{"id":"https://openalex.org/W2783199716","doi":"https://doi.org/10.1109/icsai.2017.8248431","title":"Modified decoding algorithm of LDPC codes for physical-layer key reconciliation","display_name":"Modified decoding algorithm of LDPC codes for physical-layer key reconciliation","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2783199716","doi":"https://doi.org/10.1109/icsai.2017.8248431","mag":"2783199716"},"language":"en","primary_location":{"id":"doi:10.1109/icsai.2017.8248431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2017.8248431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Systems and Informatics (ICSAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054831480","display_name":"Ying-wei Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying-wei Lu","raw_affiliation_strings":["Nanjing University Of Posts And Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University Of Posts And Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024848230","display_name":"Ze-liang Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ze-liang Zheng","raw_affiliation_strings":["Nanjing University Of Posts And Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University Of Posts And Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101920024","display_name":"Xiaoyun Hou","orcid":"https://orcid.org/0000-0003-1450-7075"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-yun Hou","raw_affiliation_strings":["Nanjing University Of Posts And Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University Of Posts And Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054831480"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.1433,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.54092553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14","issue":null,"first_page":"996","last_page":"1000"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.888519823551178},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7592267990112305},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6443748474121094},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.633594274520874},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6330122351646423},{"id":"https://openalex.org/keywords/sequential-decoding","display_name":"Sequential decoding","score":0.5622248649597168},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5276036858558655},{"id":"https://openalex.org/keywords/list-decoding","display_name":"List decoding","score":0.5205708146095276},{"id":"https://openalex.org/keywords/serial-concatenated-convolutional-codes","display_name":"Serial concatenated convolutional codes","score":0.48504966497421265},{"id":"https://openalex.org/keywords/berlekamp\u2013welch-algorithm","display_name":"Berlekamp\u2013Welch algorithm","score":0.4481915831565857},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4267886281013489},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.4108518362045288},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3688380718231201},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.17392182350158691},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.11837217211723328},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10417351126670837},{"id":"https://openalex.org/keywords/error-floor","display_name":"Error floor","score":0.07399430871009827},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07259556651115417}],"concepts":[{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.888519823551178},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7592267990112305},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6443748474121094},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.633594274520874},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6330122351646423},{"id":"https://openalex.org/C193969084","wikidata":"https://www.wikidata.org/wiki/Q7452500","display_name":"Sequential decoding","level":4,"score":0.5622248649597168},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5276036858558655},{"id":"https://openalex.org/C204397858","wikidata":"https://www.wikidata.org/wiki/Q4437907","display_name":"List decoding","level":5,"score":0.5205708146095276},{"id":"https://openalex.org/C33529081","wikidata":"https://www.wikidata.org/wiki/Q18378194","display_name":"Serial concatenated convolutional codes","level":5,"score":0.48504966497421265},{"id":"https://openalex.org/C132727834","wikidata":"https://www.wikidata.org/wiki/Q4892328","display_name":"Berlekamp\u2013Welch algorithm","level":5,"score":0.4481915831565857},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4267886281013489},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.4108518362045288},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3688380718231201},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.17392182350158691},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.11837217211723328},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10417351126670837},{"id":"https://openalex.org/C46462455","wikidata":"https://www.wikidata.org/wiki/Q5395712","display_name":"Error floor","level":4,"score":0.07399430871009827},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07259556651115417}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsai.2017.8248431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2017.8248431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Systems and Informatics (ICSAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1770324186","https://openalex.org/W2027229067","https://openalex.org/W2058182290","https://openalex.org/W2105768002","https://openalex.org/W2108730670","https://openalex.org/W2118203851","https://openalex.org/W2128765501","https://openalex.org/W2131580663","https://openalex.org/W2154350801","https://openalex.org/W2154793448","https://openalex.org/W2155086857","https://openalex.org/W2165711691","https://openalex.org/W2290634991","https://openalex.org/W2376069608","https://openalex.org/W2376903360","https://openalex.org/W2443853175","https://openalex.org/W3101367291","https://openalex.org/W4300188436","https://openalex.org/W6718507863"],"related_works":["https://openalex.org/W2385322349","https://openalex.org/W2369600518","https://openalex.org/W2370284973","https://openalex.org/W2028976748","https://openalex.org/W2050784748","https://openalex.org/W2383267581","https://openalex.org/W2102627024","https://openalex.org/W2182594114","https://openalex.org/W2085052822","https://openalex.org/W2010879611"],"abstract_inverted_index":{"Key":[0],"extraction":[1],"based":[2],"on":[3],"wireless":[4],"channel-characteristics":[5],"(Physical-Layer":[6],"Key)":[7],"is":[8,61,70,125],"the":[9,18,21,29,45,48,55,65,79,99,105,111,116,122],"new":[10],"technology":[11],"to":[12,44],"ensure":[13],"communication":[14],"security.":[15],"To":[16,73],"solve":[17],"problem":[19],"that":[20,86],"channel":[22],"characteristics":[23],"are":[24],"not":[25],"completely":[26],"consistent":[27],"in":[28],"process":[30,46],"of":[31,47,52,57,67,83,107,121],"key":[32,68,108,123],"generation,":[33],"low":[34],"density":[35],"parity":[36],"check":[37,58],"(LDPC)":[38],"codes":[39,85],"was":[40],"proposed.":[41],"But":[42],"due":[43],"traditional":[49,88],"decoding":[50,81,89,93],"algorithm":[51,82,90,96],"LDPC":[53,84],"codes,":[54],"computation":[56],"nodes":[59],"renew":[60],"too":[62,71],"high":[63],"and":[64,91,103,118],"efficiency":[66,106],"reconciliation":[69,124],"low.":[72],"overcome":[74],"this":[75],"problem,":[76],"we":[77],"propose":[78],"modified":[80],"combine":[87],"Offset-base":[92],"algorithm.":[94],"This":[95],"can":[97],"reduce":[98],"computational":[100],"complexity":[101],"efficiently,":[102],"improve":[104],"reconciliation.":[109],"Finally,":[110],"simulation":[112],"results":[113],"demonstrate":[114],"that,":[115],"BER":[117],"success":[119],"ratio":[120],"improving.":[126]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
