期刊文献+
共找到101篇文章
< 1 2 6 >
每页显示 20 50 100
Improving the Covertness in the Physical-Layer Authentication 被引量:2
1
作者 Ning Xie TianXing Hu 《China Communications》 SCIE CSCD 2021年第3期122-131,共10页
A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lo... A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lower robustness.This paper concerns the problem of improving the covertness without sacrificing the robustness.This problem is important because of the following reasons:reducing the errors in recovered source message,improving the security,and ease of constructing a multi-factor authentication system.In this paper,we propose three covert PLA schemes to address the problem.In the first scheme,we improve the covertness by reducing the modification ratio on the source message based on an encoding mechanism.In the second scheme,we improve the covertness by optimizing the superimposing angle,which maximizes the minimum distance between the tagged symbols and the boundary line of the demodulation decision for the source message.In the third scheme,referred to as the hybrid scheme,we further improve the covertness by jointly using the advantages of both the above two schemes.Our experimental results show that when the SNR at a legitimate receiver is 25 dB,as compared with the prior scheme,the first scheme improves the covertness by 17:74%,the second scheme improves the covertness by 28:79%,and the third scheme improves the covertness by 32:09%,while they have similar robustness as Received:Aug.07,2020 Revised:Sep.08,2020 Editor:Nanrun Zhou that of the prior scheme. 展开更多
关键词 physical-layer AUTHENTICATION ENCODING covertness superimposing angle SECURITY
在线阅读 下载PDF
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
2
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital Communications and Networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden Jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
3
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
BCDH:Blockchain-based covert Diffie-Hellman key exchange scheme
4
作者 Qinghua Hu Chunxiang Xu Wanpeng Li 《Defence Technology(防务技术)》 2025年第10期24-31,共8页
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha... The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications. 展开更多
关键词 Diffie-Hellman key exchange Digital signature Covert communication Blockchain Blockchain-based covert communication
在线阅读 下载PDF
Reconfigurable Intelligent Surface-Aided MIMO Covert Communications in High-Speed Railway Scenario
5
作者 Zhang Zepeng Li Cuiran +1 位作者 Wu Hao Xie Jianli 《China Communications》 2025年第7期109-123,共15页
This paper investigates the reconfigurable intelligent surface(RIS)-aided MIMO covert communications in high-speed railway(HSR)scenario.In the scenario,RIS controls the phases of reflection elements dynamically to sen... This paper investigates the reconfigurable intelligent surface(RIS)-aided MIMO covert communications in high-speed railway(HSR)scenario.In the scenario,RIS controls the phases of reflection elements dynamically to send the signal in the desired direction,which facilitates the covert communication between base station(BS)and train mobile relay(MR)in the existence of a watchful warden(Willie).To protect the desired transmission,it is assumed that MR sends out jamming signals with a varying power to confuse the Willie.Considering the Doppler spread caused by the time-varying wireless channel,the joint optimization problem of the BS beamforming matrix,MR beamforming matrix,and the RIS phase shifts is established to maximize the covert throughput.An alternating optimization(AO)method for handling non convex problems is proposed based on coupling effects and the constraints of constant modulus,and a semidefinite relaxation method is provided.Finally,we achieve the optimal solutions of the multi-objective optimization problem by interior-point method.The simulation results demonstrate that the proposed algorithm exhibits the superior robustness and covert performances in high-speed railway scenarios. 展开更多
关键词 AO covert communications HSR MIMO mmWave RIS
在线阅读 下载PDF
A Blockchain-Based Covert Communication Model Based on Dynamic Base-K Encoding
6
作者 Wang Zhujun Zhang Lejun +7 位作者 Li Xueqing Tian Zhihong Su Shen Qiu Jing Chen Huiling Qiu Tie Sergey Gataullin Guo Ran 《China Communications》 2025年第6期319-333,共15页
Blockchain,as a distributed ledger,inherently possesses tamper-resistant capabilities,creating a natural channel for covert communication.However,the immutable nature of data storage might introduce challenges to comm... Blockchain,as a distributed ledger,inherently possesses tamper-resistant capabilities,creating a natural channel for covert communication.However,the immutable nature of data storage might introduce challenges to communication security.This study introduces a blockchain-based covert communication model utilizing dynamic Base-K encoding.The proposed encoding scheme utilizes the input address sequence to determine K to encode the secret message and determines the order of transactions based on K,thus ensuring effective concealment of the message.The dynamic encoding parameters enhance flexibility and address issues related to identical transaction amounts for the same secret message.Experimental results demonstrate that the proposed method maintains smooth communication and low susceptibility to tampering,achieving commendable concealment and embedding rates. 展开更多
关键词 base-K encoding blockchain CONCEALMENT covert communication
在线阅读 下载PDF
Joint Optimization Beamforming and Horizontal Trajectory for UAV Covert Communications in Non-Terrestrial Network
7
作者 Lyu Daxin Wen Zhaoxi +2 位作者 Ma Yingchang Zhang Junlin Liu Mingqian 《China Communications》 2025年第10期34-51,共18页
With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequ... With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequently,safeguarding com-munication information in the NTN has emerged as a critical challenge.To address this issue,we pro-pose a beamforming and horizontal trajectory joint op-timization method for unmanned aerial vehicle(UAV)covert communications in the NTN.First,we formu-late an optimization problem that considers constraints such as the transmitting power and the distance.More-over,we employ the integrated communication and jamming(ICAJ)signal as Alice’s transmitting signal,further protecting the content of communication in-formation.Next,we construct two subproblems,and we propose an alternate optimization(AO)algorithm based on quadratic transform and penalty term method to solve the proposed two subproblems.Simulation re-sults demonstrate that the proposed method is effective and has better performance than benchmarks. 展开更多
关键词 BEAMFORMING covert communications horizontal trajectory optimization integrated commu-nication and jamming non-terrestrial network.
