Advanced Search

2020 Vol. 42, No. 2

contents
contents
2020, 42(2): 1-4.
Abstract:
Special Topic on Cryptography against Quantum Attack
Research Status and Development Trend of Post-quantum Symmetric Cryptography
Han SUI, Wenling WU
2020, 42(2): 287-294. doi: 10.11999/JEIT190667
Abstract:
The security of classical symmetric cryptography is facing severe challenges in quantum environment, which has prompted researchers to explore cryptography algorithms that are secure in both classical and quantum environments. Post-quantum symmetric ...
Improved Quantum Attack on Type-1 Generalized Feistel Schemes and Its Application to CAST-256
Boyu NI, Xiaoyang DONG
2020, 42(2): 295-306. doi: 10.11999/JEIT190633
Abstract:
Generalized Feistel Schemes (GFS) are important components of symmetric ciphers, which have been extensively researched in classical setting. However, the security evaluations of GFS in quantum setting are rather scanty. In this paper, more improved ...
Continuous Variable Measurement-Device-Independent Cluster State Quantum Communication Based on Coherent State
Yu WANG, Qi SU
2020, 42(2): 307-314. doi: 10.11999/JEIT190661
Abstract:
Even attacks by quantum computer can be theoretically discovered if utilizing quantum communication protocols. Compared with entangled states, the Continuous Variable (CV) Gaussian coherent state is easier to be prepared. The schemes of quantum commu...
Zero-knowledge Proofs for Attribute-Based Group Signatures with Verifier-local Revocation Over Lattices
Yanhua ZHANG, Yupu HU, Ximeng LIU, Qikun ZHANG, Huiwen JIA
2020, 42(2): 315-321. doi: 10.11999/JEIT190587
Abstract:
Attribute-Based Group Signature(ABGS) is a new variant of group signature, and it allows group members with certain specific attributes to sign messages on behalf of the whole group anonymously; Once any dispute arises, an opening authority can effec...
Analysis of Learning With Errors in Query Access Model: A List Decoding Approach
Mingqiang WANG, Jincheng ZHUANG
2020, 42(2): 322-326. doi: 10.11999/JEIT190624
Abstract:
Regev introduced the Learning With Errors (LWE) problem in 2005, which has close connections to random linear code decoding and has found wide applications to cryptography, especially to post-quantum cryptography. The LWE problem is originally introd...
On the Hardness of the Asymmetric Learning With Errors Problem
Jiang ZHANG, Shuqin FAN
2020, 42(2): 327-332. doi: 10.11999/JEIT190685
Abstract:
Due to the advantages such as the worst-case hardness assumption, lattice-based cryptography is believed to the most promising research direction in post-quantum cryptography. As one of the two main hard problems commonly used in lattice-based crypto...
FatSeal: An Efficient Lattice-based Signature Algorithm
Tianyuan XIE, Haoyu LI, Yiming ZHU, Yanbin PAN, Zhen LIU, Zhaomin YANG
2020, 42(2): 333-340. doi: 10.11999/JEIT190678
Abstract:
The lattice-based signature schemes are promising quantum-resistant replacements for classical signature schemes based on number theoretical hard problems. An important approach to construct lattice-based signature is utilizing the Fiat-Shamir transf...
Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer
Chunyan WEI, Xiaoqiu CAI, Tianyin WANG, Qi SU, Sujuan QIN, Fei GAO, Qiaoyan WEN
2020, 42(2): 341-347. doi: 10.11999/JEIT190679
Abstract:
In view of the great success of quantum cryptography in key distribution, people also try to utilize the quantum mechanics to construct many other cryptographic protocols. Anonymous authenticated key exchange is exactly one kind of cryptographic task...
Network and Information Security
An Encryption Transmission Scheme for Industrial Control System
Yuanfei TU, Qingjian SU, Geng YANG
2020, 42(2): 348-354. doi: 10.11999/JEIT190187
Abstract:

With the integration of information technology such as industrial Internet of Things (IoT), cloud computing and Industrial Control System (ICS), the security of industrial data is at enormous risk. In order to protect the confidentiality and integrit...

