CN109413068A - A kind of wireless signal encryption method based on antithesis GAN - Google Patents

A kind of wireless signal encryption method based on antithesis GAN Download PDF

Info

Publication number
CN109413068A
CN109413068A CN201811268894.7A CN201811268894A CN109413068A CN 109413068 A CN109413068 A CN 109413068A CN 201811268894 A CN201811268894 A CN 201811268894A CN 109413068 A CN109413068 A CN 109413068A
Authority
CN
China
Prior art keywords
wireless signal
network
size
decryption
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811268894.7A
Other languages
Chinese (zh)
Other versions
CN109413068B (en
Inventor
陈晋音
郑海斌
成凯回
熊晖
林翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201811268894.7A priority Critical patent/CN109413068B/en
Publication of CN109413068A publication Critical patent/CN109413068A/en
Application granted granted Critical
Publication of CN109413068B publication Critical patent/CN109413068B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention discloses a kind of wireless signal encryption methods based on antithesis GAN, comprising: using wireless signal Encryption Model by original wireless signal encryption at coded signal image;Using wireless signal decrypted model by coded signal image decryption at decryption wireless signal;The wireless signal Encryption Model and wireless signal decrypted model are obtained by the training of following model training system, the model training system includes: wireless signal refined net Ag, wireless signal encryption differentiation network A d, wireless signal decryption network Bg, wireless signal decryption differentiation network B d, wireless signal sorter network C, pre-training to Ag and C and the joint training to Ag, Ad, Bg, Bd and C are used to above-mentioned model training system, to determine wireless signal Encryption Model and wireless signal decrypted model.Wireless signal effectively can be encrypted as picture by this method, improve the concealment of information transmission.

