Journal on Communications ›› 2014, Vol. 35 ›› Issue (12): 178-189.doi: 10.3969/j.issn.1000-436x.2014.12.021
• Correspondences • Previous Articles Next Articles
Zhi-jiang XU1,Xiao LING1,Kang WANG2,Li-min MENG1
Online:
2014-12-25
Published:
2017-06-17
Supported by:
Zhi-jiang XU,Xiao LING,Kang WANG,Li-min MENG. Structure and performance analysis of binary differential stochastic process shift keying[J]. Journal on Communications, 2014, 35(12): 178-189.
[1] | 赵旦峰, 朱铁林, 薛睿 . 隐蔽通信中的 Turbo 码并行译码[J]. 应用科学学报, 2012,30(5):461-465. ZHAO D F , ZHU T L , XUE R . Parallel decoding of Turbo codes in covert communications[J]. Journal of Applied Sciences, 2012,30(5):461-465. |
[2] | DASTOOR S K , PATEL V . A novel Android based mobile application as a virtue of covert communication for concealing information in the Speech signal[A]. Emerging Technology Trends in Electronics,Com-munication and Networking (ET2ECN),2012 1st International Con-ference[C].IEEE, 2012.1-6. |
[3] | LING J , HE H , LI J ,et al. Covert underwater acoustic communica-tions:transceiver structures,waveform designs and associated per-formances[A]. OCEANS 2010[C].IEEE, 2010.1-10. |
[4] | LIU S , QIAO G , ISMAIL A ,et al. Covert underwater acoustic com-munication using whale noise masking on DSSS signal[J]. OCEANS-Bergen,2013 MTS/IEEE[C].IEEE, 2013.1-6. |
[5] | STIAN A . Detection Theoretical Approach to Digital Communica-tions Using Autoregressive Process Shift Keying[D]. Norway Troms University 2000. |
[6] | RUSCH L A , POOR H V . Narrowband interference suppression in CDMA spread spectrum communications[J]. IEEE Transaction on Communications, 1994,42(234):1969-1979. |
[7] | RABADAN J A , PEREZ S T , PEREZ R ,et al. Wireless optical spread spectrum communications data security improvement in wireless links[A]. 39th Annual 2005 International Carnahan Conference Secu-rity Technology[C]. 2005.168-170. |
[8] | NARAYANAN R , CHUANG J . Covert communications using het-erodyne correlation random noise signals[J]. Electronics Letters, 2007,43(22):9944698. |
[9] | SUSHCHIK M M , TSIMRING L S , VOLKOVSKII A R . Correlation detection in chao-based spread spectrum communication schemes[A]. Control of Oscillations and Chaos Proceedings,2000 2nd International Conference,IEEE[C]. 2000.526-529. |
[10] | LEE C , WILLIAMS D B , LEE J . A secure communications system using chaotic switching[J]. International Journal of Bifurcation and Chaos, 1997,7(6):1383-1394. |
[11] | FREY D R . Chaotic digital encoding:an approach to secure commu-nication[J]. Circuits and Systems II:Analog and Digital Signal Proc-essing,IEEE Transactions, 1993,40(10):660-666. |
[12] | DEDIEU H , KENNEDY M P , HASLER M . Chaos shift keying:modu-lation and demodulation of a chaotic carrier using self-synchronizing chua's circuits[J]. Circuits and Systems II:Analog and Digital Signal Processing,IEEE Transaction, 1993,40(10):634-642. |
[13] | YANG T , CHUA L O . Secure communication via chaotic parameter modulation[J]. Circuits and Systems I:Fundamental Theory and Ap-plications,IEEE Transactions, 1996,43(9):817-819. |
[14] | SCHIMMING T. , HASLER M. , Optimal detection of differential chaos shift keying[J]. Circuits and Systems I:Fundamental Theory and Applications,IEEE Transactions, 2000,47(12):1712-1719. |
[15] | RAAJAN N R , KARTHIKEYAN K , MALLIGARAJ M . Chaos based shift keying for covert communication[A]. Power and Computing Technologies (ICCPCT),2013 International Conference[C]. 2013.1023-1027. |
