A Novel Resource Allocation for Anti-jamming in Cognitive-UAVs: an
Active Inference Approach
- URL: http://arxiv.org/abs/2208.05269v1
- Date: Wed, 10 Aug 2022 11:03:52 GMT
- Title: A Novel Resource Allocation for Anti-jamming in Cognitive-UAVs: an
Active Inference Approach
- Authors: Ali Krayani, Atm S. Alam, Lucio Marcenaro, Arumugam Nallanathan, Carlo
Regazzoni
- Abstract summary: This work proposes a novel resource allocation strategy for anti-jamming in Cognitive Radio using Active Inference ($textitAIn$), and a cognitive-UAV is employed as a case study.
- Score: 40.196011468695914
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This work proposes a novel resource allocation strategy for anti-jamming in
Cognitive Radio using Active Inference ($\textit{AIn}$), and a cognitive-UAV is
employed as a case study. An Active Generalized Dynamic Bayesian Network
(Active-GDBN) is proposed to represent the external environment that jointly
encodes the physical signal dynamics and the dynamic interaction between UAV
and jammer in the spectrum. We cast the action and planning as a Bayesian
inference problem that can be solved by avoiding surprising states (minimizing
abnormality) during online learning. Simulation results verify the
effectiveness of the proposed $\textit{AIn}$ approach in minimizing
abnormalities (maximizing rewards) and has a high convergence speed by
comparing it with the conventional Frequency Hopping and Q-learning.
Related papers
- Active Inference-Driven World Modeling for Adaptive UAV Swarm Trajectory Design [5.238520207250123]
This paper proposes an Active Inference-based framework for autonomous trajectory design in UAV swarms.<n>The method integrates probabilistic reasoning and self-learning to enable distributed mission allocation, route ordering, and motion planning.
arXiv Detail & Related papers (2026-01-19T10:47:26Z) - Bayesian Active Inference for Intelligent UAV Anti-Jamming and Adaptive Trajectory Planning [5.620125209890186]
This paper proposes a hierarchical trajectory planning framework for UAVs operating under adversarial jamming conditions.<n>The approach combines expert-generated demonstrations with probabilistic generative modeling to encode high-level symbolic planning, low-level motion policies, and wireless signal feedback.<n>During deployment, the UAV performs online inference to anticipate interference, localize jammers, and adapt its trajectory accordingly, without prior knowledge of jammer locations.
arXiv Detail & Related papers (2025-12-05T13:38:52Z) - Efficient Onboard Vision-Language Inference in UAV-Enabled Low-Altitude Economy Networks via LLM-Enhanced Optimization [61.55616421408666]
Low-Altitude Economy Networks (LAENets) have enabled a variety of applications, including aerial surveillance, environmental sensing, and semantic data collection.<n> onboard vision (VLMs) offer inference for real-time inference but limited onboard dynamic network conditions.<n>We propose a UAV-enabled LAENet system that improves communication efficiency under dynamic LAENet conditions.
arXiv Detail & Related papers (2025-10-11T05:11:21Z) - LLM Meets the Sky: Heuristic Multi-Agent Reinforcement Learning for Secure Heterogeneous UAV Networks [57.27815890269697]
This work focuses on maximizing the secrecy rate in heterogeneous UAV networks (HetUAVNs) under energy constraints.<n>We introduce a Large Language Model (LLM)-guided multi-agent learning approach.<n>Results show that our method outperforms existing baselines in secrecy and energy efficiency.
arXiv Detail & Related papers (2025-07-23T04:22:57Z) - Aerial Secure Collaborative Communications under Eavesdropper Collusion in Low-altitude Economy: A Generative Swarm Intelligent Approach [84.20358039333756]
We introduce distributed collaborative beamforming (DCB) into AAV swarms and handle the eavesdropper collusion by controlling the corresponding signal distributions.
We minimize the two-way known secrecy capacity and maximum sidelobe level to avoid information leakage from the known and unknown eavesdroppers.
We propose a novel generative swarm intelligence (GenSI) framework to solve the problem with less overhead.
arXiv Detail & Related papers (2025-03-02T04:02:58Z) - Aerial Reliable Collaborative Communications for Terrestrial Mobile Users via Evolutionary Multi-Objective Deep Reinforcement Learning [59.660724802286865]
Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications.
This work employs collaborative beamforming through a UAV-enabled virtual antenna array to improve transmission performance from the UAV to terrestrial mobile users.
arXiv Detail & Related papers (2025-02-09T09:15:47Z) - Adaptive Anomaly Detection in Network Flows with Low-Rank Tensor Decompositions and Deep Unrolling [9.20186865054847]
Anomaly detection (AD) is increasingly recognized as a key component for ensuring the resilience of future communication systems.
This work considers AD in network flows using incomplete measurements.
We propose a novel block-successive convex approximation algorithm based on a regularized model-fitting objective.
