Chaotic optical communication has shown large potential as a hardware encryption method in the physical layer.As an important figure of merit,the bit rate–distance product of chaotic optical communication has been co...Chaotic optical communication has shown large potential as a hardware encryption method in the physical layer.As an important figure of merit,the bit rate–distance product of chaotic optical communication has been continually improved to 30 Gb/s×340 km,but it is still far from the requirement for a deployed optical fiber communication system,which is beyond 100 Gb/s×1000 km.A chaotic carrier can be considered as an analog signal and suffers from fiber channel impairments,limiting the transmission distance of high-speed chaotic optical communications.To break the limit,we propose and experimentally demonstrate a pilot-based digital signal processing scheme for coherent chaotic optical communication combined with deep-learning-based chaotic synchronization.Both transmission impairment recovery and chaotic synchronization are realized in the digital domain.The frequency offset of the lasers is accurately estimated and compensated by determining the location of the pilot tone in the frequency domain,and the equalization and phase noise compensation are jointly performed by the least mean square algorithm through the time domain pilot symbols.Using the proposed method,100 Gb∕s chaotically encrypted quadrature phase-shift keying(QPSK)signal over 800 km single-mode fiber(SMF)transmission is experimentally demonstrated.In order to enhance security,40 Gb∕s real-time chaotically encrypted QPSK signal over 800 km SMF transmission is realized by inserting pilot symbols and tone in a field-programmable gate array.This method provides a feasible approach to promote the practical application of chaotic optical communications and guarantees the high security of chaotic encryption.展开更多
Ultra-narrow bandwidth mode-locked lasers with tunable pulse duration can be versatile light sources for diverse applications.However,the spectral-temporal control of a narrow bandwidth mode-locked laser is challengin...Ultra-narrow bandwidth mode-locked lasers with tunable pulse duration can be versatile light sources for diverse applications.However,the spectral-temporal control of a narrow bandwidth mode-locked laser is challenging due to limited gain and nonlinearity,hindering practical applications of such lasers.We demonstrate a pulse duration widely tunable mode-locked ultra-narrow bandwidth laser using a composite filtering mechanism and a single-wall carbon nanotube.The laser pulse duration can be adjusted from 481 ps to 1.38 ns,which is the widest tuning range achieved in narrow-bandwidth passively mode-locked lasers.When the pulse duration is 1.38 ns,the corresponding spectral width reaches 4 pm(502 MHz).Numerical simulations support the experimental results and show that the evolution of long pulses in the laser cavity behaves similarly to a quasi-continuous wave with a low breathing ratio.We have not only designed a simple and flexible tunable scheme for the dilemma of spectral-temporal control in narrow-bandwidth mode-locked fiber lasers but also provided a unique and idealized light source for various applications that takes into account robust output.展开更多
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define...Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms.展开更多
Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this...Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this paper,we explain adversarial attacks from the perspective of robust features,and propose a novel Generative Adversarial Network(GAN)-based Robust Feature Disentanglement framework(GRFD)for adversarial defense.The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator.For the generator,we introduce a novel Latent Variable Constrained Variational Auto-Encoder(LVCVAE),which enhances the typical beta-VAE with a constrained rectification module to enforce explicit clustering of latent variables.To supervise the disentanglement of robust features,we design a Robust Supervisory Model(RSM)as the discriminator,sharing architectural alignment with the target model.The key innovation of RSM is our proposed Feature Robustness Metric(FRM),which serves as part of the training loss and synthesizes the classification ability of features as well as their resistance to perturbations.Extensive experiments on three benchmark datasets demonstrate the superiority of GRFD:it achieves 93.69%adversarial accuracy on MNIST,77.21%on CIFAR10,and 58.91%on CIFAR100 with minimal degradation in clean accuracy.Codes are available at:(accessed on 23 July 2025).展开更多
Recently,the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network(NG-EPON)systems.However,PON upstream channels operate ...Recently,the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network(NG-EPON)systems.However,PON upstream channels operate in burst-mode,hence the turn-on effects in optical network units(ONUs)may introduce burst errors,which are difficult for LDPC to deal with.One of the solutions is introducing an interleaver to convert consecutive burst errors into separate random errors.The traditional interleavers such as the block interleaver and the random interleaver,only consider dispersing the consecutive errors.In this paper,we present a design methodology for channel-adaptive interleaving pattern by joint optimizing of interleaving and LDPC decoding in PON systems deploying LDPC codes.After determining the interleaving pattern where the bits can be recovered with more reliable messages during LDPC iterative decoding,we map the bits from the potential locations of burst errors to the interleaving positions.By doing so,we can not only disperse the burst errors but also make full use of the LDPC code to improve its decoding performance.The numerical results show that the proposed interleaving scheme has a better performance under any burst-error length.展开更多
Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and struct...Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and structure sensitivity,which makes it challenging to realize broadband and reliable on-chip optical functions.Recently,topological pumping of edge states has emerged as a promising solution for implementing robust optical couplings.In this paper,we propose and experimentally demonstrate broadband on-chip mode manipulation with very large fabrication tolerance based on the Rice–Mele modeled silicon waveguide arrays.The Thouless pumping mechanism is employed in the design to implement broadband and robust mode conversion and multiplexing.The experimental results prove that various mode-order conversions with low insertion losses and intermodal crosstalk can be achieved over a broad bandwidth of 80 nm ranging from 1500 to 1580 nm.Thanks to such a topological design,the device has a remarkable fabrication tolerance of±70 nm for the structural deviations in waveguide width and gap distance,which is,to the best of our knowledge,the highest among the coupled-waveguide mode-handling devices reported so far.As a proof-of-concept experiment,we cascade the topological mode-order converters to form a four-channel mode-division multiplexer and demonstrate the transmission of a 200-Gb/s 16-quadrature amplitude modulation signal for each mode channel,with the bit error rates below the 7%forward error correction threshold of 3.8×10^(-3).We reveal the possibility of developing new classes of broadband and fabrication-tolerant coupled-waveguide devices with topological photonic approaches,which may find applications in many fields,including optical interconnects,quantum communications,and optical computing.展开更多
A power splitter with a wideband arbitrary splitting ratio,which provides flexibility and adaptability in forming photonic devices such as microring resonators and Mach–Zehnder interferometers,proves to be essential ...A power splitter with a wideband arbitrary splitting ratio,which provides flexibility and adaptability in forming photonic devices such as microring resonators and Mach–Zehnder interferometers,proves to be essential in photonic integrated circuits(PICs).We designed and fabricated a directional coupler-based power splitter with a wideband arbitrary splitting ratio and a microring resonator with a wideband uniform extinction ratio(ER)based on artificial gauge field(AGF)optimization.The neural network-aided inverse design method is applied to complete the target.Less than 0.9 dB power splitting variation and 1.6 dB ER variation have been achieved experimentally over a 100-nm bandwidth.Wideband performance,design efficiency,and device compactness are obtained by utilizing this optimization,which indicates great potential and universality in PIC applications.展开更多
Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a c...Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a costly local oscillator laser.However,a fundamental question remains if there is an optimal DD receiver structure with the simplest design to approach the performance of the coherent homodyne detection.This study derives the optimal DD receiver structure with an optimal transfer function to recover a quadrature amplitude modulation(QAM)signal with a near-zero guard band at the central frequency of the signal.We derive the theoretical ESE limit for various detection schemes by invoking Shannon’s formula.Our proposed scheme is closest to coherent homodyne detection in terms of the theoretical ESE limit.By leveraging a WaveShaper to construct the optimal transfer function,we conduct a proof-of-concept experiment to transmit a net 228.85-Gb/s 64-QAM signal over an 80-km single-mode fiber with a net ESE of 8.76 b/s/Hz.To the best of our knowledge,this study reports the highest net ESE per polarization per wavelength for DD transmission beyond 40-km single-mode fiber.For a comprehensive metric,denoted as 2ESE×Reach,we achieve the highest 2ESE×Reach per polarization per wavelength for DD transmission.展开更多
The topic of improving the mechanical stability of external cavity diode lasers(ECDLs)has recently attracted widespread attention and interest.The use of corner-cube-array(CCA)-based resonators provides a potential so...The topic of improving the mechanical stability of external cavity diode lasers(ECDLs)has recently attracted widespread attention and interest.The use of corner-cube-array(CCA)-based resonators provides a potential solution for this purpose,although continuous oscillation at super large incident angle remains challenging.In this work,we employ the CCA resonator to generate continuous oscillation within±20°angular misalignment of cavity mirror in experiment.On the basis of retroreflection theory,the retroreflectivity of a CCA is analyzed by using optical simulation software.Notably,the experiment verifies the advantage of using a CCA over a plane mirror in laser resonator,thereby providing a promising approach for ECDLs.The threshold characteristic curves measured at different incident angles in the experiment verify that the CCA possesses an obvious anti-angle misalignment performance.This research introduces an alternative solution of using CCA resonator instead of parallel plane cavity,thereby realizing an adjustment-free ECDL with enhanced mechanical stability.展开更多
