- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- UAV Applications and Optimization
- Full-Duplex Wireless Communications
- Radar Systems and Signal Processing
- Advanced SAR Imaging Techniques
- Microwave Imaging and Scattering Analysis
- Chaos-based Image/Signal Encryption
- Error Correcting Code Techniques
- DNA and Biological Computing
- Antenna Design and Analysis
- Optical Wireless Communication Technologies
- Direction-of-Arrival Estimation Techniques
- Indoor and Outdoor Localization Technologies
- Satellite Communication Systems
- Energy Efficient Wireless Sensor Networks
- Wireless Signal Modulation Classification
- Millimeter-Wave Propagation and Modeling
- Ocular Disorders and Treatments
- Knowledge Management and Sharing
- GNSS positioning and interference
- Underwater Vehicles and Communication Systems
China Mobile (China)
2017-2025
Minzu University of China
2023-2025
Beijing University of Posts and Telecommunications
2015-2024
Chang'an University
2023
Air Force Institute of Aviation Medicine Affiliated Hospital
2023
Southwest University of Science and Technology
2023
PLA Army Engineering University
2019-2022
Xi'an University of Finance and Economics
2022
Lanzhou Jiaotong University
2021
University of Electronic Science and Technology of China
2013-2021
Combination of simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) non-orthogonal multiple access (NOMA) is a win-win strategy which can significantly enhance the coverage performance. However, eavesdroppers may enjoy similar performance gains as legitimate users. To solve this problem, an artificial noise (AN) assisted secure communication proposed to maximize secrecy rate. An alternating optimization (AO) based iterative algorithm leveraging classical...
Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.
In this paper, we consider the secure transmission problem in an unmanned aerial vehicle (UAV) and intelligent reflecting surface (IRS) assisted mmWave networks presence of eavesdropper. The UAV base station (UAV-BS) IRS are deployed to overcome blockages. Artificial noise (AN) is exploited against Aiming maximize secrecy rate, jointly design positions beamforming UAV-BS IRS, where here represent position activation IRS. Meanwhile, maximum transmits power, minimum height constraint for...
This paper investigates the secrecy rate maximization problem for multiple-input-single-output multiple-antenna-eavesdropper (MISOME) wiretap channel with multiple randomly located jammers. The multi-antenna base station (BS) transmits information signals along artificial noise (AN) to disturb eavesdropper. Moreover, friendly jammers are properly selected assist legitimate link better secure transmission some payoffs. With this system model, we first formulate a Stackelberg game between BS...
Security and privacy have become increasingly critical demands in wireless networks, which, however, are particularly susceptible to eavesdropping attacks due the broadcast nature of radio signals. This paper considers problem secure communication multiuser downlink with a passive eavesdropper (Eve), whose channel state information (CSI) is unavailable. The transmitter simultaneously transmits concurrent signals users artificial noise (AN) Eve. We first assume that all users' CSI perfectly...
A rapid synthesis of structurally novel s-indacene-1,5-dione and cyclopentanone-fused isoxazole derivatives in generally moderate yields was achieved through the NaNO2-catalyzed/involved transformation cyclopentenone-MBH acetates. Under similar reaction conditions, two different pathways were observed depending on type aryl substituent MBH In formation s-indacene-1,5-diones, NaNO2 is proposed to act as a nucleophilic catalyst initiate stepwise dimeric cyclization/oxidative aromatization,...
This paper assesses the intellectual advancement of Human-Computer Interaction (HCI) scholarship as one five research streams Management Information Systems (MIS) discipline. It particularly demonstrates vitality and maturity that HCI stream (or sub-discipline) has achieved in recent years, adds to few studies draw an overarching picture HCI. study uses same approach Zhang Li (2005), delineates development MIS by employing a multifaceted assessment published articles over period 19 years...
Practical difficulty in examining all base stations (BSs) to choose the best one providing secure transmission heterogeneous networks (HetNets), we impose a BS association constraint this letter that BSs an average received signal power at legitimate user greater than predetermined receiving threshold can be candidate serving BSs. With constraint, derive closed-form expressions for secrecy outage probability (SOP) of both homogeneous and K-tier HetNets based on stochastic geometry. Our...
The authors consider the problem of covariance matrix estimation in heterogeneous environments for radar signal processing applications, where secondary data exhibit heterogeneity local power and share same structure. Without resorting to complete statistical characterisation sample support, a class estimators, each them defined as geometric barycenter set basic covariances estimates (obtained from available data) with specific distance employed, is proposed. are obtained by exploiting...
This paper analyzes the secrecy capacity of a cooperative relaying system using non-orthogonal multiple access (NOMA). A new NOMA scheme is proposed, where source actively sends jamming signals while relay forwarding, thereby enhancing security intended communication links. Closed-form expressions for ergodic rate are derived in presence an eavesdropper. Asymptotic approximate established high signal-to-noise ratio (SNR) regime, which provides insights on secure transmission. Numerical...
