- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- Full-Duplex Wireless Communications
- Antenna Design and Analysis
- Cooperative Communication and Network Coding
- Wireless Power Transfer Systems
- Direction-of-Arrival Estimation Techniques
- Radar Systems and Signal Processing
- Advanced Adaptive Filtering Techniques
- Hand Gesture Recognition Systems
- Wireless Communication Networks Research
- Wireless Signal Modulation Classification
- Speech and Audio Processing
- Service-Oriented Architecture and Web Services
- Gait Recognition and Analysis
- Caching and Content Delivery
- Hearing Impairment and Communication
- Control Systems and Identification
- Advanced Power Amplifier Design
- UAV Applications and Optimization
- Security in Wireless Sensor Networks
- Antenna Design and Optimization
- Multimedia Communication and Technology
- Indoor and Outdoor Localization Technologies
PLA Rocket Force University of Engineering
2019-2024
Xidian University
2023
Xi'an High Tech University
2014-2023
University of Electronic Science and Technology of China
2014-2021
Tsinghua University
2014-2016
Mitre (United States)
2005
In this paper, we design joint information beamforming and jamming to guarantee both transmit security receive for a full-duplex base-station (FD-BS). Specifically, aim maximize the secret rate while constrain be greater than predefined bound. When FD-BS is equipped with single antenna, derive optimal solutions in closed-form, interestingly, results say that simultaneous transmission cannot optimal. multiple antennas, convert original nonconvex problem into sequence of subproblems where...
In this paper, we design transmit beamforming for a full duplex base station (FD-BS) considering both self-interference mitigation and physical-layer security. The proposed is formulated as minimizing the power consumption of FD-BS under different signal-to-interference-and-noise-ratio (SINR) constraints. Semidefinite relaxation (SDR) used to convert initial nonconvex optimization be convex semidefinite programming (SDP) problem. Then optimality SDR strictly proved by showing existence...
In this paper, we consider a new cognitive radio network (CRN), where cooperative beamforming is designed to enhance the physical-layer security for both primary users (PUs) and secondary (SUs). particular, proposed design aims minimize transmit power of transmitter (ST) while providing an eavesdropper (Eve), receiver (PR), multiple receivers (SRs) with different signal-to-interference-plus-noise ratio (SINR). The semi-definite relaxation (SDR) technique utilized convert initial nonconvex...
This paper considers a full-duplex (FD) point-to-point system consisting of one multi-antenna FD access point (FD-AP) and two-antenna mobile station (FD-MS). We adopt simultaneous wireless information power transfer scheme apply the self-energy recycling at FD-MS. In order to minimize weighted sum transmit power, we jointly design beamforming vector FD-AP, receive splitting ratio FD-MS, value Since original problem is non-convex, semidefinite relaxation obtain new convex problem. further...
In this paper, we design robust beamforming to guarantee the physical layer security for a multiuser beam division multiple access (BDMA) massive multiple-input multiple-output (MIMO) system, when channel estimation errors are taken into consideration. With aid of artificial noise, proposed formulated as minimizing transmit power base station, while providing legal users and eavesdropper with different signal-to-interference-plus-noise ratio. It is strictly proved that, under BDMA MIMO...
Magnetic resonance coupling (MRC) has been utilized in wireless power transfer (WPT) to achieve mid-range contactless supply. However, unintended users might also draw from the transmission devices. In this letter, an MRC-WPT system with multiple transmitters, one intended receiver, and receiver is investigated. We formulate a security problem by limiting receiving and, at same time, maximizing of user. Such optimization general nonconvex. Nevertheless, global optimal solution can be...
This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to maximize its sum rate by overhearing messages from UAV jamming ground users simultaneously (corresponding DB), or vice versa UMA). However, as power of varies, will adapt their deployment allocation patterns concurrently maintain...
We investigate the worst-case robust beamforming for simultaneous wireless information and power transfer in a multiuser beamspace massive multiple-input multiple-output (MIMO) system. The objective is to minimize transmit of base station subject individual signal-to-interference-plus-noise ratio energy-harvesting constraints under imperfect channel state information. Instead directly resorting semi-definite relaxation, we convert initial non-convex optimization allocation problem, which...
Abstract Radio frequency fingerprint identification (RFFI) can distinguish highly similar wireless communication devices to protect physical layer security and improve the of networks effectively, which has been widely used for spectrum management secure communication. However, most RFFI methods show a degradation performance under low signal-to-noise ratio (SNR) environments. In this paper, we propose RSBU-LSTM network relying on multiple features accuracy with SNR. Firstly, use in-phase...
In this paper, we consider the rate maximization of a new cognitive ratio (CR) scenario when multiple primary users (PU) are operating under simultaneous wireless information and power transfer (SWIPT) mode. Since problem is NP-hard, separate derivation approach into following two steps: (i) prove that optimal transmit covariance rank-one; (ii) apply semi-definite programming (SDP) relaxation. Two suboptimal algorithms provide upper bound lower original solutions proposed to cope with...
