Biao He

ORCID: 0000-0001-9907-7881
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Cognitive Radio Networks and Spectrum Sensing
  • Energy Harvesting in Wireless Networks
  • Millimeter-Wave Propagation and Modeling
  • Advanced Wireless Communication Technologies
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Microwave Engineering and Waveguides
  • Wireless Signal Modulation Classification
  • Full-Duplex Wireless Communications
  • Advanced Steganography and Watermarking Techniques
  • Advanced Sensor and Control Systems
  • Sparse and Compressive Sensing Techniques
  • Cellular Automata and Applications
  • Deception detection and forensic psychology
  • Error Correcting Code Techniques
  • Cryptography and Data Security
  • 3D Modeling in Geospatial Applications
  • Power Line Communications and Noise
  • Simulation Techniques and Applications
  • Embedded Systems and FPGA Design
  • Network Security and Intrusion Detection
  • Antenna Design and Analysis

Shenzhen University
2021-2024

Guangdong-Hongkong-Macau Joint Laboratory of Collaborative Innovation for Environmental Quality
2024

University of California, Irvine
2017-2019

Hong Kong University of Science and Technology
2016-2019

University of Hong Kong
2016-2019

Beihang University
2018

Australian National University
2013-2017

Wuhan University of Science and Technology
2011

Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the warden's perspective. That is, detection performance of warden is used to assess covertness, which overly optimistic. Instead simply considering worst limit, we take distribution into account evaluate overall covertness in statistical sense. Specifically, define new metrics for measuring are then analyze maximum achievable rate given requirement under both bounded and unbounded models.

10.1109/lcomm.2016.2647716 article EN IEEE Communications Letters 2017-01-04

In this paper, we study delay-intolerant covert communications in additive white Gaussian noise (AWGN) channels with a finite block length, i.e., number of channel uses. Considering the maximum allowable uses to be N, it is not immediately clear whether actual uses, denoted by n, should as large N or smaller for communications. This because n reduces warden's chance detect due fewer observations, but also transmit information. We show that = indeed optimal maximize amount information bits...

10.1109/tifs.2018.2846257 article EN IEEE Transactions on Information Forensics and Security 2018-06-11

This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy considerations. We focus on NOMA system, where transmitter sends confidential messages to users in the presence an external eavesdropper. The optimal designs decoding order, transmission rates, and power allocated each user are investigated. Considering practical passive eavesdropping scenario instantaneous channel state eavesdropper is unknown, we adopt outage probability as metric. first consider...

10.1109/jsac.2017.2725698 article EN IEEE Journal on Selected Areas in Communications 2017-07-17

In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, warden, Willie, and Poisson field interferers. Bob Willie are subject to uncertain shot noise due the ambient signals from interferers network. With aid stochastic geometry, analyze throughput between Alice given requirements on covertness against reliability decoding at Bob. We consider non-fading fading channels. analytically obtain interesting findings impacts...

10.1109/twc.2018.2854540 article EN IEEE Transactions on Wireless Communications 2018-07-18

Physical layer security has recently been regarded as an emerging technique to complement and improve the communication in future wireless networks. The current research development physical are often based on ideal assumption of perfect channel knowledge or capability variable-rate transmissions. In this paper, we study secure transmission design more practical scenarios by considering estimation errors at receiver investigating both fixed-rate Assuming quasi-static fading channels, on-off...

10.1109/tifs.2013.2284754 article EN IEEE Transactions on Information Forensics and Security 2013-10-07

This letter investigates the secret key capacity of generation from correlated wireless channels in a source model. We systematically study practical scenario by taking into account all relevant parameters including sampling delay, eavesdroppers' location, qualities legitimate and eavesdropping channels, Doppler spread, pilot length. Our findings indicate that is determined cross correlation channel measurements, better not necessary when between higher than channels. also find it possible...

10.1109/lcomm.2017.2649496 article EN IEEE Communications Letters 2017-01-09

In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair presence randomly distributed eavesdroppers under interference constraint set by primary user. For different channel knowledge assumptions at transmitter, design four transmission protocols to achieve CR give comprehensive performance analysis for each protocol terms delay, security, reliability, and overall...

