- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Technologies
- Radar Systems and Signal Processing
- Security in Wireless Sensor Networks
- Millimeter-Wave Propagation and Modeling
- Advanced Statistical Process Monitoring
- Full-Duplex Wireless Communications
- Statistical Methods in Clinical Trials
- Antenna Design and Analysis
- Underwater Vehicles and Communication Systems
- Advanced Antenna and Metasurface Technologies
- UAV Applications and Optimization
- Biometric Identification and Security
- Advanced Wireless Communication Techniques
- graph theory and CDMA systems
- Wireless Signal Modulation Classification
- Sparse and Compressive Sensing Techniques
- Concrete Corrosion and Durability
- Blind Source Separation Techniques
- Statistical Methods and Inference
- Advanced Adaptive Filtering Techniques
- Statistical Distribution Estimation and Applications
- Cognitive Radio Networks and Spectrum Sensing
Hunan University
2023-2025
Xi'an Jiaotong University
2017-2021
Shaoguan University
2018-2019
Unmanned aerial vehicle (UAV) system is vulnerable to the control signal spoofing attack due openness of wireless communications. In this correspondence, a physical layer approach proposed combat attack, i.e., determine whether received packet from ground station or potential malicious attacker (MA), which does not need share any secret key. We consider worst case where UAV have prior knowledge about MA. Utilizing channel feature angles arrival, distance-based path loss, and Rician-$\kappa$...
Transmitter-side channel state information of the legitimate destination plays a critical role in physical layer secure transmissions. However, training procedure is vulnerable to pilot spoofing attack (PSA) or jamming (PJA) by an active eavesdropper (Eve), which inevitably results severe private leakage. In this paper, we propose random (RCT)-based downlink transmission framework for time division duplex multiple antennas base station. proposed RCT scheme, orthogonal sequences (PSs) are...
Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase order to wiretap data transmitted from transmitter, Alice, receiver, Bob. We propose new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses intelligent reflecting surface (IRS) reflect sent Bob Alice. The proposed scheme, referred as IRS-PCA, increases leakage Alice IRS during phase, which...
Millimeter wave (mmWave) signals are much more sensitive to blockage, which results in a significant increase of the outage probability, especially for users at edge cells. In this paper, we exploit technique base station (BS) cooperation improve performance cell-edge downlink transmission mmWave cellular networks. We design two cooperative schemes, referred as fixed-number BS (FNC) scheme and fixed-region (FRC) scheme, respectively. FNC BSs consist M nearest around served users, FRC include...
In this paper, we investigate the design of a pilot spoofing attack (PSA) carried out by multiple single-antenna eavesdroppers (Eves) in downlink time-division duplex system, where antenna base station (BS) transmits confidential information to legitimate user. During uplink channel training phase, Eves collaboratively impair acquisition link, aimed at maximizing wiretapping signal-to-noise ratio (SNR) subsequent data transmission phase. Two different scenarios are investigated: 1) BS is...
We consider that a transmitter covertly communicates with multiple receivers under the help of friendly jammer. The messages intended for different are transmitted in mutually orthogonal frequency bands. An adversary observes all these bands aiming at detecting whether or not communication occurs, while jammer broadcasts jamming signals to degrade detection performance adversary. block Rayleigh fading channel model and evaluate covert two situations: 1) wireless channels vary slowly such...
Fake base station (FBS) attack is a great security challenge to wireless user equipment (UE). During the cell selection stage, UE receives multiple synchronization signals (SSs) from nearby stations (BSs) and then synchronizes itself with strongest SS. An FBS also can transmit an SS sufficient power confuse UE, which makes connect FBS, may lead leakage of private information. In this letter, countermeasure by utilizing location information investigated. Two awareness based FBS-resistance...
In this paper, we propose a joint source-relay precoding scheme to secure an amplify-and-forward multiple-input multiple-output wireless relay network in the existence of multi-antenna eavesdropper. Different from existing works that only consider some specific signal design simplify problem, take both direct links source destination and eavesdropper into account, investigate general covariance matrices optimization problem maximize secrecy rate, which leads difficult non-convex problem. To...
