Highly reliable DHR-based polar compilation code communication method
The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face...
Uloženo v:
| Vydáno v: | Computer networks (Amsterdam, Netherlands : 1999) Ročník 252; s. 110673 |
|---|---|
| Hlavní autoři: | , , , , , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.10.2024
|
| Témata: | |
| ISSN: | 1389-1286 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face of unknown attacks. Therefore, this study introduces a highly reliable DHR-based polar coding communication approach. Drawing parallels between cyber attacks and channel noise, the method incorporates reconfigurable executors, decoding decisions, strategy scheduling, and other mechanisms to enable active defense. The True Relatively Axiom (TRA) is employed to theoretically validate the method’s heterogeneity, redundancy, and dynamics. Comparative simulation experiments with traditional polar decoding algorithms, such as SCL, SC, BP, SCAN, and SSC decoding algorithms, demonstrate that the proposed method not only improves secure transmission efficiency but also guarantees secure and reliable transmission across various attack scenarios. Our code is available at https://github.com/yuluzi/my-code.git. |
|---|---|
| AbstractList | The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability. Polar codes, the channel coding scheme in the 5G communication standard, encounter issues of singularity, limitations, and passivity in the face of unknown attacks. Therefore, this study introduces a highly reliable DHR-based polar coding communication approach. Drawing parallels between cyber attacks and channel noise, the method incorporates reconfigurable executors, decoding decisions, strategy scheduling, and other mechanisms to enable active defense. The True Relatively Axiom (TRA) is employed to theoretically validate the method’s heterogeneity, redundancy, and dynamics. Comparative simulation experiments with traditional polar decoding algorithms, such as SCL, SC, BP, SCAN, and SSC decoding algorithms, demonstrate that the proposed method not only improves secure transmission efficiency but also guarantees secure and reliable transmission across various attack scenarios. Our code is available at https://github.com/yuluzi/my-code.git. |
| ArticleNumber | 110673 |
| Author | Du, Hongyu Shao, Sisi Yang, Qian Liu, Shangdong Shi, Yuchen Nie, Yijun Zheng, Yulu Ji, Yimu Gu, Tiansheng Ji, Zongkai |
| Author_xml | – sequence: 1 givenname: Yulu orcidid: 0009-0009-2738-7456 surname: Zheng fullname: Zheng, Yulu organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 2 givenname: Tiansheng surname: Gu fullname: Gu, Tiansheng organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 3 givenname: Shangdong surname: Liu fullname: Liu, Shangdong organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 4 givenname: Sisi surname: Shao fullname: Shao, Sisi organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 5 givenname: Qian surname: Yang fullname: Yang, Qian organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 6 givenname: Hongyu surname: Du fullname: Du, Hongyu organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 7 givenname: Yuchen surname: Shi fullname: Shi, Yuchen organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 8 givenname: Yijun surname: Nie fullname: Nie, Yijun organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 9 givenname: Zongkai surname: Ji fullname: Ji, Zongkai organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China – sequence: 10 givenname: Yimu orcidid: 0009-0003-0796-5294 surname: Ji fullname: Ji, Yimu email: jiym@njupt.edu.cn organization: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China |
