Luo Xu, Jianhang Liu, Haihua Chen, Yucheng Zhang, Jingyao Zhang, Xiaoting Li
{"title":"Sparse Reconstruction Based on Tanimoto Coefficient for DOA Estimation in Compressed Sensing","authors":"Luo Xu, Jianhang Liu, Haihua Chen, Yucheng Zhang, Jingyao Zhang, Xiaoting Li","doi":"10.1109/ICICN56848.2022.10006569","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006569","url":null,"abstract":"In traditional DOA (direction of arrival) estimation, the entire airspace in which the target signal is located needs to be searched, which greatly increases the computation, while traditional algorithms use internal product criteria to select atoms from redundant dictionaries that are not optimal and fail to ensure that the selected atomic energy is better suited to residual signals. This paper introduces compressed sensing theory, divides spatial domain into different regions based on transcendental knowledge, constructs heterogeneous overcomplete dictionary, and then reconstructs the original signal sparsely using atomic matching criterion based on Tanimoto coefficient. Two improved methods are proposed: (1) roughly determine the finite solution space with PM (Propagator Method) algorithm, then further define the initialization space according to CRLB (Cramer-Rao Lower Bound) and construct a nonuniform overcomplete dictionary based on the initialization space; and (2) propose a novel reconstruction of DOA signal based on Tanimoto coefficient similarity matching criteria. Simulation results show that at low SNR, the spatial resolution of reconstruction signal based on Tanimoto coefficient and nonuniform dictionary is higher than that of traditional uniform dictionary.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123121534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on RSS Based Multi Station Passive Location Method for Satellite Emitter","authors":"Hang Dong, Can-bin Yin, Yasheng Zhang","doi":"10.1109/ICICN56848.2022.10006503","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006503","url":null,"abstract":"Passive location of radiated targets based on Received Signal Strength (RSS) has a very important position and role in the field of passive location because of its simple system structure, low cost and fast solution speed. This paper analyzes the principle and algorithm of RSS location, and describes in detail the location scenario and process of multi station passive location of satellite emitter based on RSS. Through MATLAB simulation, the positioning error accuracy of X, y and Z directions is compared and analyzed from many aspects, and the estimated target position is compared with the actual target position in space. Simulation results show that the proposed method has kilometer level positioning accuracy and low complexity.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"692 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuanbiao Zhang, Min Zhang, Xiongyan Tang, Shikui Shen
{"title":"Ghost Reflection Processing Method in PON Branch Monitoring Based on OTDR","authors":"Chuanbiao Zhang, Min Zhang, Xiongyan Tang, Shikui Shen","doi":"10.1109/ICICN56848.2022.10006422","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006422","url":null,"abstract":"In this paper, we propose a new passive optical network (PON) monitoring method based on optical time domain reflectometry (OTDR). In the primary optical splitter structure, we can monitor multiple branches, and then analyze the ghost reflection (GR) that affect the monitoring effect. Through detailed experimental analysis, we give some treatment suggestions to improve the effect of multi branch fault monitoring.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125943491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingyan Huang, Jian-shan Wang, Wei Dai, Xuan Shen, Jun He
{"title":"Cryptanalysis of Magpie Block Cipher","authors":"Jingyan Huang, Jian-shan Wang, Wei Dai, Xuan Shen, Jun He","doi":"10.1109/ICICN56848.2022.10006502","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006502","url":null,"abstract":"Block cipher is one of the most important methods to safeguard data confidentiality. The design and analysis of dynamic block ciphers are the frontier of current cryptography research. Magpie is a lightweight dynamic block cipher proposed in the “Acta Electronics Sinica” in 2017. Its block length is 64 bits, and the key length is 96 bits. The first 64-bit key is used as the round key to participate in encryption and decryption, the middle 16-bit key is used to control the selection of the S-boxes, and the last 16-bit key controls the execution sequence of the round function. In this paper, we evaluate the security of Magpie in two dimensions: the single-key model and the related-key model. In the single-key model, we research on the ability of Magpie against the meet-in-the-middle attack. Our results show that we are able to recover the master key with the time complexity of 288 encryptions and memory complexity of 292 bytes. In the related-key model, we research on the ability of Magpie against the differential attack, and our results show that the time complexity of recovering the full-round Magpie is 278 encryptions. The results of this paper provide strong support for accurately characterizing the security performance of Magpie.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123269309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Performance of OAM Based FSO System in Weak Turbulence Environment","authors":"Silun Du, T. Wang, Qiaochu Yang, Baoqun Li","doi":"10.1109/ICICN56848.2022.10006581","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006581","url":null,"abstract":"The communication performance of orbital angular momentum (OAM) based free space communication in a weak atmospheric turbulence environment is experimentally studied in this paper. We use spatial light modulator (SLM) to generate +10th and +20th OAM beams, respectively, and highspeed communication with the communication rate of 28Gbit/s in each link is demonstrated. The turbulence channel used is based on the hot plate thermal convection principle, a weak, controllable turbulence environment. The experiment also compares the communication performance of traditional Gaussian beams and +10th and +20th OAM beams. The experimental results show that in a weak turbulent environment, compared with Gaussian beam-based system, high order OAM beam-based system can reduce the scintillation index by 33% to be 0.27 and improve the detection sensitivity by 2.94dB to -21.93dBm.