Physical (PHY) layer authentication has been a significant trend towards ensuring the identity security of terminals in wireless networks due to high and low complexity. However, independence assumption existing literature ignores inherent correlation PHY-layer attributes, which limits its generality. In this paper, we propose multi-attribute-based scheme by taking into account. To cope with exponential growth computational complexity correlated analysis, paper studies reconstruction...
Unmanned aerial vehicles (UAVs) are anticipated to be a potential data collection solution for wireless sensor networks (WSNs). The main challenges of integrating UAVs in WSNs security threats and UAV's onboard energy limitation. To cope with these two challenges, this article examines the secrecy efficiency (SEE) maximization problem UAV-enabled WSN. Specifically, full-duplex (FD) UAV gathers confidential information from ground nodes (SNs) uplink while sending jamming signals confound...
With the large-scale commercial launch of fifth generation (5G) mobile network, development new services and applications catering to year 2030, along with deep convergence information, communication, data technologies (ICDT), lessons experiences from 5G practice will drive evolution next networks. This article surveys history driving forces network architecture proposes a logical function for sixth (6G) network. The proposed 6G is termed SOLIDS (related following basic features: soft,...
In this letter, a novel aerial reconfigurable intelligent surface (ARIS) assisted covert communication framework is proposed, where RIS mounted on unmanned vehicle (UAV) to enhance the performance of ground transceivers in presence warden. The detection warden first analyzed, and then energy efficiency (CEE) maiximization problem formulated by jointly optimizing power control, passive beamforming, UAV trajectory. To solve non-convex problem, an algorithm based alternating optimization...
This paper investigates the ergodic secrecy sum-rate for downlink multiuser MIMO system with independent confidential messages, each of which is intended one users and should keep secret from others. We adopt zero-forcing beamforming limited channel state information (CSI) feedback at transmitter, derive closed-form expression sum-rate. Moreover, we analyze some its asymptotic characteristics, provide guidance on secure transmission design. Finally, all theoretical results are validated by...
The intelligent reflecting surface (IRS) technology can significantly enhance the flexibility of non-orthogonal multiple access (NOMA) by reconfiguring channel gains according to users' communication requirements. We propose use IRS internal secrecy among NOMA users in multiple-input-single-output downlink networks. objective is minimize total transmit power under heterogeneous constraints, jointly optimizing beamforming vectors and factors. To efficiently solve this non-convex problem, an...
Space-air-ground integrated network (SAGIN) is a prominent architecture for the future wireless communication system. Due to long distance transmission of satellite and limited battery capacity aircrafts, energy cost has become one dominant problems SAGIN. Mobile edge computing (MEC) offers potential solution by offloading partial tasks nodes with higher computational capability. In this paper, we study hybrid problem where both unmanned aerial vehicles (UAVs) ground users have be processed,...
We consider the problem of secure communication in multiuser downlink with an external eavesdropper. The transmitter simultaneously transmits concurrent information signals to users and artificial noise (AN) derive a closed-form expression for secrecy sum-rate large system limit use it as objective function optimize power allocation between AN maximize sum-rate. obtain simple approximation optimal high signal-to-noise ratio regime, which proves be generic near-optimal strategy. Analytical...
Relay power control for two-way (TW) full-duplex (FD) relay network is studied in this letter. In the prior literature, assumed to always use its full transmit a TW FD network. However, high will increase loopback self-interference at node and thus make incoming link become bottleneck end-to-end performance. Therefore, it suboptimal utilize capability of relay. Thus, we propose three schemes, which can, respectively, maximize 1) data rate an individual end node, 2) minimum two nodes, 3) sum...
As a NP‐hard problem that needs to be solved in real time, the dynamic task allocation of unmanned aerial vehicle (UAV) swarm has gradually become difficulty and hotspot current planning field. Aiming at problems poor real‐time performance low quality solution heterogeneous UAV uncertain environment, this paper establishes model can meet actual uses binary wolf pack algorithm (BWPA) solve it, so as propose method environment. In method, mechanism attacking while searching priority important...
The simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) has emerged as a novel concept promising technology for future wireless networks. In this article, we propose STAR-RIS assisted multi-access edge computing (MEC) framework, where the user offloads tasks to multiple nodes, is deployed enable enhance offloading links at same time. Meanwhile, hybrid non-orthogonal access (h-NOMA) adopted further improve performance of downlink parallel offloading. We aim...
In this paper, reconfigurable intelligent surface (RIS) is utilized to enhance the performance of cooperative non-orthogonal multiple access (C-NOMA). The simultaneous wireless information and power transfer (SWIPT) technology adopted at cell-center user relay cell-edge user. We aim maximize data rate by jointly optimizing beamforming vectors, reflecting phase shifts, splitting (PS) ratio relaying under energy constraint minimum To solve established non-convex problem, an iterative algorithm...