- Energy Harvesting in Wireless Networks
- Advanced Wireless Communication Technologies
- Cryptographic Implementations and Security
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
- UAV Applications and Optimization
- Cryptography and Data Security
- Wireless Communication Security Techniques
Shandong University of Science and Technology
2020-2025
This article optimizes the link‐level of NOMA‐enable backscatter communication (BackCom) for beyond fifth‐generation (B5G) Internet‐of‐things (IoT) networks. Specifically, we jointly optimize transmit‐power (TP) IoT users and reflection‐coefficient (RC) tag (BackTag), where target is to increase sum capacity (SumCap) NOMA‐enabled BackCom. The problem TP RC formulated as convex optimization, exploit KKT conditions obtain optimal solutions. pure NOMA without BackCom conventional orthogonal...
The widespread use of the Internet Things (IoT) has led to significant breakthroughs in various fields but also exposed critical vulnerabilities evolving cybersecurity threats. Current Intrusion Detection Systems (IDSs) often fail provide real-time detection, scalability, and interpretability, particularly high-speed optical network environments. This research introduces XIoT, which is a novel explainable IoT attack detection model designed address these challenges. Leveraging advanced deep...