- Cooperative Communication and Network Coding
- UAV Applications and Optimization
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Distributed Control Multi-Agent Systems
- Cognitive Radio Networks and Spectrum Sensing
- Advanced Wireless Communication Technologies
- Mobile Ad Hoc Networks
- Adversarial Robustness in Machine Learning
- Wireless Signal Modulation Classification
- Security in Wireless Sensor Networks
- Wireless Communication Networks Research
- Advanced Wireless Network Optimization
- Distributed Sensor Networks and Detection Algorithms
- Anomaly Detection Techniques and Applications
- Advanced Adaptive Filtering Techniques
- Energy Harvesting in Wireless Networks
- Full-Duplex Wireless Communications
- Neural dynamics and brain function
- Cellular Automata and Applications
- Sparse and Compressive Sensing Techniques
- Advanced Algorithms and Applications
- Radar Systems and Signal Processing
- Caching and Content Delivery
- Domain Adaptation and Few-Shot Learning
PLA Army Engineering University
2016-2025
École Polytechnique Fédérale de Lausanne
2023
Beihang University
2020
Nankai University
2018-2019
Guilin University of Technology
2018
Ningbo Dahongying University
2016
Chinese Academy of Sciences
2014
Prysmian Group (United States)
2008
Wan Fang Hospital
2003
UAV cooperative control has been applied in many complex communication networks. It remains challenging to develop coverage and energy-efficient technology. In this paper, we investigate current works about problem propose a multi-UAV model based on communication. The proposed is decomposed into two steps: maximization power control, both are proved be exact potential games (EPG) have Nash equilibrium (NE) points. Then the deployment algorithm spatial adaptive play (MUECD-SAP) adopted...
For large UAV networks, timely communication is needed to accomplish a series of missions accurately and effectively. The relay technology will play an important role in networks by helping drones communicate with long-distance drones, which solves the problem limited transmission power drones. In this article, selection seen as entry point improve performance self-organizing multiple optimizing factors. Different from ground models, presents new challenges, including heterogeneous, dynamic,...
In this paper, we study the distributed relay assignment problem in multi-channel multi-radio unmanned aerial vehicle (UAV) communication networks. Multi-UAVs are driven by overall task and fly certain formation, where UAVs with different tasks have various transmission requirements. Source equipped can select more than one radios to achieve high data rate, each radio be shared multiple source UAVs. We construct game models promote global performance self-organizing coordination among...
Unmanned-aerial-vehicles (UAVs)-enabled wireless communication for Internet-of-Things (IoT) applications has attracted increasing attention. This article studies a UAV-assisted data dissemination system, where rotary-wing UAV is dispatched to disseminate terrestrial IoT devices. We target minimize the completion time via joint optimization of trajectory and transmit power, while considering indispensable constraints which cover maximum energy budget, speed, power UAV, requirement each...
In this paper, we study the multi-task cooperation problem for unmanned aerial vehicle (UAV) swarms, where UAV energy consumption is taken into consideration during location scheduling and task implementation. One may need of several UAVs with specific capabilities. To avoid unreasonable allocation, quantify mission properties areas. We comprehensively consider overlapping complementary relationship UAV's types, so that can form corresponding collective execution tasks according to...
Artistic stylization of 3D volumetric smoke data is still a challenge in computer graphics due to the difficulty ensuring spatiotemporal consistency given reference style image, and that within reasonable time computational resources. In this work, we introduce Volumetric Neural Cellular Automata (VNCA), novel model for efficient transfer synthesizes, real-time, multi-view consistent stylizing features on target with temporally coherent transitions between stylized simulation frames. VNCA...
To tackle the multi-user and multi-channel issues in anti-jamming problems, we model problem as a multi-leader one-follow Stackelberg game. An mechanism with "No Pains No Gains" idea is designed. The proposed sacrifices parts of users' benefits to trap jammer, while rest users can achieve better performance. In this way, system's throughput improved. addition, channel bonding technology used enhance robust performance improve system further. Besides cooperative modeled one-follower game,...
This article focuses on the slot access problem for neighboring cooperation in unmanned aerial vehicle (UAV) swarms. To avoid process being hindered by unavailable topology information or exchanges, a self-organized collision discovery mechanism is proposed. Each broadcaster can know whether its transmission successful through which provides basic knowledge finding strategy. Considering distributed feature, formulated as two game models. Both games are proved to have at least one Nash...
In this article, we study the unmanned aerial vehicle (UAV)-enabled opportunistic data collection in wireless sensor networks (WSNs). The UAV performing remote missions is expected to collect from WSN during return flights. Due specified task and safety restrictions, flight trajectory time of are strictly constrained, resulting limited coverage ability process. Moreover, unknown distribution active sensors makes it difficult for ground complete offline optimization mode transmission. To...
