{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T11:12:50Z","timestamp":1724843570527},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41976182","61571387","61773333","61873223","61873224"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["B2019003019","F2019203031"],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008095","name":"Yanshan University","doi-asserted-by":"publisher","award":["BL18039"],"id":[{"id":"10.13039\/501100008095","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1016\/j.neucom.2019.12.063","type":"journal-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T22:52:26Z","timestamp":1576709546000},"page":"148-159","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Adaptive OFDM underwater acoustic transmission: An adversarial bandit approach"],"prefix":"10.1016","volume":"385","author":[{"given":"Haihong","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9072-420X","authenticated-orcid":false,"given":"Xinbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xinping","family":"Guan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2019.12.063_bib0001","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.adhoc.2014.10.014","article-title":"A joint power control and rate adaptation MAC protocol for underwater sensor networks","volume":"26","author":"Su","year":"2015","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"10.1016\/j.neucom.2019.12.063_bib0002","doi-asserted-by":"crossref","first-page":"3519","DOI":"10.1109\/JSYST.2017.2789283","article-title":"Energy-efficient data collection over AUV-assisted underwater acoustic sensor network","volume":"12","author":"Yan","year":"2018","journal-title":"IEEE Syst. J."},{"issue":"2","key":"10.1016\/j.neucom.2019.12.063_bib0003","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TETC.2014.2310457","article-title":"Challenges and opportunities of underwater cognitive acoustic networks","volume":"2","author":"Luo","year":"2014","journal-title":"IEEE Trans. Emerg. Top Comput."},{"issue":"4","key":"10.1016\/j.neucom.2019.12.063_bib0004","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/JOE.2015.2451251","article-title":"On the achievable rate of a class of acoustic channels and practical power allocation strategies for OFDM systems","volume":"40","author":"Aval","year":"2015","journal-title":"IEEE J. Ocean. Eng."},{"issue":"9","key":"10.1016\/j.neucom.2019.12.063_bib0005","doi-asserted-by":"crossref","first-page":"6165","DOI":"10.1109\/TWC.2017.2720580","article-title":"Joint channel estimation and impulsive noise mitigation in underwater acoustic OFDM communication systems","volume":"16","author":"Chen","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"10.1016\/j.neucom.2019.12.063_bib0006","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/s11277-011-0270-2","article-title":"Resource management techniques for OFDM systems with the presence of inter-carrier interference","volume":"65","author":"Wen","year":"2012","journal-title":"Wirel. Pers. Commun."},{"issue":"6","key":"10.1016\/j.neucom.2019.12.063_bib0007","doi-asserted-by":"crossref","first-page":"1422","DOI":"10.1109\/TWC.2006.1638663","article-title":"Performance degradation of OFDM systems due to doppler spreading","volume":"5","author":"Wang","year":"2006","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"10.1016\/j.neucom.2019.12.063_bib0008","doi-asserted-by":"crossref","first-page":"6038","DOI":"10.1109\/TVT.2015.2472989","article-title":"On the spectral efficiency of rate and subcarrier bandwidth adaptive OFDM systems over very fast fading channels","volume":"65","author":"Dong","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.neucom.2019.12.063_bib0009","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/LCOMM.2016.2625300","article-title":"Relay selection in underwater acoustic cooperative networks: a contextual bandit approach","volume":"21","author":"Li","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.neucom.2019.12.063_bib0010","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.ins.2018.05.011","article-title":"joint resource allocation in underwater acoustic communication networks: a game-based hierarchical adversarial multiplayer multiarmed bandit algorithm","volume":"454","author":"Han","year":"2018","journal-title":"Inf Sci. (Ny)"},{"key":"10.1016\/j.neucom.2019.12.063_bib0011","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.jnca.2018.09.004","article-title":"Game theory based distributed clustering approach to maximize wireless sensors network lifetime","volume":"123","author":"Kassan","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.neucom.2019.12.063_bib0012","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.jnca.2016.07.007","article-title":"Hierarchical-game-based algorithm for downlink joint subchannel and power allocation in OFDMA femtocell networks","volume":"73","author":"Han","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.neucom.2019.12.063_bib0013","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.jnca.2018.09.003","article-title":"wireless powered public safety IOT: a UAV-assisted adaptive-learning approach towards energy efficiency","volume":"123","author":"Sikeridis","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"issue":"9","key":"10.1016\/j.neucom.2019.12.063_bib0014","doi-asserted-by":"crossref","first-page":"2902","DOI":"10.1109\/TWC.2010.070910.091651","article-title":"cognitive engine design for link adaptation: an application to multi-antenna systems","volume":"9","author":"Volos","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"10.1016\/j.neucom.2019.12.063_bib0015","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S1005-8885(10)60079-9","article-title":"Cross-layer scheduling with fairness for multi-user OFDM system: a restless bandit approach","volume":"18","author":"Ge","year":"2011","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"1","key":"10.1016\/j.neucom.2019.12.063_bib0016","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/TSP.2003.819986","article-title":"Adaptive MIMO-OFDM based on partial channel state information","volume":"52","author":"Xia","year":"2004","journal-title":"IEEE Trans. Signal Process."