Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection sch...Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection schemes with weighting factors for unsourced multiple access. First, we introduce bidirectional weighting factors in the extrinsic information passing process between the multi-user detector based on belief propagation (BP) and the LDPC decoder. Second, we incorporate bidirectional weighting factors in the message passing process between the MAC nodes and the user variable nodes in BP- based multi-user detector. The proposed schemes select the optimal weighting factors through simulations. The simulation results demonstrate that the proposed schemes exhibit significant performance improvements in terms of block error rate (BLER) compared to traditional schemes. .展开更多
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ...Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.展开更多
The extra-large scale multiple-input multiple-output(XL-MIMO)for the beyond fifth/sixth generation mobile communications is a promising technology to provide Tbps data transmission and stable access service.However,th...The extra-large scale multiple-input multiple-output(XL-MIMO)for the beyond fifth/sixth generation mobile communications is a promising technology to provide Tbps data transmission and stable access service.However,the extremely large antenna array aperture arouses the channel near-field effect,resulting in the deteriorated data rate and other challenges in the practice communication systems.Meanwhile,multi-panel MIMO technology has attracted extensive attention due to its flexible configuration,low hardware cost,and wider coverage.By combining the XL-MIMO and multi-panel array structure,we construct multi-panel XL-MIMO and apply it to massive Internet of Things(IoT)access.First,we model the multi-panel XL-MIMO-based near-field channels for massive IoT access scenarios,where the electromagnetic waves corresponding to different panels have different angles of arrival/departure(AoAs/AoDs).Then,by exploiting the sparsity of the near-field massive IoT access channels,we formulate a compressed sensing based joint active user detection(AUD)and channel estimation(CE)problem which is solved by AMP-EM-MMV algorithm.The simulation results exhibit the superiority of the AMP-EM-MMV based joint AUD and CE scheme over the baseline algorithms.展开更多
The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from t...The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from the intrusion of malicious users.Some studies focus on static characteristics of malicious users,which is easy to be bypassed by camouflaged malicious users.In this paper,we present a malicious user detection method based on ensemble feature selection and adversarial training.Firstly,the feature selection alleviates the dimension disaster problem and achieves more accurate classification performance.Secondly,we embed features into the multidimensional space and aggregate it into a feature map to encode the explicit content preference and implicit interaction preference.Thirdly,we use an effective ensemble learning which could avoid over-fitting and has good noise resistance.Finally,we propose a datadriven neural network detection model with the regularization technique adversarial training to deeply analyze the characteristics.It simplifies the parameters,obtaining more robust interaction features and pattern features.We demonstrate the effectiveness of our approach with numerical simulation results for malicious user detection,where the robustness issues are notable concerns.展开更多
The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an import...The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an important target of network attacks. In order to perceive the network attack events on the user station side in time, a method combining real-time detection and active defense of random domain names on the user station side was proposed. Capsule network (CapsNet) combined with long short-term memory network (LSTM) was used to classify the domain names extracted from the traffic data. When a random domain name is detected, it sent instructions to routers and switched to update their security policies through the remote terminal protocol (Telnet), or shut down the service interfaces of routers and switched to block network attacks. The experimental results showed that the use of CapsNet combined with LSTM classification algorithm can achieve 99.16% accuracy and 98% recall rate in random domain name detection. Through the Telnet protocol, routers and switches can be linked to make active defense without interrupting services.展开更多
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC...Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.展开更多
An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the ...An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.展开更多
Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework ...Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.展开更多
This paper describes a linear interference cancellation multi user detector for synchronous DS CDMA systems under the condition that all spread spectrum code waveforms have the constant cross correlating coefficien...This paper describes a linear interference cancellation multi user detector for synchronous DS CDMA systems under the condition that all spread spectrum code waveforms have the constant cross correlating coefficients. The basic idea is to get the estimation for total multiple access interference (MAI) of all users using a reference code waveform, then subtract the total MAI from the received signal. The structure of such a detector is nearly similar to the conventional detector. The BER expression obtained in the paper shows significant performance improvement compared to the other detectors.展开更多
