2016
DOI: 10.1109/lcomm.2016.2525759
|View full text |Cite
|
Sign up to set email alerts
|

On Blind Recognition of Channel Codes Within a Candidate Set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(39 citation statements)
references
References 8 publications
0
39
0
Order By: Relevance
“…In fact, the algorithms LLR and LD are equivalent. From [16] we can see that they have almost the same performance. Therefore, we only analyze the property of LD and CC since they have explicit probability density function and lower computational complexity.…”
Section: Analysis Of the Properties Of The Existing Algorithm Anmentioning
confidence: 82%
See 2 more Smart Citations
“…In fact, the algorithms LLR and LD are equivalent. From [16] we can see that they have almost the same performance. Therefore, we only analyze the property of LD and CC since they have explicit probability density function and lower computational complexity.…”
Section: Analysis Of the Properties Of The Existing Algorithm Anmentioning
confidence: 82%
“…According to parity-checks H θ , 1 ≤ θ ≤ s , we regardĤ = arg max 1≤θ≤s AV ET (H θ ) as the correct encoder. We can also investigate the mean and variance of AV ET under different hypothesis exactly like [16] and [17].…”
Section: A the Proposed Algorithm Tpmentioning
confidence: 99%
See 1 more Smart Citation
“…The convolution code is one type of FEC code that helps in achieving reliable communication over a noisy channel [2][3][4] . The blind identification of convolution code parameters have been studied based on linear algebraic 5-8 , maximum likelihood [9][10] , euclidean 11 and soft information and correlation attack 12 algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…The blind code detection task has been shown to be NP-hard in general [1], [2], so that heuristic algorithms are used in practice. For example, various methods have been proposed for the blind detection of Hamming and BCH codes (e.g., [3], [4] and references therein), convolutional codes (e.g., [5], [6] and references therein), Turbo codes (e.g., [7], [8] and references therein), and LDPC codes (e.g., [9], [10] and references therein). However, so far, the blind detection of polar codes, which were recently included in the 5G standard, has received little attention [11]- [13].…”
Section: Introductionmentioning
confidence: 99%