| BookMark | eNp9j81OwzAQhH0oEm3hDTjkBRK8tpMmFyRUCkGqhITgbPlnTV0lcWUHpL49qcKZy-5qtDOab0UWQxiQkDugBVCo7o-FCf2AY8EoEwUArTZ8QZbA6yYHVlfXZJXSkVIqBKuXZNf6r0N3ziJ2XukOs6f2Pdcqoc1OoVMxm9JOvlOjD8N0W7wI_ffgzSz1OB6CvSFXTnUJb__2mnw-7z62bb5_e3ndPu5zw8pyzJXmDCtFlaFls-GiBs4boZ1tnAWnK9to6rBWNZ-GK60poWJqetTQoADN10TMuSaGlCI6eYq-V_EsgcoLvjzKGV9e8OWMP9keZhtO3X48RpmMx8Gg9RHNKG3w_wf8ArK7ag8 |
| Cites_doi | 10.1007/s11432-022-3623-y 10.1109/COMST.2019.2916180 10.1109/COMST.2020.2967127 10.1109/TIT.2009.2021379 10.1109/TIT.2022.3228862 10.1109/LCOMM.2019.2910059 10.1109/JSAC.2014.140515 10.1109/LCOMM.2018.2850772 10.1016/j.telpol.2022.102327 10.23919/JCC.2023.01.013 10.1109/TIT.2015.2410251 10.1109/LWC.2017.2743080 10.1109/TWC.2020.3022922 10.1109/TCOMM.2013.070213.120789 |
| ContentType | Journal Article |
| Copyright | 2024 Elsevier B.V. |
| Copyright_xml | – notice: 2024 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.comnet.2024.110673 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| ExternalDocumentID | 10_1016_j_comnet_2024_110673 S138912862400505X |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABTAH ABXDB ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F0J FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 ZMT ZY4 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABJNI ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG ~HD |
| ID | FETCH-LOGICAL-c255t-ab32e6a0ac059734813394bfd9fd1fb6d9b0fe8a83e8af5dc5162a734b19e41b3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001288258100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1389-1286 |
| IngestDate | Sat Nov 29 05:30:37 EST 2025 Sat Aug 24 15:41:40 EDT 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Cyberspace security Polar code Active defense The true relatively axiom DHR |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c255t-ab32e6a0ac059734813394bfd9fd1fb6d9b0fe8a83e8af5dc5162a734b19e41b3 |
| ORCID | 0009-0003-0796-5294 0009-0009-2738-7456 |
| ParticipantIDs | crossref_primary_10_1016_j_comnet_2024_110673 elsevier_sciencedirect_doi_10_1016_j_comnet_2024_110673 |
| PublicationCentury | 2000 |
| PublicationDate | October 2024 2024-10-00 |
| PublicationDateYYYYMMDD | 2024-10-01 |
| PublicationDate_xml | – month: 10 year: 2024 text: October 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
| PublicationYear | 2024 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Ahmad, Shahabuddin, Kumar, Okwuibe, Gurtov, Ylianttila (b1) 2019; 21 Lin, Li, Hou, Yang, Li (b27) 2017 Pan, Zhang, Ma, Yao, Ji (b29) 2021; 42 Mendonça, Damásio, de Freitas, Oliveira, Cichy, Nicita (b3) 2022; 46 Song, Liu, Wei, Zhang, Tan (b28) 2020; 41 Qin (b20) 2020 Gao, Dai, Niu (b8) 2019 Arikan (b9) 2009; 55 He, Du (b32) 2016; 42 Fayyaz, Barry (b16) 2014; 32 Xu (b23) 2020 Chen, Niu, Lin (b15) 2013; 61 Mondelli, Hashemi, Cioffi, Goldsmith (b17) 2020; 20 Wang, Wei, Chen, Yin, Li, Zhang (b7) 2023; 66 Wu (b10) 2020 Tal, Vardy (b12) 2015; 61 Zhang, Ma, Wu (b26) 2017; 2 Zhang (b22) 2021 Li, Ye, Hu (b5) 2022; 69 Lu, Huang, Cheng, Qin (b31) 2021; 44 Liang, Liu, Zhang, Zhang (b11) 2017; 6 Tong, Zhang, Zhang, Wu (b25) 2017; 28 Wei, Zhang, Su, Xue, Wen (b30) 2021; 47 Wu (b24) 2014; 30 Lin, Xiong, Yan (b13) 2015 Du, Xu (b33) 2016 Abidrabbu, Al-Mistarihi (b2) 2022; 33 Fang (b21) 2021 Wu, Wei (b18) 2019 Zhou, Lin, Wang (b19) 2019; 23 Pillet, Bioglio, Land (b34) 2022 Lu, Zhao, Lei, Wang, Zhao (b6) 2023; 20 Bioglio, Condo, Land (b4) 2020; 23 Elkelesh, Ebada, Cammerer, Ten Brink (b14) 2018; 22 Lu (10.1016/j.comnet.2024.110673_b31) 2021; 44 Abidrabbu (10.1016/j.comnet.2024.110673_b2) 2022; 33 Li (10.1016/j.comnet.2024.110673_b5) 2022; 69 Tal (10.1016/j.comnet.2024.110673_b12) 2015; 61 Ahmad (10.1016/j.comnet.2024.110673_b1) 2019; 21 Arikan (10.1016/j.comnet.2024.110673_b9) 2009; 55 Fayyaz (10.1016/j.comnet.2024.110673_b16) 2014; 32 Lin (10.1016/j.comnet.2024.110673_b27) 2017 Fang (10.1016/j.comnet.2024.110673_b21) 2021 Tong (10.1016/j.comnet.2024.110673_b25) 2017; 28 Du (10.1016/j.comnet.2024.110673_b33) 