Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (7): 42-48.doi: 10.11959/j.issn.2096-109x.2016.00072
• Academic paper • Previous Articles Next Articles
Revised:
2016-07-02
Online:
2016-07-15
Published:
2020-03-26
CLC Number:
Ya-chong XU,Dong-wei HU. On the coding rate for differential modulation and detections[J]. Chinese Journal of Network and Information Security, 2016, 2(7): 42-48.
[1] | 陈文龙 . 高动态多进制扩频系统的关键技术研究[D]. 西安: 西安电子科技大学, 2009. |
CHEN W L . Study of key technology of high dynamic multi-band spread spectrum system[D]. Xi'an: Xidian University, 2009. | |
[2] | 胡东伟, 陈杰, 石寅, 等. BPSK调制高动态遥测接收机的设计[J]. 电子科技大学学报 2011,40(5):691-696. |
HU D W , CHEN J , SHI Y , et al. Design of BPSK modulate high dynamic telemetry receiver[[J]. Journal of University of Electronic Science and Technology, 2011,40(5):691-696. | |
[3] | 胡东伟, 王力男, 王永超 . 一种基于并行导频的短突发传输方法[J]. 无线电通信技术, 2015,41(6):50-53. |
HU D W , WANG L N , WANG Y C . A transmitting method based on parallel pilot short burst[J]. Wireless Communication Technology, 2015,41(6):50-53. | |
[4] | 沈连丰, 叶芝慧 . 信息论与编码[M]. 北京: 科学出版社, 2014:146-148. |
SHEN L F , YE Z H . Information theory and coding[M]. Beijing: Science Press, 2014:146-148. | |
[5] | 杨志敏 . 逼近香农限的检测解码算法与差错控制技术研究[D]. 杭州: 浙江大学, 2009. |
YANG Z M . Research approaching shannon limit of detection code algorithm and error control technology[D]. Hangzhou: Zhejiang University, 2009. | |
[6] | LIANG C L , MA X , ZHUANG Q T , et al. Spatial coupling of generator matrices:a general approach to design good codes at a target BER[J]. IEEE Transmition On Communication, 2014,62(12): 4211-4219. |
[7] | MARVIN K . Probability distributions involving gaussian random variables:a handbook for engineers and scientists[M]. Berlin: Springer, 2006:49. |
[8] | 李博纳, 赵新泉 . 概率论与数理统计[M]. 北京: 高等教育出版社, 2006:81. |
LI B N , ZHAO X Q . Probability and mathematical statistics[M]. Beijing: Higher Education Press, 2006:81. | |
[9] | 王新梅, 肖国镇 . 纠错码——原理与方法[M]. 西安: 西安电子科技大学出版社, 2001:413. |
WANG X M , XIAO G Z . Error correcting code,principles and methods[M]. Xi'an: Xidian University Press, 2001:413. | |
[10] | TOMLINSON M , RG'H'EFF M . A quasi coherent spread spectrum decoder for satellite communications using a low rate convolutional code[J]. IEEE the 4th International Symposium on Spread Spectrum Techniques and Applications, 1996(2):570-574. |
[11] | 王晓涛, 刘振华 . 基于可信位置排序的咬尾卷积码译码算法[J]. 电子与信息学报 2015,37(7):1575-1579. |
WANG X T , LIU Z H . Biting tail convolution code decoding algo-rithm based on trusted position sort[J]. Journal of Electronics & In-formation Technology, 2015,37(7):1575-1579. | |
[12] | WANG X T , QIAN H , XIANG W D , et al. An efficient ML decoder for tail-biting codes based on circular trap detection[J]. IEEE Transmition On Communication, 2013,61(4): 1212-1221. |
[13] | 3GPP TS 25.212.Multiplexing and channel coding(FDD)[S]. 1999. |
[14] | 胡东伟 . 极低码率Turbo及其应用[J]. 无线电工程, 2014,44(12): 1-3. |
HU D W . Very low bit rate Turbo and its application[J]. Radio En-gineering of China, 2014,44(12): 1-3. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|