- Advanced MIMO Systems Optimization
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Cooperative Communication and Network Coding
- UAV Applications and Optimization
- Wireless Signal Modulation Classification
- Millimeter-Wave Propagation and Modeling
- Wireless Communication Security Techniques
- Supercapacitor Materials and Fabrication
- Advanced Wireless Communication Technologies
- Advanced battery technologies research
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Wireless Networks and Protocols
- Cognitive Computing and Networks
- Mobile Crowdsensing and Crowdsourcing
- Advanced Battery Materials and Technologies
- Internet Traffic Analysis and Secure E-voting
- Energy Efficient Wireless Sensor Networks
- Satellite Communication Systems
- Robotics and Automated Systems
- Microwave Engineering and Waveguides
- Human Mobility and Location-Based Analysis
University of Glasgow
1996-2025
Harbin Institute of Technology
2019-2024
Guangdong University of Technology
2024
Nanyang Technological University
2024
University of Electronic Science and Technology of China
2006-2023
Tianjin University
2023
Nanjing University of Aeronautics and Astronautics
2020-2022
Heriot-Watt University
2021-2022
Shanghai Changzheng Hospital
2022
West China Hospital of Sichuan University
2021
Blockchain has shown a great potential in Internet of Things (IoT) ecosystems for establishing trust and consensus mechanisms without involvement any third party. Understanding the relationship between communication blockchain as well performance constraints posing on counterparts can facilitate designing dedicated blockchain-enabled IoT systems. In this paper, we establish an analytical model wireless system. By considering spatio-temporal domain Poisson distribution, i.e., node...
It is widely acknowledged that network slicing can tackle the diverse use cases and connectivity services of forthcoming next-generation mobile networks (5G). Resource scheduling vital importance for improving resource-multiplexing gain among slices while meeting specific service requirements radio access (RAN) slicing. Unfortunately, due to performance isolation, diversified requirements, dynamics (including user mobility channel states), resource in RAN very challenging. In this paper, we...
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective and credible solutions for various real-world scenarios. UAVs an immense variety of services due autonomy, mobility, adaptability, communications interoperability. Despite the expansive use support ground communications, data exchanges in those networks are susceptible security threats because most communication is through radio or Wi-Fi signals, which easy hack. While several techniques exist...
Generative artificial intelligence (GAI) has emerged as a rapidly burgeoning field demonstrating significant potential in creating diverse content intelligently and automatically.To support such intelligence-generated (AIGC) services, future communication systems must fulfill stringent requirements, including high data rates, throughput, low latency, while efficiently utilizing limited spectrum resources.Semantic (SemCom) been deemed revolutionary scheme to tackle this challenge by conveying...
The millimeter wave (mmWave) radio band is promising for the next-generation heterogeneous cellular networks (HetNets) due to its large bandwidth available meeting increasing demand of mobile traffic. However, unique propagation characteristics at mmWave cause huge redundant handoffs in HetNets that brings heavy signaling overhead, low energy efficiency and increased user equipment (UE) outage probability if conventional Reference Signal Received Power (RSRP) based handoff mechanism used. In...
It is widely acknowledged that network slicing can tackle the diverse usage scenarios and connectivity services 5G-and-beyond system needs to support. To guarantee performance isolation while maximizing resource utilization under dynamic traffic load, slice be reconfigured adaptively. However, it commonly believed fine-grained reconfiguration problem intractable due extremely high computational complexity caused by numerous variables. In this article, we investigate within a core with aim of...
Network slicing (NS) has been widely identified as a key architectural technology for 5G-and-beyond systems by supporting divergent requirements in sustainable way. In radio access network (RAN) slicing, due to the device-base station (BS)-NS three layer association relationship, device (including control and handoff management) becomes an essential yet challenging issue. With increasing concerns on stringent data security privacy, exploiting local resources solve problem while enforcing...
Abstract Converting low-grade heat from environment into electricity shows great sustainability for mitigating the energy crisis and adjusting configurations. However, thermally rechargeable devices typically suffer poor conversion efficiency when a semiconductor is employed. Breaking convention of thermoelectric systems, we propose demonstrate new zinc ion thermal charging cell to generate via thermo-extraction/insertion thermodiffusion processes insertion-type cathode (VO 2 -PC)...
Computation offloading via device-to-device communications can improve the performance of mobile edge computing by exploiting resources user devices. However, most proposed optimization-based computation schemes lack self-adaptive abilities in dynamic environments due to time-varying wireless environment, continuous-discrete mixed actions, and coordination among The conventional reinforcement learning based approaches are not effective for solving an optimal sequential decision problem with...
Metaverse depicts a vista of constructing virtual environment parallel to the real world so people can communicate with others and objects through digital entities. In world, communication relies on identities addresses that are recognized by authorities, no matter link is established via post, email, mobile phone, or landline. Metaverse, however, different from which requires single identity belongs individual. This be an encrypted address in metaverse but one trace verify it. order achieve...
Deploying ultra-dense networks that operate on millimeter wave (mmWave) band is a promising way to address the tremendous growth mobile data traffic. However, one key challenge of mmWave network (UDmmN) beam management due high propagation delay, limited coverage as well numerous beams and users. In this paper, novel systematic control scheme presented tackle problem which difficult nonconvex objective function. We employ double deep Q-network (DDQN) under federated learning (FL) framework...
Virtual reality (VR) over wireless is expected to be one of the killer applications in next-generation communication networks. Nevertheless, huge data volume along with stringent requirements on latency and reliability under limited bandwidth resources makes untethered VR delivery increasingly challenging. Such bottlenecks, therefore, motivate this work seek potential using semantic communication, a new paradigm that promises significantly ease resource pressure, for efficient delivery. To...
Introducing blockchain into Federated Learning (FL) to build a trusted edge computing environment for transmission and learning has attracted widespread attention as new decentralized pattern. However, traditional consensus mechanisms architectures of systems face significant challenges in handling large-scale FL tasks, especially on Internet Things (IoT) devices, due their substantial resource consumption, limited transaction throughput, complex communication requirements. To address these...
Integrating information network into power system is the key for realizing vision of smart grid, but also introduces many security problems. Wireless communication offers benefits low cost, rapid deployment, shared medium, and mobility; at same time, it causes privacy challenges. In this paper, concept dynamic secret applied to design an encryption scheme grid wireless communication. Between two parties communication, previous packets are coded as retransmission sequence, where retransmitted...
Network slicing (NS) has been identified as one of the most promising architectural technologies for future mobile network systems to meet extremely diversified service requirements users. In radio access networks (RAN) slicing, provisioning slice users becomes much more complicated than that in traditional networks, constraints both user physical association with base station (BS) and logical NS should be considered. other words, user-BS-NS three layer relationship addressed tailored use...
Network slicing is identified as a fundamental architectural technology for future mobile networks since it can logically separate into multiple slices and provide tailored quality of service (QoS). However, the introduction network radio access (RAN) greatly increase user handover complexity in cellular networks. Specifically, both physical resource constraints on base stations (BSs) logical connection (NSs) should be considered when making decision. Moreover, various types call an...
Aqueous zinc–iodine batteries, featuring high energy density, safety, and cost-effectiveness, have been regarded as a promising storage system. Nevertheless, poor cycling stability dissolution of iodine/polyiodide greatly limited the development batteries. Here, iodine encapsulated by hierarchical porous carbon is employed positive material to assemble high-performance Meanwhile, utilization ZnI2 additive in electrolyte can enhance capacity as-assembled devices because existence polyiodide...
The prosperity of artificial intelligence (AI) has laid a promising paradigm communication system, i.e., intelligent semantic (ISC), where contents, instead traditional bit sequences, are coded by AI models for efficient communication. Due to the unique demand background knowledge recovery, wireless resource management faces new challenges in ISC. In this paper, we address user association (UA) and bandwidth allocation (BA) problems an ISC-enabled heterogeneous network (ISC-HetNet). We first...
Due to the number of confirmed cases and casualties new COVID-19 virus diminishing day after day, several countries around world are discussing how return normal way life. In order keep spread disease under control avoid a second wave infection, one alternative being considered is utilization contact tracing. However, despite alternatives available, tracing still faces issues in terms maintaining user privacy security, making its mass adoption quite difficult. Based on that, novel framework...