This paper proposes some low complexity algorithms for active user detection(AUD),channel estimation(CE)and multi-user detection(MUD)in uplink non-orthogonal multiple access(NOMA)systems,including single-carrier and m...This paper proposes some low complexity algorithms for active user detection(AUD),channel estimation(CE)and multi-user detection(MUD)in uplink non-orthogonal multiple access(NOMA)systems,including single-carrier and multi-carrier cases.In particular,we first propose a novel algorithm to estimate the active users and the channels for single-carrier based on complex alternating direction method of multipliers(ADMM),where fast decaying feature of non-zero components in sparse signal is considered.More importantly,the reliable estimated information is used for AUD,and the unreliable information will be further handled based on estimated symbol energy and total accurate or approximate number of active users.Then,the proposed algorithm for AUD in single-carrier model can be extended to multi-carrier case by exploiting the block sparse structure.Besides,we propose a low complexity MUD detection algorithm based on alternating minimization to estimate the active users’data,which avoids the Hessian matrix inverse.The convergence and the complexity of proposed algorithms are analyzed and discussed finally.Simulation results show that the proposed algorithms have better performance in terms of AUD,CE and MUD.Moreover,we can detect active users perfectly for multi-carrier NOMA system.展开更多
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num...Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.展开更多
Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural N...Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions.展开更多
Interleaved Division Multiple Access (IDMA) is a new access scheme that has been proposed in the literature to increase the capacity of wireless channels. The performance of such systems depends on the accuracy of the...Interleaved Division Multiple Access (IDMA) is a new access scheme that has been proposed in the literature to increase the capacity of wireless channels. The performance of such systems depends on the accuracy of the channel state information at the receiver. In this paper, a Noisy-Independent Component Analysis (N-ICA) based IDMA receiver for multiple access communication channels is proposed. The N-ICA component is applied as a post processor. Unlike other IDMA receivers, the proposed scheme detects and separates the transmitted symbols without channel state information tracking. The performance of the proposed technique is presented in terms of raw bit error rate (BER) without channel coding for different signal to noise ratios (SNR). Simulation results demonstrate that N-ICA post processor provides an improvement in performance in terms of bit error rate (BER) in loaded systems. When the system is not loaded, the proposed post processor presents the same performance as conventional IDMA receiver with less iterations leading to a complexity reduction.展开更多
This paper deals with the presentation of different multi-user detectors in the Universal Mobile Telecommunications System (UMTS) context. The challenge is always to optimize the compromise between performance and com...This paper deals with the presentation of different multi-user detectors in the Universal Mobile Telecommunications System (UMTS) context. The challenge is always to optimize the compromise between performance and complexity. Compared with the solution commonly used today, the rake detector, successive interference cancellation (SIC) detector has better performance despite its higher complexity. Our innovative solution proposes joining detector and channel turbo decoder to get a significant gain in terms of performance. Furthermore, when detection and decoding are implemented in a single function, complexity does not increase much.展开更多
This paper provides the performance analysis of multi input multi output (MIMO) Multi carrier (MC) interleaver based multiple-access system with multiuser detection. Interleave-division multiple access (IDMA) is a sch...This paper provides the performance analysis of multi input multi output (MIMO) Multi carrier (MC) interleaver based multiple-access system with multiuser detection. Interleave-division multiple access (IDMA) is a scheme in which users are separated by employing different interleavers instead of different signatures as in a conventional code-division multiple-access (CDMA) scheme. The basic principle of IDMA is that the interleaver is different for different users. Interleavers are generated independently and randomly. At the receiver, ZF, LLSE, VBLAST/ZF/MAP and VBLAST/LLSE/MAP detectors are employed. The performance of the system is analyzed for different channel conditions using extensive simulation runs based on Monte Carlo simulation trials. Simulation results divulge that VBLAST/LLSE/MAP detector results in significant performance amelioration compared to other detectors as applied to MC/IDMA system.展开更多
In this paper, an optimal multi user detector in DS/CDMA communication systems based on the mean field annealing (MFA) neural network is proposed. It is shown that the NP complete problem of minimizing the objective...In this paper, an optimal multi user detector in DS/CDMA communication systems based on the mean field annealing (MFA) neural network is proposed. It is shown that the NP complete problem of minimizing the objective function of the optimal multi user detector can be translated into minimizing an MFA network energy function. Numerical results show that the proposed detector offers significant performance gain relative to the conventional detector and decorrelating detector while it can be implemented easily in analog hardware.展开更多
A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experime...A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experiments demonstrate that the detection effect usingenriched sequences is better than that of using truncated sequences. As a SVDD profile is composedof a small amount of support vectors, our SVDD-based method can achieve computation and storageadvantage when the detection performance issimilar to existing method.展开更多
文摘Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection schemes with weighting factors for unsourced multiple access. First, we introduce bidirectional weighting factors in the extrinsic information passing process between the multi-user detector based on belief propagation (BP) and the LDPC decoder. Second, we incorporate bidirectional weighting factors in the message passing process between the MAC nodes and the user variable nodes in BP- based multi-user detector. The proposed schemes select the optimal weighting factors through simulations. The simulation results demonstrate that the proposed schemes exhibit significant performance improvements in terms of block error rate (BLER) compared to traditional schemes. .