Speech Information Hiding Method Based on Random Position Selection and Matrix Coding
Zhijun WU, Changliang LI, Rong LI
2020, 42(2): 355-363. doi: 10.11999/JEIT181163
Abstract:

For the low-rate speech encoding problem, an information hidden algorithm based on the G.723.1 coding standard is proposed. In the pitch prediction coding process, by controlling the search range of the closed-loop pitch period (adaptive codebook), c...

A New Method for Image Superpixel Segmentation
Miao LIAO, Yang LI, Yuqian ZHAO, Yizhi LIU
2020, 42(2): 364-370. doi: 10.11999/JEIT190111
Abstract:

Considering the problem that the existing superpixel methods are usually unable to set an appropriate number of generated superpixels automatically and unable to adhere to image boundaries effectively, a new superpixel method is proposed in this pape...

Pattern Recognition and Intelligent Information Processing
Multi-context Autoencoders for Multivariate Medical Signals Based on Deep Convolutional Neural Networks
Ye YUAN, Kebin JIA, Pengyu LIU
2020, 42(2): 371-378. doi: 10.11999/JEIT190135
Abstract:

Learning unsupervised representations from multivariate medical signals, such as multi-modality polysomnography and multi-channel electroencephalogram, has gained increasing attention in health informatics. In order to solve the problem that the exis...

Speaker Recognition Based on Multimodal GenerativeAdversarial Nets with Triplet-loss
Ying CHEN, Huangkang CHEN
2020, 42(2): 379-385. doi: 10.11999/JEIT190154
Abstract:

In order to explore the correlation between face and audio in the field of speaker recognition, a novel multimodal Generative Adversarial Network (GAN) is designed to map face features and audio features to a more closely connected common space. Then...

Correntropy-based Fusion Extreme Learning Machine forRepresentation Level Feature Fusion and Classification
Chao WU, Yaqian LI, Yaru ZHANG, Bin LIU
2020, 42(2): 386-393. doi: 10.11999/JEIT190186
Abstract:

Based on the network structure and training methods of the Extreme Learning Machine (ELM), Correntropy-based Fusion Extreme Learning Machine (CF-ELM) is proposed. Considering the problem that the fusion of representation level features is insufficien...

Matrix Metric Learning for Person Re-identification Based on Bidirectional Reference Set
Ying CHEN, Xiaoyue XU
2020, 42(2): 394-402. doi: 10.11999/JEIT190159
Abstract:

To solve the problem of inaccurate feature representation caused by indistinctive appearance difference in person re-identification domain, a new Matrix Metric Learning algerithm based on Bidirectional Reference (BRM2L) set is proposed. Firstly, reci...

Radar and Digital Signal Processing
Missing Telemetry Data Prediction Algorithm via Tensor Factorization
You MA, Shuze JIA, Xiangang ZHAO, Xiaohu FENG, Cunqun FAN, Aijun ZHU
2020, 42(2): 403-409. doi: 10.11999/JEIT180728
Abstract:

Satellite health monitoring is an important concern for satellite security, for which satellite telemetry data is the only source of data. Therefore, accurate prediction of missing data of satellite telemetry is an important forward-looking approach ...

Fully Digital Feedforward Background Calibration of Time Skew for Sub-Sampling Time-interleaved Analog-to-digital Converter
Honghui DENG, Hui YAN, Rui XIAO, Hongmei CHEN
2020, 42(2): 410-417. doi: 10.11999/JEIT190052
Abstract:

A full digital feedforward Time-Interleaved Analog-to-Digital Converter (TIADC) time skew calibration algorithm is presented, the time skew estimation adopts the feedforward extraction method of the improved derivative module of time skew function, w...

Research on the Novel Ultra-wideband Power Divider Based on Beetle Antennae Search Algorithm
Jie LI, Yuepeng YAN, Xiaoxin LIANG, Jing WAN, Kuisong WANG
2020, 42(2): 418-424. doi: 10.11999/JEIT181003
Abstract:

Based on the study of the spur-line, a novel spurs-line structure is proposed. The design of a novel Ultra-WideBand (UWB) power divider is described based on the novel spur line structure for the 2.5~13.2 GHz frequency range. The designed device is c...

