- Privacy-Preserving Technologies in Data
- Advanced MIMO Systems Optimization
- IoT and Edge/Fog Computing
- Analog and Mixed-Signal Circuit Design
- Software-Defined Networks and 5G
- Blockchain Technology Applications and Security
- Energy Efficient Wireless Sensor Networks
- Advanced Authentication Protocols Security
- Wireless Networks and Protocols
- Caching and Content Delivery
- UAV Applications and Optimization
- Cooperative Communication and Network Coding
- Radio Frequency Integrated Circuit Design
- Industrial Vision Systems and Defect Detection
- Image and Signal Denoising Methods
- Electromagnetic wave absorption materials
- Advanced Power Amplifier Design
- Smart Grid Energy Management
- Fault Detection and Control Systems
- Indoor and Outdoor Localization Technologies
- Network Packet Processing and Optimization
- Wireless Communication Security Techniques
- Energy Harvesting in Wireless Networks
- User Authentication and Security Systems
- Mobile Ad Hoc Networks
Fudan University
2023-2025
University of Electronic Science and Technology of China
2018-2024
Xihua University
2018-2024
Software (Spain)
2024
University of Arkansas at Fayetteville
2023
Huzhou University
2021-2022
Institute of Electrical and Electronics Engineers
2021
ORCID
2019
Northwest University
2017
Nanyang Technological University
2002-2016
It is widely acknowledged that network slicing can tackle the diverse use cases and connectivity services of forthcoming next-generation mobile networks (5G). Resource scheduling vital importance for improving resource-multiplexing gain among slices while meeting specific service requirements radio access (RAN) slicing. Unfortunately, due to performance isolation, diversified requirements, dynamics (including user mobility channel states), resource in RAN very challenging. In this paper, we...
The ongoing increasing traffic in the era of big data yields unprecedented demands user experience and network capacity expansion. users next generation mobile networks (5 G) should be able to use 3GPP, IEEE, other technologies simultaneously. integration multiple radio access (RATs) licensed or unlicensed bands has been widely deemed as a cost-efficient way greatly increase capacity. In this paper, we propose smart aggregated RAT (SARA) strategy with aim maximizing long-term throughput...
The recently emerging blockchain technology provides a promising tool to enable endogenous security in Internet-of-Things (IoT) systems. However, when applying the legacy existing IoT systems, some technical bottlenecks due resource constraints, such as storage resource, should be carefully addressed. In this article, we propose an optimal deployment mechanism for wireless where devices have limited resources and links connection are vulnerable, improve efficiency of massive data realize...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
This article presents a direct-digitization analog front end (DD-AFE) with enhanced input-impedance, common-mode rejection ratio (CMRR), and dynamic range (DR) for wearable biopotential (ExG) signal acquisition, especially small-diameter dry electrodes. The DD-AFE employs second-order continuous-time delta-sigma modulator (CT-ΔSM) multiple circuit techniques to support readouts. These include 1) A high input-impedance input feedforward (FF), embedded in 4-input 4-bit successive approximation...
The recently emerging federated learning (FL) exploits massive data stored at multiple user nodes to train a global optimal model without leaking the privacy of data. However, it is still inadequate learn safely centralized aggregator, which an essential part for traditional FL architecture. Specifically, when using in radio access networks enable edge intelligence, difficult central server, belongs third party, guarantee its credibility. Moreover, because server may cause single point...
4G systems employ discontinuous reception (DRX) mechanism to conserve energy by intermittently suspending network connections. Moving 5G, a wide range of applications with diverse characteristics need be supported. Especially, machine-type communication (MTC) has been identified as one the three generic 5G services. Compared that human-type (HTC), traffic patterns MTC could very bursty and even nonstationary. Thus, using legacy DRX will cause longer access delay and/or higher power...
Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate dependence IoT on central servers and protect security effectively. However, legacy systems, it hardly store complete at all nodes due limited space. In order securely resource-constrained we design blockchain-assisted distributed mechanism, by multiple collaboratively blockchain. Meanwhile, deep reinforcement learning (DRL) based algorithm...
In Class-D audio amplifiers (CDAs), nonlinearity of power stages and pulse-width-modulation (PWM) modulators poses a main challenge in pursuit high-fidelity output. The distortion is typically suppressed by closed-loop topology with high inband loop gain [1, 2]. However, due to the roll-off gain, total harmonic plus noise (THD+N) CDA tends increase at frequency. Another source arises from aliasing high-frequency PWM residuals, which limits minimum THD+N [3]. Although this can be improved...
