Long Yu

ORCID: 0000-0002-8298-7165
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Advanced Wireless Communication Techniques
  • Wireless Communication Networks Research
  • Mobile Ad Hoc Networks
  • Power Line Communications and Noise
  • Blind Source Separation Techniques
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Wireless Signal Modulation Classification
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Wireless Network Optimization
  • Wireless Networks and Protocols
  • Distributed Control Multi-Agent Systems
  • Chaos control and synchronization
  • Digital Media Forensic Detection
  • Technology and Security Systems
  • Advanced MIMO Systems Optimization
  • Automated Road and Building Extraction
  • Evaluation Methods in Various Fields
  • Advanced Bandit Algorithms Research
  • Opportunistic and Delay-Tolerant Networks
  • Anomaly Detection Techniques and Applications
  • Smart Grid and Power Systems
  • Millimeter-Wave Propagation and Modeling
  • Energy Load and Power Forecasting

National University of Defense Technology
2018-2024

PLA Army Engineering University
2014-2018

Shanghai Jiao Tong University
2013

University of Electronic Science and Technology of China
2011

In this paper, we investigate the anti-jamming channel selection problem for interference mitigation (IM) based dense wireless networks in dynamic environment, which active user set is variable due to their specific traffic demands. We jointly consider mutual among users and external jamming IM-based networks, propose a generalized maximum protocol model accurately capture jamming. Then, formulated as an game, subsequently it proved be exact potential has at least one pure strategy Nash...

10.1109/tvt.2018.2889336 article EN IEEE Transactions on Vehicular Technology 2018-12-24

In this paper, we investigate the anti-jamming problem in heterogeneous wireless networks. Although there are many studies on defense both power domain and spectrum domain, these two important aspects were addressed separately. to cope with jamming attacks flexibly, study from a multi-domain perspective, which includes scheme (MDAS) is proposed. To be more specific, Stackelberg game formulated fight against attacks, multi-armed bandit-based channel selection switching cost unknown...

10.1109/access.2018.2850879 article EN cc-by-nc-nd IEEE Access 2018-01-01

Spectrum prediction is a promising technology to infer unknown/unmeasured spectrum state from known/measured data, by exploiting the inherent correlations among them. This paper investigates spectral-temporal two-dimensional perspective, with primary objective improve performance jointly in both time and frequency domains. Moreover, practical constraint also considered that historical observations could be highly incomplete, due hardware limitations and/or transmission loss. To tackle these...

10.1109/globalsip.2014.7032338 article EN 2014-12-01

Long Term Evolution (LTE) describes the standardization work by Third Generation Partnership Project (3GPP) to define a new high-speed radio access method for mobile communications systems. Rate Matching (RM) is an essential component in adaptive coding rate system and has great impact on error correcting performance turbo code 3GPP LTE. In this paper, we propose efficient RM algorithm based circular buffer interlaced puncturing applying LTE system. More specifically, both system-parity...

10.1109/cmc.2011.93 article EN 2011-04-01

WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access the Internet, and will be an essential part of future network through being integrated with 5G cellular networks. However, security threats are still a big concern for due open share nature medium easy-access intrusion tools. Therefore, it plays critical role identify experienced attacks applying further handling methods. existing detection methods based on traditional machine learning technique...

10.1109/iccc51575.2020.9345293 article EN 2020-12-11

In spite of unique advantages like higher recognition accuracy and better generalization capability, automatic modulation classification (AMC)-oriented deep neural networks (ADNNs) are still vulnerable to adversarial examples (AEs). Recent results revealed that an attacker can easily fool ADNNs through adding a small imperceptible perturbation the original signal. Among different AE generation methods, universal (UAP) has characteristics, including input agnostic shift invariance. However,...

10.1109/jiot.2023.3254648 article EN IEEE Internet of Things Journal 2023-03-14

In this paper, we investigate the frequency hit avoidance problem in distributed hopping multiple access (FHMA) networks, which each user intends to avoid with others by choosing appropriate set and sequence. First, define network degree as metric for hits, formulate an optimization of degree. Second, a non-cooperative game model solve problem, prove is exact potential game, illustrates that Nash equilibria (NE) point optimal solution problem. Finally, propose fragment-based (FDHA) learning...

10.1109/access.2017.2774812 article EN cc-by-nc-nd IEEE Access 2017-01-01

Precise path loss models play a crucial role in design and optimization of wireless communication systems, requiring careful balance between accuracy efficiency. Deep learning presents promising approach for improving both aspects. This letter proposes novel that uses satellite images to construct comprehensive dataset with rich environmental information. By incorporating features into convolutional-neural-network-based model, the prediction is significantly enhanced. Comparisons validation...

10.1109/lawp.2023.3321037 article EN IEEE Antennas and Wireless Propagation Letters 2023-10-02

Frequency hopping (FH) communication signal is usually statistically independent from common jamming signals. Blind source separation (BSS) or component analysis (ICA) can be introduced to separate the useful FH Through separation, signals are suppressed and quality of object improved. However, BSS suffered inherent permutation ambiguity, which makes it difficult select multiple separated According frequency spectrum characteristics signal, a time-frequency (TF) information based method for...

10.1109/iccsn52437.2021.9463637 article EN 2021-06-04

A novel hybrid spread spectrum system is introduced in this paper, which increases the efficiency by using scheme combining conventional M1-ary orthogonal with M2-ary phase shift keying. The antijamming performance of new analyzed and compared DS/FH system. simulation results illustrate that can provide more anti-jamming abilities than same efficiency.

10.1016/j.proeng.2012.01.135 article EN Procedia Engineering 2012-01-01

Reinforcement Learning (RL) has been employed to assign transmission parameters all sub-carriers in a set frequency band for anti-jamming Orthogonal Frequency Division Multiplexing (OFDM) systems. However, prior works often overlooked the influence of wireless environment fading and convergence issues stemming from overly large parameter sets. To address these challenges, an scheme was proposed based on Non-Contiguous (NC-OFDM) communication system integrated with reinforcement learning....

10.3390/electronics12214418 article EN Electronics 2023-10-26

Neighbor discovery is a prerequisite to establish self-organizing IoT networks. devices are mostly energy-limited, so neighbor usually implemented in duty-cycled manner. A fundamental problem of optimizing energy efficiency minimize latency for given duty cycle. We investigate purely interval (PI)-based that adopts pseudo-random delay avoid blocking problem, which also adopted by advertising mode Bluetooth low (BLE). In this article, we proposed an additional scan windows-based assisted...

10.1109/jiot.2023.3341792 article EN IEEE Internet of Things Journal 2023-12-12

High-level synthesis entails application of a sequence transformations to compile high-level description hardware design (e.g., in C/C++/SystemC) into register-transfer level (RTL) implementation. However, an error may exist the RTL implementation from compiler due complex and prone compiling process. Global common subexpression elimination (GCSE) is commonly used code motion technique scheduling synthesis. In this paper, we present equivalence checking method verify GCSE by enhancing path...

10.1109/codesisss51650.2020.9244039 article EN 2020-09-20

This paper introduces an adaptive hybrid SFH/TSS/DPSK spread spectrum system with separated interference detector. The basic working principles and architecture of the are explained. theoretic BER (bit error rate) is estimated compared to classic DS/BPSK in presence interference. Simulation results show that anti-jamming capability better than DSSS environment concerned.

10.1109/hpcc.and.euc.2013.41 article EN 2013-11-01
Coming Soon ...