The search functionality is under construction.

Author Search Result

[Author] Fu GU(6hit)

1-6hit
  • Secure Point-to-Multipoint Communication Using the Spread Spectrum Assisted Orthogonal Frequency Diverse Array in Free Space

    Tao XIE  Jiang ZHU  Qian CHENG  Yifu GUAN  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/12/17
      Vol:
    E102-B No:6
      Page(s):
    1188-1197

    Wireless communication security has been increasingly important nowadays. Directional modulation (DM) is seen as a promising wireless physical layer security technology. Traditional DM is a transmit-side technology that projects digitally modulated information signals in the desired directions (or at the desired locations) while simultaneously distorting the constellation formats of the same signals in other directions (or at all other locations). However, these directly exposed digitally modulated information signals are easily intercepted by eavesdroppers along the desired directions (or around the desired locations). A new DM scheme for secure point-to-multipoint communication based on the spread spectrum assisted orthogonal frequency diverse array (short for SS-OFDA-M-DM) is proposed in this paper. It can achieve point-to-multipoint secure communication for multiple cooperative receivers at different locations. In the proposed SS-OFDA-M-DM scheme, only cooperative users that use specific DM receivers with right spread spectrum parameters can retrieve right symbols. Eavesdroppers without knowledge of spread spectrum parameters cannot intercept useful signals directly at the desired locations. Moreover, they cannot receive normal symbols at other locations either even if the right spread spectrum parameters are known. Numerical simulation results verify the validity of our proposed scheme.

  • Consumption Pricing Mechanism of Scientific and Technological Resources Based on Multi-Agent Game Theory: An Interactive Analytical Model and Experimental Validation

    Fanying ZHENG  Fu GU  Yangjian JI  Jianfeng GUO  Xinjian GU  Jin ZHANG  

     
    PAPER

      Pubricized:
    2021/04/16
      Vol:
    E104-D No:8
      Page(s):
    1292-1301

    In the context of Web 2.0, the interaction between users and resources is more and more frequent in the process of resource sharing and consumption. However, the current research on resource pricing mainly focuses on the attributes of the resource itself, and does not weigh the interests of the resource sharing participants. In order to deal with these problems, the pricing mechanism of resource-user interaction evaluation based on multi-agent game theory is established in this paper. Moreover, the user similarity, the evaluation bias based on link analysis and punishment of academic group cheating are also included in the model. Based on the data of 181 scholars and 509 articles from the Wanfang database, this paper conducts 5483 pricing experiments for 13 months, and the results show that this model is more effective than other pricing models - the pricing accuracy of resource resources is 94.2%, and the accuracy of user value evaluation is 96.4%. Besides, this model can intuitively show the relationship within users and within resources. The case study also exhibits that the user's knowledge level is not positively correlated with his or her authority. Discovering and punishing academic group cheating is conducive to objectively evaluating researchers and resources. The pricing mechanism of scientific and technological resources and the users proposed in this paper is the premise of fair trade of scientific and technological resources.

  • A Robust Asymmetric Watermarking Scheme Using Multiple Public Watermarks

    Guo-fu GUI  Ling-ge JIANG  Chen HE  

     
    LETTER-Information Security

      Vol:
    E88-A No:7
      Page(s):
    2026-2029

    In recently proposed asymmetric watermarking schemes, the public detection is less robust than the private detection. To resolve this problem, a robust asymmetric watermarking scheme using the multiple detection watermarks for public detection is proposed in this letter. In this scheme, the private watermark used for embedding is constructed by secretly selecting the partial elements of those public watermarks. It provides the same robustness for the public and the private detections, and the robustness is demonstrated in the computer simulations.

  • Patent One-Stop Service Business Model Based on Scientific and Technological Resource Bundle

    Fanying ZHENG  Yangjian JI  Fu GU  Xinjian GU  Jin ZHANG  

     
    PAPER

      Pubricized:
    2021/04/26
      Vol:
    E104-D No:8
      Page(s):
    1281-1291

    To address slow response and scattered resources in patent service, this paper proposes a one-stop service business model based on scientific and technological resource bundle. The proposed one-step model is composed of a project model, a resource bundle model and a service product model through Web Service integration. This paper describes the patent resource bundle model from the aspects of content and context, and designs the configuration of patent service products and patent resource bundle. The model is then applied to the patent service of the Yangtze River Delta urban agglomeration in China, and the monthly agent volume increased by 38.8%, and the average response time decreased by 14.3%. Besides, it is conducive to improve user satisfaction and resource sharing efficiency of urban agglomeration.

  • Scientific and Technological Resource Sharing Model Based on Few-Shot Relational Learning

    Yangshengyan LIU  Fu GU  Yangjian JI  Yijie WU  Jianfeng GUO  Xinjian GU  Jin ZHANG  

     
    PAPER

      Pubricized:
    2021/04/21
      Vol:
    E104-D No:8
      Page(s):
    1302-1312

    Resource sharing is to ensure required resources available for their demanders. However, due to the lack of proper sharing model, the current sharing rate of the scientific and technological resources is low, impeding technological innovation and value chain development. Here we propose a novel method to share scientific and technological resources by storing resources as nodes and correlations as links to form a complex network. We present a few-shot relational learning model to solve the cold-start and long-tail problems that are induced by newly added resources. Experimentally, using NELL-One and Wiki-One datasets, our one-shot results outperform the baseline framework - metaR by 40.2% and 4.1% on MRR in Pre-Train setting. We also show two practical applications, a resource graph and a resource map, to demonstrate how the complex network helps resource sharing.

  • A New Asymmetric Watermarking Scheme for Copyright Protection

    Guo-fu GUI  Ling-ge JIANG  Chen HE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:2
      Page(s):
    611-614

    This letter proposes a new asymmetric watermarking scheme. In the proposed scheme, a non-full rank matrix is applied to an embedded watermark to form an asymmetric detection watermark. To detect the embedded watermark, the watermarked signal is transformed through the matrix firstly. Then a correlation test between the detection watermark and the transformed signal is performed. This scheme allows for the public release of all information, except for the embedded watermark. The performance of the scheme is analyzed, and the simulation results demonstrate that the proposed scheme is secure and robust to some common attacks.