Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

High-security and low-complexity OCDM transmission scheme based on GAN enhanced chaotic encryption

Open Access Open Access

Abstract

We report a low-complexity and high-security orthogonal chirp division multiplexing (OCDM) transmission scheme based on generative adversarial networks (GAN) enhanced chaotic encryption. Our investigation focuses on the security and efficiency of the communication system. To successfully apply GAN for the encryption scheme, we design our networks with new network architectures and modify the loss functions to improve the adversarial training performance of the networks. In the experiment, a weakly coupled seven cores fiber of 2 km was applied to achieve a 70 Gb/s transmission system. The results reveal that our proposed scheme has a maximum receiver sensitivity gain of about 1.26dB than traditional OFDM transmission system, and our encryption scheme has a large keyspace at about 1 × 10202 against brute force cracking by illegal optical network units with only 0.63% running time compared with the traditional chaotic scheme. The results highlight that the proposed encryption scheme has a remarkable reduction in complexity and improvement in security, which is a promising candidate for next-generation PONs.

© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

In recent years, new challenges and limitations over single-mode fiber (SMF)-based optical networks remain exacerbated owing to the incremental requirement of data traffic including 6G, Internet of Things, and virtual reality [13]. At present, optical communication has the advantage of a high security level over wireless communication due to the characteristics of optical fiber. However, in the downlink transmission of the PON system, information is vulnerable to illegal theft and faces severe security problems [4]. Therefore, transmission performance and security have become hotspots in optical communication.

As a current popular high-speed multicarrier transmission technology, orthogonal frequency division multiplexing (OFDM) has the advantages of resilience to chromatic dispersion and high spectral efficiencies [57]. However, owing to bandwidth-limited devices, OFDM suffers from frequency-selective fading, which limits transmission performance [8]. Similar to OFDM, the newly proposed orthogonal chirp division multiplexing (OCDM) technology introduces traditional chirped spread spectrum technology to multi-carrier modulation (MCM), which applies orthogonal chirp subcarriers for information modulation [9]. It has the ability to effectively alleviate system impairments including interference and frequency-selective fading. Additionally, limiting to the nonlinear effect of single-mode fiber (SMF), it is difficult for the SMF transmission system to approach the Shannon limit. Therefore, spatial division multiplexing (SDM), which enhances the transmission channels and the number of users in PON, has become a potential candidate to improve the transmission capacity [10]. Therefore, SDM-OCDM-PON will become an effective scheme for future optical transmission systems.

In recent security systems, digital chaotic encryption applied in the physical layer is widely used for its characteristics of its high sensitivity to initial value and pseudo randomness [11]. However, traditional chaotic models suffer from low security because chaotic mapping is relatively low-dimensional [12]. And the models have simple structures and very low key-space, which are vulnerable to brute force attack. Also, the traditional integral-order based models are calculated by linear iterative equation calculation, which always requires many computational resources, which could cause much complex burden to communication system. Therefore, to enhance the security and efficiency of the system, low-cost and high security encryption scheme is highly required.

In this work, we report a secure OCDM-PON optical communication system based on generative adversarial networks (GAN). DFnT and IDFnT is adopted for the digital realization of OCDM signals, which is similar to FFT and DFT for OFDM. GAN networks are trained and used to generate constellation masking vectors and frequency masking vectors to encrypt the constellation points and orthogonal chirped subcarriers. We design the architectures of networks and the loss function to improve the performance of adversarial training process. To verify our proposed scheme, a weakly coupled 7 core fiber of 2 km is set up to achieve a 70 Gb/s transmission in the experiment. The results demonstrates that our proposed scheme has a maximum receiver sensitivity gain of about 1.26dB gain than traditional OFDM transmission system, and our encryption scheme has a large key space at about 1 × 10202 against brute force cracking by illegal optical network units (ONU) with only 0.63% running time compared with traditional chaotic scheme. The experimental results demonstrate the security and the efficiency of our proposed scheme.

The framework of the paper is organized as follows: the second part explains the proposed GAN structures and the proposed OCDM encryption scheme. Experimental setup is described in the third section and the results are discussed in the fourth part. Finally, we conclude the paper in the fifth section.