The progressive edge-growth(PEG)al-gorithm is a general method to construct short low-density parity-check(LDPC)codes and it is a greedy method to place each edge with large girths.In order to improve the performance ...The progressive edge-growth(PEG)al-gorithm is a general method to construct short low-density parity-check(LDPC)codes and it is a greedy method to place each edge with large girths.In order to improve the performance of LDPC codes,many im-proved PEG(IPEG)algorithms employ multi metrics to select surviving edges in turn.In this paper,the pro-posed edges metric(EM)based on message-passing algorithm(MPA)is introduced to PEG algorithm and the proposed EM constrained PEG(EM-PEG)algo-rithm mainly considers the independence of message passing from different nodes in Tanner graph.The numerical results show that our EM-PEG algorithm brings better bit error rate(BER)performance gains to LDPC codes than the traditional PEG algorithm and the powerful multi-edge multi-metric constrained PEG algorithm(MM-PEGA)proposed recently.In ad-dition,the multi-edge EM constrained PEG(M-EM-PEG)algorithm which adopts multi-edge EM may fur-ther improve the BER performance.展开更多
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an...Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS.展开更多
The sixth generation(6G)of mobile communication system is witnessing a new paradigm shift,i.e.,integrated sensing-communication system.A comprehensive dataset is a prerequisite for 6G integrated sensing-communication ...The sixth generation(6G)of mobile communication system is witnessing a new paradigm shift,i.e.,integrated sensing-communication system.A comprehensive dataset is a prerequisite for 6G integrated sensing-communication research.This paper develops a novel simulation dataset,named M3SC,for mixed multi-modal(MMM)sensing-communication integration,and the generation framework of the M3SC dataset is further given.To obtain multimodal sensory data in physical space and communication data in electromagnetic space,we utilize Air-Sim and WaveFarer to collect multi-modal sensory data and exploit Wireless InSite to collect communication data.Furthermore,the in-depth integration and precise alignment of AirSim,WaveFarer,andWireless InSite are achieved.The M3SC dataset covers various weather conditions,multiplex frequency bands,and different times of the day.Currently,the M3SC dataset contains 1500 snapshots,including 80 RGB images,160 depth maps,80 LiDAR point clouds,256 sets of mmWave waveforms with 8 radar point clouds,and 72 channel impulse response(CIR)matrices per snapshot,thus totaling 120,000 RGB images,240,000 depth maps,120,000 LiDAR point clouds,384,000 sets of mmWave waveforms with 12,000 radar point clouds,and 108,000 CIR matrices.The data processing result presents the multi-modal sensory information and communication channel statistical properties.Finally,the MMM sensing-communication application,which can be supported by the M3SC dataset,is discussed.展开更多
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w...Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.展开更多
Sparse code multiple access (SCMA) is the most concerning scheme among non-orthogonal multiple access (NOMA) technologies for 5G wireless communication new interface. Another efficient technique in 5G aimed to improve...Sparse code multiple access (SCMA) is the most concerning scheme among non-orthogonal multiple access (NOMA) technologies for 5G wireless communication new interface. Another efficient technique in 5G aimed to improve spectral efficiency for local communications is device-to-device (D2D) communications. Therefore, we utilize the SCMA cellular network coexisting with D2D communications for the connection demand of the Internet of things (IOT), and improve the system sum rate performance of the hybrid network. We first derive the information-theoretic expression of the capacity for all users and find the capacity bound of cellular users based on the mutual interference between cellular users and D2D users. Then we consider the power optimization problem for the cellular users and D2D users jointly to maximize the system sum rate. To tackle the non-convex optimization problem, we propose a geometric programming (GP) based iterative power allocation algorithm. Simulation results demonstrate that the proposed algorithm converges fast and well improves the sum rate performance.展开更多
With the development of society and the progress of technology,more and more ocean activities are carried out.It results in booming of deep-sea diving.The use of helium-oxygen mixture(as a kind of breathing gas)solves...With the development of society and the progress of technology,more and more ocean activities are carried out.It results in booming of deep-sea diving.The use of helium-oxygen mixture(as a kind of breathing gas)solves the physiological problems of divers in saturated diving,but it brings about the Heliumspeech voice communication problem,the drop of speech intelligibility.There is no doubt that the effective speech communication must be provided for supporting the life and work of divers in deep-sea.This paper describes the mechanism of forming heliumspeech,discusses the effects of pressure and helium environment on the speech spectrum,compares the pros and cons of the time-domain and frequency-domain unscrambling techniques,shows the challenges in heliumspeech communications.Finally,it briefly introduces the deep learning,and points out that deep learning/machine learning may be a perfectly unscrambling technique.展开更多
Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to ...Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to transmit the secret messages with unconditional security. The present scheme can be implemented to distribute the secret quantum (or classical) messages with great capacity in imperfect quantum channel since the utilized code encodes k-qubit messages for each scheme run.展开更多
This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple e...This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple eavesdroppers.In this maritime communication networks(MCNs),it is challenging for the UAV to determine its trajectory on the ocean,since it cannot land or replenish energy on the sea surface,the trajectory should be pre-designed before the UAV takes off.Furthermore,the take-off location of the UAV and the sea lane of the vessel may be random,which leads to a highly dynamic environment.To address these issues,we propose two reinforcement learning schemes,Q-learning and deep deterministic policy gradient(DDPG)algorithms,to solve the discrete and continuous UAV trajectory design problem,respectively.Simulation results are provided to validate the effectiveness and superior performance of the proposed reinforcement learning schemes versus the existing schemes in the literature.Additionally,the proposed DDPG algorithm converges faster and achieves higher utilities for the UAV,compared to the Q-learning algorithm.展开更多
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the sec...A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.展开更多
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventi...The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network,sensor, global positioning system(GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots.Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors' carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert(25 km far from base station), has been proved efficient for data acquisition.展开更多
The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),...The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),the dominant transport protocol in the past decades,have had performance issues in such links.In this paper,we propose a novel transport approach which uses user datagram protocol(UDP)along with a simple yet effective bandwidth estimator for congestion control,and with a proactive packet-level forward erasure correction(FEC)code called streaming code to provide low-delay loss recovery without data retransmissions at all.We show that the approach can effectively address two issues of the state-of-the-art TCP variants in the long-distance lossy links,namely 1)the low bandwidth utilization caused by the slow increase of the congestion window(CWND)due to long roundtrip time(RTT)and the frequent CWND drop due to random and congestion losses,and 2)the high endto-end in-order delivery delay when re-transmissions are incurred to recover lost packets.In addition,we show that the scheme’s goodput has good smoothness and short-term intra-protocol fairness properties,which are beneficial for multimedia streaming and interactive applications that are prominent parts of today’s wireless traffic.展开更多
基金supported by the National Nature Science Foundation of China (Grant No.62025503).
文摘Chaotic optical communication has shown large potential as a hardware encryption method in the physical layer.As an important figure of merit,the bit rate–distance product of chaotic optical communication has been continually improved to 30 Gb/s×340 km,but it is still far from the requirement for a deployed optical fiber communication system,which is beyond 100 Gb/s×1000 km.A chaotic carrier can be considered as an analog signal and suffers from fiber channel impairments,limiting the transmission distance of high-speed chaotic optical communications.To break the limit,we propose and experimentally demonstrate a pilot-based digital signal processing scheme for coherent chaotic optical communication combined with deep-learning-based chaotic synchronization.Both transmission impairment recovery and chaotic synchronization are realized in the digital domain.The frequency offset of the lasers is accurately estimated and compensated by determining the location of the pilot tone in the frequency domain,and the equalization and phase noise compensation are jointly performed by the least mean square algorithm through the time domain pilot symbols.Using the proposed method,100 Gb∕s chaotically encrypted quadrature phase-shift keying(QPSK)signal over 800 km single-mode fiber(SMF)transmission is experimentally demonstrated.In order to enhance security,40 Gb∕s real-time chaotically encrypted QPSK signal over 800 km SMF transmission is realized by inserting pilot symbols and tone in a field-programmable gate array.This method provides a feasible approach to promote the practical application of chaotic optical communications and guarantees the high security of chaotic encryption.