在线阅读 下载PDF
Covert Rate Characterization under Multi-Antenna Detection:A Study on Warden’s CSI Availability and Noise Uncertainty
8
作者 Zhang Yuchen Xiao Sa +3 位作者 Wang Jianquan Ning Boyu Yuan Xiaojun TangWanbin 《China Communications》 2025年第2期143-159,共17页
In this paper,we investigate covert communications under multi-antenna detection,and explore the impacts of the warden’s channel state information(CSI)availability and the noise uncertainty on system covert capabilit... In this paper,we investigate covert communications under multi-antenna detection,and explore the impacts of the warden’s channel state information(CSI)availability and the noise uncertainty on system covert capability.The detection performance at warden is analyzed in two cases under the perfect and statistical CSI at warden,respectively.In particular,for the former one,the warden utilizes the likelihood ratio(LR)detector,while for the latter one,the generalized likelihood ratio(GLR)detector is adopted.We first consider the scenario where the blocklength is finite,and demonstrate that the covert rate under both cases asymptotically goes to zero as the blocklength goes to infinity.Subsequently,we take the noise uncertainty at the warden into account which leads to positive covert rate,and characterize the covert rate for infinite blocklength.Specially,we derive the optimal transmit power for the legitimate transmitter that maximizes the covert rate.Besides,the rate gap under two cases,with different CSI availability at the warden,can be presented in closed form.Finally,numerical results validate the effectiveness of our theoretical analysis and also demonstrate the impacts of the factors studied on the system covertness. 展开更多
关键词 channel state information covert communications multiple antenna noise uncertainty
在线阅读 下载PDF
A deep reinforcement learning framework and its implementation for UAV-aided covert communication
9
作者 Shu FU Yi SU +1 位作者 Zhi ZHANG Liuguo YIN 《Chinese Journal of Aeronautics》 2025年第2期403-417,共15页
In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of Communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary Comm... In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of Communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary Communication Node(PCN).Specifically,all nodes transmit to the UAV exploiting uplink non-Orthogonal Multiple Access(NOMA),while the UAV performs covert transmission to the PCN at the same frequency.To minimize the average age of covert information,we formulate a joint optimization problem of UAV trajectory and power allocation designing subject to multi-dimensional constraints including covertness demand,communication quality requirement,maximum flying speed,and the maximum available resources.To address this problem,we embed Signomial Programming(SP)into Deep Reinforcement Learning(DRL)and propose a DRL framework capable of handling the constrained Markov decision processes,named SP embedded Soft Actor-Critic(SSAC).By adopting SSAC,we achieve the joint optimization of UAV trajectory and power allocation.Our simulations show the optimized UAV trajectory and verify the superiority of SSAC compared with various existing baseline schemes.The results of this study suggest that by maintaining appropriate distances from both the PCN and CNs,one can effectively enhance the performance of covert communication by reducing the detection probability of the CNs. 展开更多
关键词 Covert communication Unmanned aerial vehicle Deep reinforcement learning Trajectory planning Power allocation Communication systems
原文传递
Outage Performance Analysis of UAV-Cooperative Vehicular Communication Systems
10
作者 Liang Linlin Tian Zongkai +4 位作者 Huang Haiyan Zhang Nina Zhang Dehua Song Qipeng Li Yue 《China Communications》 2025年第8期245-256,共12页
The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacki... The utilization of unmanned aerial vehicle(UAV) relays in cooperative communication has gained considerable attention in recent years.However,the current research is mostly based on fixed base stations and users,lacking sufficient exploration of scenarios where communication nodes are in motion.This paper presents a multi-destination vehicle communication system based on decode-and-forward(DF)UAV relays,where source and destination vehicles are moving and an internal eavesdropper intercepts messages from UAV.The closed-form expressions for system outage probability and secrecy outage probability are derived to analyze the reliability and security of the system.Furthermore,the impact of the UAV's position,signal transmission power,and system time allocation ratio on the system's performance are also analyzed.The numerical simulation results validate the accuracy of the derived formulas and confirm the correctness of the analysis.The appropriate time allocation ratio significantly enhances the security performance of system under various environmental conditions. 展开更多
关键词 covert communication outage probability secrecy outage probability transport communication