[16] | SAVACI F A , YALCIN M E , GUZELIS C . Steady-state analysis of nonlinearly coupled Chua's circuit with periodic input[J]. Int J Bifur-cation Chaos, 2003,13(11):3395-3407. |
[17] | SALBERG A B , HANSSEN A . Secure digital communications by means of stochastic process shift keying[A]. Conference Record of the Thirty-Third Asilomar Conference on[C]. 1999.1523-1527. |
[18] | SALBERG A B , HANSSEN A . A novel modulation method for secure digital communications[A]. Statistical Signal and Array Processing,Proceeding of the Tenth IEEE Workshop[C]. 2000.650-654. |
[19] | CEK M E , SAVACI F A . Stable non-Gaussian noise parameter modu-lation in digital communication[J]. Electronics Letters, 2009,45(24):1256-1257. |
[20] | HUA J Y , ZHAO X M , XU Z J ,et al. An adaptive Doppler shift esti-mator in mobile communication system[J]. IEEE Antennas and Wire-less Propagation Letters, 2007,6:117-121. |
[21] | 赵春晖, 杨伟超, 马爽 . 基于广义二阶循环统计量的通信信号调制识别研究[J]. 通信学报, 2011,32(1):144-150. ZHAO C H , YANG W C . Research on communication signal modula-tion recognition haled an the generalized second-order cyclic statis-tics[J]. Journal on Communications, 2011,32(1):144-150. |
[22] | GONZALEZ J G , PAREDES J L , ARCE G R . Zero-order statistics:a mathematical framework for the processing and characterization of very impulsive signals[J]. IEEE Transactions on Signal Processing,, 2006,54(10):3839-3851. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN. Membership inference attack and defense method in federated learning based on GAN [J]. Journal on Communications, 2023, 44(5): 193-205. |
[3] | Zaijian WANG, Huimin GU. Network slicing resource allocation strategy based on joint optimization [J]. Journal on Communications, 2023, 44(5): 234-245. |
[4] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[5] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[6] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[7] | Helin SUN, Hongyuan GAO, Yanan DU, Jianhua CHENG, Yapeng LIU. Joint estimation method of target number and orientation parameters for FDA-MIMO radar [J]. Journal on Communications, 2023, 44(2): 41-51. |
[8] | Yuan XIE, Tao1 ZOU, Weijun SUN, Shengli XIE. Algorithm of underdetermined convolutive blind source separation for high reverberation environment [J]. Journal on Communications, 2023, 44(2): 82-93. |
[9] | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG. HDFS-oriented cryptographic key resource control mechanism [J]. Journal on Communications, 2022, 43(9): 27-41. |
[10] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[11] | Tuofeng LEI, Shuyan NI, Naiping CHENG, Xin SONG. SCMA codebooks design for Rayleigh fading channel [J]. Journal on Communications, 2022, 43(4): 107-113. |
[12] | Haili SUN, Xiang LONG, Lansheng HAN, Yan HUANG, Qingbo LI. Overview of anomaly detection techniques for industrial Internet of things [J]. Journal on Communications, 2022, 43(3): 196-210. |
[13] | Bin LI, Xiaojie CHEN, Feng FENG, Qinglei ZHOU. FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber [J]. Journal on Communications, 2022, 43(2): 196-207. |
[14] | Xumin HUANG, Yang ZHANG, Rong YU, Li JIANG, Hui TIAN, Yuan WU. Stackelberg game based energy optimization for unmanned aerial vehicle assisted wireless-powered Internet of things [J]. Journal on Communications, 2022, 43(12): 146-156. |
[15] | Lian XIANG, Hongfeng PAN, Shulin JIN, Weidong SHAO. Research on inter-core crosstalk characteristics of real multi-core fibers with multi-core excitation [J]. Journal on Communications, 2022, 43(11): 233-241. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|