International Conference on Signal Processing and Communication Security最新文献

筛选
英文 中文
Simulation of direct water-air communication by using an acousto-optic method 用声光方法模拟水气直接通信
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655402
Yang Zhao, Xingkang Zhao, Jinxin Huang, Zhiquan Zhou
{"title":"Simulation of direct water-air communication by using an acousto-optic method","authors":"Yang Zhao, Xingkang Zhao, Jinxin Huang, Zhiquan Zhou","doi":"10.1117/12.2655402","DOIUrl":"https://doi.org/10.1117/12.2655402","url":null,"abstract":"This paper studies the simulation and algorism of acousto-optic method used in the wireless communication between water and air. Binary frequency shift keying (2FSK) is selected as the way of modulate underwater acoustic signals. Then, laser interferometry was introduced to detect the signal of underwater acoustic communication. Further, transmission information was demodulated by the differential-and-cross-multiplying (DCM) algorism. Information transmission rate of 2FSK was analyzed through the numerical simulation. The results shows that the maximum of information transmission rate is 67 bit/s at error free.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131268057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal detection based on deep learning in MIMO-OFDM systems MIMO-OFDM系统中基于深度学习的信号检测
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655192
Yan Yang, Yuanchun Chen
{"title":"Signal detection based on deep learning in MIMO-OFDM systems","authors":"Yan Yang, Yuanchun Chen","doi":"10.1117/12.2655192","DOIUrl":"https://doi.org/10.1117/12.2655192","url":null,"abstract":"The signal detection is presented based on deep learning (DL) for Multiple-in-Multiple-out Orthogonal Frequency Division Multiplexing (MIMO-OFDM) Systems. In MIMO-OFDM systems, a receiver is designed to eliminate successive interference cancellation based on DL for multiple users. The signal detection and channel estimation are carried out using deep neural network (DNN) which is trained offline depend on simulation data. And the symbols online are recovered directly. The simulation results show that Deep learning (DL) method is better than those traditional methods for channel estimation. The error propagation effects are reduced by DNN in the signal detector. The inter-symbol interference (ISI) of systems is serious, which shows that the DL approach can achieve the better performance by the DL approach than the maximum likelihood approach.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"25 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZY-3 satellite image based analysis of overall landscape patterns in Huai’an-Yangzhou section along the Grand Canal 基于ZY-3卫星影像的大运河淮扬段整体景观格局分析
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655328
Hong Li, Huan Xu
{"title":"ZY-3 satellite image based analysis of overall landscape patterns in Huai’an-Yangzhou section along the Grand Canal","authors":"Hong Li, Huan Xu","doi":"10.1117/12.2655328","DOIUrl":"https://doi.org/10.1117/12.2655328","url":null,"abstract":"This paper studies the overall landscape patterns in Huai’an-Yangzhou section along the Grand Canal with RS (Remote Sensing) and GIS (Geographic Information System) based on ZY-3 satellite images of this area. During the study, the landscapes of Huai’an-Yangzhou section along the Grand Canal have been classified into six types, i.e. farmland landscape, garden and forest landscape, water landscape, architectural landscape, road landscape, and other landscapes. Meanwhile PD (Patch Density), perimeter area fractal dimension (PAFRAC), and AI (agglomeration index) of different landscapes in these two heritage sites have been calculated, whose results show that farmland landscape, architectural landscape, and water landscape are the three most obvious landscapes with a high degree of concentration in the two heritage areas. The findings can provide basic data for landscape protection and management of Huai’an-Yangzhou section along the Grand Canal.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic optimization method at five-way intersection based on green building materials and signal processing 基于绿色建材和信号处理的五路交叉口交通优化方法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655335
Zijun Liang, Xu Zhan, Wei Kong, Yuanyuan Zhao, Yiran Niu, Min-Yang Peng