Description

A kind of wireless signal encryption method based on antithesis GAN
Technical field
The invention belongs to the security fields research fields of the deep learning algorithm of artificial intelligence field and data, and in particular to A kind of wireless signal encryption method based on antithesis GAN.
Background technique
Currently, deep learning has been widely used in the fields such as target detection, image detection, data generation.It generates Fighting network (GAN) is one of technology relatively advanced in current deep learning, generates confrontation network and passes through in frame (at least) Two modules: the mutual game of model (Generative Model) and discrimination model (Discriminative Model) are generated Study generates preferable output.According to different network structures, a series of GAN network has been derived: DCGAN, WGAN, WGAN-GP、LSGAN-BEGAN、DUAL-GAN。
Wherein, generation confrontation network (DUAL-GAN) of antithesis GAN be on the basis of original generation fights network into One step is extended to two generation to intercouple confrontation networks, wherein there are two generator and two arbiters, with text and figure For the mutual translation of piece, wherein character translation can be picture by first generator Ag, corresponding also one A arbiter Ad can identify the true and false of picture.Meanwhile a corresponding generator Bg is constructed, photo can be translated as Whether text, same generator Bg also have a corresponding arbiter Bd accurate to identify text.
Current existing wireless signal encryption method is broadly divided into symmetric cryptography and divides symmetric cryptosystem.Symmetric cryptography is adopted It is that the encryption of asymmetric encoding technological document and decryption use identical key.Asymmetric encryption needs two keys: open Key and private cipher key carry out encrypting another key being decrypted using one of key.Existing encryption method exists It is easily attacked, the problems such as encryption mode is single.Under normal circumstances, wireless signal encryption technology is by the way of digital encryption, this It is bigger that kind mode calculates cost, and is easy to be trapped utilization.
Summary of the invention
The object of the present invention is to provide a kind of wireless signal encryption methods based on antithesis GAN, pass through the generation of antithesis GAN It fights network and generates picture corresponding to wireless signal, and classified using wireless signal disaggregated model C, thus to wireless Signal data realizes the process of encryption.The wireless signal encryption method improves the confidentiality and peace of wireless signal transmission process Quan Xing.
For achieving the above object, the present invention the following technical schemes are provided:
A kind of wireless signal encryption method based on antithesis GAN, comprising:
Using wireless signal Encryption Model by original wireless signal encryption at coded signal image;
Using wireless signal decrypted model by coded signal image decryption at decryption wireless signal;
The wireless signal Encryption Model and wireless signal decrypted model are obtained by the training of following model training system, institute Stating model training system includes:
Wireless signal refined net Ag, for encrypting to original wireless signal, input is original wireless signal, nothing The decryption wireless signal of line decrypted signal network B g output, exports as coded signal image;
Wireless signal encryption differentiates network A d, and input is normal color image, wireless signal refined net Ag output Coded signal image exports as the judgement to normal color image and coded signal image as a result, wherein utilizing wireless signal When encryption differentiates that the output feedback training wireless signal encryption of network A d differentiates network A d parameter, the class calibration of normal color image Justice be 1, the category of coded signal image is defined as 0, using wireless signal encryption differentiate network A d output feedback training without When line signal encryption differentiates network A g parameter, coded signal image is used only, and the category of coded signal image is defined as at this time 1;
Wireless signal decryption network Bg, for coded signal image to be decrypted, input is normal color image, nothing The coded signal image of line signal encryption network A g output exports to decrypt wireless signal;
Wireless signal decryption differentiates network B d, and input is original wireless signal, wireless signal decryption network Bg output Wireless signal is decrypted, is exported as the judgement to original wireless signal and decryption wireless signal as a result, wherein utilizing wireless signal When decryption differentiates that the output feedback training wireless signal decryption of network B d differentiates network B d parameter, the class calibration of original wireless signal Justice be 1, the category for decrypting wireless signal is defined as 0, using wireless signal decryption differentiate network B d output feedback training without When line decrypted signal network B g parameter, decryption wireless signal is used only, and the category for decrypting wireless signal at this time is defined as 1;
Wireless signal sorter network C, input are coded signal image and the life of wireless signal refined net Ag output At the category of the wireless signal of the coded signal image, the i.e. modulation type of wireless signal, the classification knot for coded signal is exported Fruit, each classification results correspond to the modulation type of original wireless signal;
Training process are as follows:
Stage one: pre-training, using original wireless signal and corresponding wireless signal modulation type category to wireless signal Refined net Ag and wireless signal sorter network C carries out pre-training;
Stage two: retraining, firstly, fixed wireless signal encryption differentiate network A d, wireless signal decryption differentiate network B d, The parameter of wireless signal sorter network C, the parameter of joint training wireless signal refined net Ag and wireless signal decryption network Bg; Then, the parameter of fixed wireless signal encryption network A g, wireless signal decryption network Bg, wireless signal sorter network C, joint instruction Practice the parameter that wireless signal encryption differentiates network A d and wireless signal decryption differentiates network B d;Finally, fixed wireless signal encryption Differentiate the parameter of network A d, wireless signal decryption network Bg, wireless signal decryption differentiation network B d, joint training wireless signal adds The parameter of close network A g and wireless signal sorter network C;By above three joint training, until wireless signal refined net Ag Network A d is differentiated with wireless signal encryption, and it is assorted equal that wireless signal decryption network Bg and wireless signal decryption differentiate that network B d realization is received Weighing apparatus, training are completed, and trained wireless signal refined net Ag is wireless signal Encryption Model, trained wireless signal decryption Network B g is wireless signal decrypted model.
The graded combination Training strategy provided through the invention, the wireless signal refined net Ag after completing training can make It is signal pattern by wireless signal data encryption for a private cipher key of wireless signal;Wireless signal decryption network Bg can be with Coded signal image decryption is wireless signal data by another key as encrypted signal pattern, and by introducing Wireless signal sorter network C, classifies to the wireless signal for using different modulating type to obtain, and wireless signal can be made to encrypt Network A g learns the characteristic of division attribute of wireless signal modulation type simultaneously in the training process, can be to different modulating type Wireless signal is preferably encrypted.
The effect that the wireless signal encryption method based on antithesis GAN has are as follows: wireless signal can be passed through into wireless communication Number Encryption Model projects image feature space from signal characteristic space, picture signal is encrypted as automatically, to escape wireless communication The identification of number identifying system.The concealment of radio signal propagation, the safety of information transmission can be improved by this encryption method Property.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to do simply to introduce, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art, can be with root under the premise of not making the creative labor Other accompanying drawings are obtained according to these attached drawings.
Fig. 1 is the structural schematic diagram for the model training system that embodiment provides;
Fig. 2 is the structural schematic diagram for the wireless signal refined net Ag that embodiment provides;
Fig. 3 is the structural schematic diagram for the wireless signal decryption network Bg that embodiment provides;