10.1109/tifs.2015.2500178 article EN IEEE Transactions on Information Forensics and Security 2015-11-12

This work for the first time examines impact of transmitter-side correlation on artificial-noise-aided secure transmission, based which a new power allocation strategy artificial noise (AN) is devised physical layer security enhancement.Specifically, we design correlation-based (CPA) AN, optimality in terms achieving minimum secrecy outage probability analytically proved large system regime with number transmit antennas approaching infinity.In order to fully reveal benefits CPA, derive...

10.1109/twc.2016.2613860 article EN IEEE Transactions on Wireless Communications 2016-09-27

Theoretical studies on physical layer security often adopt the secrecy outage probability as performance metric for wireless communications over quasi-static fading channels. The has two limitations from a practical point of view: a) it does not give any insight into eavesdropper's decodability confidential messages; b) cannot characterize amount information leakage to eavesdropper when an occurs. Motivated by probability, we propose three new metrics secure transmissions first establishes...

10.1109/twc.2016.2593445 article EN IEEE Transactions on Wireless Communications 2016-07-20

Covert communication is to achieve a reliable transmission from transmitter receiver while guaranteeing an arbitrarily small probability of this being detected by warden. In work, we study the covert in AWGN channels with finite blocklength, which number channel uses finite. Specifically, analytically prove that entire block (all available uses) should be utilized maximize effective throughput subject predetermined requirement. This nontrivial result because more results observations at...

10.1109/icc.2017.7996337 article EN 2017-05-01

We propose a novel artificial noise (AN) injection scheme for wireless systems over quasi-static fading channels, in which single-antenna transmitter sends confidential messages to half-duplex receiver the presence of an eavesdropper. Different from classical AN schemes, rely on multiantenna or external helpers, our proposed is applicable scenario, where legitimate transceivers are very simple. analyze performance and optimize design transmission. Our results highlight that perfect secrecy...

10.1109/tvt.2017.2703159 article EN IEEE Transactions on Vehicular Technology 2017-05-12

Physical layer security is an emerging technique to improve the wireless communication security, which widely regarded as a complement cryptographic technologies. To design physical techniques under practical scenarios, uncertainty and imperfections in channel knowledge need be taken into consideration. This paper provides survey of recent research development considering imperfect state information (CSI) at nodes. We first present overview main information-theoretic measures secrecy...

10.48550/arxiv.1307.4146 preprint EN other-oa arXiv (Cornell University) 2013-01-01

The performance of millimeter wave (mmWave) multiple-input multiple-output (MIMO) systems is limited by the sparse nature propagation channels and restricted number radio frequency chains at transceivers. introduction reconfigurable antennas offers an additional degree freedom on designing mmWave MIMO systems. This paper provides a theoretical framework for studying with antennas. Based virtual channel model, we present architecture beamspace hybrid analog-digital beamformers both...

10.1109/tcomm.2018.2860003 article EN publisher-specific-oa IEEE Transactions on Communications 2018-07-26

We design linear precoders that perform confidential broadcasting in multi-cell networks for two different forms of base station (BS) cooperation, namely, processing (MCP) and coordinated beamforming (CBf). consider a two-cell network where each cell consists an $N$-antenna BS $K$ single-antenna users. For such network, we precoder based on the regularized channel inversion (RCI) MCP generalized RCI CBf. form derive new channel-independent expressions to approximate secrecy sum rate achieved...

10.1109/twc.2015.2435745 article EN IEEE Transactions on Wireless Communications 2015-05-20

In this paper, we study simultaneous wireless information and power transfer (SWIPT) in relay interference channels (ICs), where energy-constrained relays harvest energy from sources' radio-frequency signals use the harvested to forward destinations. We adopt splitting (PS) protocol alignment (IA) technique jointly realize management. propose two novel transmission schemes for SWIPT IC networks, namely, one-stage PS IA scheme two-stage scheme. For both schemes, investigate optimal ratios...

10.1109/tcomm.2017.2785319 article EN IEEE Transactions on Communications 2017-12-19

Recent studies have numerically demonstrated the possible advantages of asynchronous non-orthogonal multiple access (ANOMA) over conventional synchronous (NOMA). The ANOMA makes use oversampling technique by intentionally introducing a timing mismatch between symbols different users. Focusing on two-user uplink system, for first time, we analytically prove that with sufficiently large frame length can always outperform NOMA in terms sum throughput. To this end, derive expression throughput...