2016 Bioglio (10.1016/j.comnet.2024.110673_b4) 2020; 23 Pan (10.1016/j.comnet.2024.110673_b29) 2021; 42 Wei (10.1016/j.comnet.2024.110673_b30) 2021; 47 Zhang (10.1016/j.comnet.2024.110673_b22) 2021 Wu (10.1016/j.comnet.2024.110673_b24) 2014; 30 Gao (10.1016/j.comnet.2024.110673_b8) 2019 Liang (10.1016/j.comnet.2024.110673_b11) 2017; 6 Lin (10.1016/j.comnet.2024.110673_b13) 2015 Wang (10.1016/j.comnet.2024.110673_b7) 2023; 66 Wu (10.1016/j.comnet.2024.110673_b10) 2020 Wu (10.1016/j.comnet.2024.110673_b18) 2019 Mendonça (10.1016/j.comnet.2024.110673_b3) 2022; 46 Song (10.1016/j.comnet.2024.110673_b28) 2020; 41 Zhou (10.1016/j.comnet.2024.110673_b19) 2019; 23 Mondelli (10.1016/j.comnet.2024.110673_b17) 2020; 20 Lu (10.1016/j.comnet.2024.110673_b6) 2023; 20 Qin (10.1016/j.comnet.2024.110673_b20) 2020 Xu (10.1016/j.comnet.2024.110673_b23) 2020 He (10.1016/j.comnet.2024.110673_b32) 2016; 42 Zhang (10.1016/j.comnet.2024.110673_b26) 2017; 2 Elkelesh (10.1016/j.comnet.2024.110673_b14) 2018; 22 Pillet (10.1016/j.comnet.2024.110673_b34) 2022 Chen (10.1016/j.comnet.2024.110673_b15) 2013; 61 |
| References_xml | – start-page: 24 year: 2016 end-page: 27 ident: b33 article-title: The encode and decode theory of polar code and its performance simulating publication-title: 2016 8th IEEE International Conference on Communication Software and Networks – volume: 22 start-page: 1536 year: 2018 end-page: 1539 ident: b14 article-title: Belief propagation list decoding of polar codes publication-title: IEEE Commun. Lett. – year: 2020 ident: b10 article-title: Cyberspace mimic defense: Generalized robust control and endogenous security – year: 2021 ident: b21 article-title: Study of SC Decoding Algorithm for Improved Polarization Codes In eMBB Scenarios – start-page: 2670 year: 2017 end-page: 2675 ident: b27 article-title: MDFS: A mimic defense theory based architecture for distributed file system publication-title: 2017 IEEE International Conference on Big Data (Big Data) – start-page: 1 year: 2019 end-page: 6 ident: b8 article-title: Learning to decode polar codes with quantized LLRs passing publication-title: 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications – start-page: 279 year: 2019 end-page: 284 ident: b18 article-title: Heterogeneous executors scheduling algorithm for mimic defense systems publication-title: 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology – year: 2020 ident: b20 article-title: Research On Compilation Code Algorithm of Polarized Codes in 5G Application Scenario – volume: 6 start-page: 798 year: 2017 end-page: 801 ident: b11 article-title: Analysis and adaptive design of polar coded HARQ transmission under SC-list decoding publication-title: IEEE Wirel. Commun. Lett. – start-page: 110 year: 2022 end-page: 115 ident: b34 article-title: Classification of automorphisms for the decoding of polar codes publication-title: ICC 2022-IEEE International Conference on Communications – start-page: 1 year: 2015 end-page: 6 ident: b13 article-title: Reduced complexity belief propagation decoders for polar codes publication-title: 2015 IEEE Workshop on Signal Processing Systems (SiPS) – volume: 61 start-page: 3100 year: 2013 end-page: 3107 ident: b15 article-title: Improved successive cancellation decoding of polar codes publication-title: IEEE Trans. Commun. – volume: 33 year: 2022 ident: b2 article-title: Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami-m fading channels publication-title: Trans. Emerg. Telecommun. Technol. – volume: 42 start-page: 13 year: 2016 end-page: 16 ident: b32 article-title: Research on a high performance low complexity polar code coding and decoding algorithm publication-title: Appl. Electron. Tech. – volume: 30 start-page: 1 year: 2014 end-page: 7 ident: b24 article-title: Meaning and vision of mimic computing and mimic security defense