Computer Science ›› 2018, Vol. 45 ›› Issue (10): 64-68.doi: 10.11896/j.issn.1002-137X.2018.10.013
Special Issue: Network and communication
• Network & Communication • Previous Articles Next Articles
GAO Bao-jian, WANG Shao-di, REN Yu-hui, WANG Yu-jie
CLC Number:
[1]BARENGHI A,BREVEGLIERI L,KOREN I,et al.Fault Injection Attacks on Cryptographic Devices:Theory,Practice,and Countermeasures[J].Proceeding of The IEEE,2012,100(11):3056-3076. [2]MU P C,YIN Q Y,WANG W J.A Security Method of Physical Layer Transmission Using Random Antenna Arrays in Wireless Communication[J].Journal of Xi’an Jiaotong University,2010,44(6):62-66.(in Chinese) 穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. [3]LIN T,HUANG K Z,LUO W Y.A Multicarrier-based Physical Layer Security Scheme for the Multicast Systems[J].Journal of Electronics and Information Technology,2013,35(6):1388-1343.(in Chinese) 林通,黄开枝,罗文宇.一种基于多载波的多播系统物理层安全方案[J].电子与信息学报,2013,35(6):1338-1343. [4]LI M L,HUANG K Z,ZHONG Z.Physical-layer Security Algorithm Based on Joint Scrambling with Spatial and Frequency Resource[J].Journal of Electronics and Information Technology,2013,35(12):2966-2971.(in Chinese) 李明亮,黄开枝,钟州.基于空频联合加扰的物理层安全算法[J].电子与信息学报,2013,35(12):2966-2971. [5]LIU Y,WANG G P,XIAO M,et al.Spectrum Sensing and Throughput Analysis for Cognitive Two-Way Relay Networks with Multiple Transmit Powers[J].IEEE Journal on Selected Areas in Communications,2016,34(11):3038-3047. [6]JIANG H Q,TANG P Z,GUAN W S.Research on Signal Modu- lation Recognition Technology Based on PDW[J].Transactions of Beijing Institute of Technology,2013,33(11):1183-1188.(in Chinese) 江海清,唐浦钊,关文硕.基于脉冲描述字的信号调制识别技术研究[J].北京理工大学学报,2013,33(11):1183-1188. [7]ALI A,FAN Y,SHU L.Automatic Modulation Classification of Digital Modulation Signals with Stacked Autoencoders[J].Digi-tal Signal Processing,2017,71:108-116. [8]MAREY M,DOBRE O A,INKOL R.Blind STBC Identification for Multiple-Antenna OFDM Systems[J].IEEE Transactions on Communications,2014,62(5):1554-1567. [9]CHORTI A.Masked OFDM:A Physical Layer Encryption for Future OFDM Applications[C]∥IEEE Globecom Workshop on Mobile Computing and Emerging Communication Networks.2010:1254-1258. [10]GAO B J,WANG Y J,LUO Y L,et al.A Hiding Algorithm for OFDM Constellation Mapping Based on Physical Layer Encryption[J].Journal of Applied Sciences,2013,13(18):3790-3797. [11]LIU B,ZHANG L,XIN X,et al.Constellation-masked Secure Communication Technique for OFDM-PON[J].Optics Express,2012,20(22):25161. [12]BASAR B.On Multiple-Input Multiple-Output OFDM with Index Modulation for Next Generation Wireless Networks[J].IEEE Transactions on Signal Processing,2016,64(15):3868-3878. [13]ZHENG B,CHEN F,WEN M,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Communications Letters,2015,19(11):1893-1896. [14]YOU L,GAO X,SWINDLEHURST A L,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Transactions on Signal Processing,2016,64(6):1461-1476. [15]GORCIN A,ARSLAN H.An OFDM Signal Identification Meth- od for Wireless Communications Systems[J].IEEE Transactions on Vehicular Technology,2015,64(12):5688-5700. |
[1] | ZHAO Geng, SONG Xin-yu, MA Ying-jie. Secure Data Link of Unmanned Aerial Vehicle Based on Chaotic Sub-carrier Modulation [J]. Computer Science, 2022, 49(3): 322-328. |
[2] | FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346. |
[3] | TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232. |
[4] | ZHOU Hui-ting, ZHOU Jie. Simulation and Analysis on Improved NC-OFDM Algorithm [J]. Computer Science, 2020, 47(10): 263-268. |
[5] | XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149. |
[6] | ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101. |
[7] | JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64. |
[8] | CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269. |
[9] | WANG Lu, BAI Guang-wei, SHEN Hang, WANG Tian-jing. Spectrum-aware Secure Opportunistic Routing Protocol in Cognitive Radio Networks [J]. Computer Science, 2018, 45(10): 166-171. |
[10] | ZHANG Yang, ZHAO Hang-sheng and ZHAO Xiao-long. Energy-efficient Design under Imperfect Condition Based on Spectrum Prediction [J]. Computer Science, 2017, 44(Z6): 258-262. |
[11] | ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian. LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks [J]. Computer Science, 2017, 44(7): 89-93. |
[12] | ZHAO Cheng, HAO Yin-yin, HUA Jing-yu, YAO Xin-wei and WANG Wan-liang. Subcarrier Pairing Strategy for Energy Efficiency Optimization in Cognitive Radio [J]. Computer Science, 2017, 44(6): 108-113. |
[13] | HAN Jie, SONG Xiao-qin, DONG Li and JIN hui. Suboptimal Dynamic Resource Allocation Algorithm in OFDM Based Cognitive Radio Network [J]. Computer Science, 2017, 44(5): 48-52. |
[14] | ZHANG Hai-chuan and LEI Ying-ke. Blind Estimation Method for OFDM Parameter Based on Symbol Kurtosis [J]. Computer Science, 2017, 44(4): 207-212. |
[15] | ZHANG Hai-chuan and LEI Ying-ke. Identification Method for OFDM Signal Based on MUSIC Algorithm [J]. Computer Science, 2017, 44(3): 114-117. |
|