10.1109/twc.2019.2892486 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2019-01-18

The existing research on physical layer security commonly assumes the number of eavesdropper antennas to be known. Although this assumption allows one easily compute achievable secrecy rate, it can hardly realized in practice. In paper, we provide an innovative approach studying secure communication systems without knowing by introducing concept spatial constraint into security. Specifically, is assumed have a limited region place (possibly infinite of) antennas. From practical point view,...

10.1109/twc.2015.2463818 article EN IEEE Transactions on Wireless Communications 2015-08-03

Recent studies have shown that asynchronous non- orthogonal multiple access (ANOMA) outperforms conventional synchronous non-orthogonal (NOMA) by taking advantage of artificial timing mismatch with oversampling. For the first time, we comprehensively study impact errors on performance uplink ANOMA systems in this paper. We consider two types errors, which are synchronization error and coordination error. analyze how affect systems, derive throughput loss incurred both An interesting finding...

10.1109/icc.2018.8423035 article EN 2018-05-01

The potential dual use of radio-frequency (RF) signals for carrying energy and information brings an exciting opportunity harvesting (EH) from ambient RF in wireless communication networks. To maximize the efficiency energy, it is desirable to have EH node located close transmitter. However, when transmitted confidential, should be regarded as a eavesdropper, hence, preferred far Therefore, placement nodes networks becomes interesting problem secrecy important consideration. In this paper,...

10.1109/glocomw.2014.7063622 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2014-12-01

For secure communications over wireless fading channels, the secrecy outage probability is widely used as performance measure. However, current formulation has two major limitations in evaluating performance: a) amount of information leakage to eavesdropper cannot be characterized when an occurs, b) does not give insights into eavesdropper's decodability confidential messages. To overcome such and obtain in-depth understanding this paper proposes three new measures for different practical...

10.1109/glocom.2014.7036893 article EN 2014-12-01

We propose for the first time new transmission schemes based on linear precoding to enable simultaneous confidential broadcasting and power transfer in a multiuser multi-input single-output network, where base station with N antennas simultaneously transmits messages K single-antenna users. design two rules of regularized channel inversion (RCI) both splitting (PS) switching (TS) receiver architectures, namely, RCI-PS RCI-TS schemes. For each scheme, we derive channel-independent expressions...

10.1109/jstsp.2016.2608792 article EN IEEE Journal of Selected Topics in Signal Processing 2016-09-13

We propose a novel analytical framework for evaluating the coverage performance of millimeter wave (mmWave) cellular network where idle user equipments (UEs) act as relays. In this network, base station (BS) adopts either direct mode to transmit destination UE, or relay if fails, BS transmits UE and then UE. To address drastic rotational movements UEs in practice, we adopt selection combining at UEs. New expression is derived signal-to-interference-plus noise ratio (SINR) probability...

10.1109/wcnc45663.2020.9120776 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2020-05-01

In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider scenario where a secondary transmitter sends confidential messages to receiver subject an interference constraint set by primary user. design two protocols under different channel knowledge assumptions at transmitter. For each protocol, first give comprehensive performance analysis investigate delay, secrecy, and reliability performance....

10.1109/icc.2016.7511337 article EN 2016-05-01

This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy considerations. We focus on NOMA system where transmitter sends confidential messages to users in the presence an external eavesdropper. The optimal designs decoding order, transmission rates, and power allocated each user are investigated. Considering practical passive eavesdropping scenario instantaneous channel state eavesdropper is unknown, we adopt outage probability as metric. first consider problem...

10.48550/arxiv.1612.06961 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Physical layer security is an emerging technique to improve the wireless communication security, which widely regarded as a complement cryptographic technologies. To design physical techniques under practical scenarios, uncertainty and imperfections in channel knowledge need be taken into consideration. This paper provides survey of recent research development considering imperfect state information (CSI) at nodes. We first present overview main information-theoretic measures secrecy...

10.3969/j.issn.1673-5188.2013.03.002 article EN arXiv (Cornell University) 2013-09-25
Coming Soon ...