基金supported by the National Natural Science Foundation of China(Grant No.61975107)the Natural Science Foundation of Shanghai(Grant Nos.24ZR1422000 and 20ZR1471500),and the“111”Project(Grant No.D20031).
文摘Ultra-narrow bandwidth mode-locked lasers with tunable pulse duration can be versatile light sources for diverse applications.However,the spectral-temporal control of a narrow bandwidth mode-locked laser is challenging due to limited gain and nonlinearity,hindering practical applications of such lasers.We demonstrate a pulse duration widely tunable mode-locked ultra-narrow bandwidth laser using a composite filtering mechanism and a single-wall carbon nanotube.The laser pulse duration can be adjusted from 481 ps to 1.38 ns,which is the widest tuning range achieved in narrow-bandwidth passively mode-locked lasers.When the pulse duration is 1.38 ns,the corresponding spectral width reaches 4 pm(502 MHz).Numerical simulations support the experimental results and show that the evolution of long pulses in the laser cavity behaves similarly to a quasi-continuous wave with a low breathing ratio.We have not only designed a simple and flexible tunable scheme for the dilemma of spectral-temporal control in narrow-bandwidth mode-locked fiber lasers but also provided a unique and idealized light source for various applications that takes into account robust output.
基金supported in part by Scientific Research Fund of Zhejiang Provincial Education Department under Grant Y202351110in part by Huzhou Science and Technology Plan Project under Grant 2024YZ23+1 种基金in part by Research Fund of National Key Laboratory of Advanced Communication Networks under Grant SCX23641X004in part by Postgraduate Research and Innovation Project of Huzhou University under Grant 2024KYCX50.
文摘Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms.
基金funded by the National Natural Science Foundation of China Project"Research on Intelligent Detection Techniques of Encrypted Malicious Traffic for Large-Scale Networks"(Grant No.62176264).
文摘Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this paper,we explain adversarial attacks from the perspective of robust features,and propose a novel Generative Adversarial Network(GAN)-based Robust Feature Disentanglement framework(GRFD)for adversarial defense.The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator.For the generator,we introduce a novel Latent Variable Constrained Variational Auto-Encoder(LVCVAE),which enhances the typical beta-VAE with a constrained rectification module to enforce explicit clustering of latent variables.To supervise the disentanglement of robust features,we design a Robust Supervisory Model(RSM)as the discriminator,sharing architectural alignment with the target model.The key innovation of RSM is our proposed Feature Robustness Metric(FRM),which serves as part of the training loss and synthesizes the classification ability of features as well as their resistance to perturbations.Extensive experiments on three benchmark datasets demonstrate the superiority of GRFD:it achieves 93.69%adversarial accuracy on MNIST,77.21%on CIFAR10,and 58.91%on CIFAR100 with minimal degradation in clean accuracy.Codes are available at:(accessed on 23 July 2025).
基金supported by National Natural Science Foundation of China(No.U21A20454).
文摘Recently,the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network(NG-EPON)systems.However,PON upstream channels operate in burst-mode,hence the turn-on effects in optical network units(ONUs)may introduce burst errors,which are difficult for LDPC to deal with.One of the solutions is introducing an interleaver to convert consecutive burst errors into separate random errors.The traditional interleavers such as the block interleaver and the random interleaver,only consider dispersing the consecutive errors.In this paper,we present a design methodology for channel-adaptive interleaving pattern by joint optimizing of interleaving and LDPC decoding in PON systems deploying LDPC codes.After determining the interleaving pattern where the bits can be recovered with more reliable messages during LDPC iterative decoding,we map the bits from the potential locations of burst errors to the interleaving positions.By doing so,we can not only disperse the burst errors but also make full use of the LDPC code to improve its decoding performance.The numerical results show that the proposed interleaving scheme has a better performance under any burst-error length.
基金supported by the National Key R&D Program of China(Grant No.2023YFB2905503)the National Natural Science Foundation of China(Grant Nos.62035016,62105200,62475146,and 62341508).
