Zobrazeno 1 - 10
of 1 490
pro vyhledávání: '"wiretap channel"'
Autor:
Yuki Kuraya, Hideki Ochiai
Publikováno v:
IEEE Open Journal of Vehicular Technology, Vol 5, Pp 1336-1347 (2024)
We propose a new physical layer security scheme for a wiretap channel in polar-coded OFDM-based wireless communication systems. Our approach is based on the adaptive bit channel selection, where the input bit channels of polar code are selected accor
Externí odkaz:
https://doaj.org/article/6580c992562440929e1684bc9225fb52
Publikováno v:
Entropy, Vol 26, Iss 8, p 651 (2024)
Relay channels capture the essence of several important communication scenarios such as sensor network and satellite communication. In this paper, first, we propose an efficient coding scheme for an additive white Gaussian noise (AWGN) relay channel
Externí odkaz:
https://doaj.org/article/28b3fcb4b2434e769fd6dbed617fdfd3
Publikováno v:
ICT Express, Vol 9, Iss 4, Pp 728-733 (2023)
Deep learning (DL) has exhibited great potential in communication systems. Recent advances in DL-based physical-layer techniques have shown that the communication system can be modeled as an autoencoder (AE), which performs end-to-end learning tasks.
Externí odkaz:
https://doaj.org/article/8513a676e21644708321bb0a2f95d4ec
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
New Journal of Physics, Vol 26, Iss 4, p 043015 (2024)
Transmission losses through optical fibers are one of the main obstacles preventing both long-distance quantum communications and continuous-variable quantum key distribution. Optical amplification provides a tool to obtain, at least partially, signa
Externí odkaz:
https://doaj.org/article/4292e8bb75134df6aa463836a0af3992
Publikováno v:
Entropy, Vol 25, Iss 12, p 1626 (2023)
This paper studies the performance of location-based beamforming with the presence of artificial noise (AN). Secure transmission can be achieved using the location information of the user. However, the shape of the beam depends on the number of anten
Externí odkaz:
https://doaj.org/article/297c8b9d96404d7b926d48b75fb338b6
Autor:
Madhura Pathegama, Alexander Barg
Publikováno v:
Entropy, Vol 25, Iss 11, p 1515 (2023)
The action of a noise operator on a code transforms it into a distribution on the respective space. Some common examples from information theory include Bernoulli noise acting on a code in the Hamming space and Gaussian noise acting on a lattice in t
Externí odkaz:
https://doaj.org/article/1eb8b146b45743ce87d325acdc474401
Autor:
Morteza Shoushtari, Willie Harrison
Publikováno v:
Entropy, Vol 25, Iss 10, p 1456 (2023)
Nested linear coding is a widely used technique in wireless communication systems for improving both security and reliability. Some parameters, such as the relative generalized Hamming weight and the relative dimension/length profile, can be used to
Externí odkaz:
https://doaj.org/article/1c771c39b4d5429da2c28ea417ccff88
Publikováno v:
Entropy, Vol 25, Iss 10, p 1397 (2023)
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap ch
Externí odkaz:
https://doaj.org/article/cc4d4ce386614ce4a42a1f96d3a21172
Publikováno v:
Entropy, Vol 25, Iss 9, p 1339 (2023)
For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for s
Externí odkaz:
https://doaj.org/article/99f2be9e10be490fad5975bfe16565ad