{"title":"Traffic optimization method at five-way intersection based on green building materials and signal processing","authors":"Zijun Liang, Xu Zhan, Wei Kong, Yuanyuan Zhao, Yiran Niu, Min-Yang Peng","doi":"10.1117/12.2655335","DOIUrl":"https://doi.org/10.1117/12.2655335","url":null,"abstract":"With the rapid development of China's economy, the development speed and scale of transportation engineering have also expanded rapidly. But the problem of environmental pollution problems have also gradually emerged, and the use of environmental protection materials has become an inevitable trend of green transportation development. This paper puts forward the traffic optimization method at five-way intersection based on green building materials and signal processing. Firstly, the green and environment protection hot-melt reflective marking paint and color asphalt concrete pavement materials are used to construct the travel space of motor vehicles, non-motor vehicles and pedestrians at five-way intersection. Then, on this basis, the phase design method based on clipping method and the corresponding signal timing method are proposed to optimize the traffic flow travel time at five-way intersection. Finally, the evaluation and analysis is done by the VISSIM traffic simulation software, the results show that this method based on green building materials effectively defines the travel space of five-way intersection. On this premise, the traffic efficiency is further improved through signal processing optimization technology, which effectively reduces the number of conflict point at the five-way intersection and provides a basis for the research on the optimal control of deformed intersections based on green building materials and signal processing.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on smart city architecture system based on cloud-edge-terminal and blockchain technology 基于云边缘终端和区块链技术的智慧城市架构系统研究
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655179
Xiuli Su, Jun Yang, Wei Ma
{"title":"Research on smart city architecture system based on cloud-edge-terminal and blockchain technology","authors":"Xiuli Su, Jun Yang, Wei Ma","doi":"10.1117/12.2655179","DOIUrl":"https://doi.org/10.1117/12.2655179","url":null,"abstract":"In view of the problems of low data processing efficiency, security risks and low utilization rate in the construction of smart city, this paper uses the integration technology of Cloud-Edge-Terminal and blockchain to build the smart city architecture system, and proposes solutions for data storage and sharing in the architecture system, which not only realizes the real-time, efficient and rapid response of the smart city platform system, but further improves the security of data storage and sharing in the construction of smart city.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121536080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high-performance Webshell detection model 一个高性能的Webshell检测模型
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655320
Wenhao Yuan, Shanfeng Wang, Yixuan Feng, Shujie Li, Songhua Li, Ruyin Sun
{"title":"A high-performance Webshell detection model","authors":"Wenhao Yuan, Shanfeng Wang, Yixuan Feng, Shujie Li, Songhua Li, Ruyin Sun","doi":"10.1117/12.2655320","DOIUrl":"https://doi.org/10.1117/12.2655320","url":null,"abstract":"Webshell exists as a command execution environment in the form of a web page file, which is often referred to as a backdoor. After hacking a website, hackers usually upload it to the web directory of the web server and mix it with the normal web files, and then access the backdoor program through the browser, which can achieve the purpose of controlling the browser. Since there are many kinds of web backdoors in the form of asp, php, jsp or cgi files, here we choose the more popular php file as the research object. In this paper, the Webshell dataset comes from common Webshell samples on the Internet, and the white samples mainly use common open source software developed based on PHP. We use bag-of-words and TF-IDF models for feature extraction, and construct Webshell detection models based on the LightGBM algorithm. The results show that our model is more than 98% accurate and has higher performance in space and time compared to the current popular classification models.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on application of radio physical layer key generation technology to proximity communication in 6G 无线电物理层密钥生成技术在6G近距离通信中的应用研究
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655338
Jingpeng Bai
{"title":"Research on application of radio physical layer key generation technology to proximity communication in 6G","authors":"Jingpeng Bai","doi":"10.1117/12.2655338","DOIUrl":"https://doi.org/10.1117/12.2655338","url":null,"abstract":"Based on the characteristic in time, frequency and spatial domain, radio physical layer can provide powerful basic support for constructing new radio communication security mechanism. How to integrate the radio layer security concept with the traditional radio communication security mechanism is one of the most important studies during 6G technology research. This paper focuses on the proximity based services (ProSe) that show the characteristics of radio communication in 6G, analyzes the potential security enhancement space of the current 3GPP 5G ProSe standardization scheme, and proposes a proximity radio communication security enhancement mechanism based on radio physical layer key generation technology. The mechanism uses the uniqueness of the radio channel characteristics of both sides of the communication as a shared physical layer private information source, constructs a PC5 interface security model across the physical layer and the ProSe protocol layer, and enhances the security protection of discovery messages and signaling messages on PC5 interface in proximity communication. The mechanism can effectively enhance the radio communication security when the traditional security mechanism is not fully activated. Finally, potential application scenarios for radio physical layer key generation techniques in 6G proximity communication services are discussed.