Qian Yang

ORCID: 0000-0002-7404-4108
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Full-Duplex Wireless Communications
  • Electric Power System Optimization
  • Integrated Energy Systems Optimization
  • Microgrid Control and Optimization
  • Optical Wireless Communication Technologies
  • Caching and Content Delivery
  • UAV Applications and Optimization
  • Power Systems and Renewable Energy
  • HVDC Systems and Fault Protection
  • Power System Reliability and Maintenance
  • Energy Load and Power Forecasting
  • Antenna Design and Analysis
  • RFID technology advancements
  • PAPR reduction in OFDM
  • Parallel Computing and Optimization Techniques
  • Age of Information Optimization
  • Energy, Environment, and Transportation Policies
  • Frequency Control in Power Systems
  • Cryptography and Residue Arithmetic
  • Low-power high-performance VLSI design

Lanzhou University of Technology
2022-2024

Xi'an Jiaotong University
2015-2023

Nanjing Institute of Technology
2022

Guangzhou University
2017

Xi’an University of Posts and Telecommunications
2016

Tsinghua University
2002-2013

Institute of Microelectronics
2002-2005

Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security single-input single-output (SISO) NOMA system consisting of transmitter, legitimate users and an eavesdropper. The aim this maximize the secrecy sum rate (SSR) subject users' quality service (QoS) requirements. We firstly identify feasible region transmit power satisfying all QoS Then we derive closed-form expression...

10.1109/lcomm.2016.2539162 article EN IEEE Communications Letters 2016-03-07

Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency in fifth-generation systems. In this correspondence, we study benefit of NOMA enhancing energy (EE) multiuser downlink transmission, wherein EE defined ratio achievable sum rate users to total power consumption. Our goal maximize subject minimum required data each user, which leads nonconvex fractional programming problem. To solve it, first establish feasible range...

10.1109/tvt.2016.2578949 article EN IEEE Transactions on Vehicular Technology 2016-06-09

In applications of the Internet Things (IoT), use short packets is expected to meet stringent latency requirement in ultra-reliable low-latency communications; however, incurred security issues and impact finite blocklength coding on physical-layer are not well understood. This paper investigates performance secure short-packet communications a mission-critical IoT system with an external multi-antenna eavesdropper. An analytical framework proposed approximate average achievable secrecy...

10.1109/twc.2019.2904968 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2019-03-20

In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing physical-layer security a two-tier decentralized wireless network with each tier deployed large number pairs single-antenna transmitter and multi-antenna receiver. underlying tier, sends unclassified information, works halfduplex (HD) mode receiving desired signal. overlaid deliveries confidential information presence randomly located eavesdroppers, FD radiating signals to confuse eavesdroppers signal...

10.1109/twc.2016.2622689 article EN IEEE Transactions on Wireless Communications 2016-10-27

Backscatter wireless communication is an emerging technique widely used in low-cost and low-power systems, especially passive radio frequency identification (RFID) systems. Recently, the requirement of high data rates, reliability, security drives development RFID which motivates our investigation on physical layer a multiple-input multiple-output (MIMO) system. In this paper, we propose noise-injection precoding strategy to safeguard system with resource-constrained nature backscatter taken...

10.1109/twc.2016.2604800 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2016-08-31

In this paper, the performance of non-orthogonal multiple access (NOMA) is investigated and optimized in a downlink space division network with multi-antenna base station randomly deployed users, under general channel state information (CSI) limited feedback framework. We first propose dynamic user scheduling grouping strategy by leveraging feedback. Based on that, an analytical framework proposed to obtain outage probability closed form. The diversity order impacts number bits NOMA are...

10.1109/jsac.2017.2725107 article EN IEEE Journal on Selected Areas in Communications 2017-07-10

Non-orthogonal multiple access (NOMA) has been recognized as a potential technique to achieve higher spectral efficiency (SE) for future 5G systems. However, the anticipated thousand-fold increase in wireless data traffic urgently calls new designs of power-efficient communication In this paper, we investigate NOMA from perspective energy (EE) multiuser downlink system. Firstly, generalize an existing cognitive radio (CR) inspired scheme by introducing antenna techniques and extending number...