2. Principle

The main framework of a secure OCDM-PON based on proposed encryption scheme is demonstrated in the following Fig. 1. Firstly, the proposed GAN networks is trained by various chaotic sequences. And then Generator of the GAN takes the initial value to generate masking vectors for encryption. Through serial to parallel (S/P) conversion of signals on transmitting end, the constellation modulation by 16QAM mapping is encrypted by the constellation masking vectors through rotating the constellation points. Moreover, the inverse discrete Fresnel transform (IDFnT) matrix is used to realize the OCDM modulation, and the chirped subcarriers are encrypted by frequency masking vectors. Finally, we add the cyclic prefix and the encrypted signals are converted to real signals of single-channel via parallel to serial (P/S) conversion for transmission. At the receiver side, the original signal bitstream could be acquired via decoding and decryption with the inverse steps of the transmitter side. The frameworks of proposed GAN networks and the OCDM encryption is introduced as follows.

 figure: Fig. 1.

Fig. 1. The proposed GAN enhanced encryption scheme.

Download Full Size | PDF

GAN is one of attractive deep generative models with an adversarial training process, which is composed of a generator and a discriminator. As shown in Fig. 2, the main framework of our proposed networks is activated by the deep convolutional GAN (DCGAN) as proposed in [13], which introduced convolutional layers into GAN. As an adversarial process, the Generator network functions to learn the distribution of source data and generate new data of similar distribution to fool the Discriminator. At the same time, A 1 × 16 noise vector z which follows the distribution pz(z)∼N(0,I) are input into generator networks to generate fake data. The Discriminator network discriminates the reconstructed fake data by generator and the source data to help raise the reconstruction ability of Generator.

 figure: Fig. 2.

Fig. 2. Architecture of GAN

Download Full Size | PDF

The training of generator and discriminator are in an adversarial process and the loss function can be represented as follows:

$$\begin{aligned} \mathop {\textrm{min}}\limits_G \mathop {\textrm{max}}\limits_D V(D,G) &= {E_{x\textrm{ }p(x)}}[\log D(x|y)]\\ &+ {E_{z\textrm{ }p(z)}}[1 - \log D(G(z|y))], \end{aligned}$$
where x,y represent the source data and the reconstructed data, respectively.

In this condition, the networks aims to seek saddle point of Eq. (1) via calculating optimal value of parameters ${\hat{\theta }_g},{\hat{\theta }_d}$, which represents the parameters of Generator network and Discriminator network, respectively.

$${\hat{\theta }_d}\textrm{ = }\mathop {\arg \max }\limits_{{\theta _d}} E({\theta _d},{\hat{\theta }_g}),$$
$${\hat{\theta }_g}\textrm{ = }\mathop {\arg \min }\limits_{{\theta _g}} E({\theta _g},{\hat{\theta }_d}).$$
where parameters ${\theta _d}$ aim to minimize Discriminator network loss, and parameters ${\theta _g}$ aim to minimize the loss of Generator network.

In this work, we preprocess the initial training samples via performing unit power normalization, which transform the source data x as follows:

$${\mathrm{\tilde{x}}_i} = \frac{{{x_i}}}{{\sqrt {\frac{1}{\textrm{N}}\sum\limits_{i = 1}^N {{{|{{x_i}} |}^2}} } }},$$
where ${x_i}$ represents source data before normalization, and ${\mathrm{\tilde{x}}_i}$ represents data with normalization. N represents the data length. In this way, the value of source data is normalized, which alleviates the problems of slow convergence of the networks and relatively low accuracy of the trained model [14]. Therefore, it is very important to apply unit power normalization to control the average absolute value of input data around 1.

Furthermore, to alleviate the mode collapse of adversarial training, we modify the loss function and design reconstruction error Ly between source data and generated data which follows the HΔH [15] to help define the difference of different data distribution.

$${L_y}\textrm{ = }\mathop {\min }\limits_G {E_{x,y}}({\textrm{d}_{H\Delta H}}(x,y)),$$
$${\textrm{d}_{H\Delta H}}(x,y) = 2\mathop {\sup }\limits_{{h_1},{h_2} \in H} |{P_{f\sim X}}[{h_1}(f) \ne {h_2}(f)] - {P_{f\sim Y}}[{h_1}(f) \ne {h_2}(f)]|.$$
The designed Ly loss can restrict the amplitudes of the reconstructed data in the same range as the source data. We discover that the proposed scheme can enhance the performance of the adversarial training and accelerate the convergence of networks to equilibrium, which also helps reduce the running time of the training process.

