Bin Dai

ORCID: 0000-0002-7893-6218
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Cellular Automata and Applications
  • Advanced MIMO Systems Optimization
  • Error Correcting Code Techniques
  • Chaos-based Image/Signal Encryption
  • Energy Harvesting in Wireless Networks
  • Advanced Wireless Communication Technologies
  • Coding theory and cryptography
  • DNA and Biological Computing
  • Advanced Wireless Communication Techniques
  • Privacy-Preserving Technologies in Data
  • Distributed Sensor Networks and Detection Algorithms
  • graph theory and CDMA systems
  • Energy Efficient Wireless Sensor Networks
  • Cryptographic Implementations and Security
  • Wireless Signal Modulation Classification
  • Security in Wireless Sensor Networks
  • Full-Duplex Wireless Communications
  • Wireless Body Area Networks
  • Cryptography and Data Security
  • Electromagnetic Compatibility and Noise Suppression
  • Blind Source Separation Techniques
  • Advanced DC-DC Converters
  • Advanced Computational Techniques and Applications

Xiamen University of Technology
2025

Southwest Jiaotong University
2015-2024

Guizhou University
2024

Peng Cheng Laboratory
2021-2023

Peking University
2021-2023

Xidian University
1990-2022

Southeast University
2015-2021

KTH Royal Institute of Technology
2019

Chengdu Medical College
2019

South China University of Technology
2019

The performance of active disturbance rejection control (ADRC) algorithms can be limited in practice by high-frequency measurement noise. In this article, problem is addressed transforming the high-gain extended state observer (ESO), which inherent element ADRC, into a new cascade structure. Set experiments, performed on dc–dc buck power converter system, show that ESO design, compared to conventional approach, effectively suppresses detrimental effect sensor noise overamplification while...

10.1109/tie.2021.3055187 article EN IEEE Transactions on Industrial Electronics 2021-02-03

Connectivity restoration plays an important role in maintaining the long-term operation wireless sensor networks (WSNs), especially, environment-harsh cases. However, current solutions lack ability to handle second damages and capacity of designing requirement-different connectivity approaches according different needs. In this article, we propose a durability-based establishment (DBCE) scheme for disjoint segments WSNs. This includes three regarding segment evaluation or selection: 1) shape...

10.1109/jiot.2019.2953476 article EN IEEE Internet of Things Journal 2019-11-15

The finite-state Markov channel (FSMC), where the transition probability is controlled by a state undergoing process, useful model for mobile wireless communication channel. In this paper, we investigate security issue in systems considering FSMC with an eavesdropper, which call wiretap (FSM-WC). We assume that perfectly known legitimate receiver and through noiseless feedback channel, sends his received output back to transmitter after some time delay. Inner outer bounds on...

10.1109/tifs.2016.2636085 article EN IEEE Transactions on Information Forensics and Security 2016-12-06

Mobile-edge nodes, as an efficient approach to the performance improvement of wireless sensor networks (WSNs), play important role in edge computing. However, existing works only focus on connected and suffer from high calculational costs. In this article, we propose a rendezvous selection strategy for data collection disjoint WSNs with mobile-edge nodes. The goal is achieve full network connectivity minimize path length. From perspective application scenario, article distinctive two...

10.1109/jiot.2020.2973401 article EN IEEE Internet of Things Journal 2020-02-12

Ultra-reliable low-latency communication (URLLC) and reconfigurable intelligent surface (RIS) aided are two key technologies in future wireless communications. However, secure URLLC over RIS-adied channels receives little attention the literature. In this paper, we propose finite blocklength (FBL) coding schemes for RIS SISO/SIMO/MIMO systems presence of an eavesdropper (no direct link between transceiver), which based on existing scheme point-to-point white Gaussian channel with noiseless...

10.1109/tcomm.2023.3256418 article EN IEEE Transactions on Communications 2023-03-13

The model of wiretap channel (WTC) is important as it constitutes the essence physical layer security. Recently, has been shown that a noiseless feedback from legitimate receiver to transmitter helps increase secrecy capacity WTC. However, present strategy focuses only on generating key signal and using this protect part transmitted message. This secret key-based proved be optimal for some degraded cases. In paper, we propose new WTC, where not used generate but also cooperative information...

10.1109/tifs.2018.2849978 article EN IEEE Transactions on Information Forensics and Security 2018-06-25

We investigate the state-dependent Gaussian wiretap channel with noncausal state information at transmitter (GWTC-N-CSIT), and explore whether three strategies (i.e., taking action on state, legitimate receiver's output feedback, combining former two together) help to enhance secrecy capacity of GWTC-N-CSIT. To be specific, we first determine GWTC-N-CSIT noiseless feedback. Next, derive lower upper bounds action-dependent state. Finally, both show that these meet for a special case....

10.1109/tit.2020.2967757 article EN publisher-specific-oa IEEE Transactions on Information Theory 2020-01-21

It has been shown that when federated learning (FL) is implemented in wireless communication systems, the noise of channel directly serves as a privacy-inducing mechanism, which indicates un-coded transmission can achieve privacy "for free" However, due to broadcast nature communication, FL susceptible eavesdropping, and different from requirement (to preserve accuracy data analysis, information leakage allowed mechanisms), physical layer security (PLS) caused by eavesdropper should vanish,...