publication-title: Telecommun. Sci. – volume: 20 start-page: 18 year: 2020 end-page: 27 ident: b17 article-title: Sublinear latency for simplified successive cancellation decoding of polar codes publication-title: IEEE Trans. Wireless Commun. – volume: 46 year: 2022 ident: b3 article-title: The rise of 5G technologies and systems: A quantitative analysis of knowledge production publication-title: Telecommun. Policy – volume: 2 start-page: 13 year: 2017 end-page: 28 ident: b26 article-title: The test and analysis of prototype of mimic defense in web servers publication-title: J. Cyber Secur. – volume: 47 start-page: 30 year: 2021 end-page: 35 ident: b30 article-title: Higher-order heterogeneity large number judgment algorithms for mimetic defense systems publication-title: Comput. Eng. – volume: 69 start-page: 2269 year: 2022 end-page: 2299 ident: b5 article-title: Adjacent-bits-swapped polar codes: A new code construction to speed up polarization publication-title: IEEE Trans. Inform. Theory – volume: 66 year: 2023 ident: b7 article-title: Reduced-search guessing random additive noise decoding of polar codes publication-title: Sci. China Inf. Sci. – year: 2020 ident: b23 article-title: Research On Polar Code Decoding Algorithm Based on Deep Learning – volume: 55 start-page: 3051 year: 2009 end-page: 3073 ident: b9 article-title: Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels publication-title: IEEE Trans. Inform. Theory – volume: 23 start-page: 29 year: 2020 end-page: 40 ident: b4 article-title: Design of polar codes in 5G new radio publication-title: IEEE Commun. Surv. Tutor. – volume: 32 start-page: 958 year: 2014 end-page: 966 ident: b16 article-title: Low-complexity soft-output decoding of polar codes publication-title: IEEE J. Sel. Areas Commun. – volume: 44 start-page: 8 year: 2021 ident: b31 article-title: Multi-indicator fitted voting algorithm based on improved AHP-FCE modeling publication-title: J. Beijing Univ. Posts Telecommun. – volume: 61 start-page: 2213 year: 2015 end-page: 2226 ident: b12 article-title: List decoding of polar codes publication-title: IEEE Trans. Inf. Theory – volume: 41 year: 2020 ident: b28 article-title: Mimetic defense-based endogenous security architecture for ethernet switches publication-title: J. Commun. Tongxin Xuebao – volume: 23 start-page: 950 year: 2019 end-page: 953 ident: b19 article-title: Improved fast-SSC-flip decoding of polar codes publication-title: IEEE Commun. Lett. – volume: 21 start-page: 3682 year: 2019 end-page: 3722 ident: b1 article-title: Security for 5G and beyond publication-title: IEEE Commun. Surv. Tutor. – volume: 42 start-page: 37 year: 2021 end-page: 47 ident: b29 article-title: A mimetic defense approach for process control flow hijacking attacks publication-title: J. Commun. Tongxin Xuebao – year: 2021 ident: b22 article-title: Research On Compilation Algorithm of Polar Codes in 5G System – volume: 20 start-page: 153 year: 2023 end-page: 170 ident: b6 article-title: Deep learning aided SCL decoding of polar codes with shifted-pruning publication-title: China Commun. – volume: 28 start-page: 883 year: 2017 end-page: 897 ident: b25 article-title: Design and implementation of mimic defense web server publication-title: J. Softw. – volume: 66 issue: 2 year: 2023 ident: 10.1016/j.comnet.2024.110673_b7 article-title: Reduced-search guessing random additive noise decoding of polar codes publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-022-3623-y – start-page: 1 year: 2019 ident: 10.1016/j.comnet.2024.110673_b8 article-title: Learning to decode polar codes with quantized LLRs passing – volume: 47 start-page: 30 issue: 5 year: 2021 ident: 10.1016/j.comnet.2024.110673_b30 article-title: Higher-order heterogeneity large number judgment algorithms for mimetic defense systems publication-title: Comput. Eng. – volume: 21 start-page: 