Fig. 4 is the structural schematic diagram that the wireless signal encryption that embodiment provides differentiates network A d;
Fig. 5 is the structural schematic diagram that the wireless signal decryption that embodiment provides differentiates network B d;
Fig. 6 is the structural schematic diagram for the wireless signal sorter network C that embodiment provides;
12 class wireless signals are encrypted to picture in the classification method training process that Fig. 7 (a)~7 (l) provides for embodiment Visualization result schematic diagram.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, with reference to the accompanying drawings and embodiments to this Invention is described in further detail.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, And the scope of protection of the present invention is not limited.
For the confidentiality for improving wireless signal transmission, present embodiments provides a kind of wireless signal based on antithesis GAN and add Decryption method, specific steps include: by original wireless signal encryption using wireless signal Encryption Model into coded signal image;It utilizes Wireless signal decrypted model is by coded signal image decryption at decryption wireless signal.
The wireless signal Encryption Model and wireless signal decrypted model are obtained using model training system as shown in Figure 1 , specific model training system includes five modules: being respectively wireless signal refined net Ag, wireless signal encryption differentiation net Network Ad, wireless signal decryption network Bg, wireless signal decryption differentiate network B d and wireless signal sorter network C.
Wireless signal refined net Ag is mainly used for encrypting wireless signal, i.e., is to add by original wireless signal encryption Close signal pattern.Wireless signal refined net Ag is the neural network being made of LSTM unit, convolutional layer and full articulamentum, knot Structure is as shown in Figure 2, comprising: the wireless signal being originally inputted is having a size of [512,2], wherein when the sampling of 512 expression wireless signals Between point, 2 indicate that the characteristic value of wireless signal each time points, training process are minimum using the training of most small quantities of gradient descent method Generally be taken as 64 per a batch of wireless signal data sample number in batch, obtained after LSTM unit having a size of [512, 128] characteristic layer, wherein 512 correspond to original time point, the feature vector that 128 corresponding each time points are calculated makes The characteristic layer having a size of 128 is obtained with full connection, the characteristic layer having a size of 128 is obtained using full connection, is obtained using full articulamentum To the characteristic layer having a size of 64*64*3, this feature layer is deformed to obtain having a size of [64,64,3] using reshape function Characteristic layer, wherein 64 respectively correspond the length and width of characteristic layer, the depth of 3 character pair layers, using having a size of [5,5,64] Convolution module and the maximum pond module for being 2 having a size of [2,2] step-length obtain the characteristic layer having a size of [32,32,64], use [5,5,128] convolution module and the maximum pond module for being 2 having a size of [2,2] step-length are obtained having a size of [16,16,128] Characteristic layer, the maximum pond module for being 2 using the convolution module having a size of [5,5,256] and having a size of [2,2] step-length obtain ruler The very little characteristic layer for [8,8,256], the maximum for being 2 using the convolution module having a size of [5,5,512] and having a size of [2,2] step-length Pond module obtains the characteristic layer having a size of [4,4,512], using having a size of [5,5,512] convolution module and having a size of [2, 2] the maximum pond module that step-length is 2 obtains the characteristic layer having a size of [2,2,512], uses the convolution having a size of [5,5,512] Module and having a size of [2,2] step-length be 2 maximum pond module obtain the characteristic layer having a size of [1,1,512], using having a size of The warp volume module of [5,5,512] obtains the characteristic layer having a size of [2,2,512], the characteristic layer of [2,2,512] before combining, The characteristic layer having a size of [2,2,1024] is obtained, the warp volume module of [5,5,512] is used to obtain the characteristic layer of [4,4,512], The characteristic layer of [4,4,512] before joint obtains the characteristic layer of [4,4,1024], uses the warp volume module of [5,5,256] The characteristic layer of [8,8,256] is obtained, the characteristic layer of [8,8,256] before combining obtains the characteristic layer of [8,8,512], uses The warp volume module of [5,5,128] obtains the characteristic layer of [16,16,128], and the characteristic layer of [16,16,128] before combining obtains To the characteristic layer of [16,16,256], the warp volume module of [5,5,64] is used to obtain the characteristic layer of [32,32,64], before joint [32,32,64] characteristic layer, obtain the characteristic layer of [32,32,128], use the warp volume module of [5,5,3] obtain [64, 64,3] characteristic layer, what is obtained is the picture of corresponding ImageNet64, and picture a length of 64, width 64 includes RGB tri- Channel.
Wireless signal decryption network Bg is mainly used for that coded signal image is decrypted, i.e., by coded signal image decryption To decrypt wireless signal.Wireless signal decryption network Bg is the neural network being made of convolutional layer and full articulamentum, and structure is such as Shown in Fig. 3, comprising: the picture size being originally inputted is [64,64,3], uses convolution module and size having a size of [5,5,64] The maximum pond module for being 2 for [2,2] step-length obtains the characteristic layer having a size of [32,32,64], using having a size of [5,5,128] Convolution module and having a size of [2,2] step-length be 2 maximum pond module obtain making having a size of the characteristic layer of [16,16,128] With having a size of [5,5,256] convolution module and having a size of [2,2] step-length be 2 maximum pond module obtain having a size of [8,8, 256] characteristic layer, the maximum pond module for being 2 using the convolution module having a size of [5,5,1024] and having a size of [2,2] step-length The characteristic layer having a size of [4,4,1024] is obtained, using the convolution module having a size of [5,5,2048] and having a size of [2,2] step-length The characteristic layer having a size of [2,2,2048] is obtained for 2 maximum pond module, uses the convolution module having a size of [5,5,4096] It obtains using full link block having a size of the characteristic layer of [1, Isosorbide-5-Nitrae 096] for 2 maximum pond module with having a size of [2,2] step-length The characteristic layer having a size of 16384 (512*32) is obtained, obtains the characteristic layer having a size of 4096 (512*8) using full link block, The characteristic layer having a size of 1024 (512*2) is obtained using full link block, is become its shape using reshape function [512,2] obtain wireless signal corresponding to picture, wherein 512 corresponding sampling time points, the feature of 2 corresponding each time points Value.
Wireless signal encryption differentiates that network A d is mainly used for carrying out two classification to normal color image and coded signal image, Judge the category of normal color image and coded signal image, the class for defining normal color image is designated as true (real), encryption The class of signal pattern is designated as false (fake), is encrypted by classification results feedback training (feedback training) wireless signal Network A g, the image for generating encryption are more nearly true value.Wireless signal encryption differentiates that network A d is by convolutional layer and Quan Lian The neural network of layer composition being connect, structure is as shown in Figure 4, comprising: the picture size of input is [64,64,3], use [5,5, 64] convolution module and the maximum pond module for being 2 having a size of [2,2] step-length obtain the characteristic layer of [32,32,64], use [5, 5,128] convolution module and the maximum pond module for being 2 having a size of [2,2] step-length obtain the characteristic layer of [16,16,128], make The maximum pond module for being 2 with the convolution module of [5,5,256] and having a size of [2,2] step-length obtains the characteristic layer of [8,8,256], It uses the convolution module of [5,5,512] and obtains the feature of [4,4,512] having a size of [2,2] step-length for 2 maximum pond module Layer uses the convolution module of [5,5,1] and obtains the feature of [1,1,1] having a size of [4,4] step-length for 4 maximum pond module Layer, the matrix of obtained not normalized confidence value identical with shape 0 or 1 do the coded signal that cross entropy calculates Ag output The gap of image and normal color image.Wireless signal encryption differentiates that the input of network A d is the normal color of ImageNet64 The mixing for the coded signal image that image and Ag encryption generate, exports as the judgement to normal color image and coded signal image As a result.