基金supported by the National Natural Science Foundation of China(62072475)the Fundamental Research Funds for the Central Universities of Central South University(CX20230356)。
文摘Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.
基金supported by National Key Research and Development Program of China under Grants 2021YFB1600500,2021YFB3201502,and 2022YFB3207704Natural Science Foundation of China(NSFC)under Grants U2233216,62071044,61827901,62088101 and 62201056+1 种基金supported by Shandong Province Natural Science Foundation under Grant ZR2022YQ62supported by Beijing Nova Program,Beijing Institute of Technology Research Fund Program for Young Scholars under grant XSQD-202121009.
文摘The extra-large scale multiple-input multiple-output(XL-MIMO)for the beyond fifth/sixth generation mobile communications is a promising technology to provide Tbps data transmission and stable access service.However,the extremely large antenna array aperture arouses the channel near-field effect,resulting in the deteriorated data rate and other challenges in the practice communication systems.Meanwhile,multi-panel MIMO technology has attracted extensive attention due to its flexible configuration,low hardware cost,and wider coverage.By combining the XL-MIMO and multi-panel array structure,we construct multi-panel XL-MIMO and apply it to massive Internet of Things(IoT)access.First,we model the multi-panel XL-MIMO-based near-field channels for massive IoT access scenarios,where the electromagnetic waves corresponding to different panels have different angles of arrival/departure(AoAs/AoDs).Then,by exploiting the sparsity of the near-field massive IoT access channels,we formulate a compressed sensing based joint active user detection(AUD)and channel estimation(CE)problem which is solved by AMP-EM-MMV algorithm.The simulation results exhibit the superiority of the AMP-EM-MMV based joint AUD and CE scheme over the baseline algorithms.
基金supported in part by projects of National Natural Science Foundation of China under Grant 61772406 and Grant 61941105supported in part by projects of the Fundamental Research Funds for the Central Universitiesthe Innovation Fund of Xidian University under Grant 500120109215456.
文摘The continuously booming of information technology has shed light on developing a variety of communication networks,multimedia,social networks and Internet of Things applications.However,users inevitably suffer from the intrusion of malicious users.Some studies focus on static characteristics of malicious users,which is easy to be bypassed by camouflaged malicious users.In this paper,we present a malicious user detection method based on ensemble feature selection and adversarial training.Firstly,the feature selection alleviates the dimension disaster problem and achieves more accurate classification performance.Secondly,we embed features into the multidimensional space and aggregate it into a feature map to encode the explicit content preference and implicit interaction preference.Thirdly,we use an effective ensemble learning which could avoid over-fitting and has good noise resistance.Finally,we propose a datadriven neural network detection model with the regularization technique adversarial training to deeply analyze the characteristics.It simplifies the parameters,obtaining more robust interaction features and pattern features.We demonstrate the effectiveness of our approach with numerical simulation results for malicious user detection,where the robustness issues are notable concerns.
文摘The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an important target of network attacks. In order to perceive the network attack events on the user station side in time, a method combining real-time detection and active defense of random domain names on the user station side was proposed. Capsule network (CapsNet) combined with long short-term memory network (LSTM) was used to classify the domain names extracted from the traffic data. When a random domain name is detected, it sent instructions to routers and switched to update their security policies through the remote terminal protocol (Telnet), or shut down the service interfaces of routers and switched to block network attacks. The experimental results showed that the use of CapsNet combined with LSTM classification algorithm can achieve 99.16% accuracy and 98% recall rate in random domain name detection. Through the Telnet protocol, routers and switches can be linked to make active defense without interrupting services.
基金supported by the National Natural Science Foundation of China(6104000561001126+5 种基金61271262)the China Postdoctoral Science Foundation Funded Project(201104916382012T50789)the Natural Science Foundation of Shannxi Province of China(2011JQ8036)the Special Fund for Basic Scientific Research of Central Colleges (CHD2012ZD005)the Research Fund of Zhejiang University of Technology(20100244)
文摘Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.
基金Sponsored by the National"863"Program Projects (2007AA012293)
文摘An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.
文摘Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.
文摘This paper describes a linear interference cancellation multi user detector for synchronous DS CDMA systems under the condition that all spread spectrum code waveforms have the constant cross correlating coefficients. The basic idea is to get the estimation for total multiple access interference (MAI) of all users using a reference code waveform, then subtract the total MAI from the received signal. The structure of such a detector is nearly similar to the conventional detector. The BER expression obtained in the paper shows significant performance improvement compared to the other detectors.
基金supported by National Natural Science Foundation of China(NSFC)under Grant No.62001190The work of J.Wen was supported by NSFC(Nos.11871248,61932010,61932011)+3 种基金the Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme(2019),Guangdong Major Project of Basic and Applied Basic Research(2019B030302008)the Fundamental Research Funds for the Central Universities(No.21618329)The work of P.Fan was supported by National Key R&D Project(No.2018YFB1801104)NSFC Project(No.6202010600).
文摘This paper proposes some low complexity algorithms for active user detection(AUD),channel estimation(CE)and multi-user detection(MUD)in uplink non-orthogonal multiple access(NOMA)systems,including single-carrier and multi-carrier cases.In particular,we first propose a novel algorithm to estimate the active users and the channels for single-carrier based on complex alternating direction method of multipliers(ADMM),where fast decaying feature of non-zero components in sparse signal is considered.More importantly,the reliable estimated information is used for AUD,and the unreliable information will be further handled based on estimated symbol energy and total accurate or approximate number of active users.Then,the proposed algorithm for AUD in single-carrier model can be extended to multi-carrier case by exploiting the block sparse structure.Besides,we propose a low complexity MUD detection algorithm based on alternating minimization to estimate the active users’data,which avoids the Hessian matrix inverse.The convergence and the complexity of proposed algorithms are analyzed and discussed finally.Simulation results show that the proposed algorithms have better performance in terms of AUD,CE and MUD.Moreover,we can detect active users perfectly for multi-carrier NOMA system.
文摘Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.
文摘Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions.
文摘Interleaved Division Multiple Access (IDMA) is a new access scheme that has been proposed in the literature to increase the capacity of wireless channels. The performance of such systems depends on the accuracy of the channel state information at the receiver. In this paper, a Noisy-Independent Component Analysis (N-ICA) based IDMA receiver for multiple access communication channels is proposed. The N-ICA component is applied as a post processor. Unlike other IDMA receivers, the proposed scheme detects and separates the transmitted symbols without channel state information tracking. The performance of the proposed technique is presented in terms of raw bit error rate (BER) without channel coding for different signal to noise ratios (SNR). Simulation results demonstrate that N-ICA post processor provides an improvement in performance in terms of bit error rate (BER) in loaded systems. When the system is not loaded, the proposed post processor presents the same performance as conventional IDMA receiver with less iterations leading to a complexity reduction.
文摘This paper deals with the presentation of different multi-user detectors in the Universal Mobile Telecommunications System (UMTS) context. The challenge is always to optimize the compromise between performance and complexity. Compared with the solution commonly used today, the rake detector, successive interference cancellation (SIC) detector has better performance despite its higher complexity. Our innovative solution proposes joining detector and channel turbo decoder to get a significant gain in terms of performance. Furthermore, when detection and decoding are implemented in a single function, complexity does not increase much.
文摘This paper provides the performance analysis of multi input multi output (MIMO) Multi carrier (MC) interleaver based multiple-access system with multiuser detection. Interleave-division multiple access (IDMA) is a scheme in which users are separated by employing different interleavers instead of different signatures as in a conventional code-division multiple-access (CDMA) scheme. The basic principle of IDMA is that the interleaver is different for different users. Interleavers are generated independently and randomly. At the receiver, ZF, LLSE, VBLAST/ZF/MAP and VBLAST/LLSE/MAP detectors are employed. The performance of the system is analyzed for different channel conditions using extensive simulation runs based on Monte Carlo simulation trials. Simulation results divulge that VBLAST/LLSE/MAP detector results in significant performance amelioration compared to other detectors as applied to MC/IDMA system.
文摘In this paper, an optimal multi user detector in DS/CDMA communication systems based on the mean field annealing (MFA) neural network is proposed. It is shown that the NP complete problem of minimizing the objective function of the optimal multi user detector can be translated into minimizing an MFA network energy function. Numerical results show that the proposed detector offers significant performance gain relative to the conventional detector and decorrelating detector while it can be implemented easily in analog hardware.
基金Supported by the National Natural Science Foundation of China(90104005,66973034,60473023).
文摘A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experiments demonstrate that the detection effect usingenriched sequences is better than that of using truncated sequences. As a SVDD profile is composedof a small amount of support vectors, our SVDD-based method can achieve computation and storageadvantage when the detection performance issimilar to existing method.