For protecting millimeter wave (mmWave) communications from clone attacks, this paper employs the deep learning to propose a physical layer authentication (PLA) approach for detecting attackers and classifying multipl...
详细信息
The main geolocation technology currently used in COSPAS-SARSAT system is TDOA/FDOA or three-star TDOA,the principle is to determine the location of the signal source by using the difference in arrival time and freque...
详细信息
The main geolocation technology currently used in COSPAS-SARSAT system is TDOA/FDOA or three-star TDOA,the principle is to determine the location of the signal source by using the difference in arrival time and frequency of the wireless signal between different ***,ground monitoring stations need to be equipped with more than two antenna receiving stations,and multiple satellites should be able to simultaneously relay the distress signal from the target source in order to achieve the geolocation ***,when the ground receiving system has only one antenna receiving station,or the target source is in a heavily obscured environment,the ground side is unable to receive the forwarded signals from multiple satellites at the same time,which will make it impossible to *** address these problems,in this paper,a time-sharing single satellite geolocations method based on different orbits is proposed for the first *** method uses one or several low-earth orbit satellites(LEO)and mediumearth orbit satellites(MEO)in the visible area,and the receiving station only needs one pair of receiving antennas to complete the *** can effectively compensate for the shortcomings of the traditional TDOA using the same moment and have better positioning accuracy compared with the single satellite in the same *** to the limited experimental conditions,this paper tests the navigation satellite using different orbit time-sharing single satellite geolocations,and proves that the positioning method has high positioning accuracy and has certain promotion and application value.
To solve the increasing complexity with the growth of solution sets number in PESA, we present a comentropy-based PESA algorithm (C-PESA), which is an evolutionary algorithm of multi-objective optimization. In C-PESA,...
详细信息
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired...
详细信息
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.
We theoretically study the phase sensitivities of two different phase-shift configurations in an SU(1,1)interferometer with coherent■squeezed vacuum *** to quantum Cramér-Rao theorem,we analytically obtain the u...
详细信息
We theoretically study the phase sensitivities of two different phase-shift configurations in an SU(1,1)interferometer with coherent■squeezed vacuum *** to quantum Cramér-Rao theorem,we analytically obtain the ultimate phase sensitivities for two types of phase shift accumulating in one-and *** with the case of one-arm phase shift,the model with phase shift encoding in both arms may provide a better sensitivity when the strength of squeezed vacuum state is large ***,we discuss the achievable sensitivities with the homodyne measurement by invoking of error-propagation *** addition,we study the effect of internal and outernal photon losses on the phase sensitivity of the SU(1,1)interferometer and find that the unbalanced interferometer is helpful to improve precision even with high external losses.
Cloud computing plays a significant role in big data era since it can provide dynamic, scalab.e virtual resource services via the Internet. However, how to enhance the security level of cloud computing is a challengin...
详细信息
ISBN:
(纸本)9781509045006
Cloud computing plays a significant role in big data era since it can provide dynamic, scalab.e virtual resource services via the Internet. However, how to enhance the security level of cloud computing is a challenging issue which is urgently to be tackled. In this paper, we center on the data security in cloud computing and present an attribute based proxy re-encryption scheme with keyword search (ABPRE-KS) to provide flexible and secure data sharing among users in the cloud. In our scheme, a user's access privileges are described by an access structure consisting of several attributes while ciphertexts are lab.led by several target attributes. A delegator can transform the original ciphertexts into proxy ciphertexts encrypted by the delegatee's attributes without leaking any sensitive information to the cloud server. Besides, a search request on the ciphertexts is allowed by a delegatee if his credentials satisfy the delegatee's access policy. By security analysis, our ABPRE-KS is confidential and keyword semantic secure under BDBH assumption.
Dissemination and update of the code image plays an important role in application of the Internet of Things (IoT). As a part of the IoT, wirelesssensornetworks should provide the code dissemination. The commonly use...
详细信息
Non-independent networking of 5G NSA (Non-Standalone) is receiving wide attention. This paper considers an NSA architecture in which a 4G base station is used as the primary station and a newly deployed 5G base statio...
详细信息
In this paper, based on the feedback free distributed video coding system, a rate control algorithm was proposed for Wyner-Ziv frames. First, calculate the maximum correlation of coefficient band level between the sou...
详细信息
Non-deterministic polynomial (NP)-complete problems are collections of intractable problems for classical computers, but they may be easier to solve for quantum computers. Considering that practical quantum computers ...
详细信息
暂无评论