In this work, the output of Discriminator network is set randomly from [0.8∼1.2] and [0∼0.2], respectively, rather than strictly 1 and 0 to decide as true source data or reconstructed fake data. And the operation can raise the help raise the noise tolerance. Pointing to the ReLU-like activation functions, Adam optimization algorithm [16] was applied to update the parameters of networks. After training, different masking vectors can be generated by Generator and applied for the following OCDM signals encryption in different dimensions.

OCDM as proposed [9] is evolved from OFDM technology and introduced enhanced traditional chirped spread spectrum (CSS) into MCM technology, which can independently modulate the information to different chirped subcarriers and demodulate them via the orthogonality of chirped signals. Profit from the advantages of CSS, OCDM signals have the ability to relieve the system impairments over the spectrum so as to have an enhanced system performance [9]. Different from OFDM with IDFT, baseband OCDM signals are generated by synthesizing the orthogonal chirps with inverse discrete Fresnel transform (IDFnT), which could be derived as follows:

$$\begin{aligned} s(n) &= F_\Psi ^{ - 1}\{ x(k)\} (n)\\ &= \frac{1}{{\sqrt N }}{e^{j\frac{\pi }{4}}}\sum\nolimits_{k = 0}^{N - 1} {x(k) \times \left\{ {\begin{array}{c} {{e^{ - j\frac{\pi }{N}{{(n - k)}^2}}},N \equiv 0(\bmod 2)}\\ {{e^{ - j\frac{\pi }{N}{{(n - k + \frac{1}{2})}^2}}},N \equiv 0(\bmod 2)} \end{array}} \right.} \end{aligned}$$
where x(k) represents symbol for the modulation of the kth chirp subcarrier, $F_\Psi ^{ - 1}$ represents the IDFnT operator. Also, the signals generated by the above equation are complex value, and the additional digital up-conversion (DUC) is performed to transform complex value to real value before the signals inputting into transmitting channels [17].

The main structure of the proposed encryption scheme mainly contains constellation masking and Frequency masking. Note that our proposed encryption scheme also has the ability to encrypt the signals on time domain after IDFnT to further enhance the security of the system. The constellation masking process can be derived as follows:

$$\left\{ {\begin{array}{{l}} {\mathrm{C^{\prime}\ =\ mod(round((C\ -\ floor(C))} \times \textrm{180),360)}}\\ {A^{\prime} = A \times (\cos C^{\prime} + j\sin (C^{\prime}))} \end{array}} \right.$$
where mod(.) represents the function of remainder, floor(.) represents the function of downward integer function. C represents the constellation masking vectors and A represents the constellation matrix. The operation is using the masking factors to rotate the constellation points through adding the factors to the phase angle of each constellation points as shown in Fig. 1.

After 16QAM modulation and constellation encryption, the different chirp subcarriers are encrypted by frequency masking vectors as follows:

$$\left\{ {\begin{array}{{l}} {\mathrm{B^{\prime}\ =\ round(}B\textrm{)}}\\ {Z^{\prime\prime} = Z[B^{\prime}]} \end{array}} \right.$$
where Z represents chirp subcarriers, B represents the frequency masking vectors. In this process, we rearrange the sequence of the chirp subcarriers Z to obtain the encrypted subcarriers Z’.

In the receiver side, the OCDM signals can be decrypted by reverse operation of the encryption process according to the decryption masking vectors generated the corresponding key as the transmitting side.

3. Experimental Setup

To verify the feasibility of the proposed encryption scheme on the OCDM-PON system, the experimental setup on a 2 km 7 core fiber was performed as in Fig. 3. Firstly, on the optical line terminal (OLT) side, the original signals were modulated and encrypted by the key generated by a well-trained neural network. Then the arbitrary waveform generator (AWG, TekAWG70002A) took the encrypted OCDM signals with the sampling rate of 12.5GSa/s. The light source of 1550nm wavelength was launched from a continuous-wave (CW) laser and the optical power was 14.5 dBm. Then the encrypted OCDM signal was amplified via an electrical amplifier (EA) and input into the Mach-Zehnder modulator (MZM) for intensity modulation. The loss of MZM was about 6.5dB, and the optical power was about 8dBm after MZM modulation and about 15dBm after EDFA amplification. Then, the modulated optical signals were divided by the power splitter into seven paths with different delay lines to simulate different user signals. The seven single-mode fibers and the 2 km weakly coupled 7 core fiber was coupled via a fan-in device. The isolation degree of the 7 cores fiber is shown in Table. 1. On optical network units (ONU) side, we performed legal ONU receiving ends to experimentally measure the performance of the system. The 7 core channels were demultiplexed into seven single-mode fibers via a fan-out device. Then, the optical power was adjusted with an EDFA and a variable optical attenuator. A photodiode was used to convert the detected optical signals into electric signals. After that, a mixed-signal oscilloscope (MSO, TekMSO73304DX) with a 50 GSa/s sampling rate was implemented to receive electrical signals. Finally, the initial signal can be acquired with the key generated by the Generator in ONU.

 figure: Fig. 3.

