- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Energy Harvesting in Wireless Networks
- Full-Duplex Wireless Communications
- Electric Power System Optimization
- Integrated Energy Systems Optimization
- Microgrid Control and Optimization
- Optical Wireless Communication Technologies
- Caching and Content Delivery
- UAV Applications and Optimization
- Power Systems and Renewable Energy
- HVDC Systems and Fault Protection
- Power System Reliability and Maintenance
- Energy Load and Power Forecasting
- Antenna Design and Analysis
- RFID technology advancements
- PAPR reduction in OFDM
- Parallel Computing and Optimization Techniques
- Age of Information Optimization
- Energy, Environment, and Transportation Policies
- Frequency Control in Power Systems
- Cryptography and Residue Arithmetic
- Low-power high-performance VLSI design
Lanzhou University of Technology
2022-2024
Xi'an Jiaotong University
2015-2023
Nanjing Institute of Technology
2022
Guangzhou University
2017
Xi’an University of Posts and Telecommunications
2016
Tsinghua University
2002-2013
Institute of Microelectronics
2002-2005
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security single-input single-output (SISO) NOMA system consisting of transmitter, legitimate users and an eavesdropper. The aim this maximize the secrecy sum rate (SSR) subject users' quality service (QoS) requirements. We firstly identify feasible region transmit power satisfying all QoS Then we derive closed-form expression...
Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency in fifth-generation systems. In this correspondence, we study benefit of NOMA enhancing energy (EE) multiuser downlink transmission, wherein EE defined ratio achievable sum rate users to total power consumption. Our goal maximize subject minimum required data each user, which leads nonconvex fractional programming problem. To solve it, first establish feasible range...
In applications of the Internet Things (IoT), use short packets is expected to meet stringent latency requirement in ultra-reliable low-latency communications; however, incurred security issues and impact finite blocklength coding on physical-layer are not well understood. This paper investigates performance secure short-packet communications a mission-critical IoT system with an external multi-antenna eavesdropper. An analytical framework proposed approximate average achievable secrecy...
In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing physical-layer security a two-tier decentralized wireless network with each tier deployed large number pairs single-antenna transmitter and multi-antenna receiver. underlying tier, sends unclassified information, works halfduplex (HD) mode receiving desired signal. overlaid deliveries confidential information presence randomly located eavesdroppers, FD radiating signals to confuse eavesdroppers signal...
Backscatter wireless communication is an emerging technique widely used in low-cost and low-power systems, especially passive radio frequency identification (RFID) systems. Recently, the requirement of high data rates, reliability, security drives development RFID which motivates our investigation on physical layer a multiple-input multiple-output (MIMO) system. In this paper, we propose noise-injection precoding strategy to safeguard system with resource-constrained nature backscatter taken...
In this paper, the performance of non-orthogonal multiple access (NOMA) is investigated and optimized in a downlink space division network with multi-antenna base station randomly deployed users, under general channel state information (CSI) limited feedback framework. We first propose dynamic user scheduling grouping strategy by leveraging feedback. Based on that, an analytical framework proposed to obtain outage probability closed form. The diversity order impacts number bits NOMA are...
Non-orthogonal multiple access (NOMA) has been recognized as a potential technique to achieve higher spectral efficiency (SE) for future 5G systems. However, the anticipated thousand-fold increase in wireless data traffic urgently calls new designs of power-efficient communication In this paper, we investigate NOMA from perspective energy (EE) multiuser downlink system. Firstly, generalize an existing cognitive radio (CR) inspired scheme by introducing antenna techniques and extending number...
This paper proposes a secure users oriented multiple-input and single-output (MISO) non-orthogonal multiple access (NOMA) downlink transmission scheme, where legitimate are categorized as quality of service (QoS)-required (QU) the security-required (SU) overheard by passive eavesdropper. The basic idea is to exploit zero-forcing beamforming (ZFBF) cancel interference among SUs, then several QUs efficiently scheduled based on obtained vectors divide into user clusters, in such way that could...
With the increase in penetration rate of renewable energy, planning and operation power systems will face huge challenges.To ensure sufficient utilization reasonable arrangement for long-term generation plan has become more crucial.Security-constrained unit commitment (SCUC) is a critical technical means to optimize plan.However, plentiful sources complex grid structure largescale bring great difficulties SCUC.In this paper, we propose fast calculation method SCUC large-scale with...
In the fifth generation era, pervasive applications of Internet Things and massive machine-type communications have initiated increasing research interests on backscatter wireless powered communication (B-WPC) technique due to its ultrahigh energy efficiency low cost. The ubiquitous B-WPC network is characterized by nodes with dynamic spatial positions sporadic short packets, which performance has not been fully investigated. this paper, we give a comprehensive analysis multiantenna packets...