Inspired by Bayesian approaches, we extend the model architecture to perform online adaptation to per-flow and per-time-step statistics.
arXiv Detail & Related papers (2024-09-17T19:59:57Z) - Enhancing Population-based Search with Active Inference [0.0]
This paper proposes the integration of Active Inference into population-based metaheuristics to enhance performance.
Experimental results indicate that Active Inference can yield some improved solutions with only a marginal increase in computational cost.
arXiv Detail & Related papers (2024-08-18T17:21:21Z) - Secure Hierarchical Federated Learning in Vehicular Networks Using Dynamic Client Selection and Anomaly Detection [10.177917426690701]
Hierarchical Federated Learning (HFL) faces the challenge of adversarial or unreliable vehicles in vehicular networks.
Our study introduces a novel framework that integrates dynamic vehicle selection and robust anomaly detection mechanisms.
Our proposed algorithm demonstrates remarkable resilience even under intense attack conditions.
arXiv Detail & Related papers (2024-05-25T18:31:20Z) - ACE : Off-Policy Actor-Critic with Causality-Aware Entropy Regularization [52.5587113539404]
We introduce a causality-aware entropy term that effectively identifies and prioritizes actions with high potential impacts for efficient exploration.
Our proposed algorithm, ACE: Off-policy Actor-critic with Causality-aware Entropy regularization, demonstrates a substantial performance advantage across 29 diverse continuous control tasks.
arXiv Detail & Related papers (2024-02-22T13:22:06Z) - Diffusion-Based Particle-DETR for BEV Perception [94.88305708174796]
Bird-Eye-View (BEV) is one of the most widely-used scene representations for visual perception in Autonomous Vehicles (AVs)
Recent diffusion-based methods offer a promising approach to uncertainty modeling for visual perception but fail to effectively detect small objects in the large coverage of the BEV.
Here, we address this problem by combining the diffusion paradigm with current state-of-the-art 3D object detectors in BEV.
arXiv Detail & Related papers (2023-12-18T09:52:14Z) - Joint User Association, Interference Cancellation and Power Control for
Multi-IRS Assisted UAV Communications [80.35959154762381]
Intelligent reflecting surface (IRS)-assisted unmanned aerial vehicle (UAV) communications are expected to alleviate the load of ground base stations in a cost-effective way.
Existing studies mainly focus on the deployment and resource allocation of a single IRS instead of multiple IRSs.
We propose a new optimization algorithm for joint IRS-user association, trajectory optimization of UAVs, successive interference cancellation (SIC) decoding order scheduling and power allocation.
arXiv Detail & Related papers (2023-12-08T01:57:10Z) - Value function estimation using conditional diffusion models for control [62.27184818047923]
We propose a simple algorithm called Diffused Value Function (DVF)
It learns a joint multi-step model of the environment-robot interaction dynamics using a diffusion model.
We show how DVF can be used to efficiently capture the state visitation measure for multiple controllers.
arXiv Detail & Related papers (2023-06-09T18:40:55Z) - VRA: Variational Rectified Activation for Out-of-distribution Detection [45.804178022641764]
Out-of-distribution (OOD) detection is critical to building reliable machine learning systems in the open world.
ReAct is a typical and effective technique to deal with model overconfidence, which truncates high activations to increase the gap between in-distribution and OOD.
We propose a novel technique called Variational Rectified Activation (VRA)'', which simulates these suppression and amplification operations using piecewise functions.
arXiv Detail & Related papers (2023-02-23T00:45:14Z) - Asynchronous Bayesian Learning over a Network [18.448653247778143]
We present a practical asynchronous data fusion model for networked agents to perform distributed Bayesian learning without sharing raw data.
Our algorithm uses a gossip-based approach where pairs of randomly selected agents employ unadjusted Langevin dynamics for parameter sampling.
We introduce an event-triggered mechanism to further reduce communication between gossiping agents.
arXiv Detail & Related papers (2022-11-16T01:21:36Z) - Deep Equilibrium Assisted Block Sparse Coding of Inter-dependent
Signals: Application to Hyperspectral Imaging [71.57324258813675]
A dataset of inter-dependent signals is defined as a matrix whose columns demonstrate strong dependencies.
A neural network is employed to act as structure prior and reveal the underlying signal interdependencies.
Deep unrolling and Deep equilibrium based algorithms are developed, forming highly interpretable and concise deep-learning-based architectures.
arXiv Detail & Related papers (2022-03-29T21:00:39Z) - A Model-Based Derivative-Free Approach to Black-Box Adversarial
Examples: BOBYQA [10.667476482648834]
We show that model-based derivative free optimisation algorithms can generate adversarial targeted misclassification of deep networks using fewer network queries than non-model-based methods.
We show that the number of networks queries is less impacted by making the task more challenging either through reducing the allowed $ellinfty$ perturbation energy or training the network with defences against adversarial misclassification.
arXiv Detail & Related papers (2020-02-24T16:23:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.