在线阅读 下载PDF
Total Variation Based Asymptotics of Covert Communication in AWGN Channels
11
作者 Wang Jianquan Tang Wanbin Li Xiaoping 《China Communications》 2025年第5期173-188,共16页
Covert communication guarantees the security of wireless communications via hiding the existence of the transmission.This paper focuses on the first and second order asymptotics of covert communication in the AWGN cha... Covert communication guarantees the security of wireless communications via hiding the existence of the transmission.This paper focuses on the first and second order asymptotics of covert communication in the AWGN channels.The covertness is measured by the total variation distance between the channel output distributions induced with and without the transmission.We provide the exact expressions of the maximum amount of information that can be transmitted with the maximum error probability and the total variation less than any small numbers.The energy detection and the random coding are employed to prove our results.We further compare our results with those under relative entropy.The results show how many additional amounts of information can be transmitted covertly when changing the covertness constraint to total variation. 展开更多
关键词 additive white Gaussian noise channels asymptotical analysis covert communication relative entropy total variation
在线阅读 下载PDF
Intelligent Covert Communication:Recent Advances and Future Research Trends
12
作者 Zan Li Jia Shi +6 位作者 Jiangbo Si Lu Lv Lei Guan Benjian Hao Danyang Wang Chengwen Xing Tony Q.S.Quek 《Engineering》 2025年第1期101-111,共11页
With the future substantial increase in coverage and network heterogeneity,emerging networks will encounter unprecedented security threats.Covert communication is considered a potential enhanced security and privacy s... With the future substantial increase in coverage and network heterogeneity,emerging networks will encounter unprecedented security threats.Covert communication is considered a potential enhanced security and privacy solution for safeguarding future wireless networks,as it can enable monitors to detect the transmitter's transmission behavior with a low probability,thereby ensuring the secure transmission of private information.Due to its favorable security,it is foreseeable that covert communication will be widely used in various wireless communication settings such as medical,financial,and military scenarios.However,existing covert communication methods still present many challenges toward practical applications.In particular,it is difficult to guarantee the effectiveness of covert schemes based on the randomness of eavesdropping environments,and it is challenging for legitimate users to detect weak covert signals.Considering that emerging artificial-intelligence-aided transmission technologies can open up entirely new opportunities to address the above challenges,we provide a comprehensive review of recent advances and potential research directions in the field of intelligent covert communications in this work.First,the basic concepts and performance metrics of covert communications are introduced.Then,existing effective covert communication techniques in the time,frequency,spatial,power,and modulation domains are reviewed.Finally,this paper discusses potential implementations and challenges for intelligent covert communications in future networks. 展开更多
关键词 Covert communication Artificial intelligence Wireless security
在线阅读 下载PDF
Physical Layer Security Scheme With AoI-Awareness for Industrial IoT Based on Covert Communications
13
作者 Yaping Li Zhi-Xin Liu +1 位作者 Jia-Wei Su Ya-Zhou Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期276-278,共3页
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo... Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1]. 展开更多
关键词 industrial iiot internet things iiot physical layer security covert communications malicious detections attacks cyberphysical system cps aoi awareness wireless communication
在线阅读 下载PDF
Establishment and characterization of a continuous marine fish fin cell line from Epinephelus fuscoguttatus and viral susceptibility to crustacean CMNV
14
作者 Ting XUE Yue ZHANG +3 位作者 Zhenxin ZHAO Yaru LI Jinwu WANG Huarong GUO 《Journal of Oceanology and Limnology》 2025年第3期892-905,共14页