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Technology and System of Chaotic Laser AVSK Coding and Combined Coding for Optics Secure Communications","authors":"Yang Senlin","doi":"10.1109/ICICN56848.2022.10006575","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006575","url":null,"abstract":"We present a novel chaotic laser coding technology of alternate variable secret-key (AVSK) for optics secure communication using alternate variable orbits (AVOs) method. We define the principle of chaotic AVSK encoding and decoding, and introduce a chaotic AVSK communication platform and its coding scheme. And then the chaotic AVSK coding technology be successfully achieved in encrypted optics communications while the presented AVO function, as AVSK, is adjusting real-time chaotic phase space trajectory, where the AVO function and AVSK according to our needs can be immediately variable and adjustable. The coding system characterizes AVSK of emitters. And another combined AVSK coding be discussed. So the system's security enhances obviously because it increases greatly the difficulty for intruders to decipher the information from the carrier. AVSK scheme has certain reference value for the research of chaotic laser secure communication and laser network synchronization.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demands Analysis of Autonomy Levels Evaluation in 5G Bearer Network","authors":"Yu Wang, Liangbin Zhao","doi":"10.1109/ICICN56848.2022.10006470","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006470","url":null,"abstract":"Focusing on the intelligent development direction of 5G bearer networks, this paper analyzes and proposes the five major requirements for autonomy levels evaluation in 5G bearer network. It mainly includes the typical characteristics of autonomous levels evaluation in 5G bearer network, the evaluation objects and scope to be covered, the requirements for levels evaluation, evaluation methods to meet different scenarios, and evaluation combined with network KPIs, etc.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangsheng Sun, ZhiLin Duo, Ziguang Jie, Hongya Wang
{"title":"A Temporal Knowledge Graph Application for Network Security of Power Monitoring System Based on KNN and SVM","authors":"Yangsheng Sun, ZhiLin Duo, Ziguang Jie, Hongya Wang","doi":"10.1109/ICICN56848.2022.10006471","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006471","url":null,"abstract":"Static knowledge graphs applied to power monitoring systems can no longer guarantee network security in the current situation, so it is necessary to develop dynamic, time-scale knowledge graphs in the current context. This paper proposes a temporal knowledge graph application based on KNN and SVM. Curves with multiple K-values are used in the KNN model to determine feature importance and filter data noise, and a supervised learning classification SVM approach is used to predict four-dimensional data. The ultimate goal is to generate multiple temporal knowledge graphs and use them in a power monitoring system to ensure network security.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiemei Liu, Yingxue Zhao, Kaixu Liu, Fei Lin, Jun Li
{"title":"Research on Offloading and Selection Scheme Based on SWIPT Terminals of Moblie Edge Computing","authors":"Jiemei Liu, Yingxue Zhao, Kaixu Liu, Fei Lin, Jun Li","doi":"10.1109/ICICN56848.2022.10006487","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006487","url":null,"abstract":"This paper combines Simultaneous Wireless Information and Power Transfer technology and Mobile Edge Computing technology, and proposes a system model of multi-terminal, multi-server, and relays. Under the background of time-varying channel and time-varying servers' price, we derive the expressions of calculation rate and calculation cost of the system. The deep reinforcement learning algorithm and convex optimization algorithm are used to select the DRL offloading scheme, DRL selection scheme and time allocation. The purpose is to maximize the computing rate and minimize the computing cost when the collected energy is limited. The simulation results verify the effectiveness of the theoretical analysis and algorithm. The algorithm proposed in this paper not only reduces the program execution delay significantly, but also obtains the near optimal calculation rate and the near optimal calculation cost.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129873011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Large-Capacity Coverless Steganography Based on Two-MSB and Artificial Immune System","authors":"Di Xiao, Aozhu Zhao","doi":"10.1109/ICICN56848.2022.10006448","DOIUrl":"https://doi.org/10.1109/ICICN56848.2022.10006448","url":null,"abstract":"With the development of information hiding technology, coverless steganography, which provides non-embedding and distortion-free hiding by constructing a mapping relationship between the secret information and the cover image, has attracted more and more attention. This paper proposes a large-capacity coverless steganography based on two-MSB (MSB and second MSB) and Artificial Immune System (AIS). In order to use the two-Msbto represent feature information, the cover image is first divided into blocks and the pixel value of each block is averaged. Then, randomly scramble blocks to obtain the feature sequence. Next, according to the hidden ratio, a diffusion factor is introduced and optimized by an artificial immune algorithm to generate the optimal feature sequence. Finally, the mapping relationship between the optimal feature sequence and the secret information is established, and an error map is generated in the process. Experimental results show that the proposed method has good robustness and can resist attacks such as noise and filtering. Compared with existing coverless steganography algorithms, this method has higher hiding capacity and security.","PeriodicalId":325077,"journal":{"name":"2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128458191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}