In this paper, we design robust downlink beamforming against the imperfect channel state information (CSI) for beam division multiple access (BDMA) massive multiple-input output (MIMO) systems. Following a worst-case deterministic model, proposed is formulated as minimizing power consumption of base station (BS) under different signal-to-interference-plus-noise ratio (SINR) constraints. The S-Procedure and semi-definite relaxation (SDR) are used to convert initial non-convex optimization...
Abstract In this paper, we consider the physical layer security for simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) system that is consisted of three nodes: one transmitter with multiple antennas, decoding (ID) receiver single antenna, energy harvesting (EH) antenna. We propose new zero-forcing based strategy contains both beamforming beamforming, pointing to different receivers. To prevent from possibly eavesdropping information, our...
This paper describes reasoning and inference mechanisms the initial experience gained from a preliminary software prototype that can exploit contextual knowledge to dynamically access electromagnetic spectrum. The proposed architecture draws semantic Web technologies, such as ontological reasoning, enable radio cognition consisting of an awareness environment (context) ability make decisions act, two fundamental elements cognition. Such cognitive or context-aware spectrum more effectively...
Wireless power transfer (WPT) is an emerging and promising technique for supplies to mobile portable devices. Among all approaches, magnetic resonant coupling (MRC) excellent one midrange WPT, which provides high mobility, flexibility, convenience due its simplicity in hardware implementation longer transmission distances. In this letter, we consider MRC-WPT system with multiple transmitters, intended receiver unintended receivers. The optimal robust beamforming design of the complex...
Abstract Without the response variation constraint, main‐lobe responses of wideband beamforming usually vary with frequencies interest, and beam pointing may deviate from incident angle desired signal. If interference‐plus‐noise covariance matrix (INCM) is directly replaced by sample matrix, signal in data result self‐null problem, which can lead to degradation performance beamformers. Through frequency division, a novel adaptive proposed reconstructing INCM solving convex optimisation...
This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored channel training phase and just considered jamming power optimization of E data transmission to facilitate eavesdropping, this advances research by comprehensively investigating allocation both phases, purpose maximizing its success probability. Under setup, we first derive an exact expression objective reveal...
In this paper, we design joint information beam-forming and jamming beamforming to guarantee both transmit security receive for a full duplex base station (FD-BS). Specifically, aim maximize the secret rate while constrain be greater than predefined bound. We convert original non-convex problem into new sequence of subproblems where semidefinite programming (SDP) relaxation can applied efficiently find optimal solutions. strictly prove that such does not change optimality these subproblems....
The hybrid phased multiple-input-multiple-output (MIMO) radar with subarray partition can provide the transmit coherent gain of array and waveform diversity MIMO radar. current researches mainly focus on different schemes array. In this letter, a full phased-MIMO (FPMIMO) equally overlapped subarrays is introduced, robust adaptive transmit/receive beamforming algorithm proposed based virtual interference-plus-noise covariance matrix (INCM) reconstruction steering vector estimation. FPMIMO...
Gesture recognition is an indispensable component of natural and efficient human-computer interaction technology, particularly in desktop-level applications, where it can significantly enhance people's productivity. However, the current gesture community lacks a suitable (top-view perspective) dataset for lightweight capture devices. In this study, we have established named GR4DHCI. What distinguishes its inherent naturalness, intuitive characteristics, diversity. Its primary purpose to...
With the development of Internet things, its application is more and close to people's life. As main sensor networks things base layer, wireless (WSN) provide users with a large number useful real-time sensing data. While user wants enjoy services provided by sensor, WSN must access network in some way. This paper presents new framework based on cloud gateway, which realized storage mass data reduced pressure WSN. At same time providing efficient service for make full use platform computing...
Magnetic resonance coupling (MRC) has been utilized in wireless power transfer (WPT) systems to achieve mid-range contactless supply. For many cases, security is an important issue, say when certain users unintended and therefore needs be restricted. Moreover, manufacturing costs physical dimensions are also issues for mass production. In this paper, we investigate MRC-WPT system with multiple transmitters, one intended receiver receiver. We formulate the problem of maximizing by designing...
In this paper, we design transmit beamforming for a full-duplex base station (FD-BS) considering joint self-interference mitigation and physical-layer security enhancement. The proposed designs are formulated to minimize the power consumption of FD-BS, under different signal- to-interference-and-noise-ratio (SINR) constraints. We strictly prove optimality SDR by showing existence rank-one solutions. Simulation results provided demonstrate efficiency algorithms.
For the distributed digital subarray antennas (DDSA), conventional beamforming may give rise to grating lobes, high sidelobes, and other problems. In this paper, gaps between subarrays are filled with virtual array elements, then DDSA can form a contiguous array. More concretely, based on direction-of-arrival (DOA) estimation of signal sources, interference components elements interference-plus-noise covariance matrix (INCM) be reconstructed. At low signal-to-noise ratio (SNR), DOA desired...