A 300 km fiber channel mapping using neural networks for Gb/s physical-layer key distribution

X Huang, X Peng, L Zhang, W Hu, X Yang - Optics Letters, 2024 - opg.optica.org
Physical-layer secure key distribution (PLSKD) generally acquires highly correlated entropy
sources via bidirectional transmission to share the channel reciprocity. For long-haul fiber …

Integrating key generation and distribution with the quantum noise stream cipher system without compromising the transmission performance

Y Li, Y Li, K Zhu, S Wei, M Zhang, Y Zhao, J Zhang - Optics Letters, 2023 - opg.optica.org
We propose and experimentally demonstrate a secure quantum noise stream cipher
transmission system that integrates key generation and distribution. At the stage of carrier …

Security Performance Prediction Method of Artificial Intelligence of Things Based on Lightweight MS-Net Network

L Xu, X Zhou, S Cao, M Asif, X Li… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Emerging technologies such as artificial intelligence and big data have made numerous
Internet of things (IoT) applications possible. In particular, the Artificial Intelligence of Things …

Secure transmission in a W-band RoF system based on delta-sigma modulation

Y Xiao, C Zhou, L Jiang, Z An, Y Li - Optics Letters, 2024 - opg.optica.org
In this Letter, a delta-sigma modulation (DSM) encryption technique in a W-band RoF
system is proposed. By performing DSM with different over-sample ratios (OSRs) on the …

Integrated Physical Layer Key Distribution by Optical Steganography in Quantum Noise Stream Cipher System

Y Wang, H Luo, T Qiu, L Zhong, X Dai… - IEEE Photonics …, 2024 - ieeexplore.ieee.org
To counter heterodyne measurements, correlation attacks, and known plaintext attacks,
seed key refresh is critical to the security of a quantum noise stream cipher system …

Optical Covert Communication Based on Microwave Photonic Filter

Z Liu, H Zhu, X Zhang - 2023 IEEE 11th International …, 2023 - ieeexplore.ieee.org
Optical communication networks are easy to be eavesdropped by attackers, and traditional
encryption algorithms have become more and more difficult to ensure the security of …