3682 issue: 4 year: 2019 ident: 10.1016/j.comnet.2024.110673_b1 article-title: Security for 5G and beyond publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2916180 – volume: 23 start-page: 29 issue: 1 year: 2020 ident: 10.1016/j.comnet.2024.110673_b4 article-title: Design of polar codes in 5G new radio publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2020.2967127 – volume: 44 start-page: 8 issue: 2 year: 2021 ident: 10.1016/j.comnet.2024.110673_b31 article-title: Multi-indicator fitted voting algorithm based on improved AHP-FCE modeling publication-title: J. Beijing Univ. Posts Telecommun. – year: 2020 ident: 10.1016/j.comnet.2024.110673_b23 – volume: 2 start-page: 13 issue: 1 year: 2017 ident: 10.1016/j.comnet.2024.110673_b26 article-title: The test and analysis of prototype of mimic defense in web servers publication-title: J. Cyber Secur. – start-page: 24 year: 2016 ident: 10.1016/j.comnet.2024.110673_b33 article-title: The encode and decode theory of polar code and its performance simulating – start-page: 1 year: 2015 ident: 10.1016/j.comnet.2024.110673_b13 article-title: Reduced complexity belief propagation decoders for polar codes – start-page: 110 year: 2022 ident: 10.1016/j.comnet.2024.110673_b34 article-title: Classification of automorphisms for the decoding of polar codes – volume: 55 start-page: 3051 issue: 7 year: 2009 ident: 10.1016/j.comnet.2024.110673_b9 article-title: Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels publication-title: IEEE Trans. Inform. Theory doi: 10.1109/TIT.2009.2021379 – volume: 41 issue: 5 year: 2020 ident: 10.1016/j.comnet.2024.110673_b28 article-title: Mimetic defense-based endogenous security architecture for ethernet switches publication-title: J. Commun. Tongxin Xuebao – volume: 69 start-page: 2269 issue: 4 year: 2022 ident: 10.1016/j.comnet.2024.110673_b5 article-title: Adjacent-bits-swapped polar codes: A new code construction to speed up polarization publication-title: IEEE Trans. Inform. Theory doi: 10.1109/TIT.2022.3228862 – volume: 23 start-page: 950 issue: 6 year: 2019 ident: 10.1016/j.comnet.2024.110673_b19 article-title: Improved fast-SSC-flip decoding of polar codes publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2019.2910059 – volume: 32 start-page: 958 issue: 5 year: 2014 ident: 10.1016/j.comnet.2024.110673_b16 article-title: Low-complexity soft-output decoding of polar codes publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2014.140515 – volume: 22 start-page: 1536 issue: 8 year: 2018 ident: 10.1016/j.comnet.2024.110673_b14 article-title: Belief propagation list decoding of polar codes publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2018.2850772 – volume: 46 issue: 4 year: 2022 ident: 10.1016/j.comnet.2024.110673_b3 article-title: The rise of 5G technologies and systems: A quantitative analysis of knowledge production publication-title: Telecommun. Policy doi: 10.1016/j.telpol.2022.102327 – volume: 30 start-page: 1 issue: 7 year: 2014 ident: 10.1016/j.comnet.2024.110673_b24 article-title: Meaning and vision of mimic computing and mimic security defense publication-title: Telecommun. Sci. – volume: 33 issue: 9 year: 2022 ident: 10.1016/j.comnet.2024.110673_b2 article-title: Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami-m fading channels publication-title: Trans. Emerg. Telecommun. Technol. – volume: 42 start-page: 13 issue: 7 year: 2016 ident: 10.1016/j.comnet.2024.110673_b32 article-title: Research on a high performance low complexity polar code coding and decoding algorithm publication-title: Appl. Electron. Tech. – start-page: 2670 year: 2017 ident: 10.1016/j.comnet.2024.110673_b27 article-title: MDFS: A mimic defense theory based architecture for distributed file system – volume: 20 start-page: 153 issue: 1 year: 2023 ident: 10.1016/j.comnet.2024.110673_b6 article-title: Deep