{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T21:47:48Z","timestamp":1761169668911,"version":"build-2065373602"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2019,4,1]]},"DOI":"10.1587\/transcom.2018ebp3148","type":"journal-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T18:27:13Z","timestamp":1538504833000},"page":"779-789","source":"Crossref","is-referenced-by-count":2,"title":["Secure Communication Using Scramble Phase Assisting WFRFT"],"prefix":"10.23919","volume":"E102.B","author":[{"given":"Yuan","family":"LIANG","sequence":"first","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Xinyu","family":"DA","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Ruiyang","family":"XU","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Lei","family":"NI","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Dong","family":"ZHAI","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Yu","family":"PAN","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] S. Bayat, R.H.Y. Louie, Z. Han, B. Vucetic, and Y. Li, \u201cPhysical-layer security in distributed wireless networks using matching theory,\u201d IEEE Trans. Inf. Forensics Security, vol.8, no.5, pp.717-732, 2013. 10.1109\/tifs.2013.2251335","DOI":"10.1109\/TIFS.2013.2251335"},{"key":"2","unstructured":"[2] Y. Wu and P. Yi, \u201cSecurity issues and solutions in wireless communications at physical layer,\u201d China Commun., vol.8, no.5, pp.11-19, 2011."},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] V.D. Nguyen, T.Q. Duong, O.S. Shin, A. Nallanathan, and G.K. Karagiannidis, \u201cEnhancing PHY security of cooperative cognitive radio multicast communications,\u201d IEEE Trans. Cogn. Commun. Netw., vol.3, no.4, pp.599-613, 2017. 10.1109\/tccn.2017.2748132","DOI":"10.1109\/TCCN.2017.2748132"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] T. Jing, L. Jiang, Y. Huo, J. Qian, and Y. Wen, \u201cPHY security of preventing eavesdroppers in MIMO-OFDM system,\u201d IEEE International Conference on Signal Processing, pp.1429-1434, 2017. 10.1109\/icsp.2016.7878062","DOI":"10.1109\/ICSP.2016.7878062"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] P. Praveenkumar, K. Thenmozhi, J.B.B. Rayappan, and R. Amirtharajan, \u201cStego in multicarrier: A phase hidden communication,\u201d Information Technology J., vol.13, no.12, pp.2011-2016, 2014. 10.3923\/itj.2014.2011.2016","DOI":"10.3923\/itj.2014.2011.2016"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] B.A. Bash, D. Goeckel, D. Towsley, and S. Guha, \u201cHiding information in noise: fundamental limits of covert wireless communication,\u201d IEEE Commun. Mag., vol.53, no.12, pp.26-31, 2015. 10.1109\/mcom.2015.7355562","DOI":"10.1109\/MCOM.2015.7355562"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] M.R. Bloch, \u201cCovert communication over noisy channels: A resolvability perspective,\u201d IEEE Trans. Inf. Theory, vol.62, no.5, pp.2334-2354, 2015. 10.1109\/tit.2016.2530089","DOI":"10.1109\/TIT.2016.2530089"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] C.C. Shih, \u201cFractionalization of Fourier transform,\u201d Opt. Commun., vol.118, no.5-6, pp.495-498, 1995. 10.1016\/0030-4018(95)00268-d","DOI":"10.1016\/0030-4018(95)00268-D"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] L. Mei, X. Sha, and N. Zhang, \u201cCovert communication based on waveform overlay with weighted fractional Fourier transform signals,\u201d IEEE International Conference on Wireless Communications, NETWORKING and Information Security, pp.472-475, 2010. 10.1109\/wcins.2010.5541823","DOI":"10.1109\/WCINS.2010.5541823"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] X. Fang, X. Sha, and Y. Li, \u201cSecret communication using parallel combinatory spreading WFRFT,\u201d IEEE Commun. Lett., vol.19, no.1, pp.62-65, 2015. 10.1109\/lcomm.2014.2359200","DOI":"10.1109\/LCOMM.2014.2359200"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] X.J. Fang, X.J. Sha, and L. Mei, \u201cGuaranteeing wireless communication secrecy via a WFRFT-based cooperative system,\u201d China Commun., vol.12, no.9, pp.76-82, 2015. 10.1109\/cc.2015.7275261","DOI":"10.1109\/CC.2015.7275261"},{"key":"12","unstructured":"[12] X. Fang, X. Sha, and L. Yue, \u201cMP-WFRFT and constellation scrambling based physical layer security system,\u201d China Commun., vol.13, no.2, pp.138-145, 2016."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] X. Fang, X. Wu, N. Zhang, X. Sha, and X. Shen, \u201cSafeguarding physical layer security using weighted fractional Fourier transform,\u201d IEEE Global Communications Conference, pp.1-6, 2016. 10.1109\/glocom.2016.7842239","DOI":"10.1109\/GLOCOM.2016.7842239"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Y. Liang, X. Da, R. Xu, Z. Zhang, and H. Liu, \u201cWFRFT modulation recognition based on HOC and optimal order searching algorithm,\u201d J. Syst. Eng. Electron., vol.29, no.3, pp.462-470, 2018. 10.21629\/JSEE.2018.03.03","DOI":"10.21629\/JSEE.2018.03.03"},{"key":"15","unstructured":"[15] Y. Liang, X. Da, R. Xu, and L. Ni, \u201cDesign of constellation precoding in MP-WFRFT based system for covert communications,\u201d J. Huazhong University of Science and Technology (Nature Science Edition), vol.46, no.2, pp.72-78, 2018."