Fig. 3. Experimental Setup (MZM: Mach-Zehnder modulator; AWG: arbitrary waveform generator; EDFA: Erbium-doped fiber amplifier; VOA: Variable optical attenuator; PD: Photodiode; MSO: mixed-signal oscilloscope).

Download Full Size | PDF

Tables Icon

Table 1. Seven core fiber isolation degree

4. Results and discussion

The loss of Generator and Discriminator for the training of GAN is demonstrated as Fig. 4. It can be seen that at first the loss of Discriminator is very high but decrease rapidly to a very small value, and after many iterations of training it finally converges to a small value. The loss of the Generator is very small at first but increases very fast, and it requires a long journey to converge to a small value. Different from the loss of normal networks, which always starts from a high value and decreases to converge at a small value. This can be explained with the mechanism of adversarial training. In adversarial progress, at first, the Generator takes noise vector as original input and it has little knowledge about the training samples, the task tends to be very easy to generate some noise vector; however, as the Discriminator learns to discriminate the generated samples and the training samples, the Generator begins to learn the original chaotic sequences and the task becomes complex, which results in a relatively high loss. After a period of training, the Generator can generate high-quality samples to confuse the discriminator, and the loss of the Generator decreases to a small value. As the adversarial training of Generator and Discriminator networks, they finally converge to a Nash equilibrium and the loss fluctuates around a small value, which means that the training of networks is completed.

 figure: Fig. 4.

Fig. 4. The loss of Generator and Discriminator during the training of GAN

Download Full Size | PDF

The running time of the traditional iteration equations-based model and the GAN-based model in the condition of the same hardware and software is recorded as shown in Table. 2. The codes of both models are run with NVIDA GeForce RTX 2060 Graphics Cards. As presented in Table. 2, the running time of the Iteration equations-based model increases with the data size on the GPU. Due to the parallel computing and the well-designed Cuda Core of NVIDA for deep learning tasks, the running time of GAN keeps constant at about 1.9 ms, which is significantly shorter than the iteration equations-based method. When the data size of keys is 800, the running time of GAN based model is 1.99 ms, which is 0.63% of that of 315 ms of Iteration equations-based model. To assure the security of communication system, large amounts of keys are needed in practice, where the proposed scheme saves many computing sources and ensure both the security and efficiency of the communication system.

Tables Icon

Table 2. Comparison between Iteration equations and GAN

To further verify the performance of the proposed scheme for a communication system, bit error rate with different received optical power is computed. Since isolation of each fiber works very well as shown in Table. 1, the crosstalk of different cores can be ignored and signals transmitted through each core are almost independent which is the same as single-mode fiber transmission. In Fig. 5 it can be seen from the results that, while received optical power is about −13 dBm, the BER is smaller than 10−3 and the signals are successfully decrypted and recovered. The experimental results demonstrate that our proposed scheme has few side effects on the quality of signals in the transmission system.

To verify the performance of our proposed scheme, the comparison of signal quality between the OFDM signals and OCDM signals is performed in the same core fiber. As shown in Fig. 6, when the received optical power is very low and only linear effects such as chromatic effect work, OCDM and OFDM technologies have similar performance. However, with the increase of the received optical power, to achieve the BER to 1 × 10−3, the OCDM signals require about −12.73dBm and the OFDM requires −11.48dBm, which means the receiver sensitivity of OCDM signals has 1.26dB gain compared with OFDM signals. The results reveal that our scheme has better transmission performance than the traditional scheme.

 figure: Fig. 5.

Fig. 5. BER curves at different optical power in different cores.

Download Full Size | PDF

 figure: Fig. 6.

Fig. 6. BER curves of encrypted OCDM and OFDM signals at different optical power transmitted in the same core.

