Fengchao Zhu

ORCID: 0000-0002-0867-5470
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Energy Harvesting in Wireless Networks
  • Full-Duplex Wireless Communications
  • Antenna Design and Analysis
  • Cooperative Communication and Network Coding
  • Wireless Power Transfer Systems
  • Direction-of-Arrival Estimation Techniques
  • Radar Systems and Signal Processing
  • Advanced Adaptive Filtering Techniques
  • Hand Gesture Recognition Systems
  • Wireless Communication Networks Research
  • Wireless Signal Modulation Classification
  • Speech and Audio Processing
  • Service-Oriented Architecture and Web Services
  • Gait Recognition and Analysis
  • Caching and Content Delivery
  • Hearing Impairment and Communication
  • Control Systems and Identification
  • Advanced Power Amplifier Design
  • UAV Applications and Optimization
  • Security in Wireless Sensor Networks
  • Antenna Design and Optimization
  • Multimedia Communication and Technology
  • Indoor and Outdoor Localization Technologies

PLA Rocket Force University of Engineering
2019-2024

Xidian University
2023

Xi'an High Tech University
2014-2023

University of Electronic Science and Technology of China
2014-2021

Tsinghua University
2014-2016

Mitre (United States)
2005

In this paper, we design joint information beamforming and jamming to guarantee both transmit security receive for a full-duplex base-station (FD-BS). Specifically, aim maximize the secret rate while constrain be greater than predefined bound. When FD-BS is equipped with single antenna, derive optimal solutions in closed-form, interestingly, results say that simultaneous transmission cannot optimal. multiple antennas, convert original nonconvex problem into sequence of subproblems where...

10.1109/tsp.2014.2364786 article EN IEEE Transactions on Signal Processing 2014-10-24

In this paper, we design transmit beamforming for a full duplex base station (FD-BS) considering both self-interference mitigation and physical-layer security. The proposed is formulated as minimizing the power consumption of FD-BS under different signal-to-interference-and-noise-ratio (SINR) constraints. Semidefinite relaxation (SDR) used to convert initial nonconvex optimization be convex semidefinite programming (SDP) problem. Then optimality SDR strictly proved by showing existence...

10.1109/twc.2015.2472527 article EN IEEE Transactions on Wireless Communications 2015-08-25

In this paper, we consider a new cognitive radio network (CRN), where cooperative beamforming is designed to enhance the physical-layer security for both primary users (PUs) and secondary (SUs). particular, proposed design aims minimize transmit power of transmitter (ST) while providing an eavesdropper (Eve), receiver (PR), multiple receivers (SRs) with different signal-to-interference-plus-noise ratio (SINR). The semi-definite relaxation (SDR) technique utilized convert initial nonconvex...

10.1109/tvt.2015.2412152 article EN IEEE Transactions on Vehicular Technology 2015-03-12

This paper considers a full-duplex (FD) point-to-point system consisting of one multi-antenna FD access point (FD-AP) and two-antenna mobile station (FD-MS). We adopt simultaneous wireless information power transfer scheme apply the self-energy recycling at FD-MS. In order to minimize weighted sum transmit power, we jointly design beamforming vector FD-AP, receive splitting ratio FD-MS, value Since original problem is non-convex, semidefinite relaxation obtain new convex problem. further...

10.1109/access.2016.2593914 article EN cc-by-nc-nd IEEE Access 2016-01-01

In this paper, we design robust beamforming to guarantee the physical layer security for a multiuser beam division multiple access (BDMA) massive multiple-input multiple-output (MIMO) system, when channel estimation errors are taken into consideration. With aid of artificial noise, proposed formulated as minimizing transmit power base station, while providing legal users and eavesdropper with different signal-to-interference-plus-noise ratio. It is strictly proved that, under BDMA MIMO...

10.1109/jsac.2018.2824259 article EN IEEE Journal on Selected Areas in Communications 2018-04-01

Magnetic resonance coupling (MRC) has been utilized in wireless power transfer (WPT) to achieve mid-range contactless supply. However, unintended users might also draw from the transmission devices. In this letter, an MRC-WPT system with multiple transmitters, one intended receiver, and receiver is investigated. We formulate a security problem by limiting receiving and, at same time, maximizing of user. Such optimization general nonconvex. Nevertheless, global optimal solution can be...