文摘Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and structure sensitivity,which makes it challenging to realize broadband and reliable on-chip optical functions.Recently,topological pumping of edge states has emerged as a promising solution for implementing robust optical couplings.In this paper,we propose and experimentally demonstrate broadband on-chip mode manipulation with very large fabrication tolerance based on the Rice–Mele modeled silicon waveguide arrays.The Thouless pumping mechanism is employed in the design to implement broadband and robust mode conversion and multiplexing.The experimental results prove that various mode-order conversions with low insertion losses and intermodal crosstalk can be achieved over a broad bandwidth of 80 nm ranging from 1500 to 1580 nm.Thanks to such a topological design,the device has a remarkable fabrication tolerance of±70 nm for the structural deviations in waveguide width and gap distance,which is,to the best of our knowledge,the highest among the coupled-waveguide mode-handling devices reported so far.As a proof-of-concept experiment,we cascade the topological mode-order converters to form a four-channel mode-division multiplexer and demonstrate the transmission of a 200-Gb/s 16-quadrature amplitude modulation signal for each mode channel,with the bit error rates below the 7%forward error correction threshold of 3.8×10^(-3).We reveal the possibility of developing new classes of broadband and fabrication-tolerant coupled-waveguide devices with topological photonic approaches,which may find applications in many fields,including optical interconnects,quantum communications,and optical computing.
基金supported by the National Key R&D Program of China(Grant No.2023YFB2905502)the National Natural Science Foundation of China(Grant Nos.62122047 and 61935011).
文摘A power splitter with a wideband arbitrary splitting ratio,which provides flexibility and adaptability in forming photonic devices such as microring resonators and Mach–Zehnder interferometers,proves to be essential in photonic integrated circuits(PICs).We designed and fabricated a directional coupler-based power splitter with a wideband arbitrary splitting ratio and a microring resonator with a wideband uniform extinction ratio(ER)based on artificial gauge field(AGF)optimization.The neural network-aided inverse design method is applied to complete the target.Less than 0.9 dB power splitting variation and 1.6 dB ER variation have been achieved experimentally over a 100-nm bandwidth.Wideband performance,design efficiency,and device compactness are obtained by utilizing this optimization,which indicates great potential and universality in PIC applications.
基金supported by the National Natural Science Foundation of China(62341508).
文摘Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a costly local oscillator laser.However,a fundamental question remains if there is an optimal DD receiver structure with the simplest design to approach the performance of the coherent homodyne detection.This study derives the optimal DD receiver structure with an optimal transfer function to recover a quadrature amplitude modulation(QAM)signal with a near-zero guard band at the central frequency of the signal.We derive the theoretical ESE limit for various detection schemes by invoking Shannon’s formula.Our proposed scheme is closest to coherent homodyne detection in terms of the theoretical ESE limit.By leveraging a WaveShaper to construct the optimal transfer function,we conduct a proof-of-concept experiment to transmit a net 228.85-Gb/s 64-QAM signal over an 80-km single-mode fiber with a net ESE of 8.76 b/s/Hz.To the best of our knowledge,this study reports the highest net ESE per polarization per wavelength for DD transmission beyond 40-km single-mode fiber.For a comprehensive metric,denoted as 2ESE×Reach,we achieve the highest 2ESE×Reach per polarization per wavelength for DD transmission.
基金supported by the Natural Science Foundation of Jiangsu Province(Grant No.BK20240613)Jiangsu Province’s“Innovation and Entrepreneurship Doctor”Program(Grant No.JSSCBS20230088)+4 种基金Natural Science Foundation of Nanjing University of Posts and Telecommunications(Grant No.NY224123)Natural Science Research Start-up Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications(Grant No.NY222112)Beijing Nova Program(Grant No.20240484696)Wenzhou Major Science and Technology Innovation Key Project(Grant No.ZG2020046)INNOVATION Program for Quantum Science and Technology(Grant No.2021ZD0303200)。
文摘The topic of improving the mechanical stability of external cavity diode lasers(ECDLs)has recently attracted widespread attention and interest.The use of corner-cube-array(CCA)-based resonators provides a potential solution for this purpose,although continuous oscillation at super large incident angle remains challenging.In this work,we employ the CCA resonator to generate continuous oscillation within±20°angular misalignment of cavity mirror in experiment.On the basis of retroreflection theory,the retroreflectivity of a CCA is analyzed by using optical simulation software.Notably,the experiment verifies the advantage of using a CCA over a plane mirror in laser resonator,thereby providing a promising approach for ECDLs.The threshold characteristic curves measured at different incident angles in the experiment verify that the CCA possesses an obvious anti-angle misalignment performance.This research introduces an alternative solution of using CCA resonator instead of parallel plane cavity,thereby realizing an adjustment-free ECDL with enhanced mechanical stability.