Download Full Size | PDF

Additionally, to measure the security performance of the proposed scheme, we perform the calculation of the keyspace. As presented in above Fig. 7, the key is composed of initial values as original vector z for networks, and control parameters including learning rate, and batch size. Also, with the modified loss function, the sensitivity of each parameter is enhanced to some extent. Therefore, keyspace is performed as (1 × 1012)16×(1 × 106)×(1 × 104) = 1 × 10202. In addition to the parameters of networks, the number of training samples, the training epochs, and the number of network layers are also adjustable and can increase the complexity of the proposed security scheme. Compared to the traditional Iteration equations-based model such as the Chens model, which has the initial sensitivity of 1 × 1016 for each key, the total keyspace is improved by a large number of parameters of networks. In the condition, the proposed scheme is robust to brute force attack and thus ensures the security of the communication system.

 figure: Fig. 7.

Fig. 7. BER curves with. tiny changes of the initial value.

Download Full Size | PDF

5. Conclusion

In this work, we report a high-security and low-complexity OCDM transmission scheme based on GAN enhanced chaotic encryption. To improve the security of the transmission system, the proposed GAN networks are adopted to generate masking keys for the encryption of the OCDM constellation points and frequency signals. Moreover, we adopt the basic model of DCGAN and design our networks with new network architectures and loss functions to improve the adversarial training performance of the network. To verify the feasibility of our proposed scheme, a weakly coupled 7 core fiber of 2 km was set up to experimentally achieve a 70 Gb/s transmission. The experimental results show that our proposed scheme has about 1.26 dB receiver sensitivity gain than traditional OFDM transmission system, and our encryption scheme has a large keyspace at about 1 × 10202 against brute force cracking by illegal ONU with only 0.63% running time compared with the traditional chaotic scheme. The fact proves that the proposed encryption scheme is a promising candidate for next-generation PONs.

Funding

National Key Research and Development Program of China (2018YFB1800901); National Natural Science Foundation of China (61835005, 62171227, 61727817, U2001601, 62035018, 61875248, 61935005, 61935011, 61720106015, 61975084); Jiangsu team of innovation and entrepreneurship; The Startup Foundation for Introducing Talent of NUIST.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. K. Kitayama, A. Maruta, and Y. Yoshida, “Digital Coherent Technology for Optical Fiber and Radio-Over-fiber Transmission Systems,” J. Lightwave Technol. 32(20), 3411–3420 (2014). [CrossRef]  

2. Y. Yin, H. Zhang, M. Zhang, M. Xia, Z. Zhu, S. Dahlfort, and S. J. B. Yoo, “Spectral and Spatial 2D Fragmentation-Aware Routing and Spectrum Assignment Algorithms in Elastic Optical Networks,” J. Opt. Commun. Netw. 5(10), A100–A106 (2013). [CrossRef]  

3. P. Lu, L. Zhang, X. Liu, J. Yao, and Z. Zhu, “Highly-Efficient Data Migration and Backup for Big Data Applications in Elastic Optical Inter-Data-Center Networks,” IEEE Netw. 29(5), 36–42 (2015). [CrossRef]  

4. S. Jung, C. Kim, S. Jung, and S. Han, “Optical pulse division multiplexing-based OBI reduction for single wavelength uplink multiple access in IM/DD OFDMA-PON,” Opt. Express 24(25), 29198–29208 (2016). [CrossRef]  

5. J. Armstrong, “OFDM for optical communications,” J. Lightwave Technol. 27(3), 189–204 (2009). [CrossRef]  

6. Z. Zhu, W. Lu, L. Zhang, and N. Ansari, “Dynamic Service Provisioning in Elastic Optical Networks with Hybrid Single-/Multi-Path Routing,” J. Lightwave Technol. 31(1), 15–22 (2013). [CrossRef]  

7. L. Gong, X. Zhou, X. Liu, W. Zhao, W. Lu, and Z. Zhu, “Efficient Resource Allocation for All-Optical Multicasting over Spectrum-Sliced Elastic Optical Networks,” J. Opt. Commun. Netw. 5(8), 836–847 (2013). [CrossRef]  

8. Z. Feng, M. Tang, S. Fu, L. Deng, Q. Wu, R. Lin, R. Wang, P. Shum, and D. Liu, “Performance-Enhanced Direct Detection Optical OFDM Transmission With CAZAC Equalization,” IEEE Photonics Technol. Lett. 27(14), 1507–1510 (2015). [CrossRef]  

