Junwei Zou

ORCID: 0000-0002-3156-7734
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Harvesting in Wireless Networks
  • Advanced MIMO Systems Optimization
  • Full-Duplex Wireless Communications
  • Cognitive Radio Networks and Spectrum Sensing
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Image and Video Retrieval Techniques
  • Access Control and Trust
  • Digital Rights Management and Security
  • Image Processing Techniques and Applications
  • E-commerce and Technology Innovations
  • Mobile Agent-Based Network Management
  • Advanced Wireless Communication Technologies
  • Advanced Malware Detection Techniques
  • Wireless Communication Networks Research
  • Cloud Computing and Remote Desktop Technologies
  • Advanced Authentication Protocols Security
  • Robotics and Sensor-Based Localization
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • User Authentication and Security Systems
  • Advanced Vision and Imaging
  • Technology and Security Systems
  • Digital and Cyber Forensics

Beijing University of Posts and Telecommunications
2011-2023

Peking University
2015

This letter studies a non-orthogonal multiple-access (NOMA)-based mobile edge computing (MEC) system. In order to enhance communication coverage and energy efficiency, intelligent reflecting surface (IRS) is proposed, which deployed assist computation offloading from end users an access point (AP) equipped with server. We aim minimize the sum consumption by jointly optimizing transmit powers, transmission time, partitions IRS phase shift. To address non-convex formulated problem, we first...

10.1109/lcomm.2022.3172309 article EN IEEE Communications Letters 2022-05-03

Simultaneous wireless information and power transfer (SWIPT) mobile-edge computing (MEC) are promising technologies in Internet of Things era, which can enhance the self-sustainability computation capability user equipment, respectively. In this paper, we propose a multiple-input multiple-output full-duplex (FD) relay-based SWIPT-MEC system. With MEC SWIPT, UE use its battery energy to execute task locally or offload part all it access point connected with an server refill while receiving...

10.1109/access.2018.2879334 article EN cc-by-nc-nd IEEE Access 2018-01-01

Mobile-edge computing (MEC) has been a promising solution for Internet-of-Things (IoT) applications to obtain latency reduction and energy savings. In view of the loosely coupled application, multiple devices can use same task code different input parameters diverse results. This motivates us study cooperation between eliminating repeated data transmission. Leveraging coalitional game theory, we formalize cooperative offloading process reusable into maximize cost particular, first propose an...

10.1109/jiot.2021.3064186 article EN IEEE Internet of Things Journal 2021-03-08

10.1007/s00170-015-8231-7 article EN The International Journal of Advanced Manufacturing Technology 2015-12-29

Near field communication (NFC) has been a widely used radiofrequency identification (RFID) technology, credited to its convenience and security features. However, the transmitted signals can be easily eavesdropped or relayed in an open wireless channel. One of challenges is relay attack, where attacker simply relays signal bypasses encryption other means application layer. Prior works on attack countermeasures have focused distance-bounding protocols ambient-based solutions. This paper...

10.3390/electronics12030559 article EN Electronics 2023-01-21

We consider a multiple-input multiple-output amplify-and-forward wireless multiple-hop sensor network (WMSN). The simultaneous information and power transfer technology is deployed to potentially achieve an autonomous system. investigate two practical receiver schemes, which are the splitting (PS) time switching (TS). splits received signals into streams, one for decoding (ID) other energy harvesting (EH). On hand, only serves in ID mode or during certain slot. Subject transmit constraints...

10.3390/s19010182 article EN cc-by Sensors 2019-01-06

Nowadays, OpenID is a popular specification and provided by several large websites. It decentralized, open standard to authenticate user's identity. We don't deny that has some disadvantages. In our proposal, we try improve the performance of OpenID. The proposed authentication mechanism embedded with One-time password (OTP) technology which solves security problems also illustrate architecture OTP typical process between mobile terminal provider. Finally, analyses system results demonstrate...

10.1109/wicom.2011.6040525 article EN 2011-09-01

A full-duplex two-way relay channel with multiple antennas is considered. For this three-node network, the beamforming design needs to suppress self-interference. While a traditional way apply zero-forcing for self-interference mitigation, it may harm desired signals. In paper, which reserves fraction of proposed by solving quality-of-service constrained problem. Since problem challenging due loop self-interference, convergence-guaranteed alternating optimization algorithm jointly relay-user...

10.1109/tvt.2016.2583261 article EN IEEE Transactions on Vehicular Technology 2016-06-23

The internet of things and Services is a rapidly growing concept that illustrates the ever increasing amount physical items our daily life which become addressable through network could be made more easily manageable usable use Services. This paper describes an innovative web service architecture, dedicated to Internet Things (IoT). My main concern why how REST architecture structure IoT platform.

10.1109/icbmei.2011.5917838 article EN 2011-05-01

A mobile payment solution, called SIMpass is presented in this paper, a contactless technology solution based on RFID-SIM implemented with Dual-interface SIM card. Moreover, the scheme described paper. Compare traditional NFC more cost effective and easy to use. The applications card are also discussed

10.1109/cit.2010.348 article EN 2010-06-01

In this paper, we present a new spectrum-hole prediction model for cognitive radio (CR) systems based on the IEEE 802.11 wireless local areas networks. We have also analyzed distribution of interval between two consecutive packets (ITCP) simple two-user network. For multiuser networks, investigated ITCP and study its characteristics using Bayesian inference. The effectiveness presented is validated by MATLAB simulation programs.

