Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons...
详细信息
A Ka-band quasi-elliptic bandpass filter (BPF) based on stereolithography apparatus (SLA) 3-D printing technique is proposed. The filter consists of four coupled resonators with three direct couplings between adjacent...
详细信息
MIMO technology has been widely used in the telecommunication systems nowadays, and the space-time coding is a key part of MIMO technology. A good coding scheme can exploit the spatial diversity to correct the error w...
详细信息
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c...
详细信息
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c...
详细信息
In the 5th Generation Mobile communicationtechnology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink control Informa...
详细信息
In the field of signal modulation classification, deep neural networks (DNNs) perform very well and have good generalization ability. However, the DNN model is extremely vulnerable. The model gives a false output with...
详细信息
In the field of signal modulation classification, deep neural networks (DNNs) perform very well and have good generalization ability. However, the DNN model is extremely vulnerable. The model gives a false output with high confidence from an input example, which formed only by deliberately adding tiny disturbances. Such elaborate examples that make the model misclassify are called adversarial examples. In this paper, for the detection of adversarial examples in electromagnetic signals, we propose a method based on generative adversarial networks (GANs), a novel strategy to defend deep neural networks against such attacks. First of all, by experiment we came to the conclusion that the confidence of the DNN model for normal examples is stable, and the confidence for adversarial examples is unstable. We trained a classifier that performs well in extracting electromagnetic signal features. Then, We feed the normal examples to the generative adversarial network, the generator generates examples with similar data distribution to the clean examples. We send such pairs of examples to the classifier to calculate a threshold T, and the same operations will be performed on the test examples. Finally, the absolute error E of each pair of test examples will be calculated and compared with the threshold T to achieve electromagnetic signal adversarial examples detection. We define the method in the paper as Detect-GAN. The experimental results show that Detect-GAN can effectively defend against common and powerful attack algorithm. Comparing with other detection methods, Detect-GAN achieves more competitive performance.
This paper centers around the examination of a downlink system comprising of a base station (BS) located at the center of a circular cell. Within this cell, we find cache-equipped users uniformly distributed. Our aim ...
This paper centers around the examination of a downlink system comprising of a base station (BS) located at the center of a circular cell. Within this cell, we find cache-equipped users uniformly distributed. Our aim is to explore an innovative approach to enhance spectral efficiency by dividing the users into two groups, effectively utilizing the principles of nonorthogonal multiple access (NOMA) and coded caching. Introducing the NOMA over coded caching scheme, we propose a novel method to elevate the service rate. We derive closedform expressions to accurately quantify the performance of NOMA over coded caching in terms of the service rate. Simulation experiments are conducted to validate the superiority of our proposed algorithm. The results demonstrate the remarkable efficacy of the NOMA over coded caching schemes in significantly improving the service rate, surpassing the conventional coded caching and non-encoding caching schemes.
Aiming at the problem of 'singularity' generated by the traditional DTW matching algorithm, the DDTW matching algorithm is used to match the geomagnetic sequence, and the first derivative of the sequence is co...
详细信息
The traditional algorithm of cross-ambiguity function requires a large amount of computation and storage capacity, which brings difficulties to real-time processing. In addition, the long-integration time will cause r...
详细信息
暂无评论