2022
DOI: 10.1109/twc.2022.3165588
|View full text |Cite
|
Sign up to set email alerts
|

Robust Online CSI Estimation in a Complex Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…It can be seen that foreign scholars have conducted research on the methods and approaches of smart city construction. Chinese scholars also highly a rmed the interaction between the Internet of ings and smart cities [22][23][24][25]. In the macro field, the state has formulated the "New Smart City Evaluation Indicators (2016)", and a large number of regions across the country have participated in the indicator evaluation [26].…”
Section: Introductionmentioning
confidence: 99%
“…It can be seen that foreign scholars have conducted research on the methods and approaches of smart city construction. Chinese scholars also highly a rmed the interaction between the Internet of ings and smart cities [22][23][24][25]. In the macro field, the state has formulated the "New Smart City Evaluation Indicators (2016)", and a large number of regions across the country have participated in the indicator evaluation [26].…”
Section: Introductionmentioning
confidence: 99%
“…42,43 An IDS is a physical device or software that detects and prevents a wireless or wired network admission. 44,45 The IDS's major task when it detects an invader trying an assault is to prohibit it; this action should be conducted before any sensitive data is damaged or accessed. 46 IDSs depend on anomaly detection to create a regular habit profile and label activities that do not fit it as assaults.…”
Section: F I G U R E 2 Ids Sorts Based On the Relevant Deploymentmentioning
confidence: 99%
“…A completely random set has been chosen to reduce the chance of biasness. e applicability of keys on sensitive data is shown by key grades [53,54]. In methodology, mainly three keys were used, which give five different types of key distribution individually or in combination.…”
Section: Comparative Analysis Based On Data Securitymentioning
confidence: 99%