文摘The progressive edge-growth(PEG)al-gorithm is a general method to construct short low-density parity-check(LDPC)codes and it is a greedy method to place each edge with large girths.In order to improve the performance of LDPC codes,many im-proved PEG(IPEG)algorithms employ multi metrics to select surviving edges in turn.In this paper,the pro-posed edges metric(EM)based on message-passing algorithm(MPA)is introduced to PEG algorithm and the proposed EM constrained PEG(EM-PEG)algo-rithm mainly considers the independence of message passing from different nodes in Tanner graph.The numerical results show that our EM-PEG algorithm brings better bit error rate(BER)performance gains to LDPC codes than the traditional PEG algorithm and the powerful multi-edge multi-metric constrained PEG algorithm(MM-PEGA)proposed recently.In ad-dition,the multi-edge EM constrained PEG(M-EM-PEG)algorithm which adopts multi-edge EM may fur-ther improve the BER performance.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,61941104,61921004,62171240,61771264,62001254,61801248,61971467+2 种基金the Key Research and Development Program of Shandong Province under Grant 2020CXGC010108the Key Research and Development Program of Jiangsu Province of China under Grant BE2021013-1the Science and Technology Program of Nantong under Grants JC2021121,JC2021017。
文摘Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS.
基金This work was supported in part by the Ministry National Key Research and Development Project(Grant No.2020AAA0108101)the National Natural Science Foundation of China(Grants No.62125101,62341101,62001018,and 62301011)+1 种基金Shandong Natural Science Foundation(Grant No.ZR2023YQ058)the New Cornerstone Science Foundation through the XPLORER PRIZE.The authors would like to thank Mengyuan Lu and Zengrui Han for their help in the construction of electromagnetic space in Wireless InSite simulation platform and Weibo Wen,Qi Duan,and Yong Yu for their help in the construction of phys ical space in AirSim simulation platform.
文摘The sixth generation(6G)of mobile communication system is witnessing a new paradigm shift,i.e.,integrated sensing-communication system.A comprehensive dataset is a prerequisite for 6G integrated sensing-communication research.This paper develops a novel simulation dataset,named M3SC,for mixed multi-modal(MMM)sensing-communication integration,and the generation framework of the M3SC dataset is further given.To obtain multimodal sensory data in physical space and communication data in electromagnetic space,we utilize Air-Sim and WaveFarer to collect multi-modal sensory data and exploit Wireless InSite to collect communication data.Furthermore,the in-depth integration and precise alignment of AirSim,WaveFarer,andWireless InSite are achieved.The M3SC dataset covers various weather conditions,multiplex frequency bands,and different times of the day.Currently,the M3SC dataset contains 1500 snapshots,including 80 RGB images,160 depth maps,80 LiDAR point clouds,256 sets of mmWave waveforms with 8 radar point clouds,and 72 channel impulse response(CIR)matrices per snapshot,thus totaling 120,000 RGB images,240,000 depth maps,120,000 LiDAR point clouds,384,000 sets of mmWave waveforms with 12,000 radar point clouds,and 108,000 CIR matrices.The data processing result presents the multi-modal sensory information and communication channel statistical properties.Finally,the MMM sensing-communication application,which can be supported by the M3SC dataset,is discussed.
基金Acknowledgements The work was supported by National Natural Science Foundation of China (Grant No.60972008). The corresponding author is Jiang Wei.
文摘Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.
基金supported by National key project 2018YFB1801102 and 2020YFB1807700by NSFC 62071296STCSM 20JC1416502, 22JC1404000
文摘Sparse code multiple access (SCMA) is the most concerning scheme among non-orthogonal multiple access (NOMA) technologies for 5G wireless communication new interface. Another efficient technique in 5G aimed to improve spectral efficiency for local communications is device-to-device (D2D) communications. Therefore, we utilize the SCMA cellular network coexisting with D2D communications for the connection demand of the Internet of things (IOT), and improve the system sum rate performance of the hybrid network. We first derive the information-theoretic expression of the capacity for all users and find the capacity bound of cellular users based on the mutual interference between cellular users and D2D users. Then we consider the power optimization problem for the cellular users and D2D users jointly to maximize the system sum rate. To tackle the non-convex optimization problem, we propose a geometric programming (GP) based iterative power allocation algorithm. Simulation results demonstrate that the proposed algorithm converges fast and well improves the sum rate performance.
