{"id":"https://openalex.org/W2922102150","doi":"https://doi.org/10.1109/robio.2018.8665238","title":"Anti-Jamming Path Planning for Unmanned Aerial Vehicles with Imperfect Jammer Information","display_name":"Anti-Jamming Path Planning for Unmanned Aerial Vehicles with Imperfect Jammer Information","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2922102150","doi":"https://doi.org/10.1109/robio.2018.8665238","mag":"2922102150"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/robio.2018.8665238","pdf_url":null,"source":{"id":"https://openalex.org/S4363607846","display_name":"2021 IEEE International Conference on Robotics and Biomimetics (ROBIO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056348295","display_name":"Biqi Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biqi Duan","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766340","display_name":"Dong Yin","orcid":"https://orcid.org/0000-0002-3867-5674"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Yin","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078140705","display_name":"Yirui Cong","orcid":"https://orcid.org/0000-0003-0621-6331"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yirui Cong","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102778165","display_name":"Han Zhou","orcid":"https://orcid.org/0000-0001-6725-6746"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Zhou","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027437343","display_name":"Xiaojia Xiang","orcid":"https://orcid.org/0000-0002-1525-6231"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojia Xiang","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056012647","display_name":"Lincheng Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lincheng Shen","raw_affiliation_strings":["College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology National, University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.593,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":32,"citation_normalized_percentile":{"value":0.901154,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"729","last_page":"735"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.83515954},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.5220087},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.4746376},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.4249689}],"concepts":[{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.83515954},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7834835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6968175},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.5220087},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4810134},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.4746376},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.4249689},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24549976},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.09285712},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/robio.2018.8665238","pdf_url":null,"source":{"id":"https://openalex.org/S4363607846","display_name":"2021 IEEE International Conference on Robotics and Biomimetics (ROBIO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1554944862","https://openalex.org/W1966104830","https://openalex.org/W2034218391","https://openalex.org/W2036900823","https://openalex.org/W2042706753","https://openalex.org/W2098804374","https://openalex.org/W2111131418","https://openalex.org/W2118521282","https://openalex.org/W2122285088","https://openalex.org/W2124280970","https://openalex.org/W2133282516","https://openalex.org/W2135421257","https://openalex.org/W2782752457"],"related_works":["https://openalex.org/W426968574","https://openalex.org/W2619844325","https://openalex.org/W2539387137","https://openalex.org/W2393709043","https://openalex.org/W2385449752","https://openalex.org/W2382520895","https://openalex.org/W2374952201","https://openalex.org/W2374808384","https://openalex.org/W2365639220","https://openalex.org/W2080567403"],"abstract_inverted_index":{"In":[0],"this":[1,48],"paper,":[2],"we":[3,50,57,121],"consider":[4],"an":[5,32],"anti-jamming":[6],"problem":[7],"for":[8],"one":[9],"unmanned":[10],"aerial":[11],"vehicle":[12],"(UAV)":[13],"reaching":[14],"a":[15,52,59,123,152,160],"given":[16],"destination":[17],"with":[18,69,115],"maintaining":[19],"the":[20,24,37,64,75,91,109,134,139,144,173],"communication":[21,26,145,162],"quality,":[22],"where":[23],"ground-to-air":[25],"link":[27],"is":[28,77,86,113,165],"spatially":[29],"affected":[30],"by":[31],"adversarial":[33],"jammer.":[34],"Note":[35],"that":[36,143],"jammer's":[38],"position":[39,93],"and":[40,94,107,171],"transmit":[41],"power":[42,97],"are":[43],"initially":[44],"unknown.":[45],"To":[46,117],"solve":[47],"problem,":[49],"propose":[51,122],"jammer":[53,60,76,83,92,111,130],"detection-localization-evasion":[54],"framework.":[55],"Firstly,":[56],"employ":[58],"detection":[61],"method":[62,127,136],"combining":[63],"Received":[65],"Signal":[66],"Strength":[67],"(RSS)":[68],"Packet":[70],"Error":[71],"Rate":[72],"(PER).":[73],"After":[74],"detected,":[78],"our":[79,176],"designed":[80],"RSS":[81],"based":[82],"localization":[84,100],"algorithm":[85],"presented,":[87],"which":[88],"can":[89,137,147],"estimate":[90],"jamming":[95],"signal":[96],"simultaneously.":[98],"However,":[99],"noises":[101],"often":[102],"exist":[103],"in":[104],"practical":[105],"scenarios,":[106],"therefore":[108],"estimated":[110],"information":[112],"usually":[114],"uncertainties.":[116,158],"overcome":[118],"these":[119],"uncertainties,":[120],"robust":[124],"path":[125],"planning":[126],"of":[128,175],"successful":[129],"evasion.":[131],"More":[132],"specifically,":[133],"proposed":[135,177],"guarantee":[138],"worst-case":[140],"performance":[141],"so":[142],"quality":[146],"be":[148],"always":[149],"better":[150],"than":[151],"certain":[153],"level":[154],"under":[155],"all":[156],"possible":[157],"Finally,":[159],"UAV":[161],"jammed":[163],"model":[164],"built":[166],"on":[167],"Network":[168],"Simulator":[169],"(NS3)":[170],"corroborates":[172],"effectiveness":[174],"method.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2922102150","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2}],"updated_date":"2024-12-11T08:47:00.885895","created_date":"2019-03-22"}