A. madohe, Li Qiong, Lin, defense method of eavesdropping attack on mobile target network based on POF.
Gui Guan, Yu Wang, Huang Hao, Physical layer wireless communication technology based on deep learning: opportunities and challenges.
Analysis and optimization of zero-pole sensitivity of Zhuang Ling, Ma Jingyi, Wang Guangyu, Guan Juan and FIR digital filters.
D. Xu Yuan, Yang Chao and Yang Li "Single password authentication method for remote users based on mobile phone assistance"
Correct answer: BD