[1] STALLINGS W. Cryptography and Network Security:Principles and Practice[M]. 3rd ed.[S.l.]:Pearson Education, 2002:121-136. [2] YI P, YAO Y, HOU Y, et al. Securing Ad Hoc networks through mobile Agent[C]//Proceedings of the 3rd International Conference on Information Security. New York:ACM, 2004:125-129. [3] CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[C]//Proceedings of the 2003 Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2003:197-213. [4] THANGARAJ A, DIHIDAR S, CALDERBANK A R, et al. Applications of LDPC codes to the wiretap channel[J]. IEEE Transactions on Information Theory, 2004, 53(8):2933-2945. [5] LIU R, POOR H V, SPASOJEVIC P, et al. Nested codes for secure transmission[C]//Proceedings of the 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications. Piscataway, NJ:IEEE, 2008:1-5. [6] ZHANG Y, DAI H. A real orthogonal space-time coded UWB scheme for wireless secure communications[J]. EURASIP Journal on Wireless Communications & Networking, 2009, 2009(1):Article ID 571903. [7] KOBAYASHI M, DEBBAH M, SHAMAI S. Secured communication over frequency-selective fading channels:a practical vandermonde precoding[J]. EURASIP Journal on Wireless Communications & Networking, 2009, 2009(1):Article ID 386547. [8] 张聪. MIMO系统中物理层安全研究[D]. 北京:北京邮电大学, 2014:1-15.(ZHANG C. Research on physical layer security in MIMO system[D]. Beijing:Beijing University of Posts and Telecommunications, 2014:1-15.) [9] XIAO L, GREENSTEIN L, MANDAYAM N, et al. Fingerprints in the Ether:using the physical layer for wireless authentication[C]//Proceedings of the 2007 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2007:4646-4651. [10] XIAO L, GREENSTEIN L J, MANDAYAM N B, et al. Using the physical layer for wireless authentication in time-variant channels[J]. IEEE Transactions on Wireless Communications, 2008, 7(7):2571-2579. [11] XIAO L, GREENSTEIN L, MANDAYAM N, et al. A physical-layer technique to enhance authentication for mobile terminals[C]//Proceedings of the 2008 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2008:1520-1524. [12] PEI C C, ZHANG N, SHEN X S, et al. Channel-based physical layer authentication[C]//Proceedings of the 2014 IEEE Global Communications Conference. Piscataway, NJ:IEEE, 2014:4114-4119. [13] 王映民, 孙韶辉. TD-LTE技术原理与系统设计[M]. 北京:人民邮电出版社, 2010:7-60.(WANG Y M, SUN S H. TD-LTE Technology Principle and System Design[M]. Beijing:Posts and Telecommunications Press, 2010:7-60.) [14] 梁循. 支持向量机算法及其金融应用[M]. 北京:知识产权出版社, 2012:3-25. (LIANG X. SVM Algorithm and Its Application in Finance[M]. Beijing:Intellectual Property Publishing House, 2012:3-25.) [15] 白鹏, 张喜斌, 张斌,等. 支持向量机理论及工程应用实例[M]. 西安:西安电子科技大学出版社, 2008:1-21.(BAI P, ZHANG X B, ZHANG B, et al. SVM Theory and Engineering Application Example[M]. Xi'an:Xidian University Press, 2008:1-21.) [16] CRISTIANINI N, SHAWE-TAYLOR J. An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods[M]. Cambridge:Cambridge University Press, 2000:4-266. [17] IMAM T, TING K M, KAMRUZZAMAN J. z-SVM:an SVM for improved classification of imbalanced data[C]//Proceedings of the 19th Australian Joint Conference on Artificial Intelligence. Berlin:Springer-Verlag, 2006:264-273. [18] BOTTOU L, LIN C J. Support Vector Machine Solvers[M]. Cambridge:MIT Press, 2007:301-320. |