In this paper, we propose a joint source-relay precoding scheme to secure an amplify-and-forward multiple-input multiple-output wireless relay network in the existence of multi-antenna eavesdropper. Different from existing works that only consider some specific signal design simplify problem, take both direct links source destination and eavesdropper into account, investigate general covariance matrices optimization problem maximize secrecy rate, which leads difficult non-convex problem. To...
To enable the low-cost ubiquitous Internet of Things, passive backscatter communication is envisioned as one most prominent and promising techniques; however, underlying security issues associated with practical finite-alphabet signaling from perspective physical-layer (PLS) have not been well studied. Despite several preliminary efforts on improving eavesdropper's decoding error probability through PLS approaches, this article comprehensively investigates secrecy rate performance a secure...
Coupling renewable energy sources (RES) such as wind farms with storage systems (ESSs) to form a hybrid power plant (HPP) has gained increasing attention. However, its investment profitability is closely associated capacity configuration, site location, grid network, and market-clearing outcomes. To study the HPP's planning strategy interaction transmission system operator (TSO), this paper proposes tri-level coordinated scheme for networks profit-driven wind-storage (WSHPP) in electricity...
Wireless caching has been widely recognized as a promising technique for efficient content delivery. In this paper, by taking different file secrecy levels into consideration, physical-layer security oriented placement is optimized in stochastic cache-enabled cellular network. We propose an analytical framework to investigate the nontrivial delivery-secrecy tradeoff. Specifically, we first derive closed-form expressions hit and probabilities. The global optimal probabilistic policy then...
The co-planning problem of transmission and energy storage system (ESS) requires a large amount historical forecasted input data to account for the volatility renewable loads. However, usually make planning difficult solve, so time series aggregation is often used reduce computational complexity. Nevertheless, it guarantee reliability operation on whole data. Therefore, this paper proposes an iterative method select extreme scenarios, designs two indicators considering power balance peak...
In cognitive radio networks (CRNs), the performance of primary users (PUs) may suffer adverse effects from secondary (SUs) if spectrum PUs is haphazardly shared with SUs. this paper, we propose a hybrid cooperative protocol based on orthogonal multiple access (OMA) and non-orthogonal (NOMA) that improves utilization by allowing SUs opportunistic to Pus, while guaranteeing PU. Specifically, system can switch between non-cognitive transmission mode, underlay OMA overlay OMA/NOMA according...
Backscatter wireless communication is an emerging technique widely used in passive radio frequency identification (RFID) systems. Recently, the requirement of a high data rate, reliability, and secure transmission becoming main driving force for development RFID systems, which motivates introduction multiple-input multiple-output (MIMO) schemes physical layer security techniques into backscatter In this paper, combination multiple antennas exploited to improve level We propose...
In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For specific propagation characteristics of wave, provide transmission scheme designs and a comprehensive performance analysis. Specifically, maximize outage probability (SOP) constraint through dynamic parameter scheme, optimal solution to parameters, including codeword rate power allocation ratio information signal total transmit power. We find that system...
Aiming at the problem that node energy is limited, network cycle short and throughput low in wireless sensor network, Dynamic Routing Protocol Based on Clustering was proposed known as KACO (K-means Ant Colony Optimal). At beginning it employs ant colony optimal k-means algorithm to form cluster, novel method which consider ratio, location distance used select cluster head. In transmission phase, dynamic hybrid routing adopted create shortest path between nodes reducing consumption...
Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...
The increase in wind power penetration has weakened the equivalent inertia of system, posing a significant challenge to frequency stability. In this paper, trajectory planning (FTP)-based regulation (FR) strategy is proposed for permanent magnet synchronous generator-based turbines equipped with an energy storage system (ESS) on DC link. core idea that index provided by grid code used plan safe when fluctuates. FR ESS controlled tracking planned compensate unbalanced provide support, and...
Abstract The authors study the energy efficiency (EE) of ambient backscatter communication (AmBC) device‐assisted and reconfigurable intelligent surfaces (RIS)‐assisted non‐orthogonal multiple access (NOMA) downlinks. establish two optimisation problems based on collaborative devices (AmBC devices, RIS) with objective maximising EE system, taking into account requirements power limitation rate limitation, etc. also obtain solutions by optimising relevant performance metrics alternating...
Multi-region geocast, an efficient technique for routing protocols at the network layer, realizes delivery of different information to user groups that are differentiated from each other by their geographical locations. This paper studies multi-region geocast physical layer first time exploiting non- orthogonal multiple access (NOMA) which is one promising technologies future 5G systems. We investigate physical-layer studying its beamforming design in a multiple-input single-output (MISO)...
In this paper, we investigate physical-layer security in a wireless ad hoc network which large number of legitimate transmitter-receiver pairs coexist with randomly distributed eavesdroppers; each receiver works either half-duplex (HD) or full-duplex (FD) mode. We aim to increase the secure links per unit area interest by determining allocation between HD- and FD-mode links. use tools from stochastic geometry theory analyze connection outage probability secrecy for an arbitrary link deriving...