10.1109/infocomwkshps54753.2022.9797923 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022-05-02

In this paper, we investigate the state-dependent degraded broadcast channels with confidential messages (SD-DBC-CM), and or without noiseless feedback. new model, channel state is available at transmitter in a noncausal causal manner, there may exist feedback link from nondegraded receiver to transmitter. For discrete memoryless SD-DBC-CM, inner outer bounds on capacity-equivocation regions are provided for both cases. SD-DBC-CM feedback, region case, determined case. The results of paper...

10.1109/tifs.2015.2419182 article EN IEEE Transactions on Information Forensics and Security 2015-04-03

Recently, it has been shown that the time-varying multiple-access channel (MAC) with perfect state information (CSI) at receiver and delayed feedback CSI transmitters can be modeled as finite MAC (FS-MAC) feedback, where time variation of is characterized by statistics underlying process. To study fundamental limit secure transmission over multi-user wireless communication systems, we re-visit FS-MAC considering an external eavesdropper, which call wiretap (FS-MAC-WT) feedback. The main...

10.1109/jsac.2018.2824938 article EN IEEE Journal on Selected Areas in Communications 2018-04-01

In this paper, we investigate the effects of an additional trusted relay node on secrecy multiple-access wiretap channel (MAC-WT) by considering model (MARC-WT). More specifically, first, discrete memoryless MARC-WT. Three inner bounds (with respect to decode-forward (DF), noise-forward (NF) and compress-forward (CF) strategies) capacity region are provided. Second, degraded MARC-WT, present outer bound model. Finally, Gaussian find that NF CF strategies help enhance Tekin-Yener's achievable...

10.1109/tifs.2015.2431992 article EN IEEE Transactions on Information Forensics and Security 2015-05-12

In this paper, we investigate the effects of a trusted relay node on secrecy broadcast channel by considering model with confidential messages (RBC-CM). Inner and outer bounds capacity-equivocation region RBC-CM are provided, capacity results further explained via degraded Gaussian example, which call one common messages. Numerical show that helps to enhance security

10.1109/tifs.2015.2503259 article EN IEEE Transactions on Information Forensics and Security 2015-11-23

In this article, a general framework for enhancing the physical layer security (PLS) in Internet of Things (IoT) systems via channel feedback is established. To be specific, first, we study compound wiretap (WTC) with feedback, which can viewed as an ideal model PLS downlink transmission IoT feedback. A novel strategy proposed and corresponding lower bound on secrecy capacity constructed model. Next, generalize (i.e., WTC feedback) by considering states delay, generalized called finite state...

10.1109/jiot.2019.2945503 article EN IEEE Internet of Things Journal 2019-10-03

The wireless hierarchical federated learning (HFL) in the presence of physical layer security (PLS) issue is revisited. Though a framework this problem has been established previous work, practical coding scheme for HFL system remains unknown. In paper, we extend already existing feedback white Gaussian channel to with quasi-static fading duplex channel, and derive achievable rate upper bound on eavesdropper's uncertainty proposed scheme. Finally, results paper are further explained via...

10.1109/infocomwkshps57453.2023.10226140 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2023-05-20

It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for Gaussian wiretap channel, i.e., not only achieves capacity of but also secure itself secrecy channel. For multi-user channels, very recently, it Ozarow's two-user multiple-access channel (GMAC) SSCA (GMAC-WT). In this paper, first, we propose GMAC-WT with degraded message sets (GMAC-WT-DMS). Next, extend above to GMAC-WT-DMS noncausal state...

10.1109/tifs.2022.3164196 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2022-01-01

A naphthalene group was incorporated into the polymer side chain to help active layer spontaneously form good film morphology.

10.1039/c5tc01142f article EN Journal of Materials Chemistry C 2015-01-01

The relative generalized Hamming weight (RGHW) of a linear code and subcode, two-code extension (GHW), has been applied to the wiretap channel type II. concept also extended in network II for secrecy control coding. In trellis-based decoding algorithms, given subcode provides additional information measure complexity. Bounds on RGHW facilitate design optimal schemes above applications. only known explicit bound was Singleton bound. this paper, we show some important inequalities with respect...

10.1109/icct.2011.6158023 article EN 2011-09-01

In this paper, we re-visit the relay broadcast channel with confidential messages (RBC-CM) by considering a compress-and-forward (CF) inner bound on capacity-equivocation region of RBC-CM. This CF is further explained via degraded Gaussian example, and show that in some particular cases, strategy performs better than decode-and-forward (DF) noise-and-forward (NF) strategies.

10.1109/iccw.2016.7503796 article EN 2016-05-01

The development of GPU has launched a huge challenge to the current traditional computing architecture. In recent years, CPUs have developed from single-core multi-core make up for shortcomings that are not good at large-scale calculations. How balance computational load multiple become an urgent problem in academic community years. This paper uses BP neural network predict weight smooth weighted round-robin algorithm by extracting characteristics computer system and task graph...

10.1109/icisfall51598.2021.9627422 article EN 2021-10-13
Coming Soon ...