基金supported by National Natural Science Foundation of China(No.61871241,No.61771263)Science and Technology Program of Nantong(No.JC2018129,No.JC2018127)Fund of Nantong University-Nantong Joint Research Center for Intelligent Information Technology(No.KFKT2016A01,No.KFKT2017A05)。
文摘With the development of society and the progress of technology,more and more ocean activities are carried out.It results in booming of deep-sea diving.The use of helium-oxygen mixture(as a kind of breathing gas)solves the physiological problems of divers in saturated diving,but it brings about the Heliumspeech voice communication problem,the drop of speech intelligibility.There is no doubt that the effective speech communication must be provided for supporting the life and work of divers in deep-sea.This paper describes the mechanism of forming heliumspeech,discusses the effects of pressure and helium environment on the speech spectrum,compares the pros and cons of the time-domain and frequency-domain unscrambling techniques,shows the challenges in heliumspeech communications.Finally,it briefly introduces the deep learning,and points out that deep learning/machine learning may be a perfectly unscrambling technique.
基金The project supported by National Natural Science Foundation of China under Grant Nos.60472018 and 60573127partly supported by the Postdoctoral Science Foundation of Central South University
文摘Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to transmit the secret messages with unconditional security. The present scheme can be implemented to distribute the secret quantum (or classical) messages with great capacity in imperfect quantum channel since the utilized code encodes k-qubit messages for each scheme run.
基金supported by the Six Categories Talent Peak of Jiangsu Province(No.KTHY-039)the Future Network Scientific Research Fund Project(No.FNSRFP-2021-YB-42)+1 种基金the Science and Technology Program of Nantong(No.JC2021016)the Key Research and Development Program of Jiangsu Province of China(No.BE2021013-1)。
文摘This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple eavesdroppers.In this maritime communication networks(MCNs),it is challenging for the UAV to determine its trajectory on the ocean,since it cannot land or replenish energy on the sea surface,the trajectory should be pre-designed before the UAV takes off.Furthermore,the take-off location of the UAV and the sea lane of the vessel may be random,which leads to a highly dynamic environment.To address these issues,we propose two reinforcement learning schemes,Q-learning and deep deterministic policy gradient(DDPG)algorithms,to solve the discrete and continuous UAV trajectory design problem,respectively.Simulation results are provided to validate the effectiveness and superior performance of the proposed reinforcement learning schemes versus the existing schemes in the literature.Additionally,the proposed DDPG algorithm converges faster and achieves higher utilities for the UAV,compared to the Q-learning algorithm.
基金National Natural Science Foundation of China under Grant Nos.60472018,60773085,and 60773012National 863 Project under Grant No.2006AA01Z255+2 种基金the Natural Science Foundation of Hunan Province under Grant No.07JJ3128the Postdoctoral Science Foundation of China under Grant No.20070420184Science and Technology Project of Hunan Province under Grant No.2008RS4016
文摘A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.
基金International S&T Cooperation Program of China(No.2011DFA11780)
文摘The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network,sensor, global positioning system(GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots.Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors' carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert(25 km far from base station), has been proved efficient for data acquisition.
基金supported by Natural Science Foundation of China(NSFC)under Grant no.61801248,62171240by the Key Research and Development Program of Jiangsu Province of China under Grant BE2021013-1+2 种基金by Science and Technology Program of Nantong under JC2021121by State Key Laboratory of Advanced Optical Communication Systems and Networks under Grant 2021GZKF006by the Postgraduate Research&Practice Innovation Program of Jiangsu Province KYCX223346。
文摘The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),the dominant transport protocol in the past decades,have had performance issues in such links.In this paper,we propose a novel transport approach which uses user datagram protocol(UDP)along with a simple yet effective bandwidth estimator for congestion control,and with a proactive packet-level forward erasure correction(FEC)code called streaming code to provide low-delay loss recovery without data retransmissions at all.We show that the approach can effectively address two issues of the state-of-the-art TCP variants in the long-distance lossy links,namely 1)the low bandwidth utilization caused by the slow increase of the congestion window(CWND)due to long roundtrip time(RTT)and the frequent CWND drop due to random and congestion losses,and 2)the high endto-end in-order delivery delay when re-transmissions are incurred to recover lost packets.In addition,we show that the scheme’s goodput has good smoothness and short-term intra-protocol fairness properties,which are beneficial for multimedia streaming and interactive applications that are prominent parts of today’s wireless traffic.