10.1109/pimrc.2016.7794658 article EN 2016-09-01

This paper proposes a secure users oriented multiple-input and single-output (MISO) non-orthogonal multiple access (NOMA) downlink transmission scheme, where legitimate are categorized as quality of service (QoS)-required (QU) the security-required (SU) overheard by passive eavesdropper. The basic idea is to exploit zero-forcing beamforming (ZFBF) cancel interference among SUs, then several QUs efficiently scheduled based on obtained vectors divide into user clusters, in such way that could...

10.1109/jstsp.2019.2899778 article EN IEEE Journal of Selected Topics in Signal Processing 2019-02-15

With the increase in penetration rate of renewable energy, planning and operation power systems will face huge challenges.To ensure sufficient utilization reasonable arrangement for long-term generation plan has become more crucial.Security-constrained unit commitment (SCUC) is a critical technical means to optimize plan.However, plentiful sources complex grid structure largescale bring great difficulties SCUC.In this paper, we propose fast calculation method SCUC large-scale with...

10.35833/mpce.2021.000155 article EN Journal of Modern Power Systems and Clean Energy 2022-01-01

In the fifth generation era, pervasive applications of Internet Things and massive machine-type communications have initiated increasing research interests on backscatter wireless powered communication (B-WPC) technique due to its ultrahigh energy efficiency low cost. The ubiquitous B-WPC network is characterized by nodes with dynamic spatial positions sporadic short packets, which performance has not been fully investigated. this paper, we give a comprehensive analysis multiantenna packets...

10.1109/jiot.2018.2800096 article EN publisher-specific-oa IEEE Internet of Things Journal 2018-01-31

In this paper, we propose a joint source-relay precoding scheme to secure an amplify-and-forward multiple-input multiple-output wireless relay network in the existence of multi-antenna eavesdropper. Different from existing works that only consider some specific signal design simplify problem, take both direct links source destination and eavesdropper into account, investigate general covariance matrices optimization problem maximize secrecy rate, which leads difficult non-convex problem. To...

10.1109/tcomm.2017.2686870 article EN publisher-specific-oa IEEE Transactions on Communications 2017-03-24

To enable the low-cost ubiquitous Internet of Things, passive backscatter communication is envisioned as one most prominent and promising techniques; however, underlying security issues associated with practical finite-alphabet signaling from perspective physical-layer (PLS) have not been well studied. Despite several preliminary efforts on improving eavesdropper's decoding error probability through PLS approaches, this article comprehensively investigates secrecy rate performance a secure...

10.1109/jiot.2020.2968337 article EN IEEE Internet of Things Journal 2020-01-21

Coupling renewable energy sources (RES) such as wind farms with storage systems (ESSs) to form a hybrid power plant (HPP) has gained increasing attention. However, its investment profitability is closely associated capacity configuration, site location, grid network, and market-clearing outcomes. To study the HPP's planning strategy interaction transmission system operator (TSO), this paper proposes tri-level coordinated scheme for networks profit-driven wind-storage (WSHPP) in electricity...

10.1016/j.ijepes.2023.109328 article EN cc-by-nc-nd International Journal of Electrical Power & Energy Systems 2023-06-25

Wireless caching has been widely recognized as a promising technique for efficient content delivery. In this paper, by taking different file secrecy levels into consideration, physical-layer security oriented placement is optimized in stochastic cache-enabled cellular network. We propose an analytical framework to investigate the nontrivial delivery-secrecy tradeoff. Specifically, we first derive closed-form expressions hit and probabilities. The global optimal probabilistic policy then...

10.1109/tvt.2018.2869930 article EN IEEE Transactions on Vehicular Technology 2018-09-12

The co-planning problem of transmission and energy storage system (ESS) requires a large amount historical forecasted input data to account for the volatility renewable loads. However, usually make planning difficult solve, so time series aggregation is often used reduce computational complexity. Nevertheless, it guarantee reliability operation on whole data. Therefore, this paper proposes an iterative method select extreme scenarios, designs two indicators considering power balance peak...

