Computer Science ›› 2019, Vol. 46 ›› Issue (6): 168-173.doi: 10.11896/j.issn.1002-137X.2019.06.025
Previous Articles Next Articles
PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you
CLC Number:
[1]WYNER A D.The wire-tap channel [J].The Bell System Technical Journal,1975,54(8):1355-1387. [2]ZHOU L.Research on Physical Layer Security of Cognitive Radio Based on Cooperative Communication[C]∥2015 Sixth International Conference on Intelligent Systems Design and Enginee-ring Applications.Guiyang:IEEE Press,2015:661-664. [3]LI L,PETROPULU A P,CHEN Z,et al.Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference [J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1433-1448. [4]WANG L,TEH K C,LI K H.Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks [J].IEEE Transactions on Information Forensics and Security,2017,12(6):1470-1482. [5]HU L,WEN H,WU B,et al.Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks[J].IEEE Communications Letters,2017,21(3):524-527. [6]ZHANG Q,GAO Y,ZANG G,et al.Physical layer security for cooperative communication system with untrusted relay based on jamming signals[C]∥2015 International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-4. [7]YANG Y,CHEN J,HUANG Y,et al.Secure Transmission of Wireless Relaying Systems with Jammer and Multiple-User Selection[J].IEEE Access,2017,5:8771-8779. [8]LONG H,WANG J,ZHANG Y Y,et al.Cooperative Jamming Technique:Proposal,Survey and Future[J].Telecommunications Science,2013,29(1):109-114.(in Chinese) 龙航,王静,张月莹,等.协作干扰技术的提出、现状和未来展望[J].电信科学,2013,29(1):109-114. [9]HAYKIN S.Adaptive Filter Theory[M].Upper Saddle River:Prentice Hall,2002:325-415. [10]WIDROW B,GOODLIN R C.Adaptive noise canceling:principles and applications[J].Proceedings of the IEEE,1975,63(12):1692-1716. [11]HUANG B.Performance Analysis of NCLMS-based PCMA [C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1375-1378. [12]ARIF M,NASEEM I,MOINUDDIN M,et al.Adaptive noise cancellation using q-LMS[C]∥2017 International Conference on Innovations in Electrical Engineering and Computational Technologies.Karachi:IEEE Press,2017:1-4. [13]LIU J,QUAN H,LI Z,et al.Digital Nonlinear Self-Interference Cancellation Based on LMS-Volterra Algorithm[C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1298-1302. [14]GORRIZ J M,RAMIREZ J,CRUCES-ALVAREZ,et al.A Novel LMS Algorithm Applied to Adaptive Noise Cancellation[J].IEEE Signal Processing Letters,2009,16(1):34-37. [15]JIN J,WANG X,YU Y B,et al.Adaptive De-noising Method of Ballistocar diogram Based on Orthogonal Wavelet Transform[J].Computer Science,2010,37(8):232-235.(in Chinese) 金晶晶,王旭,于艳波,等.基于正交小波变换的心冲击图自适应去噪方法[J].计算机科学,2010,37(8):232-235. [16]PANDA S,MOHANTY M N.Performance analysis of LMS based algorithms used for impulsive noise cancellation[C]∥2016 International Conference on Circuit,Power and Computing Technologies.Nagercoil:IEEE Press,2016:1-4. [17]PROAKIS J G.Digital Communications (Fifth Edition)[M].New York:McGraw-Hill,2007:101-103. [18]LI B,LIANG T.Cooperative jamming secure scheme for un-trusted full-duplex relay system[C]∥2016 2nd IEEE International Conference on Computer and Communication (ICCC).Chengdu:IEEE Press,2016:2328-2331. [19]LV L,CHEN J,YANG L,et al.Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J].IET Communication,2017,11(3):393-399. [20]HE B,SHE Y,LAU V K N.Artificial Noise Injection for Securing Single-Antenna Systems[J].IEEE Transactions on Vehicular Technology,2017,66(10):9577-9581. |
[1] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[2] | CHEN Pei-pei, LI Tao-shen, FANG Xing, WANG Zhe. Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System [J]. Computer Science, 2020, 47(6): 316-321. |
[3] | XI Chen-jing,GAO Yuan-yuan,SHA Nan. Performance Study on Constellation Obfuscation Design Method for Physical Layer Security [J]. Computer Science, 2020, 47(3): 304-311. |
[4] | TIAN Xian-zhong, YAO Chao, ZHAO Chen, DING Jun. 5G Network-oriented Mobile Edge Computation Offloading Strategy [J]. Computer Science, 2020, 47(11A): 286-290. |
[5] | JI Bao-feng, WANG Yi-dan, XING Bing-bing, LI Yu-qi, GAO Hong-feng, HAN Cong-cheng. Enhancement Method of Throughput in Ultra-dense Network Based on Hierarchical Multi-hop Physical Layer Network Coding [J]. Computer Science, 2019, 46(7): 56-60. |
[6] | CHENG Zhen, ZHAO Hui-ting, ZHANG Yi-ming, LIN Fei. Bit Error Rate Analysis of Diffusion-based Multicast Molecular Communication Networks [J]. Computer Science, 2019, 46(11): 80-87. |
[7] | LU Ming-yue, GUO Dao-xing and NIU He-hao. New Physical Layer Network Coding Denoising Mapping Algorithm Based on MQAM [J]. Computer Science, 2017, 44(Z6): 284-287. |
[8] | LIU Chun-ling and ZHANG Zi-hao. Performance Analysis of Beidou Receiver under Interference [J]. Computer Science, 2017, 44(2): 163-170. |
[9] | TIAN Xin-ji and LU Jing. Improved Interference Cancellation Method over X Channel [J]. Computer Science, 2015, 42(5): 157-159. |
[10] | ZHANG Xiao-rong, WU Cheng-mao and LI Wen-xue. Method of Constructing Spread-spectrum Code Based on Chaos and Self-coded [J]. Computer Science, 2015, 42(3): 42-46. |
[11] | ZHOU Lu-na, LIU Feng and ZENG Lian-sun. Research on Degrees of Freedom of Two PTP Networks Coexistence [J]. Computer Science, 2015, 42(1): 110-112. |
[12] | SHEN Hu,LV Shao-he,WANG Xiao-dong and ZHOU Xing-ming. Distributed Collision-resolvable MAC Protocol for Wireless LANs with Interference Cancellation Support [J]. Computer Science, 2014, 41(12): 60-66. |
[13] | YUAN Xiao-gang,HUANG Guo-ce,,LIU Jian,GUO Xing-yang. Adaptive FH Cosite Interference Cancellation Using Laguerre Filter [J]. Computer Science, 2009, 36(11): 93-96. |
|