中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
数学与系统科学研究院 [2]
地理科学与资源研究所 [1]
长春光学精密机械与物... [1]
软件研究所 [1]
采集方式
OAI收割 [5]
内容类型
期刊论文 [4]
会议论文 [1]
发表日期
2026 [1]
2022 [1]
2021 [1]
2008 [1]
2005 [1]
学科主题
Engineerin... [1]
筛选
浏览/检索结果:
共5条,第1-5条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
发表日期升序
发表日期降序
题名升序
题名降序
提交时间升序
提交时间降序
Neural-Enhanced Modulation for Spatial Selective Transmission on Low-End IoT Devices
期刊论文
OAI收割
IEEE TRANSACTIONS ON NETWORKING, 2026, 卷号: 34, 页码: 3013-3028
作者:
Wu, Huangwei
;
Fan, Tingchao
;
Jin, Meng
;
Chen, Tao
;
Wang, Xinbing
  |  
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2026/03/16
Antenna arrays
Internet of Things
Wireless communication
Receivers
Transmitters
Communication system security
Training
Channel impulse response
Channel estimation
Microphones
IoT security
acoustic
DL-based communication
Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
期刊论文
OAI收割
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 卷号: 21, 期号: 9, 页码: 7238-7252
作者:
Su, Nanchi
;
Liu, Fan
;
Wei, Zhongxiang
;
Liu, Ya-Feng
;
Masouros, Christos
  |  
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2023/02/07
Radar
Signal to noise ratio
Wireless communication
Copper
Security
Radar detection
Precoding
Dual-functional radar-communication system
millimeter-wave
physical layer security
direction modulation
constructive interference
fractional programming
System Identification With Binary-Valued Observations Under Data Tampering Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
作者:
Guo, Jin
;
Wang, Xuebin
;
Xue, Wenchao
;
Zhao, Yanlong
  |  
收藏
  |  
浏览/下载:133/0
  |  
提交时间:2021/10/26
Estimation
Sensor systems
Security
Communication networks
Automation
Production
Binary-valued observations
compensation-oriented defense scheme
data tampering attack
system identification
A new authentication protocol for wireless communication network based on IEEE802.16 (EI CONFERENCE)
会议论文
OAI收割
2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, December 10, 2008 - December 12, 2008, Sydney, NSW, Australia
Li R.
;
Fang Z.
;
Cao W.
;
Yin Y.
;
Xu P.
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2013/03/25
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16
a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then
its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially
formal analysis was mostly done. Finally
system testing was also carried out and the results were analyzed to verify function and performance of the new protocol. 2008 IEEE.
efficient identity-based multicast scheme from bilinear pairing
期刊论文
OAI收割
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 卷号: 152, 期号: 6, 页码: 877-882
Wang L
;
Wu CK
  |  
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2011/07/28
backward secrecy
bilinear pairing
data integrity service
dynamic group key management
efficient identity-based multicast scheme
forward secrecy
multicast communication system
source authentication
cryptography
data integrity
message authentication
multicast protocols
telecommunication security