Wireless signal decryption differentiates that network B d is mainly used for carrying out two classification to original wireless signal and decryption wireless signal, Judge original wireless signal and decrypt the category of wireless signal, the class for defining original wireless signal is designated as true (real) and decryption The class of wireless signal is designated as false (fake), and passes through classification results feedback training (feedback training) wireless signal solution Close network B g, the wireless signal for generating decryption are more nearly true value.Wireless signal decryption differentiates that network B d is mono- by LSTM The neural network that member, convolutional layer and full articulamentum are constituted, structure are as shown in Figure 5, comprising: the wireless signal sample being originally inputted Having a size of [512,2], the characteristic layer having a size of [512,64] is obtained after LSTM unit, wherein 512 when corresponding to original Between point, the feature vector that 64 corresponding each time points are calculated obtains the characteristic layer having a size of 64 using full connection, using complete Connection obtains the characteristic layer having a size of 1, and obtained not normalized confidence value and 0 or 1 is done cross entropy calculating wireless signal and added The gap of original wireless signal and decryption wireless signal that close network A g is generated.Wireless signal decryption differentiates the input of network B d It is decrypted into the mixing of decryption wireless signal for normal wireless signal and Ag, exports as to normal wireless signal and decryption wireless signal Judging result.
Wireless signal sorter network C is mainly used for classifying to wireless signal, inputs as wireless signal refined net Ag The coded signal image of output, exports the classification results for coded signal, finely tunes training (fine tune by feedback Training) Ag, it is more accurate to wireless signal refined net Ag to make.Wireless signal sorter network C is by convolutional layer and Quan Lian The neural network of layer composition is connect, specific structure is as shown in Figure 6, comprising: the dimension of picture of input is [64,64,3], is used Convolution kernel having a size of [5,5,64] and the maximum pond module for being 2 having a size of [2,2] step-length are obtained having a size of [32,32,64] Characteristic layer, using having a size of [5,5,128] convolution kernel and having a size of [2,2] step-length be 2 maximum pond module obtain ruler The very little characteristic layer for [16,16,128], the maximum for being 2 using the convolution kernel having a size of [5,5,256] and having a size of [2,2] step-length Pond module obtains the characteristic layer having a size of [8,8,256], using the convolution kernel having a size of [5,5,512] and having a size of [2,2] The maximum pond module that step-length is 2 obtains the characteristic layer having a size of [4,4,512], obtains the spy having a size of 1024 using full connection Layer is levied, full articulamentum is used to obtain (being directed to comprising 12 kinds of wireless signal modulation types having a size of 12 characteristic layer as output 12 classification tasks), the class of obtained not normalized confidence value original wireless signal corresponding with coded signal image Mark does cross entropy and calculates distance.
The design object of above-mentioned model training system are as follows:
(a) original wireless signal is encrypted automatically by network A g, which adds respectively as wireless signal The close input sample for differentiating network A d and wireless signal sorter network C, and Ag is fed back to by the output of Ad and C, adjust Ag's Inner parameter.Wherein Ad is by determining the picture sample of Ag encryption generation and the distribution distance of true normal sample, to adjust Ag Parameter;C is by predicting category at a distance from true category, to adjust Ag parameter.Eventually by the multilateral Game mistake of Ag and Ad and C Journey guarantees the stability for the picture sample that Ag encryption generates, and is trained with the encryption picture generated to C that obtaining can be right The wireless signal Encryption Model that the wireless signal data of different modulating type are more preferably encrypted;
(b) it is automatically signal data to image data decryption by network B g, is decrypted as wireless signal and differentiate network B d Input sample adjust Bg inner parameter by the input feedback of Bd to Bg.The wherein signal that Bd is generated by determining Bg decryption The distribution distance of sample and authentic specimen, to adjust Bg parameter.
In model training system, the network structure of wireless signal sorter network C is related with the complexity of data set;And The network structure of Ag and Ad designs, related with the complexity of C network and data set;Bg and Bd network structure design, with number It is related according to the complexity of collection.In order to realize better cipher round results, and prevent in the training process generation model collapse It bursts, be better achieved the encryption and decryption of wireless model, present invention uses the methods of joint training to have carried out accordingly model Training.
Specifically, the training of above-mentioned model training system is broadly divided into two stages of pre-training and retraining, detailed process Are as follows:
The pre-training stage: wireless signal is encrypted using original wireless signal and corresponding wireless signal modulation type category Network A g and wireless signal sorter network C carries out pre-training.When training, fixed wireless signal encryption differentiates network A d, wireless communication Number decryption differentiate network B d and wireless signal decryption network Bg parameter, trained epochs=N1, i.e. training data are set Collection is used N1 times;The input of wireless signal refined net Ag is original wireless signal, is exported as encrypted coded signal figure Picture, the input of wireless signal sorter network C are the coded signal image of wireless signal refined net Ag output, are exported as to encryption The category of the debug-type of original wireless signal corresponding to signal pattern is predicted;Wireless signal refined net Ag and nothing at this time Disaggregated model Ag-C classifies to the modulation type of wireless signal to line Modulation recognition network C as a whole, wireless signal Refined net Ag is equivalent to the characteristic extracting module of disaggregated model Ag-C, and wireless signal sorter network C is equivalent to disaggregated model Ag- The categorization module of C.
Specifically, original signal data collection x is inputtedsignal, corresponding picture Ag (x is generated by Ag networksignal), By Ag (xsignal) be input in disaggregated model C, 10 epochs of training.
The retraining stage, using joint training strategy, detailed process are as follows:
(1) fixed wireless signal encryption differentiates that network A d, wireless signal decryption differentiate network B d, wireless signal sorter network The parameter of C, by original wireless signal xsignal, wireless signal decryption network Bg output decryption wireless signal Bg (ximage) conduct The input of wireless signal refined net Ag, the parameter of training Ag, the coded signal image for exporting it are more nearly normal color Image, so that the ciphering process of wireless signal is realized, so that the propagation that encrypted information is safer;And by normal color figure As ximage, wireless signal refined net Ag output coded signal image Ag (xsignal) as wireless signal decryption network Bg's Input, the parameter of training Bg, the decryption wireless signal for exporting it are more nearly original wireless signal, realize that encryption is wireless with this The decrypting process of signal;
The optimization aim of the process indicates are as follows:
Wherein, xAgIndicate the coded signal image of wireless signal refined net Ag output, xBgIndicate that wireless signal decrypts net The decryption wireless signal of network Bg output, xAg~pAg indicates xAgSample the output from wireless signal refined net Ag, xBg~pBg table Show xBgThe output from wireless signal decryption network Bg is sampled, pAg and pBg respectively indicate the probability distribution of Ag and Bg output, Ad (xAg) indicate that wireless signal encryption differentiates network A d to xAgDifferentiation probability, Bd (xBg) indicate that wireless signal decryption differentiates network Bd is to xBgDifferentiation probability, E () indicate cross entropy expectation;
(2) parameter of fixed wireless signal encryption network A g, wireless signal decryption network Bg, wireless signal sorter network C, The coded signal image Ag (x that wireless signal refined net Ag is exportedsignal) and normal color imageBlended data, Encrypt the input for differentiating network A d as wireless signal, the parameter of training Ad can distinguish coded signal image and normal Color image;And the decryption wireless signal Bg (x for exporting wireless signal decryption network Bgimage) and original wireless signal Blended data, the input for differentiating network B d is decrypted as wireless signal, it is wireless can to distinguish decryption for the parameter of training Bd Signal and original wireless signal;