9. X. Ouyang and J. Zhao, “Orthogonal Chirp Division Multiplexing,” IEEE Trans. Commun. 64(9), 3946–3957 (2016). [CrossRef]  

10. F. Bao, Y. Ding, Y. Nooruzzaman, Y. Amma, LK. Sasaki, H. Oxenlwe, T. Hu, and Morioka, “DSP-free single-wavelength 100 Gbps SDM-PON with increased splitting ratio using 10G-class DML,” Opt. Express 27(23), 33915–33924 (2019). [CrossRef]  

11. J. Ren, B. Liu, X. Wu, X. Xu, Y. Mao, Y. Wu, X. Song, L. Jiang, J. Zhang, Y. Zhang, and X. Xin, “Security-Enhanced 3D-CAP-PON Based on Two-Stage Spherical Constellation Masking,” IEEE Access 8, 111966–111973 (2020). [CrossRef]  

12. J. Shen, B. Liu, Y. Mao, R. Ullah, J. Zhao, and S. Chen, “Enhancing the reliability and security of OFDM-PON using modified Lorenz chaos based on the linear properties of F,” J. Lightwave Technol. 39(13), 4294–4299 (2021). [CrossRef]  

13. A. Radford, L. Metz, and S. Chintala, “Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks Computerence,” 2015.

14. H. Yang, Z. Niu, S. Xiao, J. Fang, and L. Yi, “Fast and Accurate Optical Fiber Channel Modeling Using Generative Adversarial Network,” J. Lightwave Technol. 39(5), 1322–1333 (2021). [CrossRef]  

15. S. Ben-David, J. Blitzer, K. Crammer, A. Kulesza, F. Pereira, and J. W.-m. Vaughan, “A theory of learning from different domains,” JMLR 79(2010).

16. D. P. Kingma and J. Ba. Adam, “A method for stochastic optimization,” 2014, arXiv:1412.6980.

17. X. Ouyang, G. Talli, M. Power, and P. Townsend, “Orthogonal chirp-division multiplexing for IM/DD-based short-reach systems,” Opt. Express 27(16), 23620–23632 (2019). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1. The proposed GAN enhanced encryption scheme.
Fig. 2.
Fig. 2. Architecture of GAN
Fig. 3.
Fig. 3. Experimental Setup (MZM: Mach-Zehnder modulator; AWG: arbitrary waveform generator; EDFA: Erbium-doped fiber amplifier; VOA: Variable optical attenuator; PD: Photodiode; MSO: mixed-signal oscilloscope).
Fig. 4.
Fig. 4. The loss of Generator and Discriminator during the training of GAN
Fig. 5.
Fig. 5. BER curves at different optical power in different cores.
Fig. 6.
Fig. 6. BER curves of encrypted OCDM and OFDM signals at different optical power transmitted in the same core.
Fig. 7.
Fig. 7. BER curves with. tiny changes of the initial value.

Tables (2)

Tables Icon

Table 1. Seven core fiber isolation degree

Tables Icon

Table 2. Comparison between Iteration equations and GAN

Equations (9)

Equations on this page are rendered with MathJax. Learn more.

min G max D V ( D , G ) = E x   p ( x ) [ log D ( x | y ) ] + E z   p ( z ) [ 1 log D ( G ( z | y ) ) ] ,
θ ^ d  =  arg max θ d E ( θ d , θ ^ g ) ,
θ ^ g  =  arg min θ g E ( θ g , θ ^ d ) .
x ~ i = x i 1 N i = 1 N | x i | 2 ,
L y  =  min G E x , y ( d H Δ H ( x , y ) ) ,
d H Δ H ( x , y ) = 2 sup h 1 , h 2 H | P f X [ h 1 ( f ) h 2 ( f ) ] P f Y [ h 1 ( f ) h 2 ( f ) ] | .
s ( n ) = F Ψ 1 { x ( k ) } ( n ) = 1 N e j π 4 k = 0 N 1 x ( k ) × { e j π N ( n k ) 2 , N 0 ( mod 2 ) e j π N ( n k + 1 2 ) 2 , N 0 ( mod 2 )
{ C   =   m o d ( r o u n d ( ( C     f l o o r ( C ) ) × 180),360) A = A × ( cos C + j sin ( C ) )
{ B   =   r o u n d ( B ) Z = Z [ B ]
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.