A New High Order Finite Difference Time Domain Method
Jie XU, Ke XU, Zhixiang HUANG
2020, 42(2): 425-429. doi: 10.11999/JEIT190050
Abstract:

Compared with the traditional high-order Finite Difference Time Domain(FDTD) Method, an improved high-order FDTD optimization method is proposed in this paper. This algorithm is based on Ampere’s law of circuits and finds a set of optimal coefficient...

Individual Recognition Algorithm of IFF Radiation Sources Based on Ensemble Intrinsic Time-scale Decomposition
Yu ZHANG, Tianqi LI, Jin ZHANG, Bo TANG
2020, 42(2): 430-437. doi: 10.11999/JEIT190085
Abstract:

In order to study the subtle feature recognition of Identification Foe or Friend (IFF) radiation source signals, this paper proposes an IFF individual recognition method based on ensemble intrinsic time-scale decomposition to solve the problem of ins...

Research on the Adaptive Synchrosqueezing Algorithm
Lin LI, Lin WANG, Hongxia HAN, Hongbing JI, Li JIANG
2020, 42(2): 438-444. doi: 10.11999/JEIT190146
Abstract:

The improvement of time-frequency resolution plays a crucial role in the analysis and reconstruction of multi-component non-stationary signals. For traditional time-frequency analysis methods with fixed window, the time-frequency concentration is low...

Iterative Multiple Signal Classification Algorithm with Small Sample Size
Juan WANG, Tong WANG, Jianxin WU
2020, 42(2): 445-451. doi: 10.11999/JEIT190160
Abstract:

For cases with small samples, the estimated noise subspace obtained from sample covariance matrix deviates from the true one, which results in MUltiple SIgnal Classification (MUSIC) Direction-Of-Arrival (DOA) estimation performance breakdown. To deal...

Analysis for Effect of Radar Intermittent Radiation on the Performance of Cross Location
Yatao WANG, Xiaodong ZENG, Longjian ZHOU
2020, 42(2): 452-457. doi: 10.11999/JEIT190110
Abstract:

For the radio frequency stealth control measure of radar intermittent radiation, the relationship between radiation time ratio and positioning performance is studied which takes cross location with two stations as an example. Firstly, the control met...

Multi-channel SAR-GMTI Clutter Suppression Method Based onHypersonic Platform Forward Squint
Yu WANG, Yunhe CAO, Chen QI, Jiusheng HAN, Yutao LIU
2020, 42(2): 458-464. doi: 10.11999/JEIT181002
Abstract:

According to the HyperSonic Vehicle (HSV) borne radar platform system, a multi-channel SAR-GMTI clutter suppression method is presented based on hypersonic platform forward squint mode. First, range walk correction and range compression are completed...

Scheduling Algorithm Based on Value Optimization for Phased Array Radar
Shanchao YANG, Kangsheng TIAN, Renzheng LIU, Yujun ZHENG
2020, 42(2): 465-471. doi: 10.11999/JEIT190147
Abstract:

A task scheduling algorithm based on value optimization is proposed for phased array radar. Firstly, the schedulability of tracking tasks is obtained through feasibility analysis and selecting operation on the task queue, using the proposed schedulab...

A Dual Satellite Interferometric Precise Localization Method Based on Short Synthetic Aperture
Guangcai SUN, Yuqi WANG, Zhaozhao GAO, Fan JIANG, Mengdao XING, Zheng BAO
2020, 42(2): 472-479. doi: 10.11999/JEIT180940
Abstract:

Dual satellite TDOA/FDOA localization is achieved by the TDOA hyperboloid and FDOA hyperboloid. The accuracy of localization is affected by TDOA/FDOA accuracy. In order to measure accurately the TDOA/FDOA, a method of TDOA/FDOA measurement based on s...

