Chaoying Yuan

ORCID: 0000-0002-2453-9540
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Wireless Signal Modulation Classification
  • Ocular Disorders and Treatments
  • Energy Harvesting in Wireless Networks

Beijing University of Posts and Telecommunications
2019-2021

This paper analyzes the secrecy capacity of a cooperative relaying system using non-orthogonal multiple access (NOMA). A new NOMA scheme is proposed, where source actively sends jamming signals while relay forwarding, thereby enhancing security intended communication links. Closed-form expressions for ergodic rate are derived in presence an eavesdropper. Asymptotic approximate established high signal-to-noise ratio (SNR) regime, which provides insights on secure transmission. Numerical...

10.1109/tvt.2019.2895911 article EN IEEE Transactions on Vehicular Technology 2019-01-29

The intelligent reflecting surface (IRS) technology can significantly enhance the flexibility of non-orthogonal multiple access (NOMA) by reconfiguring channel gains according to users' communication requirements. We propose use IRS internal secrecy among NOMA users in multiple-input-single-output downlink networks. objective is minimize total transmit power under heterogeneous constraints, jointly optimizing beamforming vectors and factors. To efficiently solve this non-convex problem, an...

10.1109/lwc.2021.3058768 article EN IEEE Wireless Communications Letters 2021-02-13

This paper considers that a transmitter superposes secrecy transmissions to closer receiver with high security level in the active MIMO-OFDM channel it is using send data farther low level, by NOMA techniques. A joint optimization of power allocation and beamforming important maximize rate receiver, while keeping requested unaffected. The problem challenging because coupled variables, has yet be addressed. We propose decouple between subcarrier beamforming. Given beamforming, we prove for...

10.1109/tvt.2020.3004889 article EN IEEE Transactions on Vehicular Technology 2020-06-25

Superposition coding allows secret messages to be delivered stealthily on top of legacy signals. The effective allocation the limited transmit power at a transmitter is critical serve data rate request (untrusted) receiver while accomplishing stealthy and secure transmissions trusted receiver, which challenging under OFDM settings due non-convexity secrecy rate. This paper presents new iterative algorithm, optimizes across subcarriers minimize power, subject (legacy) untrusted required...

10.1109/tvt.2021.3051501 article EN cc-by IEEE Transactions on Vehicular Technology 2021-02-01
Coming Soon ...