},{"issue":"2\/3\/4","key":"10.1016\/j.neucom.2019.12.063_bib0017","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/26.380108","article-title":"A practical discrete multitone transceiver loading algorithm for data transmission over spectrally shaped channels","volume":"43","author":"Chow","year":"1995","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.neucom.2019.12.063_bib0018","series-title":"Proceedings of the OCEANS\u201910 IEEE SYDNEY","first-page":"1","article-title":"Data driven algorithms to tune physical layer parameters of an underwater communication link","author":"Shankar","year":"2010"},{"key":"10.1016\/j.neucom.2019.12.063_bib0019","series-title":"Proceedings of the 2013 MTS\/IEEE OCEANS-Bergen","first-page":"1","article-title":"Tuning an underwater communication link","author":"Shankar","year":"2013"},{"key":"10.1016\/j.neucom.2019.12.063_bib0020","series-title":"Adapting underwater physical link parameters using data driven algorithms, Ph.D. thesis","author":"Jayasuriya","year":"2010"},{"key":"10.1016\/j.neucom.2019.12.063_bib0021","series-title":"Proceedings of the IEEE 36th Annual Foundations of Computer Science","first-page":"322","article-title":"Gambling in a rigged casino: The adversarial multi-armed bandit problem","author":"Auer","year":"1995"},{"issue":"1","key":"10.1016\/j.neucom.2019.12.063_bib0022","first-page":"613","article-title":"Delay and cooperation in nonstochastic bandits","volume":"20","author":"Cesa-Bianchi","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.neucom.2019.12.063_bib0023","series-title":"Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)","first-page":"188","article-title":"Shrewd selection speeds surfing: use smart exp3!","author":"Appavoo","year":"2018"},{"key":"10.1016\/j.neucom.2019.12.063_bib0024","series-title":"Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications","first-page":"1","article-title":"Specwatch: adversarial spectrum usage monitoring in CRNS with unknown statistics","author":"Li","year":"2016"},{"issue":"1","key":"10.1016\/j.neucom.2019.12.063_bib0025","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","article-title":"The nonstochastic multiarmed bandit problem","volume":"32","author":"Auer","year":"2002","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.neucom.2019.12.063_bib0026","unstructured":"S. Sakaue, M. Ishihata, S. Minato, Practical adversarial combinatorial bandit algorithm via compression of decision sets. arXiv preprint arXiv:1707.08300, (2017)."},{"key":"10.1016\/j.neucom.2019.12.063_bib0027","series-title":"Proceedings of the EWRL","first-page":"103","article-title":"Evaluation and analysis of the performance of the exp3 algorithm in stochastic environments.","author":"Seldin","year":"2012"},{"issue":"5","key":"10.1016\/j.neucom.2019.12.063_bib0028","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/TNET.2011.2181864","article-title":"combinatorial network optimization with unknown variables: multi-armed bandits with linear rewards and individual observations","volume":"20","author":"Gai","year":"2012","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"10.1016\/j.neucom.2019.12.063_bib0029","series-title":"Proceedings of the 2012 Information Theory and Applications Workshop","first-page":"352","article-title":"Online learning algorithms for stochastic water-filling","author":"Gai","year":"2012"},{"key":"10.1016\/j.neucom.2019.12.063_bib0030","doi-asserted-by":"crossref","first-page":"9699","DOI":"10.1109\/ACCESS.2017.2705019","article-title":"Improved differential evolution with a modified orthogonal learning strategy","volume":"5","author":"Lei","year":"2017","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.neucom.2019.12.063_bib0031","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/TEVC.2010.2052054","article-title":"Orthogonal learning particle swarm optimization","volume":"15","author":"Zhan","year":"2010","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"3","key":"10.1016\/j.neucom.2019.12.063_bib0032","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1080\/00207721.2012.723053","article-title":"An immune orthogonal learning particle swarm optimisation algorithm for routing recovery of wireless sensor networks with mobile sink","volume":"45","author":"Hu","year":"2014","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.neucom.2019.12.063_bib0033","series-title":"Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC)","first-page":"594","article-title":"Orthogonal learning particle swarm optimization with variable relocation for dynamic optimization","author":"Wang","year":"2016"},{"issue":"3","key":"10.1016\/j.neucom.2019.12.063_bib0034","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1198\/004017002320256440","article-title":"Design of experiments using the Taguchi approach: 16 steps to product and process improvement by Ranjit K. Roy","volume":"44","author":"Nostrand","year":"2001","journal-title":"Technometrics"},{"key":"10.1016\/j.neucom.2019.12.063_bib0035","series-title":"Proceedings of the 19th International Conference on World Wide Web","first-page":"661","article-title":"A contextual-bandit approach to personalized news article recommendation","author":"Li","year":"2010"},{"key":"10.1016\/j.neucom.2019.12.063_bib0036","series-title":"Proceedings of the International Conference on Decision and Game Theory for Security","first-page":"340","article-title":"Online learning methods for border patrol resource allocation","author":"Kl\u00edma","year":"2014"},{"key":"10.1016\/j.neucom.2019.12.063_bib0037","series-title":"Bandit Algorithms for Website Optimization","author":"White","year":"2012"},{"key":"10.1016\/j.neucom.2019.12.063_bib0038","unstructured":"World ocean database, (Available: http:\/\/www.nodc.noaa.gov\/OC5\/WOD13\/)."},{"key":"10.1016\/j.neucom.2019.12.063_bib0039","unstructured":"General bathymetric chart of the oceans. (online), (Available: http:\/\/www.gebco.net)."},{"key":"10.1016\/j.neucom.2019.12.063_bib0040","unstructured":"National geophysical data center, seafloor surficial sediment descriptions, (Available: http:\/\/www.ngdc.noaa.gov\/mgg\/geology\/deck41.html)."},{"key":"10.1016\/j.neucom.2019.12.063_bib0041","first-page":"2016","article-title":"The watermark manual and users guide","volume":"1378","author":"van Walree","year":"2016","journal-title":"Forsvarets Forskningsinstitutt, Horten, Norway, FFI-rapport"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231219317722?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231219317722?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T16:48:07Z","timestamp":1656866887000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231219317722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":41,"alternative-id":["S0925231219317722"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2019.12.063","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2020,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Adaptive OFDM underwater acoustic transmission: An adversarial bandit approach","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2019.12.063","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}