Fish cell line provide a useful tool for studies in virology and molecular biology.To establish a novel continuous marine fish cell line(EFF)from caudal fin tissue of brown-marbled grouper Epinephelus fuscoguttatus,it... Fish cell line provide a useful tool for studies in virology and molecular biology.To establish a novel continuous marine fish cell line(EFF)from caudal fin tissue of brown-marbled grouper Epinephelus fuscoguttatus,its susceptibility to the crustacean covert mortality nodavirus(CMNV)was evaluated.The primary cell cultures were initiated first by incomplete digestion of fin tissue blocks with dispase and collagenase,and then the explant was cultured in L-15 medium supplemented with 20%fetal bovine serum,10%grouper muscle extract,and 20-ng/mL growth factors of basic fibroblast growth factor(bFGF)and epidermal growth factor(EGF).The EFF cells were continuously passaged beyond 50 times in fibroblast-like morphology,and they grew well in L-15 medium supplemented with a lower concentration fetal bovine serum(10%)at 28℃ after passage 10,without muscle extract and the growth factors.In addition,their grouper origin was confirmed by chromosome analysis and cytochrome oxidase 1(CO 1)gene analysis of these EFF cells.Transfection experiment via lipofectamine 8000 indicated that the EFF cells had a high transfection potential with a transfection efficiency up to 32%.Cross-species viral susceptibility analysis showed that CMNV not only successfully infected the EFF cells as evidenced by obvious cytopathic effects like vacuolation,detachment and death of cells,but also multiplied in the EFF cells as indicated by the results of semi-quantitative RT-PCR in transmission electron microscopy.Therefore,the establishment of immortal EFF cell line provided a useful cell model for future works on the isolation,multiplication,and pathogenic mechanism of cross-species infection of CMNV as well as genetic manipulation. 展开更多
关键词 Epinephelus fuscoguttatus fish cell line(EFF) caudal fin TRANSFECTION covert mortality nodavirus(CMNV) cross-species infection
在线阅读 下载PDF
Intelligent Reflecting Surface-Aided Secure and Covert Communications 被引量:2
15
作者 Zhou Xiaobo Jiang Yong +2 位作者 Xia Tingting Xia Guiyang Shen Tong 《China Communications》 SCIE CSCD 2024年第9期1-10,共10页
This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit pow... This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit power at transmitter Alice in order to optimize the achievable secrecy rate at Bob subject to a covertness constraint.We first develop a Dinkelbach-based algorithm to achieve an upper bound performance and a high-quality solution.For reducing the overhead and computational complexity of the Dinkelbach-based scheme,we further conceive a low-complexity algorithm in which analytical expression for the IRS reflection beamforming is derived at each iteration.Examination result shows that the devised low-complexity algorithm is able to achieve similar secrecy rate performance as the Dinkelbach-based algorithm.Our examination also shows that introducing an IRS into the considered system can significantly improve the secure and covert communication performance relative to the scheme without IRS. 展开更多
关键词 covert communications intelligent reflecting surface physical layer security reflection beamforming
在线阅读 下载PDF
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies 被引量:2
16
作者 Mao Haobin Liu Yanming +5 位作者 Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen 《China Communications》 SCIE CSCD 2024年第3期1-18,共18页
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation. 展开更多
关键词 artificial intelligence(AI) sixth generation(6G) space-air-ground integrated networks(SAGINs) space/air covert communications
在线阅读 下载PDF
Tree: Reducing the use of restrictive practices on psychiatric wards through virtual reality immersive technology training 被引量:2
17
作者 Peter Phiri Laura Pemberton +8 位作者 Yang Liu Xiaojie Yang Joe Salmon Isabel Boulter Sana Sajid Jackie Clarke Andy McMillan Jian Qing Shi Gayathri Delanerolle 《World Journal of Psychiatry》 SCIE 2024年第10期1521-1537,共17页
BACKGROUND Restrictive practices(RPs)are defined by measures linked to physical and chemical restraints to reduce the movement or control behaviours during any emergency.Seclusion is an equal part of RPs intended to i... BACKGROUND Restrictive practices(RPs)are defined by measures linked to physical and chemical restraints to reduce the movement or control behaviours during any emergency.Seclusion is an equal part of RPs intended to isolate and reduce the sensory stimulation to safeguard the patient and those within the vicinity.Using interventions by way of virtual reality(VR)could assist with reducing the need for RPs as it could help reduce anxiety or agitation by way of placing users into realistic and immersive environments.This could also aid staff to and change current RPs.AIM To assess the feasibility and effectiveness of using a VR platform to provide reduction in RP training.METHODS A randomised controlled feasibility study,accompanied by evaluations at 1 month and 6 months,was conducted within inpatient psychiatric wards at Southern Health National Health Service Foundation Trust,United Kingdom.Virti VR scenarios were used on VR headsets to provide training on reducing RPs in 3 inpatient psychiatric wards.Outcome measures included general self-efficacy scale,generalised anxiety disorder assessment 7(GAD-7),Burnout Assessment Tool 12,the Everyday Discrimination Scale,and the Compassionate Engagement and Action Scale.RESULTS Findings revealed statistically significant differences between the VR and treatment as usual groups,in the Everyday Discrimination Scale items Q8 and Q9:P=0.023 and P=0.040 respectively,indicating