","https:\/\/openalex.org\/W2810504435","https:\/\/openalex.org\/W2810541051","https:\/\/openalex.org\/W2888024549","https:\/\/openalex.org\/W2900051367","https:\/\/openalex.org\/W2905854587","https:\/\/openalex.org\/W2962792006","https:\/\/openalex.org\/W2964277700","https:\/\/openalex.org\/W2983729222","https:\/\/openalex.org\/W2984937369","https:\/\/openalex.org\/W2990747873","https:\/\/openalex.org\/W2991700376","https:\/\/openalex.org\/W2996313530","https:\/\/openalex.org\/W3016369572","https:\/\/openalex.org\/W3033035734","https:\/\/openalex.org\/W3088272583","https:\/\/openalex.org\/W3088566444","https:\/\/openalex.org\/W3104300639","https:\/\/openalex.org\/W3109254234","https:\/\/openalex.org\/W3114213209","https:\/\/openalex.org\/W3119223610","https:\/\/openalex.org\/W3126934368","https:\/\/openalex.org\/W3136993430","https:\/\/openalex.org\/W3143117471","https:\/\/openalex.org\/W3152585206","https:\/\/openalex.org\/W3195542062","https:\/\/openalex.org\/W3201870125","https:\/\/openalex.org\/W3203387279","https:\/\/openalex.org\/W3204184545","https:\/\/openalex.org\/W4205683915","https:\/\/openalex.org\/W4206167132","https:\/\/openalex.org\/W4206470264","https:\/\/openalex.org\/W4206571275","https:\/\/openalex.org\/W4214727170","https:\/\/openalex.org\/W4243574393","https:\/\/openalex.org\/W4252713891","https:\/\/openalex.org\/W4285217437","https:\/\/openalex.org\/W7062248106"],"related_works":["https:\/\/openalex.org\/W4200319726","https:\/\/openalex.org\/W1984793747","https:\/\/openalex.org\/W3197729047","https:\/\/openalex.org\/W4312547492","https:\/\/openalex.org\/W1987034598","https:\/\/openalex.org\/W2370486284","https:\/\/openalex.org\/W2143847498","https:\/\/openalex.org\/W2354671671","https:\/\/openalex.org\/W3005169718","https:\/\/openalex.org\/W4296209631"],"abstract_inverted_index":{"The":[0],"existing":[1],"theory":[2],"and":[3,26,77,90,104],"techniques":[4],"of":[5,23,31,41,87,107],"wireless":[6,24,108],"communication":[7,25,109],"anti-jamming":[8,50,116],"have":[9],"reached":[10],"their":[11],"performance":[12],"limit":[13],"recently.":[14],"With":[15],"this":[16,35],"focus,":[17],"by":[18],"leveraging":[19],"the":[20,29,38,45,61,69,73,83,91,99],"inherent":[21],"characteristics":[22],"referring":[27],"to":[28,67,119],"principle":[30],"cyberspace":[32],"endogenous":[33,42,49,78,115],"security,":[34],"paper":[36],"investigates":[37],"core":[39],"issues":[40],"security":[43],"in":[44,80],"electromagnetic":[46,57],"space,":[47],"namely,":[48],"(EAJ),":[51],"which":[52,81],"can":[53],"defend":[54],"against":[55],"unknown":[56],"attacks":[58],"effectively.":[59],"Specifically,":[60],"subspace":[62],"method":[63],"is":[64],"first":[65],"adopted":[66],"establish":[68],"unified":[70],"framework":[71],"for":[72],"conventional":[74],"spread-spectrum,":[75],"intelligent,":[76],"anti-jamming,":[79],"both":[82],"intrinsic":[84],"development":[85,105],"law":[86],"each":[88],"technique":[89],"internal":[92],"logic":[93],"between":[94],"them":[95],"are":[96,117],"revealed.":[97],"Then,":[98],"fundamental":[100],"concept,":[101],"key":[102],"techniques,":[103],"suggestions":[106],"\u201c":[110],"N":[111],"+":[112],"1":[113],"dimensionality\u201d":[114],"proposed":[118],"seek":[120],"a":[121],"disruptive":[122],"breakthrough.":[123]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-01-23T23:20:30.427331","created_date":"2023-04-05T00:00:00"}