In this paper, we establish a framework for low probability of detection (LPD) communication from sequential change-point (SCPD) perspective, where transmitter, Alice, wants to hide her transmission receiver, Bob, an adversary, Willie. The new facilitates modeling LPD and further evaluating its performance under the condition that Willie has no prior knowledge about when Alice might start determine existence as quickly possible in real-time manner. We consider three different tests, i.e.,...
Device-to-device (D2D) communication is a promising solution to meet rapidly growing demands for data services via spectrum reuse. This paper studies the physical layer security in D2D underlay cellular network from network-wide perspective, where locations of and users are modeled as Poisson cluster processes (PCPs) characterize clustering feature users, eavesdroppers (Eves) base stations (BSs) PCP point process (PPP), respectively. We establish an analytical framework assess coverage...
Social awareness and social ties are becoming increasingly popular with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields wireless communications, such as resource sharing, cooperative communication, so on. In this paper, we propose a based hybrid beamforming jamming scheme to secure transmissions under stochastic geometry framework, where friendly nodes categorized into relays jammers according their locations degrees...
We take the viewpoint of wireless attackers, and investigate use reconfigurable intelligent surface (RIS) in degrading communications performance a time-division duplex system, which multiple-antenna base station (BS) transmits independent data streams to multiple user terminals (UTs). Each channel coherent time block consists training (CT) phase followed by transmission (DT) phase. During CT phase, UTs broadcast pilots enable BS estimate channels, RIS manipulates environment so that...
In this letter, we design passive beamforming in an intelligent reflecting surface (IRS) assisted multiple-user wireless network. Two different scenarios are considered, namely, multicasting and multi-user downlink transmission. We optimize the vector of IRS to maximize smallest signal-to-noise ratio users both scenarios. Based on alternating direction method multipliers algorithm, a low complexity is designed iteratively solve established problem. each iteration proposed method, solution...
We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive multiple-input multiple-output systems. The beamformer is divided into two parts: pre-beamforming matrix to separate the users different beams with no interference between each other, which designed based on low-rank covariance of channel, linear precoding using partial or even channel state information (CSI) concatenated by an OSTBC. To construct...
Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...
Recently, device-to-device (D2D) communication has emerged as a promising solution to meet rapidly growing demands for data services. This paper studies the physical layer security of D2D underlay cellular network, where and communications coexist in presence randomly distributed eavesdroppers (Eves). We establish an analytical framework assess performance network interest. To be specific, by modeling Poisson cluster process (PCP), we derive exact expressions coverage outage probabilities...
The safety of coated steel belts (CSBs) is crucial for reliable elevator operation, as they are critical components in systems. Magnetic flux leakage (MFL) testing the preferred non-destructive method evaluating CSBs due to its high sensitivity. Previous studies overlooked tensile stress's impact on in-service MFL CSBs, potentially resulting inaccurate defect assessments. This research aims investigate stress signal by developing a theoretical model, conducting finite element simulations,...
We investigate covert communication under a sequential change-point detection (SCPD) framework, where transmitter, Alice, attempts to communicate reliably with receiver, Bob, over an additive white Gaussian noise channel, while simultaneously ensuring covertness (low probability of detection) respect adversary, Willie. Different from the binary hypothesis test based framework considered in prior works Willie collects all signal samples together and makes decision batch manner, we view...
Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...
Spectrum sensing has attracted much attention due to its significant contribution idle spectrum detection in Cognitive Radio Networks.However, specialized discussion is on complexity-based strategy for seldom considered.Motivated by this, this paper devoted sensing.Firstly, three efficiency functions are defined estimate of a scheme.Then novel proposed given performance and computational complexity.After that, the extended energy detector, Cyclostationary feature covariance matrix detector...
For the specific propagation characteristics of millimeter wave, in this paper, we study beamforming design and interference management wave cellular networks with partial channel state information (CSI). Specifically, propose two schemes, namely eigen orthogonal beamforming, based on covariance matrix, analyze intercell caused by proposed schemes. We find that performance is greatly influenced number clusters which constitute channel, angular spread. This different from traditional...
Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, training procedure is vulnerable to pilot spoofing attack (PSA) or jamming (PJA) by an active eavesdropper (Eve), which inevitably results severe private leakage. In this paper, we propose random (RCT) based downlink transmission framework for time division duplex (TDD) multiple antennas base station (BS). proposed RCT scheme, orthogonal...