期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Adversarial attacks and defenses for digital communication signals identification
1
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
下载PDF
A Low Power Non-Volatile LR-WPAN Baseband Processor with Wake-Up Identification Receiver
2
作者 YU Shuangming FENG Peng WU Nanjian 《China Communications》 SCIE CSCD 2016年第1期33-46,共14页
The paper proposes a low power non-volatile baseband processor with wake-up identification(WUI) receiver for LR-WPAN transceiver.It consists of WUI receiver,main receiver,transmitter,non-volatile memory(NVM) and power... The paper proposes a low power non-volatile baseband processor with wake-up identification(WUI) receiver for LR-WPAN transceiver.It consists of WUI receiver,main receiver,transmitter,non-volatile memory(NVM) and power management module.The main receiver adopts a unified simplified synchronization method and channel codec with proactive Reed-Solomon Bypass technique,which increases the robustness and energy efficiency of receiver.The WUI receiver specifies the communication node and wakes up the transceiver to reduce average power consumption of the transceiver.The embedded NVM can backup/restore the states information of processor that avoids the loss of the state information caused by power failure and reduces the unnecessary power of repetitive computation when the processor is waked up from power down mode.The baseband processor is designed and verified on a FPGA board.The simulated power consumption of processor is 5.1uW for transmitting and 28.2μW for receiving.The WUI receiver technique reduces the average power consumption of transceiver remarkably.If the transceiver operates 30 seconds in every 15 minutes,the average power consumption of the transceiver can be reduced by two orders of magnitude.The NVM avoids the loss of the state information caused by power failure and energy waste caused by repetitive computation. 展开更多
关键词 LR-WPAN wake-up identification receiver synchronization non-volatile memory baseband processor digital integrated circuit low power chip design
下载PDF
REGULATIONS OF THE PEOPLE'S REPUBLIC OF CHINA ON ADMINISTRATION OF IMPORT AND EXPORT ENTERPRISE IDENTIFICATION DIGITS
3
作者 MaZhou 《大经贸》 北大核心 1997年第10期94-95,共2页
The Ministry of Foreign Trade and Economy Co-operation (hereinafter called the MOFFEC)willintroduce throughout the country "the Importand Export Enterprise Identification Digits of thePeople’s Republic of China&... The Ministry of Foreign Trade and Economy Co-operation (hereinafter called the MOFFEC)willintroduce throughout the country "the Importand Export Enterprise Identification Digits of thePeople’s Republic of China" (hereinafter called"IEEID") for the purpose of pushing forward the de-velopment of foreign economy and trade, strength-ening macro-administration by the governments andimproving working efficiency and service. ThisRegulation has been enacted to ensure 展开更多
关键词 REGULATIONS OF THE PEOPLE’S REPUBLIC OF CHINA ON ADMINISTRATION OF IMPORT AND EXPORT ENTERPRISE identification DIGITS
下载PDF
An online identity authentication method for blood smear
4
作者 Xiaozhen Feng Yiping Cao +1 位作者 Kuang Peng Cheng Chen 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2016年第6期1-11,共11页
Blood smear test is the basic method of blood cytology and is also a standard medical test that can help diagnose various conditions and diseases.Morphological examination is the gold stan-dard to determine pathologic... Blood smear test is the basic method of blood cytology and is also a standard medical test that can help diagnose various conditions and diseases.Morphological examination is the gold stan-dard to determine pathological changes in blood cell morphology.In the biology and medicine automation trend,blood smears'automated management and analysis is very necessary.An online blood smear automatic microscopic image detection system has been constructed.It includes an online blood smear automatic producing part and a blood smear automatic micro-scopic image detection part.Online identity authentication is at the core of the system.The identifiers printed online always present dot matrix digit code(DMDC)whose stroke is not continuous.Considering the particularities of DMDC and the complexities of online application environment,an online identity authentication method for blood smear with heterological theory is proposed.By synthesizing the certain regional features according to the heterological theory,high identification accuracy and high speed have been guaranteed with few features required.In the experiment,the suficient correct matches bet ween the tube barcode and the identification result verified its feasibility and validity. 展开更多
关键词 Blood smear digit identification identity authentication feature identification blood smear detection microscopic imaging
下载PDF
A new physical unclonable function architecture
5
作者 白创 邹雪城 戴葵 《Journal of Semiconductors》 EI CAS CSCD 2015年第3期121-126,共6页
This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier,... This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier, comparator, voting mechanism and diffusion algorithm circuit. Multiple identical process sensors are fabricated on the same chip. Due to manufacturing process variations, each sensor produces slightly different physical charac- teristic values that can be compared in order to create a digital identification for the chip. The diffusion algorithm circuit ensures further that the PUF based on the proposed architecture is able to effectively identify a population of ICs. We also improve the stability of PUF design with respect to temporary environmental variations like temperature and supply voltage with the introduction of difference amplifier and voting mechanism. The PUF built on the proposed architecture is fabricated in 0.18 μm CMOS technology. Experimental results show that the PUF has a good output statistical characteristic of uniform distribution and a high stability of 98.1% with respect to temperature variation from -40 to 100 ℃, and supply voltage variation from 1.7 to 1.9 V. 展开更多
关键词 physical unclonable functions digital identification process sensors voting mechanism diffusion algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部