10.1016/j.egyr.2023.04.183 article EN cc-by-nc-nd Energy Reports 2023-04-24

In cognitive radio networks (CRNs), the performance of primary users (PUs) may suffer adverse effects from secondary (SUs) if spectrum PUs is haphazardly shared with SUs. this paper, we propose a hybrid cooperative protocol based on orthogonal multiple access (OMA) and non-orthogonal (NOMA) that improves utilization by allowing SUs opportunistic to Pus, while guaranteeing PU. Specifically, system can switch between non-cognitive transmission mode, underlay OMA overlay OMA/NOMA according...

10.3390/app122412683 article EN cc-by Applied Sciences 2022-12-10

Backscatter wireless communication is an emerging technique widely used in passive radio frequency identification (RFID) systems. Recently, the requirement of a high data rate, reliability, and secure transmission becoming main driving force for development RFID systems, which motivates introduction multiple-input multiple-output (MIMO) schemes physical layer security techniques into backscatter In this paper, combination multiple antennas exploited to improve level We propose...

10.1109/icc.2016.7510869 article EN 2016-05-01

In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For specific propagation characteristics of wave, provide transmission scheme designs and a comprehensive performance analysis. Specifically, maximize outage probability (SOP) constraint through dynamic parameter scheme, optimal solution to parameters, including codeword rate power allocation ratio information signal total transmit power. We find that system...

10.1109/pimrc.2016.7794721 article EN 2016-09-01

Aiming at the problem that node energy is limited, network cycle short and throughput low in wireless sensor network, Dynamic Routing Protocol Based on Clustering was proposed known as KACO (K-means Ant Colony Optimal). At beginning it employs ant colony optimal k-means algorithm to form cluster, novel method which consider ratio, location distance used select cluster head. In transmission phase, dynamic hybrid routing adopted create shortest path between nodes reducing consumption...

10.1109/cse-euc.2017.144 article EN 2017-07-01

Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...

10.1109/glocomw.2017.8269218 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2017-12-01

The increase in wind power penetration has weakened the equivalent inertia of system, posing a significant challenge to frequency stability. In this paper, trajectory planning (FTP)-based regulation (FR) strategy is proposed for permanent magnet synchronous generator-based turbines equipped with an energy storage system (ESS) on DC link. core idea that index provided by grid code used plan safe when fluctuates. FR ESS controlled tracking planned compensate unbalanced provide support, and...

10.23919/cjee.2022.000014 article EN cc-by Chinese Journal of Electrical Engineering 2022-06-01

Abstract The authors study the energy efficiency (EE) of ambient backscatter communication (AmBC) device‐assisted and reconfigurable intelligent surfaces (RIS)‐assisted non‐orthogonal multiple access (NOMA) downlinks. establish two optimisation problems based on collaborative devices (AmBC devices, RIS) with objective maximising EE system, taking into account requirements power limitation rate limitation, etc. also obtain solutions by optimising relevant performance metrics alternating...

10.1049/rsn2.12584 article EN cc-by IET Radar Sonar & Navigation 2024-05-22

Multi-region geocast, an efficient technique for routing protocols at the network layer, realizes delivery of different information to user groups that are differentiated from each other by their geographical locations. This paper studies multi-region geocast physical layer first time exploiting non- orthogonal multiple access (NOMA) which is one promising technologies future 5G systems. We investigate physical-layer studying its beamforming design in a multiple-input single-output (MISO)...

10.1109/wcnc.2017.7925858 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2017-03-01

In this paper, we investigate physical-layer security in a wireless ad hoc network which large number of legitimate transmitter-receiver pairs coexist with randomly distributed eavesdroppers; each receiver works either half-duplex (HD) or full-duplex (FD) mode. We aim to increase the secure links per unit area interest by determining allocation between HD- and FD-mode links. use tools from stochastic geometry theory analyze connection outage probability secrecy for an arbitrary link deriving...

10.1109/icc.2017.7996859 article EN 2017-05-01
Coming Soon ...