The optimization aim of the process indicates are as follows:
Wherein, Pdata indicates raw data set,Indicate normal signal sampleFrom original letter Number Pdata;Indicate normal image dataFrom raw image data Pdata;
(3) fixed wireless signal encryption differentiates that network A d, wireless signal decryption network Bg, wireless signal decryption differentiate network The parameter of Bd, by original wireless signal xsignal, wireless signal decryption network Bg output decryption wireless signal Bg (ximage) conduct The input of wireless signal refined net Ag, and the coded signal image Ag (x that wireless signal refined net Ag is exportedsignal) and Corresponding true category y (namely original wireless signal xsignalCorresponding modulation type category) as wireless signal classification net The input of network C, the parameter of coorinated training wireless signal refined net Ag and wireless signal sorter network C;
The optimization aim of the process are as follows:
Wherein, y indicates the modulation type category of original wireless signal,Indicate normal wireless sample of signalFrom wireless signal data set, C () indicates wireless signal sorter network C to the classification knot of wireless signal modulation type for sampling Fruit;
Wireless signal classification mould network C is introduced, is classified to the wireless signal for using different modulating type to obtain, energy Enough make wireless signal refined net Ag in the training process while learning the characteristic of division attribute of wireless signal modulation type, it can be with It is preferably encrypted for the modulation type of wireless signal.
(4) step (1)~(3) are repeated, until wireless signal refined net Ag and wireless signal encryption differentiate network A d, nothing Line decrypted signal network B g and wireless signal decryption differentiate that network B d realizes Nash Equilibrium, i.e. wireless signal refined net Ag and nothing Line style number encryption differentiates that both network A d game tends to balance, and wireless signal decryption network Bg and wireless signal decryption differentiate network The game of both Bd tends to balance, training cut-off, and trained wireless signal refined net Ag is wireless signal Encryption Model, instruction The wireless signal decryption network Bg perfected is wireless signal decrypted model.
When training, the loss function being related to is respectively as follows:
The loss function Ag_loss of wireless signal refined net Ag are as follows:
Wherein, λBFor introduce parameter, for balance B_loss withCodomain range so that B_loss withCodomain it is close, xAg~pAg indicates xAgIt samples from wireless signal refined net Ag Output, B_loss indicate normal color image and coded signal image mean square error, form are as follows:
B_loss=MSE (image, Ag (xsignal))
Wherein, image indicates the normal color image on ImageNet64, the normal color image and image Ag (xsignal) it is the consistent two images of pattern, MSE () indicates mean square error function;
The loss function Bg_loss of wireless signal decryption network Bg are as follows:
Wherein, λAFor introduce parameter, for balance A_loss withCodomain range so that A_loss withCodomain it is close, A_loss indicates original wireless signal and decrypts wireless signal Mean square error, form are as follows:
A_loss=MSE (signal, Bg (ximage))
Wherein, signal indicates original wireless signal;
Wireless signal encryption differentiates the loss function Ad_loss of network A d are as follows:
Wireless signal decryption differentiates the loss function Bd_loss of network B d are as follows:
The loss function C_loss of wireless signal sorter network C are as follows:
The calculating and optimization of the 5 above loss functions are converted the calculating of following 3 loss functions by the present embodiment:
G_loss=Ag_loss+Bg_loss
D_loss=Ad_loss+Bd_loss
C_loss
By the calculating to above 3 loss functions, each network is updated by backpropagation using Adam optimizer Parameter.
Have when realizing Nash Equilibrium:
Through the above training method based on minimax theorem (Minimax theorem), Ag and Bg, Ad are realized With the competition Game Relationship of Bd, C tripartite, the target of Ag is quickly to encrypt a large amount of wireless signal sample, can be connect as far as possible Nearly authentic specimen distribution, while Ad can be deceived;The target of Ad is to distinguish the picture sample and true figure that Ag is generated as far as possible Piece sample;The target of C be correctly classify as far as possible Ag generation picture, thereby realize wireless signal to the encrypted of picture Journey;The target of Bg is to carry out fast decryption to encrypted signal pattern, and revert to original signal, the target of Bd as far as possible It is the recovery degree distinguished the sample of signal of original normal signal sample and decryption as far as possible, and further increase Bg decryption, Thereby realize the decrypting process of signal.
Training strategy in this way, the wireless signal more adjunction of the wireless signal encryption picture and Bg decryption that generate Ag Nearly corresponding true value, such Ag can serve as a private cipher key of wireless signal, wireless signal are encrypted as picture; Image data is translated as wireless signal data by another key that Bg can serve as wireless signal, and wireless by introducing Modulation recognition MODEL C classifies to the wireless signal for using different modulating type to obtain, and can make wireless signal Encryption Model Ag learns the characteristic of division attribute of wireless signal modulation type simultaneously in the training process, can be to different types of wireless signal Preferably encrypted.
Specific experiment:
Data set basic condition includes: that (a) wireless signal data have 312000 training samples and 156000 test specimens This, each sample-size is the matrix of 512*2, and sample value range is (- 6,6).Verifying collection is to take out from test sample at random Take 10% sample size;(b) data set can be divided into 12 classes according to modulation type, every class equal part, there is every class in training set 26000 samples, every class has 13000 samples in test set;(c) state of signal-to-noise: for the 500*26*12=in test set 156000 samples, every one kind have 26 kinds of signal-to-noise ratio (- 20 to 30 all even numbers), different signal-to-noise ratio data collection in every class sample Distribution is substantially are as follows: the sample that 500 signal-to-noise ratio are -20, the sample that 500 signal-to-noise ratio are -18, the sample that 500 signal-to-noise ratio are -16 This ... ... the sample that 500 signal-to-noise ratio are 28, the sample that 500 signal-to-noise ratio are 30.And for the data distribution feelings of training set Condition is 1000 in the number of samples of one of classification signal-to-noise ratio, then the sample size of training set is 1000*26*12 =312000.(d) the simple reduction process divided by 6 has all been carried out to all wireless signal sample datas, has been input to facilitating In model.
Model training system of the above-mentioned training set to above-mentioned building is trained, trained wireless signal encryption is obtained Model and wireless signal decrypted model.And the sample in test set is input in wireless signal Encryption Model, it exports as such as Fig. 7 (a)~7 the corresponding coded signal image of 12 class wireless signals shown in (l), because the batch (batch) of input is 64, every part Figure contains 64 figures, these pictures are manually difficult its content for being included respectively, illustrates this method adding for wireless signal It is close to produce a desired effect.
Technical solution of the present invention and beneficial effect is described in detail in above-described specific embodiment, Ying Li Solution is not intended to restrict the invention the foregoing is merely presently most preferred embodiment of the invention, all in principle model of the invention Interior done any modification, supplementary, and equivalent replacement etc. are enclosed, should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of wireless signal encryption method based on antithesis GAN, comprising:
Using wireless signal Encryption Model by original wireless signal encryption at coded signal image;
Using wireless signal decrypted model by coded signal image decryption at decryption wireless signal;
The wireless signal Encryption Model and wireless signal decrypted model are obtained by the training of following model training system, the mould Type training system includes:
Wireless signal refined net Ag, for encrypting to original wireless signal, input is original wireless signal, wireless communication The decryption wireless signal of number decryption network Bg output, exports as coded signal image;