10.1109/cit.2010.355 article EN 2010-06-01

This paper proposes an approach to compute EOH (edge-oriented histogram) descriptor with main orientation. has a better matching ability than SIFT (scale-invariant feature transform) on multispectral images, but does not assign orientation keypoints. Alternatively, it tends the same every keypoint, e.g., zero degrees. limits keypoints between images of translation misalignment only. Observing this limitation, we propose assigning that is computed PIIFD (partial intensity invariant...

10.3390/s150715595 article EN cc-by Sensors 2015-07-01

Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. nodes are deployed hostile or unattended environment to collect data information. Therefore, network security has become big problem. A new key management scheme of architecture for wireless sensor presented this paper. The mechanism combines trusted-server and pre-distribution which meets requirements WSN. We also illustrate typical communication process between two describe...

10.1109/icnidc.2010.5657820 article EN 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content 2010-09-01

The simultaneous wireless information and power transfer (SWIPT) technique has been regarded as an appealing approach to prolong the lifetime of sensor networks. However, co-channel interferences with SWIPT in networks have not investigated from a green communication perspective. In this paper, joint transmit receive beamforming design for full-duplex multiple-input multiple-output amplify-and-forward relay system WSNs is investigated. Multiple interferers are considered at destination...

10.3390/s18103362 article EN cc-by Sensors 2018-10-08

The simultaneous wireless information and power transfer (SWIPT) technique has been considered as a promising approach to prolong the lifetime of energy-constraint sensor networks (WSNs). In this paper, multiple-input multiple-output (MIMO) full-duplex (FD) bidirectional network (BWSN) with SWIPT is investigated. Based on minimum total mean-square-error (total-MSE) criterion, joint optimization problem for source relay beamforming receiving subject transmitting harvesting energy constraints...

10.3390/s19081827 article EN cc-by Sensors 2019-04-17

Mobile phones which use Android or other smartphone operating systems, equipped with richer applications than traditional ones, enable users to leave more things deal with. As a result, personal information stored on mobile becomes and more. It is well known that backup an important means keep the safe. However, could only sync their contacts, sms, etc. Internet easily back these if necessary. Application settings such as activations, game scores so are also users. The lost of caused by...

10.1109/wicom.2011.6040155 article EN 2011-09-01

The paper proposes a data management platform with an open architecture for converting huge amount of various and cluttered into Lean Data, which provides customer-expected service can be then encapsulated as packages to used by different application developers. Ontology is provide unified way flow description semantic storage achieve understanding among layers modules. A case study routing optimization in the industry intelligent transportation illustrated show how works, he potential...

10.1109/ieeegcc.2011.5752613 article EN 2011-02-01

In this article, we investigate a multi-user multiple-input-single-output full-duplex system with simultaneous wireless information and power transfer under the non-linear energy harvesting model, where channel state is imperfect. Since estimation error considered in our proposed system, self-interference cannot be canceled perfectly. For such robust optimization problem that maximizes minimum average total harvested by jointly optimizing uplink downlink beamforming matrices formulated. As...

10.1109/access.2021.3052343 article EN cc-by IEEE Access 2021-01-01

With the development of society and changes traffic information on urban road, Optimal path is no longer simply shortest distance geographical location, but also taking into account real-time information. Meanwhile, with computer technology, communication technology intelligent navigation brings more benefits to people. It can save travel time reduce energy consumption. On other hand, using navigation, people avoid roadblock, jams, accidents etc. Intelligent provide a safer reassuring...

10.1109/icsess.2011.5982279 article EN 2011-07-01

With the development of scientific technology and continuous economy, logistics influences daily life greatly. At same time our country's existing enterprises are good evil people mixed up, do not have ability to integrate social resources as a whole. The mode now actually restricts economic some extent. This paper firstly introduces shortcomings mode, current situation internet things discusses why we should build fourth party platform. Secondly concept IOT 4PL, then analyses 4PL structure...

10.1109/imccc.2011.151 article EN 2011-10-01

With communications technologies improving and the market continuing to expand, there is a transfer of mobile value-added services wide variety data services. OTA (Over Air) remote management technology for SIM card applications through air interface communication. As one today's popular services, it achieves personalization STK (SIM Card Toolkit) menu via SMS BIP two kinds load mode, which makes users able update built-in menus phones anytime anywhere customize content they are interested...

10.1109/icecc.2011.6067626 article EN 2011-09-01

This paper presents an approach to detect sharp edges for estimating point spread function (PSF) of a lens. A category PSF estimation methods from low-resolution (LR) images and estimate with the detected edges. Existing techniques usually rely on accurate detection ending points profile normal edge. In practice, however, it is often very difficult localize profiles accurately. Inaccurately localized generate poor estimation. We employ Random Sample Consensus (RANSAC) algorithm rule out...

10.1080/09500340.2015.1074738 article EN Journal of Modern Optics 2015-08-14

In order to solve the problems that unsafely login e-commerce, Internet banking system and traditional dynamic password needs external equipment, an improved identity authentication scheme based on PKI-SIM card is proposed in this paper. With SIM which embedded with a security algorithm generate as terminal, user avoids trouble carry other additional special devices. addition, new method loss of synchronization when event-synchronous mode selected. Finally major advantages technology, such...

10.1109/wicom.2009.5301680 article EN 2009-09-01
Coming Soon ...