Weiyu Chen

ORCID: 0000-0002-9552-7221
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Advanced MIMO Systems Optimization
  • Antenna Design and Analysis
  • Cooperative Communication and Network Coding
  • Full-Duplex Wireless Communications
  • Adaptive Control of Nonlinear Systems
  • Guidance and Control Systems
  • UAV Applications and Optimization
  • Neural Networks and Applications
  • Advanced Control Systems Design
  • Inertial Sensor and Navigation
  • Advanced Antenna and Metasurface Technologies
  • Electric Motor Design and Analysis
  • Ocular Disorders and Treatments
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Iterative Learning Control Systems
  • Sensorless Control of Electric Motors
  • Wireless Signal Modulation Classification
  • RFID technology advancements

National University of Defense Technology
2019-2025

Innovation Team (China)
2023

China Academy of Space Technology
2014

Tatung University
2009

In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea to the surplus power of received signals at one user enhance reception who cannot recover its information. To evaluate performance BC-NOMA scheme, three benchmark schemes are introduced, which include non-cooperation (NC)-NOMA conventional relaying (CR)-NOMA and incremental (IR)-NOMA scheme. For all these schemes, outage performance, expected rate,...

10.1109/twc.2021.3050600 article EN IEEE Transactions on Wireless Communications 2021-02-25

This letter investigates the limit covert rate of ambient backscatter communications over additive white Gaussian noise channel, where Alice expects to reliably transmit information Bob via reflecting incident signals from an radio frequency (RF) source without being detected by Willie. The RF is not dedicatedly deployed for communication and has its own data stream send. Our analyses show that subject well-known square root law (i.e., <inline-formula...

10.1109/lwc.2021.3126707 article EN IEEE Wireless Communications Letters 2021-11-09

In this letter, a reconfigurable intelligent surface (RIS)-based passive covert communication scheme is proposed, where source node Alice covertly transmits information to receiver Bob by using RIS and reflecting the incident signals from an ambient radio frequency source. The key idea adjust phase shifts of align phases received reflected at meanwhile reflection amplitude satisfy constraint. detection error probability warden Willie decoding in Rayleigh fading channels are derived...

10.1109/lwc.2022.3206229 article EN IEEE Wireless Communications Letters 2022-09-13

This paper proposes a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) segmented symbiotic ambient backscatter system. The elements of the STAR-RIS are into an enhancing primary-signal (EP) zone backscatter-device (BD) zone, which adjusted to enhance receivers' reception primary signal from S convey STAR-RIS's information, respectively. With aid proposed Max-Min rule, optimal reflection coefficients achieve maximum sum ergodic capacity derived. A...

10.1109/lwc.2024.3370778 article EN IEEE Wireless Communications Letters 2024-02-27

This paper investigates the limit covert rate of backscatter communication systems based on undecodable ambient radio frequency (RF) signals over additive white Gaussian noise channel. In considered network, source node Alice expects to transmit information receiver Bob without being detected by warden Willie, backscattering RF signals. this case, it is challenging for recover from Alice, since result in both unknown and multiplicative interference. A subtle strategy proposed alleviate...

10.1109/tifs.2023.3293420 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

In this paper, an impartial simultaneous wireless information and power transfer (SWIPT)-assisted cooperation mechanism is proposed for a non-orthogonal multiple access (NOMA) downlink scenario. The key idea of the user (IUCM) that not only cell-center but also cell-edge applies power-splitting architecture utilizes harvested energy to forward other user's information. Analytical results show IUCM outperforms traditional partial in terms outage probability, diversity order...

10.1109/twc.2020.2972864 article EN IEEE Transactions on Wireless Communications 2020-02-18

In this paper, to perform an energy-efficient and high-throughput time-switching (TS)-based energy-harvesting (EH) relaying in a practical block-by-block manner, adaptive discrete TS-based EH scheme is proposed. Specifically, focusing on both dual-hop amplify-and-forward (AF) decode-and-forward (DF) systems, we make full use of the channel state information (CSI) at relay determine power as well TS factor based relay's current accumulated energy. For such, effective analytical framework...

10.1109/tvt.2019.2943364 article EN IEEE Transactions on Vehicular Technology 2019-09-24

ABSTRACT Existing research in the field of reconfigurable intelligent surface (RIS)‐aided physical layer security assumed Gaussian signal inputs, which is inapplicable to practical communication systems, where finite‐alphabet inputs are used. This paper considers an RIS‐aided secure multiple‐input multiple‐output wireless system with artificial noise (AN) invoked at transmitter enhance performance. In order maximize secrecy rate (SR), data precoder, AN and RIS's reflection coefficients...

10.1002/ett.70029 article EN Transactions on Emerging Telecommunications Technologies 2024-11-29

In this paper, a robust adaptive fuzzy control for class of nonlinear uncertain systems preceded by an unknown dead-zone and with upper bound uncertainties is developed. The dead-zones are quite commonly encountered in many (e.g., DC servosystem, robot, machine tools), usually poorly known, may severely limit the performance control. addition, system parameter variations, or external load, unmodeled dynamics) often exist. Therefore, controllers required to deal stability presence...

10.1109/fuzzy.2009.5277337 article EN IEEE International Conference on Fuzzy Systems 2009-08-01

Uncertainty about noise variance is unavoidable. Many existing works exploited the uncertainty for covert communication and meanwhile assumed that adversary third party Willie adopts a radiometer detector, in which case positive reliable rate O(N) bits/N channel uses achievable. Nonetheless, not optimal general. The limit based on against detector remains unknown. To shed light this problem, letter proves when suffers from but has two or more antennas detection, over additive white Gaussian...

10.1109/lwc.2023.3323764 article EN IEEE Wireless Communications Letters 2023-10-11

In this paper, we propose an impartial simultaneous wireless information and power transfer (SWIPT)-assisted cooperation mechanism for a non-orthogonal multiple access (NOMA) downlink scenario. Specifically, both cell-center user cell-edge apply the power-splitting technique utilize harvested energy to forward other user's on premise of successful decoding their own information. Both analytical numerical results show that proposed (IUCM) outperforms traditional partial in terms outage...

10.48550/arxiv.1910.00244 preprint EN other-oa arXiv (Cornell University) 2019-01-01

A reconfigurable intelligent surface (RIS)-based passive secure communication scheme is proposed, where the RIS uses part of power incident signals from an ambient radio frequency source to transmit its own confidential information, and remaining used passively generate jamming confuse eavesdropper. Each RIS’s reflection coefficient responsible for both jamming. The coefficients are jointly optimized maximize secrecy rate (SR). Numerical results show that proposed algorithm can approach...

10.1109/lcomm.2022.3215712 article EN IEEE Communications Letters 2022-11-03
Coming Soon ...