Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fouri...
详细信息
ISBN:
(纸本)9781467349970
Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fourier Transform(FrFT) was *** experimental results show that FrFT estimation method was not affected by nonstationary time series and has better performance on Hurst *** also verify the improvement in the network traffic anomaly detection.
For affinity propagation algorithm, traditional Euclidean distance measure cannot fully reflect the complex spatial distribution of the data sets. We propose a self-tuning kernel geodesic distance as the similarity me...
详细信息
For affinity propagation algorithm, traditional Euclidean distance measure cannot fully reflect the complex spatial distribution of the data sets. We propose a self-tuning kernel geodesic distance as the similarity measure which can reflect the inherent manifold structure information effectively. Meanwhile, according to the neighborhooddensity of the data sets, it identifies and eliminates the influence of boundary noise effectively, the results show that the improved algorithm has higher accuracy and betterrobustness fordata with manifolddistribution, multi-scale and noise overlap.
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than o...
详细信息
ISBN:
(纸本)9781467327626
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than other users. In order to improve the system's security, a novel physical layer security algorithm based on cooperative jamming for multiuser MIMO system is proposed in this paper. Firstly, a multi-user MIMO system of security is established, combining transmit beamforming and artificial noise. Then, the status of each user's characteristics is describedrespectively. And users are divided into a secure communications group and interference group for scheduling according to the characteristics of the user's state. Further, interference group assists the base station interference eavesdropper by adjusting the beamforming weights. Simulation results show that the proposed algorithm can increase the secrecy capacity by 2.4bit/s/HZ averagely, which can improve security for multi-user MIMO system.
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private infor...
详细信息
ISBN:
(纸本)9781467327626
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFdM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures ar...
详细信息
ISBN:
(纸本)9781467327626
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures are fast matched based on Transformation distance, and then an asymmetric technique is used to obtain the longest same sub-sequence anddetect video copies. Experimental results show that the method has goodrobustness anddistinctiveness.
The wireless microphone network is an important PU network for CrN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utiliz...
详细信息
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a s...
详细信息
ISBN:
(纸本)9781467327626
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a string and a low mismatch rate at the same time because of the static quantization method. In this paper we first propose an adaptive quantization algorithm formed of an quantizer offset with the quantization noise at one side and a quantization-level optimizing method, which maximize the length of secret bit string under the constraint of mismatch rate. Based on this algorithm, a key agreement scheme selection approach is presented to harvest longer bit strings. As a result, an adaptive key generation scheme based on quantization of channel characteristics is proposed using the above methods. With this scheme, bit strings with length close to theoretical limit can be generated, and the mismatch rate is lower than 5%.
Poor error-tolerance and polynomial taps restriction are the main issues of Walsh Hadamard Transform estimation method. This article is devoted to these issues and a novel soft fast PN sequence estimation algorithm ba...
详细信息
ISBN:
(纸本)9781467327626
Poor error-tolerance and polynomial taps restriction are the main issues of Walsh Hadamard Transform estimation method. This article is devoted to these issues and a novel soft fast PN sequence estimation algorithm based on weighting Walsh Hadamard Transform is proposed. Firstly, the theoretical analysis about error-tolerance likelihood bound of sequence hard-decision andrestrictive factor of estimation polynomial taps is performed. Based on the analysis, the sequence soft information is introduced into sequence frequency-coefficient to improve estimation performance, and the Walsh Hadamard matrix is column-weighted to change its binary property, which can decrease the influence of polynomial taps to estimation performance. Meanwhile, the sequence control state is chosen to decrease the estimation polynomial taps in essence. Simulation results illustrate that our proposed method is irrelevant with the order and tap of generation polynomial and can yield a performance gain of more than 1.5dB compared to WHT.
Cognitive radio Network is an effective technology and a hot research direction which can solve the problem of deficient resource andrevolutionize utilization. And its safety technology attracts more and more researc...
详细信息
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomize...
详细信息
ISBN:
(纸本)9781467327626
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Ourresults show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.
暂无评论