{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,2,9]],“日期-时间”:“2024-02-09T04:09:11Z”,“时间戳”:1707451751421},“引用-计数”:21,“发布者”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2021,6,1]],”日期-时间“:”2021-06-01T00:00:00Z“,”timestamp“:1622505600000},”content-version“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[2021,6,1]],“date-time”:“2021-06-01T00:00:00Z”,“timestamp”:1622505600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10152 23\/policy-029“},{“开始”:{“日期部分”:[[2021,6,1]],“date-time”:“2021-06-01T00:00:00Z”,“timestamp”:1622505600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”shortcontainer-title“:[],”published-print“:{”date-parts“:[2021,6]},“doi”:“10.1109\/icc42927.2021.9500773”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2021,8,6]],“date-time”:“2021-08-06T20:49:21Z”,“timestamp”:1628282961000},“source”:“Crossref”,“is-referenced-by-count”:3,“title”:[“智能干扰威胁的对策:一种欺骗对手攻击方法”],“prefix”:“10.1109”,”author“[{”given“:”Wei“,”family“:”Li“,“sequence”:“first”,“隶属关系”:[]},{“给定”:“军”,“家庭”:“王”,“序列”:“附加”,“隶属”:[]},}“给定的”:“李”,“家族”:“黎”,“顺序”:“额外”,“从属关系”:[]}},{“给定”:“少钱”,“家庭”:“李”,“sequence”:“additional”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICASSP.2017.7952524”},{“密钥”:“ref11”,“dio-asserted-by”:”publisher“,”doi“:”10.1109\/ICC.2019.8761578“},“key“ref12”,“article-title”:“Reinformment Learning:An”简介“,”作者“:”萨顿“,”年份“:”2018“},{”关键“:“ref13”,“doi-asserted-by”:“publisher”,“doi”:“10.3390\/app9071361”},{“key”:“ref14”,“article-title”:“DeepFake:基于深度对偶欺骗策略击败反应性干扰机”,“author”:“van huynh”,“year”:“2020”}“ref16”,“文章标题”:“TensorFlow:大规模机器学习系统”,“author”:“adadi”,“year”:“2016”,“journal-title”:“技术代表Google Brain”},{“key”:“ref17”,“doi-asserted-by”:“publisher”,”doi“:”10.24963\/ijcai.2017\/525“},”{“密钥”:“ref18”,“article-title“:”神经网络的有趣特性“,”author“:”szegedy“,”year“:”2014“,”journal-title“:”ICLR E“},{”键“:“ref19”,“first page”:“2040”,“article-title”:“Roubst deep reinforction learning with敌意攻击”,“author”:“pattanaik”,“year”:“2018”,“journal-title“:“International Conference on Autonomous Agents and Multiagent Systems”},{“key”::“ref4”,“doi-asserted-by”:“publisher”,“doi”:“10.1109 \/MCOM.001.1900530”}:“自动驾驶汽车:调查”,“作者”:“badue”,“年份”:“2019”},{“key”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1998412.1998422”}、{“密钥”:“ref5”,“doi-asserte-by”:“publisher”,“DI:”10.1109\/JSAC.2016.2605799 \/TIFS.2015.2467593“},{“key”:“ref7”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/GLOCOM.2015.7417437”},{“key”:“ref2”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.techfore.2018.09.018”}815018“},{”key“:”ref20“,”article-title“:“神经网络策略的对抗性攻击”,“author”:“huang”,“year”:“2017”},{“key”:“ref21”,“article-title”:“A3C路径发现广义攻击免疫的梯度带对抗性训练”,“author”:“chen”,“年份”:“2018”}],“event”:{“name”:“ICC 2021-IEEE国际通信会议”,“location”:“加拿大魁北克省蒙特利尔”,“start”:{“date-parts”:[[2021,6,14]]},“end”:{“date-parts”:[[2021,6,23]]}},”container-title“:[“ICC 2021-IEEE国际通信会议”],“original-title”:[],“link”:[{“URL”:“http://\xplorestaging.IEEE.org\/ielx7\/95000243\/9500244\/0950773.pdf?arnumber=9500773”,“content-t”type“:”unspecified“,”content-version“:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,5,10]],“date-time”:“2022-05-10T15:44:13Z”,“timestamp”:1652197453000},“score”:1,“resource”:{“primary”:}“URL”:“https:\/\/ieeexplore.ieee.org\/document\/9500773\/”},”subtitle“[],”shorttitle“:[],“issued”:{date parts“:[[2021,6]]},”references-count“:21,”URL“:“http://\/dx.doi.org\/10.109\/icc42927.2021.9500773”,“关系”:{},“主题”:[],“发布”:{“日期部分”:[[2021,6]]}}