- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Techniques
- Error Correcting Code Techniques
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Antenna Design and Analysis
- Indoor and Outdoor Localization Technologies
- Wireless Signal Modulation Classification
- Energy Harvesting in Wireless Networks
- Wireless Communication Networks Research
- Full-Duplex Wireless Communications
- Age of Information Optimization
- IoT Networks and Protocols
- Fractal and DNA sequence analysis
- Anomaly Detection Techniques and Applications
- Video Surveillance and Tracking Methods
- Ocular Disorders and Treatments
- IoT and Edge/Fog Computing
- Advanced Photonic Communication Systems
- Blind Source Separation Techniques
- Distributed Sensor Networks and Detection Algorithms
- Millimeter-Wave Propagation and Modeling
- Blockchain Technology Applications and Security
- CCD and CMOS Imaging Sensors
Xi'an Jiaotong University
2013-2024
Fudan University
2021-2024
Institute of Plasma Physics
2015
Pilot spoofing attack is a serious threat to timedivision duplex (TDD) orthogonal frequency division multiplexing (TDD-OFDM) system. By employing identical pilot tones as legitimate receiver, an adversary can contaminate the uplink channel estimation between transceiver pair. To solve this problem, we in paper propose independent component analysis (ICA) based and identification mechanism with subcarrier-block discriminating coding (SBDC) technique (ICA-SBDC). Firstly, receiver randomizes...
The three articles in this special section focus are devoted to sharing state-of-the-art research on private blockchain industrial IoT (Internet of Things). A is a decentralized and distributed ledger with chain network blocks recording historical transactions. transaction record action. inside the block will be of: sensing/saving data, assembling parts, depositing money, processing business deal, ordering/ delivering product part, notarizing paperwork, so on. Blockchains categorized into...
Age of information (AoI) is a powerful metric to evaluate the freshness information, where minimization average statistics, such as AoI and peak AoI, currently prevails in guiding optimization for related applications. Although minimizing statistics does improve received information's status update systems sense average, time-varying fading characteristics wireless channels often cause uncertain yet frequent age violations. The recently-proposed statistical can better characterize more...
In recent years, many approaches have been introduced in next generation (5G) wireless cellular networks response to the demands for higher data rates and broader coverage. this paper, a novel downlink three-dimensional (3D) beamforming scheme is proposed 5G multiuser multiple-input multiple-output (MU-MIMO) system. This separates beams so-called elevation domain via base station (BS) antenna tilt assignment, with objective of reducing inter-user interference. The key controlling vertical...
As drones become increasingly prevalent in human life, they also raise security concerns such as unauthorized access and control, well collisions interference with manned aircraft. Therefore, ensuring the ability to accurately detect identify between different holds significant implications for coverage extension. Assisted by machine learning, radio frequency (RF) detection can recognize type flight mode of based on sampled drone signals. In this paper, we first utilize Short-Time Fourier...
To achieve spatial diversity and improve the average bit error probability (ABEP) of Generalized Space Shift Keying (GSSK) in Multiple-Input Multiple-Output (MIMO) channels with low feedback overhead computational complexity, we propose a three-step adaptive precoding strategy for single-user GSSK (SU-GSSK) transmission by exploiting channel state information at transmitter (CSIT). First, norm based reference receive antenna selection is conducted to maximize gain. Second, active transmit...
The conventional depth-first sphere decoder (DF-SD) and breadth-first K-Best algorithm for MIMO detection are subject to unstable output throughput error-rate degradation, respectively, over ill- conditioned channels. These problems become more serious in high-order systems with antennas larger constellation size. In this paper, we propose a condition-number driven overcome these problems. Specifically, first apply Winner-Path Enumeration (WPE) method on high layers of the tree guarantee...
The K-best detection algorithm with its diverse variations, which belong to a typical breadth-first type of quasi maximum-likelihood (ML) algorithms, have been close implementation in realistic communications systems for excellent bit error rate (BER) performance reasonable computational complexity. However, when high-order modulation schemes are employed, the complexity MIMO remains drastically high. In this paper, we propose an adaptive low-complexity constellation-reduction aided using...
With the development of communication systems, MIMO order low-cost equipments have also increased. However, classical algorithms either too high computational complexity or poor performance. Some existing deep learning-based detection networks achieved excellent results in high-order MIMO, but they unbearable performance low-order MIMO. Based on idea dividing sample space, we propose MLNet. Compared with Det Net and MMNet, MLNet has made a huge leap time-varying channels. At same time, four...
In recent years, the machine learning assisted communication system design has drawn a lot of attentions. As remarkable progress, work proposed to incorporate neural network (NN) into traditional algorithms for symbol detection under intersymbol interference (ISI), e.g. Viterbi algorithm and BCJR algorithm, achieve robustness against channel estimation errors. This paper presents an improved over state-of-the-art by using approximate likelihood received sample given different state...
This paper considers countermeasure technology of satellite passive location system based on TDOA measurement. Considering that measurement is the principle time difference estimation emitter signal received by different receivers, a same form spread spectrum signals with delay emitted two antennas in proposed. The center vectors point to directions, which makes power ratios satellites different. Then, compares theoretical derivation between traditional method and dual-antenna time-delay...
This paper focuses on the distributed intelligent reflecting surface (IRS) assisted legitimate monitoring system to improve availability of nodes, so that monitors (LMs) can stably and sustainably conduct covert both sides suspicious communication. Our active scheme is consistent with conventional dual-stage transmissions between transmitter (ST) receiver (SR). Firstly, in process SR sending pilot ST (PT stage), LMs control phase shifts IRSs reflect signal sent by for spoofing, resulting...
This paper studies machine learning-assisted optimal receivers for a communication system with memory, which can be modelled by trellis diagram. The prerequisite of the receiver is to obtain likelihoods received samples under different state transitions. We propose learn diagram real-time using an artificial neural network (ANN) trained pilot sequence. approach, termed as online learning (OLTD), requires neither channel information (CSI) nor statistics noise, and incorporated into classic...