higher levels of perceived discrimination in the VR group.There were no significant differences between groups in terms of general self-efficacy,generalised anxiety disorder assessment 9,and Burnout Assessment Tool 12 scores.A significant difference was observed within the VR group for compassionate engagement from others(P=0.005)over time.Most respondents recorded System Usability Scale scores above 70,with an average score of 71.79.There was a significant reduction in rates of RPs in the VR group vs treatment as usual group with a fluctuating variability observed in the VR group likely due to external factors not captured in the study.CONCLUSION Ongoing advancement of VR technology enables the possibility of creating scenarios and simulations tailored to healthcare environments that empower staff by providing more comprehensive and effective training for handling situations. 展开更多
关键词 Virtual reality Restrictive practices Inpatient wards Restraint Isolation Rapid tranquilisation Covert medication Procedural restrictions Health professions training
暂未订购
Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array 被引量:1
18
作者 Ma Yue Ma Ruiqian +4 位作者 Lin Zhi Yang Weiwei Cai Yueming Miao Chen Wu Wen 《China Communications》 SCIE CSCD 2024年第4期23-37,共15页
In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retro... In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retrodirective array(TMRDA).Specifically,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is sufficiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fixed block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI. 展开更多
关键词 age of information covert communication retrodirective array time modulation
在线阅读 下载PDF
Joint Active and Passive Beamforming Design in Intelligent Reflecting Surface(IRS)-Assisted Covert Communications:A Multi-Agent DRL Approach 被引量:1
19
作者 Gao Ang Ren Xiaoyu +2 位作者 Deng Bin Sun Xinshun Zhang Jiankang 《China Communications》 SCIE CSCD 2024年第9期11-26,共16页
Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detecti... Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detection of malicious eavesdroppers by coherently beaming the scattered signals and suppressing the signals leakage.However,when multiple IRSs are involved,accurate channel estimation is still a challenge due to the extra hardware complexity and communication overhead.Besides the crossinterference caused by massive reflecting paths,it is hard to obtain the close-formed solution for the optimization of covert communications.On this basis,the paper improves a heterogeneous multi-agent deep deterministic policy gradient(MADDPG)approach for the joint active and passive beamforming(Joint A&P BF)optimization without the channel estimation,where the base station(BS)and multiple IRSs are taken as different types of agents and learn to enhance the covert spectrum efficiency(CSE)cooperatively.Thanks to the‘centralized training and distributed execution’feature of MADDPG,each agent can execute the active or passive beamforming independently based on its partial observation without referring to others.Numeral results demonstrate that the proposed deep reinforcement learning(DRL)approach could not only obtain a preferable CSE of legitimate users and a low detection of probability(LPD)of warden,but also alleviate the communication overhead and simplify the IRSs deployment. 展开更多
关键词 covert communications deep reinforcement learning intelligent reflecting surface
在线阅读 下载PDF
Digital Image Steganographer Identification:A Comprehensive Survey
20
作者 Qianqian Zhang Yi Zhang +2 位作者 Yuanyuan Ma Yanmei Liu Xiangyang Luo 《Computers, Materials & Continua》 SCIE EI 2024年第10期105-131,共27页
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ... The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online.Accurately discerning a steganographer from many normal users is challenging due to various factors,such as the complexity in obtaining the steganography algorithm,extracting highly separability features,and modeling the cover data.After extensive exploration,several methods have been proposed for steganographer identification.This paper presents a survey of existing studies.Firstly,we provide a concise introduction to the research background and outline the issue of steganographer identification.Secondly,we present fundamental concepts and techniques that establish a general framework for identifying steganographers.Within this framework,state-of-the-art methods are summarized from five key aspects:data acquisition,feature extraction,feature optimization,identification paradigm,and performance evaluation.Furthermore,theoretical and experimental analyses examine the advantages and limitations of these existing methods.Finally,the survey highlights outstanding issues in image steganographer identification that deserve further research. 展开更多
关键词 Information hiding STEGANALYSIS steganographer identification STEGANOGRAPHY covert communication SURVEY
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部