},{"key":"16","unstructured":"[16] Y. Liang and X. Da, \u201cAnalysis and implementation of constellation precoding system based on multiple parameters weighted-type fractional Fourier transform,\u201d J. Electronics &amp; Information Technology, vol.40, no.4, pp.825-831, 2018. 10.11999\/JEIT170673"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Y. Liang, X. Da, and S. Wang, \u201cOn narrowband interference suppression in OFDM-based systems with CDMA and weighted-type fractional Fourier transform domain preprocessing,\u201d KSII Trans. Internet and Information Systems, vol.11, no.11, pp.5377-5391, 2017. 10.3837\/tiis.2017.11.011","DOI":"10.3837\/tiis.2017.11.011"},{"key":"18","unstructured":"[18] L. Ni, X. Da, S. Wang, and Y. Liang, \u201cResearch on satellite covert conmmunication based on the information encryption of physical layer,\u201d Advanced Engineering Sciences, vol.50, no.1, pp.133-139, 2018. 10.15961\/j.jsuese.201700160"},{"key":"19","unstructured":"[19] Z. Zhang, X. Da, H. Liu, and Y. Liang, \u201cA secure transmission scheme for satellite communications based on hybrid carrier and chaotic phase scrambling,\u201d J. Xi&apos;an Jiaotong University, vol.51, no.12, pp.42-48, 2017."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] L. Mei, X.J. Sha, and N.T. Zhang, \u201cThe approach to carrier scheme convergence based on 4-weighted fractional Fourier transform,\u201d IEEE Commun. Lett., vol.14, no.6, pp.503-505, 2010. 10.1109\/lcomm.2010.06.092413","DOI":"10.1109\/LCOMM.2010.06.092413"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] L. Mei, X. Sha, and N. Zhang, \u201cAnti-interception communication system based on double layers weighted-type fractional Fourier transform,\u201d International ICST Conference on Communications and NETWORKING in China, pp.88-92, 2011. 10.1109\/chinacom.2011.6158125","DOI":"10.1109\/ChinaCom.2011.6158155"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] Y. Hui, B. Li, and Z. Tong, \u201c4-weighted fractional Fourier transform over doubly selective channels and optimal order selecting algorithm,\u201d Electron. Lett., vol.51, no.2, pp.177-179, 2015. 10.1049\/el.2014.2268","DOI":"10.1049\/el.2014.2268"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] Y. Li, X. Sha, and K. Wang, \u201chybrid carrier communication with partial FFT demodulation over underwater acoustic channels,\u201d IEEE Commun. Lett., vol.17, no.12, pp.2260-2263, 2013. 10.1109\/lcomm.2013.102613.131651","DOI":"10.1109\/LCOMM.2013.102613.131651"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] L. Mei, Q. Zhang, X. Sha, and N. Zhang, \u201cWFRFT precoding for narrowband interference suppression in DFT-based block transmission systems,\u201d IEEE Commun. Lett., vol.17, no.10, pp.1916-1919, 2013. 10.1109\/lcomm.2013.090213.131126","DOI":"10.1109\/LCOMM.2013.090213.131126"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] L. Mei, X.J. Sha, Q.W. Ran, and N.T. Zhang, \u201cResearch on the application of 4-weighted fractional Fourier transform in communication system,\u201d Sci. China Inf. Sci., vol.53, no.6, pp.1251-1260, 2010. 10.1007\/s11432-010-0073-1","DOI":"10.1007\/s11432-010-0073-1"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] J. Lang, R. Tao, Q. Ran, and Y. Wang, \u201cThe multiple-parameter fractional Fourier transform,\u201d Sci. China, vol.51, no.8, pp.1010-1024, 2008. 10.1007\/s11432-008-0073-6","DOI":"10.1007\/s11432-008-0073-6"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] W. Akmouche, \u201cDetection of multicarrier modulations using 4th-order cumulants,\u201d Military Communications Conference Proceedings, 1999. Milcom, pp.432-436, 1999. 10.1109\/milcom.1999.822720","DOI":"10.1109\/MILCOM.1999.822720"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[29] P.J. Swackhammer, M.A. Temple, and R.A. Raines, \u201cPerformance simulation of a transform domain communication system for multiple access applications,\u201d Military Communications Conference Proceedings, 1999. Milcom, pp.1055-1059, 1999. 10.1109\/milcom.1999.821364","DOI":"10.1109\/MILCOM.1999.821364"},{"key":"29","unstructured":"[30] B. Sklar, Digital Communications, Prentice Hall, 2001."},{"key":"30","doi-asserted-by":"publisher","unstructured":"[31] A. Swami and B.M. Sadler, \u201cHierarchical digital modulation classification using cumulants,\u201d IEEE Trans. Commun., vol.48, no.3, pp.416-429, 2000. 10.1109\/26.837045","DOI":"10.1109\/26.837045"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[32] L. Liu and J. Xu, \u201cA novel modulation classification method based on high order cumulants,\u201d International Conference on Wireless Communications, NETWORKING and Mobile Computing, pp.1-5, 2006. 10.1109\/wicom.2006.157","DOI":"10.1109\/WiCOM.2006.157"},{"key":"32","unstructured":"[33] W. Banzhaf, P. Nordin, R.E. Keller, and F.D. Francone, \u201cGenetic programming \u2014 An introduction,\u201d Fires &amp; Human Behaviour, vol.150, no.11, pp.39-47, 1998."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/4\/E102.B_2018EBP3148\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T01:31:01Z","timestamp":1761096661000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/4\/E102.B_2018EBP3148\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2018ebp3148","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"type":"print","value":"0916-8516"},{"type":"electronic","value":"1745-1345"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}