Wireless signal encryption differentiates network A d, and input is the encryption of normal color image, wireless signal refined net Ag output Signal pattern is exported as the judgement to normal color image and coded signal image as a result, wherein being encrypted using wireless signal When differentiating that the output feedback training wireless signal encryption of network A d differentiates network A d parameter, the category of normal color image is defined as 1, the category of coded signal image is defined as 0, in the output feedback training wireless communication for differentiating network A d using wireless signal encryption When number refined net Ag parameter, coded signal image is used only, and the category of coded signal image is defined as 1 at this time;
Wireless signal decryption network Bg, for coded signal image to be decrypted, input is normal color image, wireless communication The coded signal image of number refined net Ag output exports to decrypt wireless signal;
Wireless signal decryption differentiates network B d, and input is the decryption of original wireless signal, wireless signal decryption network Bg output Wireless signal is exported as the judgement to original wireless signal and decryption wireless signal as a result, wherein being decrypted using wireless signal When differentiating that the output feedback training wireless signal decryption of network B d differentiates network B d parameter, the category of original wireless signal is defined as 1, the category for decrypting wireless signal is defined as 0, in the output feedback training wireless communication for differentiating network B d using wireless signal decryption When number decryption network Bg parameter, decryption wireless signal is used only, and the category for decrypting wireless signal at this time is defined as 1;
Wireless signal sorter network C, input are that the coded signal image of wireless signal refined net Ag output and generation should The category of the wireless signal of coded signal image, the i.e. modulation type of wireless signal, export the classification results for coded signal, often A classification results correspond to the modulation type of original wireless signal;
Training process are as follows:
Stage one: pre-training encrypts wireless signal using original wireless signal and corresponding wireless signal modulation type category Network A g and wireless signal sorter network C carries out pre-training;
Stage two: retraining, firstly, fixed wireless signal encryption differentiates that network A d, wireless signal decryption differentiate network B d, wireless The parameter of Modulation recognition network C, the parameter of joint training wireless signal refined net Ag and wireless signal decryption network Bg;So Afterwards, the parameter of fixed wireless signal encryption network A g, wireless signal decryption network Bg, wireless signal sorter network C, joint training Wireless signal encryption differentiates that network A d and wireless signal decryption differentiate the parameter of network B d;Finally, fixed wireless signal encryption is sentenced The parameter of other network A d, wireless signal decryption network Bg, wireless signal decryption differentiation network B d, the encryption of joint training wireless signal The parameter of network A g and wireless signal sorter network C;By above three joint training, until wireless signal refined net Ag and Wireless signal encryption differentiate network A d, wireless signal decryption network Bg and wireless signal decryption differentiate network B d realization receive it is assorted Weighing apparatus, training are completed, and trained wireless signal refined net Ag is wireless signal Encryption Model, trained wireless signal decryption Network B g is wireless signal decrypted model.
2. as described in claim 1 based on the wireless signal encryption method of antithesis GAN, which is characterized in that the wireless signal The structure of refined net includes:
The wireless signal being originally inputted is having a size of [512,2], wherein 512 indicate the sampling time point of wireless signal, 2 indicate wireless The characteristic value of signal each time point, training process using the training of most small quantities of gradient descent method, it is most small quantities of in per a batch of Wireless signal data sample number is generally taken as 64, and the characteristic layer having a size of [512,128] is obtained after LSTM unit, In 512 correspond to original time point, the feature vector that 128 corresponding each time points are calculated obtains ruler using full connection The very little characteristic layer for being 128 is obtained the characteristic layer having a size of 128 using full connection, is obtained using full articulamentum having a size of 64*64*3 Characteristic layer, this feature layer is deformed using reshape function to obtain the characteristic layer having a size of [64,64,3], wherein 64 Respectively correspond the length and width of characteristic layer, the depth of 3 character pair layers, using having a size of [5,5,64] convolution module and having a size of The maximum pond module that [2,2] step-length is 2 obtains the characteristic layer having a size of [32,32,64], uses the convolution mould of [5,5,128] Block and having a size of [2,2] step-length be 2 maximum pond module obtain the characteristic layer having a size of [16,16,128], using having a size of [5,5,256] convolution module and the maximum pond module for being 2 having a size of [2,2] step-length obtain the spy having a size of [8,8,256] Layer is levied, the maximum pond module for being 2 using the convolution module having a size of [5,5,512] and having a size of [2,2] step-length obtains size For the characteristic layer of [4,4,512], the maximum pond for being 2 using the convolution module having a size of [5,5,512] and having a size of [2,2] step-length Change module and obtain the characteristic layer having a size of [2,2,512], using the convolution module having a size of [5,5,512] and having a size of [2,2] The maximum pond module that step-length is 2 obtains the characteristic layer having a size of [1,1,512], uses the deconvolution having a size of [5,5,512] Module obtains the characteristic layer having a size of [2,2,512], the characteristic layer of [2,2,512] before combining, obtain having a size of [2,2, 1024] characteristic layer uses the warp volume module of [5,5,512] to obtain the characteristic layer of [4,4,512], before combining [4,4, 512] characteristic layer obtains the characteristic layer of [4,4,1024], and the warp volume module of [5,5,256] is used to obtain [8,8,256] Characteristic layer, the characteristic layer of [8,8,256] before combining obtain the characteristic layer of [8,8,512], use the warp of [5,5,128] Volume module obtains the characteristic layer of [16,16,128], and the characteristic layer of [16,16,128] before combining obtains [16,16,256] Characteristic layer uses the warp volume module of [5,5,64] to obtain the characteristic layer of [32,32,64], [32,32,64] before combining Characteristic layer obtains the characteristic layer of [32,32,128], and the warp volume module of [5,5,3] is used to obtain the characteristic layer of [64,64,3], What is obtained is the picture of corresponding ImageNet64, and picture a length of 64, width 64 includes RGB triple channel.
3. as described in claim 1 based on the wireless signal encryption method of antithesis GAN, which is characterized in that the wireless signal The structure of decryption network Bg includes:
The picture size being originally inputted is [64,64,3], using the convolution module having a size of [5,5,64] and having a size of [2,2] step A length of 2 maximum pond module obtains the characteristic layer having a size of [32,32,64], uses the convolution module having a size of [5,5,128] With having a size of [2,2] step-length be 2 maximum pond module obtain the characteristic layer having a size of [16,16,128], using having a size of [5, 5,256] convolution module and the maximum pond module for being 2 having a size of [2,2] step-length obtain the feature having a size of [8,8,256] Layer, using having a size of [5,5,1024] convolution module and having a size of [2,2] step-length be 2 maximum pond module obtain having a size of The characteristic layer of [4,4,1024], the maximum pond for being 2 using the convolution module having a size of [5,5,2048] and having a size of [2,2] step-length Change module obtain the characteristic layer having a size of [2,2,2048], using having a size of [5,5,4096] convolution module and having a size of [2, 2] step-length be 2 maximum pond module obtain the characteristic layer having a size of [1, Isosorbide-5-Nitrae 096], using full link block obtain having a size of The characteristic layer of 16384 (512*32) obtains the characteristic layer having a size of 4096 (512*8) using full link block, uses full connection Module obtains the characteristic layer having a size of 1024 (512*2), its shape is become [512,2] using reshape function, obtains figure Wireless signal corresponding to piece, wherein 512 corresponding sampling time points, the characteristic value of 2 corresponding each time points.