The multi-functional integrated systems have been emerging recently. This article proposes a generalized framework, named communications and jamming (ICAJ), which has potential to enable communication reinforce each other in one system, then achieve more reliable efficient jamming. Specifically, we first introduce the concept benefits of ICAJ. In particular, make comparison between proposed ICAJ sensing (ISAC) literature. Then, typical use cases including jamming-aided communication-aided...
In this paper, we proposed a context-aware group buying mechanism to reduce users' data cost based on the content similarity. Each user's is formulated as combination of content-aware and location-aware sharing cost. Data payoff spectrum owner's channel download files energy time in transmitting among coalition. Compared with downloading alone, users would like form different groups traffic first then share achieve lower The reducing problem through modeled coalition formation game (CFG)....
With the development of access technologies and artificial intelligence, a deep reinforcement learning (DRL) algorithm is proposed into channel accessing anti-jamming. Assuming jamming modes are sweeping, comb, dynamic statistic, DRL-based method through training can almost perfectly avoid signal communicate successfully. Instead, in this paper, from perspective jammers, we investigate performance anti-jamming method. First all, design an intelligent based on to combat user. Then,...
Eavesdropping and jamming pose great threats to the security of wireless communication. In this paper, a secure multicast communication system transmitting different messages group users based on reconfigurable intelligent surfaces (RIS) is considered, in presence both jammer an eavesdropper whose channel state information (CSI) not perfectly known. Specifically, we aim maximize secrecy rate by jointly optimizing beamforming at base station phase shift RIS. To solve non-convexity...
This paper investigates the problem of database-assisted spectrum access in dynamic TV white networks, which active user set is varying. Since there no central controller and information exchange, it encounters incomplete constraints. To solve this challenge, we formulate a state-based game robust game. It proved that two games are ordinal potential with (expected) aggregate weighted interference serving as functions. A distributed learning algorithm proposed to achieve pure strategy Nash...
In this letter, the frequency selection problem in jamming environment with large number of optional frequencies is investigated. With numerous actions wider band scenario, most existing anti-jamming methods will become ineffective, since convergence time and computational complexity grow exponentially actions. To cope above challenge, a novel hierarchical deep reinforcement learning algorithm which does not need to know patterns channel model proposed. The proposed divides broadband into...
In this paper, an Unmanned Aerial Vehicle (UAV)-assisted relay communication system is studied, where a UAV served as flying to maintain link between mobile source node and remote destination node. Specifically, average outage probability minimization problem formulated firstly, with the constraints on transmission power of node, maximum energy consumption budget, power, speed acceleration relay. Next, closed-form derived, under hybrid line-of-sight non-line-of-sight channel model. To deal...
In communication countermeasure, in order to efficiently interfere with the enemy, firstly we need determine modulation mode of enemy signals. This paper introduces a recognition algorithm digital signals which based on high-order cumulants. Due 8PSK and MFSK have same cumulants, can't recognize them directly. Meanwhile, identify species exiting method are few. So, this new is proposed solve problems. The not only has high ratio, but also it simple effective. And can classify more than...
Deep neural networks (DNNs) are vulnerable to adversarial examples where inputs with imperceptible perturbations mislead DNNs incorrect results. Despite the potential risk they bring, also valuable for providing insights into weakness and blind-spots of DNNs. Thus, interpretability a DNN in setting aims explain rationale behind its decision-making process makes deeper understanding which results better practical applications. To address this issue, we try robustness deep models from new...
Current Dynamic Texture Synthesis (DyTS) models can synthesize realistic videos. However, they require a slow iterative optimization process to single fixed-size short video, and do not offer any post-training control over the synthesis process. We propose Neural Cellular Automata (DyNCA), framework for real-time controllable dynamic texture synthesis. Our method is built upon recently introduced NCA infinitely long arbitrary-sized video textures in real time. quantitatively qualitatively...
Integrated sensing and communication (ISAC) is regarded as a recent advanced technology, which expected to realize the dual functions of simultaneously in one system. Nevertheless, it still faces challenges information security transmission robustness caused by openness wireless channel, especially under antagonistic environment. Hence, this article develops generalized framework, named cognitive joint jamming, (cognitive J <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...
In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, take features different loads and local interference relationship into account. It is proved that formulated an exact potential aggregate level as function, Nash equilibrium (NE) corresponds to global or optima original optimization problem. A lower bound achievable rigorously derived. Finally, propose autonomous best response...
The effective information interaction is important for drones to complete various tasks of flying ad hoc networks (FANETs). In this letter, we study the selection problem transmission nodes and modes in dynamic FANETs. Besides classic direct relay transmission, can choose ferrying opportunistically based on given trajectory other during topology adjustment swarms. To help multiple adjust strategy with changing, design a matching game model, which takes both current communication environment...
Deep neural networks (DNNs) are vulnerable to adversarial examples which generated by inputs with imperceptible perturbations. Understanding robustness of DNNs has become an important issue, would for certain result in better practical deep learning applications. To address this we try explain models from a new perspective critical attacking route, is computed gradient-based influence propagation strategy. Similar rumor spreading social networks, believe that noises amplified and propagated...