Wireless Communication and Internet of Things
D2D Resource Allocation Mechanism Based on Energy EfficiencyOptimization in Heterogeneous Networks
Damin ZHANG, Huijuan ZHANG, Wei YAN, Zhongyun CHEN, Ziyun XIN
2020, 42(2): 480-487. doi: 10.11999/JEIT190042
Abstract:

For the problem of spectrum allocation in the multiplexing of cellular user spectrum resources by Device-to-Device (D2D) communication in heterogeneous networks, a D2D communication resource allocation mechanism based on improved discrete Pigeon-Insp...

Applying Chernoff Weighted Classification Frame Method to MotorImagery Brain Computer Interface
Ping TAN, Limei LIU, Fan GUO, Kaijun ZHOU
2020, 42(2): 488-494. doi: 10.11999/JEIT181132
Abstract:

For the problem that the classifier is less considered to be combined with the brain's cognitive process in the Brain-Computer Interface (BCI) system, a Chernoff-weighted based classifier integrated frame method is proposed and used in synchronous mo...

A Cluster Algorithm Based on Interference Increment Reduction in Ultra-Dense Network
Yanxia LIANG, Jing JIANG, Changyin SUN, Xin LIU, Yongbin XIE
2020, 42(2): 495-502. doi: 10.11999/JEIT181144
Abstract:

Ultra-Dense Networks (UDNs) shorten the distance between terminals and nodes, which improve greatly the spectral efficiency and expand the system capacity. But the performance of cell edge users is seriously degraded. Reasonable planning of Virtual C...

New Coding Scheduling Strategy Based on Virtual Queuein Wireless Multicast Network
Rui ZHANG, You ZHAN, Quan QIAN
2020, 42(2): 503-510. doi: 10.11999/JEIT190059
Abstract:

Network coding is widely used in wireless multicast networks in recent years due to its high transmission efficiency. To address the low efficiency of automatic retransmission caused by packet loss in wireless multicast network, a new Coding Scheduli...

A SideLink-assisted Joint Handover Scheme for Long Term Evolution -Vehicle to Everything System
Bin SHEN, Xiaoyong ZHOU, Lang XU, Xiaoge HUANG
2020, 42(2): 511-518. doi: 10.11999/JEIT190120
Abstract:

For LTE-V2X(Long Term Evolution-Vehicle to Everything) system, the cellular link and the SideLink (SL) are usually unstable in the handover process, and the situation is even deteriorating when the SL is employed to assist the normal handover process...

Channel Estimation Algorithm Using Temporal-spatial Structure for Up-link of Massive MIMO Systems
Xinhua LU, Carles Navarro MANCHÓN, Zhongyong WANG, Chuanzong ZHANG
2020, 42(2): 519-525. doi: 10.11999/JEIT180676
Abstract:

To deal with the estimation problem of non-stationary channel in massive Multiple-Input Multiple-Output (MIMO) up-link, the 2D channels’ sparse structure information in temporal-spatial domain is used, to design an iterative channel estimation algori...

Energy Efficiency Based Dynamic Resource Allocation Algorithm for Cellular Vehicular Based on Non-Orthogonal Multiple Access
Lun TANG, Jiao XIAO, Guofan ZHAO, Youchao YANG, Qianbin CHEN
2020, 42(2): 526-533. doi: 10.11999/JEIT190006
Abstract:

In the Non-Orthogonal Multiple Access (NOMA) based cellular network with Vehicle-to-Vehicle (V2V) communication, to mitigate the co-channel interference between V2V users and cellular users as well as the power allocation problem based on the NOMA pr...

Channel Estimation Algorithm of Maritime Sparse Channel Based on Fast Bayesian Matching Pursuit Optimization
Ying ZHANG, Yufeng YAO
2020, 42(2): 534-540. doi: 10.11999/JEIT190102
Abstract:

In the Orthogonal Frequency Division Multiplexing (OFDM) system, the receiver often needs to know the channel state information, because the frequency selective fading channel will generate inter-symbol interference in the data transmission. In the c...