4. as described in claim 1 based on the wireless signal encryption method of antithesis GAN, which is characterized in that the wireless signal Encryption differentiates that the structure of network A d includes:
The picture size of input is [64,64,3], uses the convolution module of [5,5,64] and is 2 most having a size of [2,2] step-length Great Chiization module obtains the characteristic layer of [32,32,64], uses the convolution module of [5,5,128] and is 2 having a size of [2,2] step-length Maximum pond module obtain the characteristic layer of [16,16,128], use the convolution module of [5,5,256] and having a size of [2,2] step A length of 2 maximum pond module obtains the characteristic layer of [8,8,256], uses the convolution module of [5,5,512] and having a size of [2,2] The maximum pond module that step-length is 2 obtains the characteristic layer of [4,4,512], uses the convolution module of [5,5,1] and having a size of [4,4] The maximum pond module that step-length is 4 obtains the characteristic layer of [1,1,1], and obtained not normalized confidence value is identical with shape 0 or 1 matrix does cross entropy and calculates the coded signal image of Ag output and the gap of normal color image;
The wireless signal decryption differentiates that the structure of network B d includes:
The wireless signal sample-size being originally inputted is [512,2], and the spy having a size of [512,64] is obtained after LSTM unit Layer is levied, wherein 512 correspond to original time point, the feature vector that 64 corresponding each time points are calculated uses full connection Obtain the characteristic layer having a size of 64, obtain the characteristic layer having a size of 1 using full connection, obtained not normalized confidence value with 0 or 1 does the gap that cross entropy calculates original wireless signal and decryption wireless signal that wireless signal refined net Ag is generated.
5. as described in claim 1 based on the wireless signal encryption method of antithesis GAN, which is characterized in that the wireless signal The structure of sorter network C includes:
The dimension of picture of input is [64,64,3], is 2 using the convolution kernel having a size of [5,5,64] and having a size of [2,2] step-length Maximum pond module obtain the characteristic layer having a size of [32,32,64], use convolution kernel and size having a size of [5,5,128] The maximum pond module for being 2 for [2,2] step-length obtains the characteristic layer having a size of [16,16,128], using having a size of [5,5,256] Convolution kernel and having a size of [2,2] step-length be 2 maximum pond module obtain using ruler having a size of the characteristic layer of [8,8,256] It is very little be the convolution kernel of [5,5,512] and be 2 having a size of [2,2] step-length maximum pond module obtain having a size of [4,4,512] Characteristic layer obtains the characteristic layer having a size of 1024 using full connection, use full articulamentum obtain having a size of 12 characteristic layer as Export (being directed to 12 classification tasks comprising 12 kinds of wireless signal modulation types), obtained not normalized confidence value with The category of the corresponding original wireless signal of coded signal image does cross entropy and calculates distance.
6. as described in claim 1 based on the wireless signal encryption method of antithesis GAN, which is characterized in that pre-training it is specific Process are as follows:
Fixed wireless signal encryption differentiates that network A d, wireless signal decryption differentiate network B d's and wireless signal decryption network Bg Trained epochs=N1 is arranged in parameter, i.e. training dataset is used N1 times;The input of wireless signal refined net Ag is original Beginning wireless signal exports as encrypted coded signal image, and the input of wireless signal sorter network C is wireless signal densification network The coded signal image of network Ag output, exports as the class to the debug-type of original wireless signal corresponding to coded signal image Mark prediction;Ag-C pairs of disaggregated model as a whole of wireless signal refined net Ag and wireless signal sorter network C at this time The modulation type of wireless signal is classified, and wireless signal refined net Ag is equivalent to the feature extraction mould of disaggregated model Ag-C Block, wireless signal sorter network C are equivalent to the categorization module of disaggregated model Ag-C.
7. as claimed in claim 6 based on the wireless signal encryption method of antithesis GAN, which is characterized in that retraining it is specific Process are as follows:
(1) fixed wireless signal encryption differentiates that network A d, wireless signal decryption differentiate network B d, wireless signal sorter network C Parameter, by original wireless signal xsignal, wireless signal decryption network Bg output decryption wireless signal Bg (ximage) as wireless The input of signal encryption network A g, the parameter of training Ag, the coded signal image for exporting it are more nearly normal color image; And by normal color image ximage, wireless signal refined net Ag output coded signal image Ag (xsignal) it is used as wireless communication The input of number decryption network Bg, the parameter of training Bg, the decryption wireless signal for exporting it are more nearly original wireless signal, with This realizes the decrypting process of encrypted wireless signal;
(2) parameter of fixed wireless signal encryption network A g, wireless signal decryption network Bg, wireless signal sorter network C, by nothing The coded signal image Ag (x of line signal encryption network A g outputsignal) and normal color imageBlended data, as Wireless signal encryption differentiates the input of network A d, and the parameter of training Ad can distinguish coded signal image and normal color Image;And the decryption wireless signal Bg (x for exporting wireless signal decryption network Bgimage) and original wireless signalIt is mixed Data are closed, the input for differentiating network B d is decrypted as wireless signal, the parameter of training Bd can distinguish decryption wireless signal With original wireless signal;
(3) fixed wireless signal encryption differentiates that network A d, wireless signal decryption network Bg, wireless signal decryption differentiate network B d's Parameter, by original wireless signal xsignal, wireless signal decryption network Bg output decryption wireless signal Bg (ximage) as wireless The input of signal encryption network A g, and the coded signal image Ag (x that wireless signal refined net Ag is exportedsignal) and it is corresponding Input of the true category y as wireless signal sorter network C, coorinated training wireless signal refined net Ag and wireless signal point The parameter of class network C;
(4) step (1)~(3) are repeated, until wireless signal refined net Ag and wireless signal encryption differentiate network A d, wireless communication Number decryption network Bg and wireless signal decryption differentiate that network B d realizes Nash Equilibrium, i.e. wireless signal refined net Ag and radio-type Number encryption differentiates that both network A d game tends to balance, and wireless signal decryption network Bg and wireless signal decryption differentiate network B d two The game of person tends to balance, and training cut-off, trained wireless signal refined net Ag is wireless signal Encryption Model, trains Wireless signal decryption network Bg be wireless signal decrypted model.
8. as claimed in claim 7 based on the wireless signal encryption method of antithesis GAN, which is characterized in that when realization receive it is assorted Have when weighing apparatus:
Wherein, xAgIndicate the coded signal image of wireless signal refined net Ag output, xBgIndicate wireless signal decryption network Bg The decryption wireless signal of output, xAg~pAg indicates xAgSample the output from wireless signal refined net Ag, xBg~pBg indicates xBg The output from wireless signal decryption network Bg is sampled, pAg and pBg respectively indicate the probability distribution of Ag and Bg output, Ad (xAg) table Show that wireless signal encryption differentiates network A d to xAgDifferentiation probability, Bd (xBg) indicate that wireless signal decryption differentiates network B d to xBg Differentiation probability, E () indicate cross entropy expectation;Pdata indicates raw data set,Indicate normal signal SampleFrom original signal data Pdata;Indicate normal image dataFrom original graph As data Pdata;Y indicates the modulation type category of original wireless signal,Indicate normal wireless sample of signalFrom wireless signal data set, C () indicates wireless signal sorter network C to the classification knot of wireless signal modulation type for sampling Fruit.
CN201811268894.7A 2018-10-29 2018-10-29 Wireless signal encryption method based on dual GAN Active CN109413068B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811268894.7A CN109413068B (en) 2018-10-29 2018-10-29 Wireless signal encryption method based on dual GAN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811268894.7A CN109413068B (en) 2018-10-29 2018-10-29 Wireless signal encryption method based on dual GAN