learning aided SCL decoding of polar codes with shifted-pruning publication-title: China Commun. doi: 10.23919/JCC.2023.01.013 – volume: 61 start-page: 2213 issue: 5 year: 2015 ident: 10.1016/j.comnet.2024.110673_b12 article-title: List decoding of polar codes publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2015.2410251 – start-page: 279 year: 2019 ident: 10.1016/j.comnet.2024.110673_b18 article-title: Heterogeneous executors scheduling algorithm for mimic defense systems – year: 2020 ident: 10.1016/j.comnet.2024.110673_b20 – volume: 6 start-page: 798 issue: 6 year: 2017 ident: 10.1016/j.comnet.2024.110673_b11 article-title: Analysis and adaptive design of polar coded HARQ transmission under SC-list decoding publication-title: IEEE Wirel. Commun. Lett. doi: 10.1109/LWC.2017.2743080 – year: 2020 ident: 10.1016/j.comnet.2024.110673_b10 – volume: 20 start-page: 18 issue: 1 year: 2020 ident: 10.1016/j.comnet.2024.110673_b17 article-title: Sublinear latency for simplified successive cancellation decoding of polar codes publication-title: IEEE Trans. Wireless Commun. doi: 10.1109/TWC.2020.3022922 – volume: 42 start-page: 37 issue: 1 year: 2021 ident: 10.1016/j.comnet.2024.110673_b29 article-title: A mimetic defense approach for process control flow hijacking attacks publication-title: J. Commun. Tongxin Xuebao – volume: 61 start-page: 3100 issue: 8 year: 2013 ident: 10.1016/j.comnet.2024.110673_b15 article-title: Improved successive cancellation decoding of polar codes publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2013.070213.120789 – year: 2021 ident: 10.1016/j.comnet.2024.110673_b21 – year: 2021 ident: 10.1016/j.comnet.2024.110673_b22 – volume: 28 start-page: 883 issue: 4 year: 2017 ident: 10.1016/j.comnet.2024.110673_b25 article-title: Design and implementation of mimic defense web server publication-title: J. Softw. |
| SSID | ssj0004428 |
| Score | 2.4312332 |
| Snippet | The advent of fifth-generation mobile communication technology, 5G, has raised the bar for data transmission rates, information security, and reliability.... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 110673 |
| SubjectTerms | Active defense Cyberspace security DHR Polar code The true relatively axiom |
| Title | Highly reliable DHR-based polar compilation code communication method |
| URI | https://dx.doi.org/10.1016/j.comnet.2024.110673 |
| Volume | 252 |
| WOSCitedRecordID | wos001288258100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 1389-1286 databaseCode: AIEXJ dateStart: 19990114 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0004428 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwELa2Sw_lgPoUtBT50Bsy2jjOw8dVWQQcECpU2vYS2bGjBi0BLbuIXvnlzNh50SIEBy5WNMk6j_l2PJl8M0PINz0ynKsoZRap4gJcBKaNskxq_ApTaB4W2jWbSI6O0ulUHg8Gt00uzPUsqar05kZevqiqQQbKxtTZZ6i7nRQEsA1KhxHUDuOTFI_MjdlfTFIpXVrU7v4PhmuVwYYMau5I5KVnwG1jQjsKuhyRuqV032dtGj9sV54y7uK043OssGBqOHVZw3WIQcpeiOH3H-styq_lbNkSfpYeKrBU4u6WGFQ6-QnGsc1FJweBC-qelFdlP1LBRct5a4wrOEcM1sO4b325L2Bb288AK9qFD5p2H2U4Q83A7e7gCXa6w-9X0v5nhWt5hw2l7Szzs2Q4S-ZneUVWeBLJdEhWxgeT6WGXXStch9726psETMcS_P9qHnZwek7L6VuyVr9t0LFHyTsysNV7stqrQfmBTDxeaIMX2uKFOrzQHl4o4oXewwv1ePlIfu5NTr_vs7q3BsvhJXLBlA65jdVI5eBfY4WjIAyl0IWRhQkKHRv4sxY2VWkIQxGZPApiruBAHUgrAh1-IsPqorLrhEZ5EYtccCVNKiJuU2mSQAs7inLYToINwpoHkl36EirZY4rYIEnz1LLaDfTuXQZQePSXn595pi_kTYfTTTJczJf2K3mdXy_Kq_lWjYM7VMV_Vw |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Highly+reliable+DHR-based+polar+compilation+code+communication+method&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Zheng%2C+Yulu&rft.au=Gu%2C+Tiansheng&rft.au=Liu%2C+Shangdong&rft.au=Shao%2C+Sisi&rft.date=2024-10-01&rft.issn=1389-1286&rft.volume=252&rft.spage=110673&rft_id=info:doi/10.1016%2Fj.comnet.2024.110673&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comnet_2024_110673 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |