期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Optimal decision threshold for soft decision cooperative spectrum sensing
1
作者 孙大飞 宋铁成 +3 位作者 吴名 胡静 郭洁 顾斌 《Journal of Southeast University(English Edition)》 EI CAS 2013年第4期355-360,共6页
In order to achieve higher spectrum efficiency in cognitive radio (CR) systems, a closed-form expression of the optimal decision threshold for soft decision cooperative spectrum sensing based on the minimum total er... In order to achieve higher spectrum efficiency in cognitive radio (CR) systems, a closed-form expression of the optimal decision threshold for soft decision cooperative spectrum sensing based on the minimum total error probability criterion is derived. With the analytical expression of the optimal decision threshold, the impact of different sensing parameters on the threshold value is studied. Theoretical analyses show that the optimal threshold achieves an efficient trade-off between the missed detection probability and the false alarm probability. Simulation results illustrate that the average signal-to-noise ratio (SNR) and the soft combination schemes have a great influence on the optimal threshold value, whereas the number of samples has a weak impact on the optimal threshold value. Furthermore, for the maximal ratio combing (MRC) and the modified deflection coefficient (MDC) schemes, the optimal decision threshold value increases and approaches a corresponding individual limit value while the number of CR users increases. But the number of CR users has a weak influence on the optimal decision threshold for the equal gain combining (EGC) scheme. 展开更多
关键词 cognitive radio cooperative spectrum sensing energy detection decision threshold
下载PDF
Integration Interval Determination and Decision Threshold Optimization for Improved TRPC-UWB Communication Systems 被引量:2
2
作者 Zhonghua Liang Junshan Zang +2 位作者 Xiaojun Yang Xiaodai Dong Huansheng Song 《China Communications》 SCIE CSCD 2017年第5期185-192,共8页
Integration interval and decision threshold issues were investigated for improved transmitted reference pulse cluster (iTRPC-) ultra-wideband (UWB) systems. Our analysis shows that the bit error rate (BER) perfo... Integration interval and decision threshold issues were investigated for improved transmitted reference pulse cluster (iTRPC-) ultra-wideband (UWB) systems. Our analysis shows that the bit error rate (BER) performance of iTRPC-UWB systems can be significantly improved via integration interval determination (IID) and decision threshold optimization. For this purpose, two modifications can be made at the autocorrelation receiver as follows. Firstly, the liD processing is performed for autocorrelation operation to capture multi-path energy as much as possible. Secondly, adaptive decision threshold (ADT) instead of zero decision threshold (ZDT), is used as estimated optimal decision threshold for symbol detection. Performance of iTRPCUWB systems using liD and ADT was evaluated in realistic IEEE 802.15.4a UWB channel models and the simulation results demonstrated our theoretical analysis. 展开更多
关键词 ultra-wideband (UWB) improved transmitted reference pulse cluster (iTRPC) integration interval determination (IID) adaptive decision threshold (ADT)
下载PDF
A Nonparametric Approach to Foreground Detection in Dynamic Backgrounds 被引量:3
3
作者 LIAO Juan JIANG Dengbiao +2 位作者 LI Bo RUAN Yaduan CHEN Qimei 《China Communications》 SCIE CSCD 2015年第2期32-39,共8页
Foreground detection is a fundamental step in visual surveillance.However,accurate foreground detection is still a challenging task especially in dynamic backgrounds.In this paper,we present a nonparametric approach t... Foreground detection is a fundamental step in visual surveillance.However,accurate foreground detection is still a challenging task especially in dynamic backgrounds.In this paper,we present a nonparametric approach to foreground detection in dynamic backgrounds.It uses a history of recently pixel values to estimate background model.Besides,the adaptive threshold and spatial coherence are introduced to enhance robustness against false detections.Experimental results indicate that our approach achieves better performance in dynamic backgrounds compared with several approaches. 展开更多
关键词 foreground detection dynamic background the decision threshold spatial coherence
下载PDF
标准模型下的抗选择密文攻击基于身份门限解密方案 被引量:3
4
作者 梅其祥 何大可 《中国科学院研究生院学报》 CAS CSCD 2006年第2期198-204,共7页
提出了两个有效的抗选择密文攻击的基于身份门限解密方案.在标准的决定性双线性Diffie-Hellman假设下,它们被证明可以抗选择密文攻击.第一个方案基于Boneh和Boyen提出的一个Selective IBE方案,另外一个方案基于Waters提出的Full IBE方案... 提出了两个有效的抗选择密文攻击的基于身份门限解密方案.在标准的决定性双线性Diffie-Hellman假设下,它们被证明可以抗选择密文攻击.第一个方案基于Boneh和Boyen提出的一个Selective IBE方案,另外一个方案基于Waters提出的Full IBE方案.与所基于的方案相同,前者的挑战身份要在公共参数选取之前确定,而后者的挑战身份可以由攻击者适应性地选取.据我们所知,以前的相关方案的安全性只能在随机预言机模型中得以证明. 展开更多
关键词 门限解密 选择密文安全性 决定性双线性Diffie-Hellman假设
下载PDF
标准模型下可证安全的基于身份门限签密方案 被引量:2
5
作者 孙华 姚宣霞 +2 位作者 刘行兵 韩晓光 郑雪峰 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第2期11-15,共5页
提出了一种有效的基于身份的门限签密方案.采用双线性对映射技术,基于Waters和Paterson提出的签名方案,设计了标准模型下可证安全的门限签密方案,并利用决策双线性Diffie-Hellman问题的困难性证明了方案的语义安全性,同时利用计算Diffie... 提出了一种有效的基于身份的门限签密方案.采用双线性对映射技术,基于Waters和Paterson提出的签名方案,设计了标准模型下可证安全的门限签密方案,并利用决策双线性Diffie-Hellman问题的困难性证明了方案的语义安全性,同时利用计算Diffie-Hellman问题的困难性证明了方案的不可伪造性.相对随机预言模型下的同类方案,本文方案更具有实际意义. 展开更多
关键词 门限签密 标准模型 计算DIFFIE-HELLMAN问题 决策双线性Diffie-Hellman问题
下载PDF
标准模型下可证安全的基于身份的门限环签密方案 被引量:4
6
作者 孙华 王爱民 郑雪峰 《计算机科学》 CSCD 北大核心 2013年第5期131-135,共5页
签密是一个能够同时提供认证性和保密性的密码学术语,而它却比分别签名和加密具有更低的计算成本。环签密除具有签密的一般属性外,还具有匿名性。为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术,提出了一种标准模型下基... 签密是一个能够同时提供认证性和保密性的密码学术语,而它却比分别签名和加密具有更低的计算成本。环签密除具有签密的一般属性外,还具有匿名性。为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术,提出了一种标准模型下基于身份的门限环签密方案,并对方案的安全性进行了分析。最后,通过计算Diffie-Hell-man问题和判定性Diffie-Hellman问题的困难性,证明了该方案在适应性选择消息和身份攻击下的不可伪造性以及在适应性选择密文攻击下的不可区分性。 展开更多
关键词 门限环签密 双线性对 计算DIFFIE-HELLMAN问题 判定性Diffie-Hellman问题 基于身份的密码学
下载PDF
一种可证安全的基于身份门限代理签密方案 被引量:2
7
作者 孙华 郭磊 +1 位作者 郑雪峰 王爱民 《计算机科学》 CSCD 北大核心 2012年第4期101-105,共5页
代理签名可以实现签名权利的委托,具有可认证性和不可否认性,然而却不能提供保密性。签密是一种将加密和签名结合在一起的技术,它同时具有两者的优点。利用双线性对技术,提出了一种在标准模型下有效的基于身份门限代理签密方案,并对方... 代理签名可以实现签名权利的委托,具有可认证性和不可否认性,然而却不能提供保密性。签密是一种将加密和签名结合在一起的技术,它同时具有两者的优点。利用双线性对技术,提出了一种在标准模型下有效的基于身份门限代理签密方案,并对方案的安全性进行了分析。最后,通过DBDH问题的困难性证明了方案的语义安全性,同时利用CDH问题的困难性证明了方案的不可伪造性。 展开更多
关键词 基于身份的密码学 门限代理签密 双线性对 CDH问题 DBDH问题
下载PDF
基于身份的门限环签密方案 被引量:1
8
作者 罗大文 何明星 李虓 《计算机工程与应用》 CSCD 北大核心 2011年第33期65-67,77,共4页
把基于身份的环签密和门限签名结合起来,提出了一个基于身份的门限环签密方案。此方案不但具有签密的一般性质:机密性和认证性,还具有签密者的匿名性和门限性质。在CDHP、DBDHP困难性假设下,分别证明了方案在适应性选择消息攻击下的不... 把基于身份的环签密和门限签名结合起来,提出了一个基于身份的门限环签密方案。此方案不但具有签密的一般性质:机密性和认证性,还具有签密者的匿名性和门限性质。在CDHP、DBDHP困难性假设下,分别证明了方案在适应性选择消息攻击下的不可伪造性以及在适应性选择密文攻击下的不可区分性。 展开更多
关键词 环签名 门限环签密 计算性Diffie-Hellman问题(CDHP) 决定性双线性对Diffie-Hellman问题(DBDHP)
下载PDF
一种有效基于身份的门限环签密方案