Publications (2)

Publication Number Publication Date
CN109413068A true CN109413068A (en) 2019-03-01
CN109413068B CN109413068B (en) 2021-01-26

Family

ID=65469565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811268894.7A Active CN109413068B (en) 2018-10-29 2018-10-29 Wireless signal encryption method based on dual GAN

Country Status (1)

Country Link
CN (1) CN109413068B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047006A (en) * 2019-10-28 2020-04-21 浙江工业大学 Anti-attack defense model based on dual-generation network and application
CN111654368A (en) * 2020-06-03 2020-09-11 电子科技大学 Key generation method for generating countermeasure network based on deep learning
CN114710371A (en) * 2022-06-08 2022-07-05 深圳市乐凡信息科技有限公司 Method, device, equipment and storage medium for safely signing electronic data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951919A (en) * 2017-03-02 2017-07-14 浙江工业大学 A kind of flow monitoring implementation method based on confrontation generation network
CN107220600A (en) * 2017-05-17 2017-09-29 清华大学深圳研究生院 A kind of Picture Generation Method and generation confrontation network based on deep learning
CN108573479A (en) * 2018-04-16 2018-09-25 西安电子科技大学 The facial image deblurring and restoration methods of confrontation type network are generated based on antithesis

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951919A (en) * 2017-03-02 2017-07-14 浙江工业大学 A kind of flow monitoring implementation method based on confrontation generation network
CN107220600A (en) * 2017-05-17 2017-09-29 清华大学深圳研究生院 A kind of Picture Generation Method and generation confrontation network based on deep learning
CN108573479A (en) * 2018-04-16 2018-09-25 西安电子科技大学 The facial image deblurring and restoration methods of confrontation type network are generated based on antithesis

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SURYAWANSHI S B: "A triple-key Chaotic neural network for", 《 INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES& EMERGING TECHNOLOGIES》 *
王万良: "生成式对抗网络研究进展", 《通信学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047006A (en) * 2019-10-28 2020-04-21 浙江工业大学 Anti-attack defense model based on dual-generation network and application
CN111047006B (en) * 2019-10-28 2023-04-21 浙江工业大学 Dual generation network-based anti-attack defense model and application
CN111654368A (en) * 2020-06-03 2020-09-11 电子科技大学 Key generation method for generating countermeasure network based on deep learning
CN111654368B (en) * 2020-06-03 2021-10-08 电子科技大学 Key generation method for generating countermeasure network based on deep learning
CN114710371A (en) * 2022-06-08 2022-07-05 深圳市乐凡信息科技有限公司 Method, device, equipment and storage medium for safely signing electronic data

Also Published As

Publication number Publication date
CN109413068B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
Zheng et al. Spectrum interference-based two-level data augmentation method in deep learning for automatic modulation classification
Kong et al. Detect and locate: Exposing face manipulation by semantic-and noise-level telltales
CN109413068A (en) A kind of wireless signal encryption method based on antithesis GAN
Guo et al. Self-supervised GANs with similarity loss for remote sensing image scene classification
CN107341463A (en) A kind of face characteristic recognition methods of combination image quality analysis and metric learning
Qian et al. Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks
CN109831422A (en) A kind of encryption traffic classification method based on end-to-end sequence network
CN109800785A (en) One kind is based on the relevant data classification method of expression and device certainly
CN109948692A (en) Picture detection method is generated based on the computer of multiple color spaces convolutional neural networks and random forest
CN113553624A (en) WGAN-GP privacy protection system and method based on improved PATE
CN109887047A (en) A kind of signal-image interpretation method based on production confrontation network
Luo et al. Beyond universal attack detection for continuous-variable quantum key distribution via deep learning
William et al. Implementation of hand written based signature verification technology using deep learning approach
CN114499861A (en) Quantum key cloud security situation sensing method based on machine learning
Neagoe et al. CNN hyperspectral image classification using training sample augmentation with generative adversarial networks
CN108090905B (en) The judgment method and system of producing line exception
Kumar et al. Secured Cloud Application for Detection of Brain Tumor using Deep Learning Algorithms
Liu et al. MSNet: A multiple supervision network for remote sensing scene classification
CN109951278A (en) A kind of asymmetrical digital image encryption method based on generalized chaotic synchronization system
CN115690484A (en) Unattended content auditing method
CN115618226A (en) Encrypted traffic data synthesis method based on generation countermeasure network model
Peng et al. Counterfactual image enhancement for explanation of face swap deepfakes
Le et al. Generating high-fidelity cybersecurity data with generative adversarial networks
Gadgilwar et al. Exploring Deepfakes-Creation Techniques Detection Strategies and Emerging Challenges: A Survey
Huang et al. Ffaa: Multimodal large language model based explainable open-world face forgery analysis assistant

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant