Kai Chen

ORCID: 0000-0002-6030-0481
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Techniques
  • Error Correcting Code Techniques
  • Advancements in Semiconductor Devices and Circuit Design
  • Underwater Vehicles and Communication Systems
  • Semiconductor materials and devices
  • Vehicular Ad Hoc Networks (VANETs)
  • Silicon Carbide Semiconductor Technologies
  • Coding theory and cryptography
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • DNA and Biological Computing
  • Indoor and Outdoor Localization Technologies
  • Advanced Chemical Sensor Technologies
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Simulation and Modeling Applications
  • Perovskite Materials and Applications
  • Multi-Criteria Decision Making
  • Underwater Acoustics Research
  • Advanced Algorithms and Applications
  • Fuzzy Logic and Control Systems
  • Conducting polymers and applications
  • Polymer composites and self-healing
  • Multi-Agent Systems and Negotiation
  • Wireless Sensor Networks and IoT

Huazhong University of Science and Technology
2009-2024

Wuhan National Laboratory for Optoelectronics
2023-2024

Shanghai Key Laboratory of Trustworthy Computing
2023

East China Normal University
2023

Dalian Polytechnic University
2021

Iraqi University
2019

Huawei Technologies (China)
2016

Beijing University of Posts and Telecommunications
2013-2014

University of Arizona
2014

University of Lübeck
2012

As improved versions of successive cancellation (SC) decoding algorithm, list (SCL) and stack (SCS) are used to improve the finite-length performance polar codes. Unified descriptions SC, SCL SCS algorithms given as path searching procedures on code tree Combining ideas SCS, a new algorithm named hybrid (SCH) is proposed, which can achieve better trade-off between computational complexity space complexity. Further, reduce complexity, pruning technique proposed avoid unnecessary operations....

10.1109/tcomm.2013.070213.120789 article EN IEEE Transactions on Communications 2013-07-16

Polar codes represent an emerging class of error-correcting with power to approach the capacity a discrete memoryless channel. This overview article aims illustrate its principle, generation and decoding techniques. Unlike traditional capacity-approaching coding strategy that tries make as random possible, polar follow different philosophy, also originated by Shannon, creating jointly typical set. Channel polarization, concept central codes, is intuitively elaborated Matthew effect in...

10.1109/mcom.2014.6852102 article EN IEEE Communications Magazine 2014-07-01

Abstract Due to the low cost and excellent potential for mass production, printable mesoscopic perovskite solar cells (p‐MPSCs) have drawn a lot of attention among other device structures. However, open‐circuit voltage ( V OC ) such devices restricts their power conversion efficiency (PCE). This limitation is brought by high defect density at grain boundaries in mesoporous scaffold, which results severe nonradiative recombination detrimental . To improve crystallization process, passivate...

10.1002/adfm.202300473 article EN Advanced Functional Materials 2023-03-15

CRC (cyclic redundancy check) concatenated polar codes are superior to the turbo under successive cancellation list (SCL) or stack (SCS) decoding algorithms. But code length of is limited power two. In this paper, a family rate-compatible punctured (RCPP) proposed satisfy construction with arbitrary length. We propose simple quasi-uniform puncturing algorithm generate table. And we prove that method has better row-weight property than random puncturing. Simulation results binary input...

10.1109/icc.2013.6655078 article EN 2013-06-01

Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security privacy issues. paper, we propose new pseudo-identity-based scheme for conditional anonymity with integrity authentication VANET. The proposed uses pseudonym joining process road-side unit (RSU) protect real identity even from RSU, case it compromised. All previous identity-based schemes have been...

10.1109/access.2019.2919973 article EN cc-by-nc-nd IEEE Access 2019-01-01

Abstract The oxidation of iodide ions during annealing in air and rich defects generated at crystal terminations perovskite are major limitations for achieving high photovoltaic performance printable mesoscopic solar cells (p‐MPSCs). Here, the dual role hydrazide derivatives inhibiting passivating termination is reported how affected by substituent studied. It's found that varying derivative from formylhydrazine (FH) to benzhydrazide (BH) then 4‐tert‐butylbenzhydrazide (TBBH) introducing...

10.1002/aenm.202402344 article EN Advanced Energy Materials 2024-09-09

A new physical and continuous BSIM (Berkeley Short-Channel IGFET Model) I-V model in BSIM3v3 is presented for circuit simulation. Including the major effects state-of-the art MOS devices, describes current characteristics from subthreshold to strong inversion as well linear saturation operating regions with a single expression, guarantees continuities of I/sub ds/, conductances their derivatives throughout all V/sub gs/, T/sub bs/, bias conditions. Compared previous models, improved...

10.1109/16.557715 article EN publisher-specific-oa IEEE Transactions on Electron Devices 1997-02-01

A hybrid automatic repeat request (HARQ) scheme based on a novel class of rate-compatible polar (RCP) codes is proposed. The RCP are constructed by performing punctures and repetitions the conventional codes. Simulation results over binary-input additive white Gaussian noise channels show that, under low-complexity successive cancellation decoder, proposed HARQ can perform as well existing schemes turbo low-density parity-check transmission only about 1.0 to 1.5dB away from channel capacity...

10.1109/lcomm.2013.090213.131670 article EN IEEE Communications Letters 2013-09-06

Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are essential features in vehicular ad hoc network (VANETs) security. Most previously proposed VANETs security solutions do not sufficiently satisfy efficiency requirements. Besides, most those heavily dependent on system key long-term sensitive data stored an ideal tamper-proof device, which may be practical or for resource-constrained onboard units (OBUs), especially case unexpected cloning physical...

10.1109/access.2020.3014038 article EN cc-by IEEE Access 2020-01-01

A rateless coding scheme transmits incrementally more and coded bits over an unknown channel until all the information are decoded reliably by receiver. We propose a new based on polar codes, we show that this is capacity-achieving, i.e. its rate as good best code specifically designed for channel. Previous schemes specific classes of channels such AWGN channels, binary erasure etc. but proposed capacity-achieving broad long they ordered via degradation. Moreover, it inherits conceptual...

10.1109/isit.2016.7541258 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2016-07-01

Channel reassignment is to assign again on the assigned channel resources in order use more efficiently. Software-Defined Networking (SDN) based Internet of Things (SDN-IoT) a promising paradigm improve communication performance network, since it allows software-defined routers (SDRs) with help SDN controller appropriately schedule traffic loads meet better transaction corresponding channels one link. However, existing works have many limitations. In this paper, we develop joint...

10.1109/tnse.2020.3036456 article EN IEEE Transactions on Network Science and Engineering 2020-11-06

An increasing number of sensors is being connected to the Internet and their output published on Web, resulting in formation a Web Things (WoT) that will soon connect tens Billions devices. As traditional web, search be key service also WoT enable users find with certain properties. We propose sensor similarity search, where given sensor, other are found produced similar past. At heart our approach an algorithm exploits fuzzy sets for efficiently computing score pair used obtain ranked list...

10.1109/iot.2012.6402314 article EN 2012-10-01

We address the problem of improving throughput and delay efficiency distributed multi-channel MAC (MMAC) protocols. design an MMAC protocol called FD-MMAC that exploits recent advances in full-duplex (FD) communications to coordinate channel access a manner. Compared with prior designs, eliminates use in-band or out-of-band control channels for combating hidden terminal problem, discovering resident destinations, performing load balancing. Furthermore, improves spectral by enabling operation...

10.1109/infocom.2014.6848223 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Artificial Intelligence of Things (AIoT) is an emerging paradigm that integrates artificial intelligence (AI) and Internet (IoT) technologies to provide intelligent IoT solutions. The AIoT system acquires data in real time through sensors, performs analysis tasks anywhere the terminal–edge–cloud continuum, provides accurate decision-making services based on predictions. Cloud–edge collaboration can reduce security risks for prediction by sharing features instead raw data. However, sensitive...

10.1109/jiot.2023.3314460 article EN IEEE Internet of Things Journal 2023-09-12

The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time accuracy current relatively low. As fact that led abnormal distribution ACK traffic, can be detected analyzing characteristics traffic. Then EWMA algorithm which smooth accidental error while being as exceptional mutation...

10.1155/2014/496376 article EN cc-by Mathematical Problems in Engineering 2014-01-01

Analytical models on metal-oxide-semiconductor field-effect transistor (MOSFET) scaling and complementary (CMOS) ring oscillator performance developed recently are applied to revisit CMOS design guidelines because those based the basic long channel model obsolete. Handy empirical equations for deep submicrometer MOSFET drain saturation current developed. The differences between accurate highlighted. Design V/sub th/ dd/ as well interconnect loading effects presented.

10.1109/4.720410 article EN IEEE Journal of Solid-State Circuits 1998-01-01

An increasing number of sensors is being connected to the Internet and their output published on Web, resulting in formation a Web Things (WoT) that will soon connect tens Billions devices. We propose sensor similarity search, where given sensor, other WoT are found produced similar past. At heart our approach an algorithm exploits fuzzy sets for efficiently computing score pair used obtain ranked list matching sensors. Using data from real deployments, we find this results high accuracy.

10.1109/wowmom.2012.6263791 article EN 2012-06-01

Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well computation communication overheads.In this paper, we a robust conditional privacypreserving scheme based on pseudonym root with cuckoo filter to meet requirements reduce our scheme, used new idea generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named "pseudonym root," generates all the same...

10.3837/tiis.2019.12.018 article EN KSII Transactions on Internet and Information Systems 2019-12-31

In addition to the security and privacy challenges in vehicular ad hoc network (VANET), computational communicational costs are huge challenges, since they increase latency, thus casing reduce network's communication efficiency, providing attacker with an opportunity penetrate network. this paper, we propose a new scheme eliminate mentioned VANET systems. first part of scheme, initialize register On-Board Units (OBUs) Road Side (RSUs). second part, exchange between RSU OBU mutual...

10.1109/hpcc/smartcity/dss.2019.00212 article EN 2019-08-01

Polar codes have a regular recursive structure which is feasible for hardware implementation in practice. Quantization critical issue implementation. In this paper, quantization scheme successive-cancellation (SC) decoding of polar proposed based on the equivalent channel cutoff rate optimization. Moreover, modified Gaussian approximation (GA) method exploiting maximizing criterion brought forward to construct and estimate frame error (FER) performance under quantized algorithms. Utilizing...

10.1109/vtcfall.2014.6966081 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2014-09-01

An analytical inversion charge model, ICM, based on a surface potential solution and consideration of poly-gate depletion as well the correction quantum mechanical effects is presented. It continuous accurate from weak to strong inversion, including moderate region, growing importance for low voltage/power circuits. The model verified with extensive measured data applied modeling MOSFETs down 0.13 /spl mu/m channel length.

10.1109/sispad.1997.621348 article EN 2002-11-22
Coming Soon ...