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A non-convex optimization method for identification of cascaded nonlinear systems 级联非线性系统辨识的非凸优化方法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655413
Yu Fu, Zhenlong Xiao
{"title":"A non-convex optimization method for identification of cascaded nonlinear systems","authors":"Yu Fu, Zhenlong Xiao","doi":"10.1117/12.2655413","DOIUrl":"https://doi.org/10.1117/12.2655413","url":null,"abstract":"Identification of cascaded dynamic nonlinear systems has received more and more attention since it can be applied to characterize a wide class of engineering problems. However, this problem is inherently non-convex, and few efforts have been devoted to identifying these systems. In this paper, we propose a novel non-convex optimization method for identifying the cascaded nonlinear systems. The identification problem is modeled as a multi-objective consensus problem. Numerical simulation shows that the proposed algorithm is able to alleviate the non-convex characteristic and identifying the nonlinear dynamic cascade systems.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123799815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Build intrusion detection model based on CNN and ensemble learning 建立基于CNN和集成学习的入侵检测模型
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655173
Chen Chen, Guanghua Wang, Bo Yang, Lintao Yang, Xiaoyan Ye
{"title":"Build intrusion detection model based on CNN and ensemble learning","authors":"Chen Chen, Guanghua Wang, Bo Yang, Lintao Yang, Xiaoyan Ye","doi":"10.1117/12.2655173","DOIUrl":"https://doi.org/10.1117/12.2655173","url":null,"abstract":"In order to effectively detect network attacks, machine learning is widely used to classify different types of intrusion detection. Traditional detection usually used a single model to train data, which was prone to the problems of large generalization error and over fitting. In order to solve this problem, the idea of ensemble learning is introduced, and an intrusion detection model based on CNN and ensemble learning is proposed. Firstly, CNN is used to mine the deep information in the original data, and then the mined information is taken as the input and detected by using the ensemble learning model. According to the stacking strategy, a variety of heterogeneous models are used as the base-learner, and support vector machine is selected as the meta-learner. The NSL-KDD dataset is used to train and test the intrusion detection model. The experimental results show that the model can obtain higher accuracy and has very good intrusion detection classification effect.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on distributed competition big data hierarchical storage method based on Ceph architecture 基于Ceph架构的分布式竞争大数据分层存储方法研究
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655365
Xiang Chen, Qing Liu, Bijun Zhang, Gang Li, Shaoping Wu
{"title":"Research on distributed competition big data hierarchical storage method based on Ceph architecture","authors":"Xiang Chen, Qing Liu, Bijun Zhang, Gang Li, Shaoping Wu","doi":"10.1117/12.2655365","DOIUrl":"https://doi.org/10.1117/12.2655365","url":null,"abstract":"In the face of intensive data access requests, the current big data storage methods have the problem of poor concurrent read-write performance. Based on Ceph architecture, a distributed big data hierarchical storage method is designed to realize the robust storage service of data files. According to the frequency and popularity of the access object, the cold data with low frequency is eliminated, and the access cache pool or back-end storage pool is selected. Standardize the I/O performance, load and capacity values in the OSD set, calculate the comprehensive weight, and determine the priority of node access. The entire Ceph architecture balances the data distribution. When highly concurrent data access operations occur, a random number is selected to execute the read service of the storage node to ensure the interconnection communication in different clusters. The test results show that the write and read time of the hierarchical storage method based on Ceph architecture is greatly reduced, and good results are achieved in terms of cache hit rate, which can effectively manage and store competitive big data.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131736026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信