10.1109/lsp.2017.2703105 article EN IEEE Signal Processing Letters 2017-05-12

This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to maximize its sum rate by overhearing messages from UAV jamming ground users simultaneously (corresponding DB), or vice versa UMA). However, as power of varies, will adapt their deployment allocation patterns concurrently maintain...

10.1109/lwc.2021.3109037 article EN IEEE Wireless Communications Letters 2021-08-31

We investigate the worst-case robust beamforming for simultaneous wireless information and power transfer in a multiuser beamspace massive multiple-input multiple-output (MIMO) system. The objective is to minimize transmit of base station subject individual signal-to-interference-plus-noise ratio energy-harvesting constraints under imperfect channel state information. Instead directly resorting semi-definite relaxation, we convert initial non-convex optimization allocation problem, which...

10.1109/twc.2019.2916405 article EN IEEE Transactions on Wireless Communications 2019-05-20

Abstract Radio frequency fingerprint identification (RFFI) can distinguish highly similar wireless communication devices to protect physical layer security and improve the of networks effectively, which has been widely used for spectrum management secure communication. However, most RFFI methods show a degradation performance under low signal-to-noise ratio (SNR) environments. In this paper, we propose RSBU-LSTM network relying on multiple features accuracy with SNR. Firstly, use in-phase...

10.1186/s13634-024-01169-5 article EN cc-by EURASIP Journal on Advances in Signal Processing 2024-06-28

In this paper, we consider the rate maximization of a new cognitive ratio (CR) scenario when multiple primary users (PU) are operating under simultaneous wireless information and power transfer (SWIPT) mode. Since problem is NP-hard, separate derivation approach into following two steps: (i) prove that optimal transmit covariance rank-one; (ii) apply semi-definite programming (SDP) relaxation. Two suboptimal algorithms provide upper bound lower original solutions proposed to cope with...

10.1109/hmwc.2014.7000217 article EN 2014-11-01

In this paper, we design robust downlink beamforming against the imperfect channel state information (CSI) for beam division multiple access (BDMA) massive multiple-input output (MIMO) systems. Following a worst-case deterministic model, proposed is formulated as minimizing power consumption of base station (BS) under different signal-to-interference-plus-noise ratio (SINR) constraints. The S-Procedure and semi-definite relaxation (SDR) are used to convert initial non-convex optimization...

10.1109/tcomm.2017.2787582 article EN IEEE Transactions on Communications 2017-12-27

Abstract In this paper, we consider the physical layer security for simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) system that is consisted of three nodes: one transmitter with multiple antennas, decoding (ID) receiver single antenna, energy harvesting (EH) antenna. We propose new zero-forcing based strategy contains both beamforming beamforming, pointing to different receivers. To prevent from possibly eavesdropping information, our...

10.1186/s13638-015-0278-5 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2015-03-09

This paper describes reasoning and inference mechanisms the initial experience gained from a preliminary software prototype that can exploit contextual knowledge to dynamically access electromagnetic spectrum. The proposed architecture draws semantic Web technologies, such as ontological reasoning, enable radio cognition consisting of an awareness environment (context) ability make decisions act, two fundamental elements cognition. Such cognitive or context-aware spectrum more effectively...

10.1109/dyspan.2005.1542685 article EN 2005-12-10

Wireless power transfer (WPT) is an emerging and promising technique for supplies to mobile portable devices. Among all approaches, magnetic resonant coupling (MRC) excellent one midrange WPT, which provides high mobility, flexibility, convenience due its simplicity in hardware implementation longer transmission distances. In this letter, we consider MRC-WPT system with multiple transmitters, intended receiver unintended receivers. The optimal robust beamforming design of the complex...

10.1109/lsp.2018.2849586 article EN IEEE Signal Processing Letters 2018-06-21

Abstract Without the response variation constraint, main‐lobe responses of wideband beamforming usually vary with frequencies interest, and beam pointing may deviate from incident angle desired signal. If interference‐plus‐noise covariance matrix (INCM) is directly replaced by sample matrix, signal in data result self‐null problem, which can lead to degradation performance beamformers. Through frequency division, a novel adaptive proposed reconstructing INCM solving convex optimisation...

10.1049/mia2.12043 article EN cc-by IET Microwaves Antennas & Propagation 2021-02-01

This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored channel training phase and just considered jamming power optimization of E data transmission to facilitate eavesdropping, this advances research by comprehensively investigating allocation both phases, purpose maximizing its success probability. Under setup, we first derive an exact expression objective reveal...

10.1109/lsp.2022.3150244 article EN IEEE Signal Processing Letters 2022-01-01

In this paper, we design joint information beam-forming and jamming beamforming to guarantee both transmit security receive for a full duplex base station (FD-BS). Specifically, aim maximize the secret rate while constrain be greater than predefined bound. We convert original non-convex problem into new sequence of subproblems where semidefinite programming (SDP) relaxation can applied efficiently find optimal solutions. strictly prove that such does not change optimality these subproblems....

10.1109/glocom.2014.7037039 article EN 2014-12-01

The hybrid phased multiple-input-multiple-output (MIMO) radar with subarray partition can provide the transmit coherent gain of array and waveform diversity MIMO radar. current researches mainly focus on different schemes array. In this letter, a full phased-MIMO (FPMIMO) equally overlapped subarrays is introduced, robust adaptive transmit/receive beamforming algorithm proposed based virtual interference-plus-noise covariance matrix (INCM) reconstruction steering vector estimation. FPMIMO...

10.1049/ell2.12120 article EN Electronics Letters 2021-02-23

Gesture recognition is an indispensable component of natural and efficient human-computer interaction technology, particularly in desktop-level applications, where it can significantly enhance people's productivity. However, the current gesture community lacks a suitable (top-view perspective) dataset for lightweight capture devices. In this study, we have established named GR4DHCI. What distinguishes its inherent naturalness, intuitive characteristics, diversity. Its primary purpose to...

10.48550/arxiv.2401.03828 preprint EN other-oa arXiv (Cornell University) 2024-01-01

With the development of Internet things, its application is more and close to people's life. As main sensor networks things base layer, wireless (WSN) provide users with a large number useful real-time sensing data. While user wants enjoy services provided by sensor, WSN must access network in some way. This paper presents new framework based on cloud gateway, which realized storage mass data reduced pressure WSN. At same time providing efficient service for make full use platform computing...

10.1109/iccwamtip.2014.7073446 article EN 2014-12-01

Magnetic resonance coupling (MRC) has been utilized in wireless power transfer (WPT) systems to achieve mid-range contactless supply. For many cases, security is an important issue, say when certain users unintended and therefore needs be restricted. Moreover, manufacturing costs physical dimensions are also issues for mass production. In this paper, we investigate MRC-WPT system with multiple transmitters, one intended receiver receiver. We formulate the problem of maximizing by designing...

10.1109/iccchina.2017.8330496 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2017-10-01

In this paper, we design transmit beamforming for a full-duplex base station (FD-BS) considering joint self-interference mitigation and physical-layer security enhancement. The proposed designs are formulated to minimize the power consumption of FD-BS, under different signal- to-interference-and-noise-ratio (SINR) constraints. We strictly prove optimality SDR by showing existence rank-one solutions. Simulation results provided demonstrate efficiency algorithms.

10.1109/glocom.2015.7416954 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2015-12-01

For the distributed digital subarray antennas (DDSA), conventional beamforming may give rise to grating lobes, high sidelobes, and other problems. In this paper, gaps between subarrays are filled with virtual array elements, then DDSA can form a contiguous array. More concretely, based on direction-of-arrival (DOA) estimation of signal sources, interference components elements interference-plus-noise covariance matrix (INCM) be reconstructed. At low signal-to-noise ratio (SNR), DOA desired...

10.1155/2021/6649439 article EN cc-by International Journal of Antennas and Propagation 2021-01-31
Coming Soon ...