9
作者 孙华 郭磊 +1 位作者 郑雪峰 王爱民 《计算机应用研究》 CSCD 北大核心 2012年第7期2660-2664,共5页
为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术,提出了一种在标准模型下基于身份的门限环签密方案,并对方案的安全性进行了分析。最后,利用CDH问题和DBDH问题的困难性,证明了方案在适应性选择消息和身份攻击下的不可伪... 为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术,提出了一种在标准模型下基于身份的门限环签密方案,并对方案的安全性进行了分析。最后,利用CDH问题和DBDH问题的困难性,证明了方案在适应性选择消息和身份攻击下的不可伪造性以及在适应性选择密文攻击下的不可区分性。 展开更多
关键词 门限环签密 双线性对 CDH问题 DBDH问题 基于身份的密码学
下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
10
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(DataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
A Certificateless Threshold Public Key Encryption Scheme
11
作者 ZOU Xiubin ZOU Ran 《Wuhan University Journal of Natural Sciences》 CAS 2012年第3期223-228,共6页
The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the au... The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the author presents a certificateless threshold public key encryption scheme.Collaborating with an administrator,the decryption participant generates his whole private key share for decryption in the scheme.The administrator does not know the decryption participant's private key share for decryption.Making use of q-SDH assumption,the author constructs a certificateless threshold public key encryption scheme.The security of the scheme is eventually reduced to the solving of Decisional Bilinear Diffie-Hellman problem.Moreover,the scheme is secure under the chosen ciphertext attack in the standard model. 展开更多
关键词 certificateless public key cryptosystem identity-based encryption threshold public key encryption decisional bilinear Diffie-Hellman assumption bilinear pairings
原文传递
一种安全有效的基于身份的门限签密方案 被引量:1
12
作者 孙华 郑雪峰 +1 位作者 于义科 周芳 《控制与决策》 EI CSCD 北大核心 2010年第7期1031-1034,1039,共5页
签密是一种将加密和数字签名技术结合在一起的思想,它比采用先签名后加密的方法具有更高的效率.基于双线性对技术,提出了一种新的基于身份的门限签密方案.它利用决策双线性Diffie-Hellman(DBDH)问题的困难性在随机预言模型下给出了方案... 签密是一种将加密和数字签名技术结合在一起的思想,它比采用先签名后加密的方法具有更高的效率.基于双线性对技术,提出了一种新的基于身份的门限签密方案.它利用决策双线性Diffie-Hellman(DBDH)问题的困难性在随机预言模型下给出了方案的语义安全性证明,并利用计算Diffie-Hellman(CDH)问题的困难性证明了方案的不可伪造性,同时指出方案具有较高的效率. 展开更多
关键词 门限签密 双线性对 决策双线性Diffie-Hellman问题 随机预言模型
原文传递
The Research of ST-OFDM in Physical Layer of IEEE 802.16a
13
作者 JUMei-yan ZHUQi FENGGuang-zeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期7-14,共8页
This paper briefly introduces one of the three physical layer implementations of IEEE 802.16a~[1],WirelessMAN-OFDM PHY.Based on the implementation,the combination of Orthogonal Frequency Division Multiplexing(OFDM)and... This paper briefly introduces one of the three physical layer implementations of IEEE 802.16a~[1],WirelessMAN-OFDM PHY.Based on the implementation,the combination of Orthogonal Frequency Division Multiplexing(OFDM)and Space-Time Coding(STC)which is briefly called ST-OFDM in IEEE 802.16a,is investigated under thechannel provided in Ref.[2].Especially,this paper is focused on the influence of the optimal decision threshold on the sys-tern Bit-Error-Rate(BER)performance based on unequal probabilities of sources.The simulations show that when Signal-Noise-Ratio(SNR)is low the optimal decision threshold is obviously superior to the usual one;when SNR is high to someextent,such as 10 dB for 4QAM and 16 dB for 16QAM,we can use the usual decision threshold instead of the optimal 展开更多
关键词 STC OFDM IEEE 802.16a STBC decision threshold
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部