The wireless technology has revolutionized and had a significant impact on every aspect of people's life. Confidential information, financial transactions, sensitive conversations are frequent via the network securing all these data utmost importance. In this paper, we discuss major weaknesses long-term evolution (LTE) authentication process propose new approach-the hybrid evolved packet system (HEPS) protocol to address vulnerabilities. proposed been verified logically, using...
This article presents a second-order continuous-time delta-sigma (CT-ΔΣ) based AFE for biopotential sensor interfaces. High linearity is achieved by using current balanced Gm,1 input stage with gain-boosting and cascode techniques. Low-frequency chopping embedded in OTAs breaks the limitation of frequency conventional CT-ΔΣ ADCs mitigates flicker noise without reducing impedance. In second stage, closedloop Gm,2-OTA-C proportional integrator (PI) relaxes requirements OTA eliminates...
Biclustering refers to simultaneously capturing correlations present among subsets of attributes (columns) and records (rows). It is widely used in data mining applications including biological analysis, financial forecasting, text mining. algorithms are significantly more complex compared the classical one dimensional clustering techniques, particularly those requiring multiple computing platforms for large distributed sets. In this paper, we develop an efficient scalable algorithm,...
As network function virtualization (NFV) is realized based on general-purpose processors for avoiding proprietary hardware, its benefits of flexibility and agility could be compromised by the increased packet latency reduced throughput. An effective approach improving throughput performance to exploit new (NF) processing framework general purpose processors. In this paper, we propose a joint two-tier NF parallelization (TNP) framework, which can agilely flexibly organize parallel greatly...
In legacy blockchain based systems, each involved node has to store a complete ensure the system security without any central authoritative controller. However, it is usually impossible for wireless IoT blockchain, especially those simple sensor nodes sufficient storage and computing resources. this paper, we propose block assignment scheme systems with aim tackle problem. Specifically, maintain by set of in collaborative way on premise ensuring that can check every transaction. On other...
Remote-sensing image fusion aims to obtain a multispectral (MS) with high spatial resolution, which integrates information from the panchromatic (Pan) and spectral MS image. Sparse representation (SR) has been recently used in remote-sensing method, can superior results many traditional methods. However, main obstacle is that dictionary generated resolution images (HRMS), are difficult acquire. In this article, new SR-based method sub-dictionaries proposed. The problem transformed into...
In recent years, with the development and wide application of unmanned aerial vehicle (UAV) technology, key technology network has become a new research focus. Compared traditional networks, UAV networks have characteristics dynamic topology limited energy. These brought challenges to design implementation communication systems. We need redesign organizational structure reduce power consumption, extend operation time, improve stability. this paper, we studied clustering designed strategy....
Triple-negative breast cancer (TNBC) is an aggressive type of where no effective therapy has been developed. Here, we report that the natural product ER translocon inhibitor ipomoeassin F a selective TNBC cell growth. A proteomic analysis cells revealed significantly reduced levels molecular chaperones, including PDIA6 and PDIA4, induced stress, unfolded protein response (UPR) autophagy in cells. Mechanistically, F, as Sec61α-containing translocon, blocks translocation PDIA6, inducing its...
Radio Access Network (RAN) slicing is a promising architectural technology to address extremely diversified service demands and provide profitable business models for future mobile networks. In RAN architecture, self-healing an important functional module minimize the impact of network failings on performance slices. However, burgeoning sliced vastly different from that traditional has been rarely investigated. this paper, we Self-healing Slice (SRANS) problem by modeling it as Pareto...
Network slicing has been viewed as one of the key architectural technologies for next generation (5G) mobile network. The mobility pattern User Equipments (UEs) in different network slices poses great challenge to management 5G systems, which is from that 4G systems. In this paper we propose a multiple level tracking area (TA) and list (TAL) structure considers characteristics UE density analyze location update frequency paging UE. Based on structure, employ an embedded Markov chain model...
Federated learning (FL) has become a promising technique for developing intelligent wireless networks. In traditional FL paradigms, local models are usually required to be homogeneous aggregation. However, due heterogeneous coming with sysTem heterogeneity, it is preferable user equipments (UEs) undertake appropriate amount of computing and/or data transmission work based on constraints. Meanwhile, considerable communication costs incurred by model training, when large number UEs participate...
As Network Function Virtualization (NFV) is based on general purpose processors for avoiding any proprietary hardware, the benefits of NFV could be compromised by increased packet latency and reduced throughput. One feasible solution to exploit new network function (NF) framework with aim reducing processing in NFs. In this paper, we propose a joint Two-Tier NF Parallelization (TNP) framework, which can agilely flexibly organize parallel map individual NFs one or multiple core(s). TNP,...