2020
DOI: 10.1109/access.2020.2979768
|View full text |Cite
|
Sign up to set email alerts
|

Communication Protocol Classification Based on LSTM and DBN

Abstract: In the battlefield, we often don't know the parameters about enemy wireless communication system. Therefore, we need to use electronic reconnaissance equipment to search, intercept, identify and analyze enemy wireless communication signal. However, the exciting electronic reconnaissance methods can only detect signal layer parameters such as signal carrier frequency and bandwidth, and cannot obtain more information. In order to improve the reconnaissance ability, we propose a novel communication protocol class… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…In this analysis, the effective performed rate is attained with the help of maximum iteration 25 and population rate 10. Multiple contrasting approaches like Sunflower Optimization (SFO) [ 30 ], Jaya (JA) [ 31 ], Elephant Herding Optimization (EHO) [ 32 ], and AOA [ 26 ] along with classifiers like Random Forest with Support Vector Machine (RF+SVM) [ 33 ], DBN [ 28 ], LSTM [ 29 ], AL-DBN [ 34 ] were used for the calculation.…”
Section: Resultsmentioning
confidence: 99%
“…In this analysis, the effective performed rate is attained with the help of maximum iteration 25 and population rate 10. Multiple contrasting approaches like Sunflower Optimization (SFO) [ 30 ], Jaya (JA) [ 31 ], Elephant Herding Optimization (EHO) [ 32 ], and AOA [ 26 ] along with classifiers like Random Forest with Support Vector Machine (RF+SVM) [ 33 ], DBN [ 28 ], LSTM [ 29 ], AL-DBN [ 34 ] were used for the calculation.…”
Section: Resultsmentioning
confidence: 99%
“…is the bias of feature map c, and K (1) is the number of convolution kernels in the first convolutional layer. f conv_2D represents the twodimensional convolution operation.…”
Section: B Algorithmmentioning
confidence: 99%
“…This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ kernels are used for down-sampling, while the output sizes are [1,8], [1,4], and [1, 1] respectively. Thus, the variable length input with size [1, (L/ 3 l=1 s l p )] can be converted to the fixed length output with size [1,13].…”
Section: B Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…It is worth noting that the message distance is the basis of protocol clustering. Besides, the specifications vary greatly according to the protocol type [26]. Therefore, the distance between two different types of protocol messages is greater than the distance of the protocol messages in the same type, so it can be used as a basis for protocol clustering.…”
Section: Introductionmentioning
confidence: 99%