- Wireless Communication Security Techniques
- Full-Duplex Wireless Communications
- Energy Harvesting in Wireless Networks
- Electrostatic Discharge in Electronics
- Advanced Wireless Communication Technologies
- Microwave Engineering and Waveguides
- Radar Systems and Signal Processing
- Semiconductor materials and devices
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Advancements in Semiconductor Devices and Circuit Design
- Human Pose and Action Recognition
- Air Quality and Health Impacts
- Advanced Vision and Imaging
- Climate Change and Health Impacts
- Video Surveillance and Tracking Methods
- Simulation and Modeling Applications
- Electromagnetic Compatibility and Noise Suppression
- Wireless Signal Modulation Classification
- Industrial Technology and Control Systems
- QR Code Applications and Technologies
- Optical Wireless Communication Technologies
- RFID technology advancements
- Brain Tumor Detection and Classification
- Physical Unclonable Functions (PUFs) and Hardware Security
Jilin Medical University
2025
Jilin University
2025
Henan University
2011-2024
Qingdao University of Science and Technology
2024
Zhengzhou Normal University
2023
Chongqing University
2019-2022
Guangdong Medical College
2019
Beijing Institute of Technology
2014-2019
Nanyang Normal University
2019
North Carolina Central University
2019
The simultaneous wireless information and power transfer (SWIPT) has recently attracted much attention since both energy are integrated within radio frequency signals, which is considered to be one of the most important technologies for future networks. However, security becomes critical issues in SWIPT networks due its broadcasting features over media transferring requirements strong signal strength. To improve networks, this paper, a system enabled by full-duplex (FD) jamming proposed,...
We report systematic transient characterization of a graphene ribbon (GR) used as an interconnect for electrostatic discharge (ESD) protection future integrated circuits. A large set GR wires (around 6000) with varying and practical dimensions were fabricated using the chemical vapor deposition method characterized by transmission line pulsing (TLP) very fast TLP (VFTLP) measurements. Comprehensive VFTLP testing pulse rise time ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML"...
This paper reports new mechanisms, design, and analysis of novel electrostatic discharge (ESD) protection solutions, which enable post-Si field-programmable ESD circuit design for the first time. Two concepts, nano-crystal quantum-dot (NC-QD) silicon–oxide–nitride–oxide–silicon (SONOS)-based protection, are presented. Experiments validated two programmable mechanisms. Prototype designs demonstrated a wide adjustable triggering voltage <formula formulatype="inline"...
The issues of the physical layer security are studied, where one transmitter (Alice), full‐duplex (FD) legitimate receiver (Bob) and multi‐antenna jammer (Charlie) considered to defend against multiple passive non‐colluding eavesdroppers (Eves), for multiple‐input multiple‐output wiretap channels. With assumption that complete channel state information (CSI) main channels statistical CSI Eves' available, an improved secrecy transmission design is proposed minimise outage probability (SOP),...
This paper reports a new behavioral modeling technique for HV diode and silicon controlled rectifier (SCR) based electrostatic discharge (ESD) protection structures using Verilog-A language. Accurate models were developed various ESD stacked SCR power clamp implemented in foundry BCD30V process, which validated by circuit simulation measurement.
This paper presents a new approach for environmental/economic transaction planning model of the electricity market. The problem is formulated as multi-objective optimal power flow (MOPF) problem. A novel algorithm using multiobjective particle swarm optimization (MOPSO) and non-stationary multi-stage assignment penalty function proposed to solve this PSO modified by dynamic neighborhood strategy, memory updating, one-dimension deal with multiple objectives. Incorporating multistage in...
Microstrip patch antenna has compact structure, low weight and easy to integrate good performance on polarization characteristic. It become an important part of research. But microstrip is rarely used in W band because its large loss port isolation. The design a dual-polarized for presented this paper. This 2×2 achieved stable radiation with gain greater than 13dB isolation more 20dB across the frequency range from 92GHz 94GHz. And range, VSWR can lower 2.
This paper reports a new scalable behavioral modeling technique for novel nano crossbar ESD protection structures using Verilog-A language. Accurate models with different sizes were developed, which validated by circuit level simulation and transmission line pulsing measurement.
Current Pose-Guided Person Image Synthesis (PGPIS) methods depend heavily on large amounts of labeled triplet data to train the generator in a supervised manner. However, they often falter when applied in-the-wild samples, primarily due distribution gap between training datasets and real-world test samples. While some researchers aim enhance model generalizability through sophisticated procedures, advanced architectures, or by creating more diverse datasets, we adopt test-time fine-tuning...
Abstract In this article, a land mobile satellite communication network with an external jammer to fight against the eavesdropper is investigated, where hardware impairments are introduced make analyses more practical. It worth noting that three jamming schemes, is, Gaussian noise jamming, friendly and scheme without taken into account explore effect of comprehensively. The secrecy metrics such as connectivity outage probability (COP), security probability, throughput (ST), derived for...
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and legitimate monitor over wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from dedicated power beacon then communicates with destination. Under this setup, relay-aided scheme is designed to improve surveillance performance of system. The closed-form expressions are derived under linear nonlinear EH models, including decoding outage...
Legitimate wireless surveillance plays an important and preventive role in protecting public safety. To promote the eavesdropping performance of systems, a proactive scheme with decode-and-forward relay is proposed, where intercepts suspicious information interferes receiver simultaneously. The closed-form expressions are derived, including decoding outage probability, average rate. maximize rate, transmit power location deployment at optimized. Specifically, result approximate optimal for...
Simultaneous wireless information and power transfer (SWIPT) is a promising technique for energy-constrained networks. To improve the security of SWIPT-enabled relay networks, in this paper, full-duplex (FD) destination-aided jamming strategy proposed, where splitting (PS) scheme considered two transmission phases are designed. In first phase, energy-limited half-duplex receives signal superposed by confidential artificial noise (AN) from source destination, respectively. And then FD...
Simultaneous wireless information and power transfer (SWIPT) is a major breakthrough in the field of low-power transmissions. In this paper, secrecy performance SWIPT-enabled relay network with full-duplex destination-aided jamming assessed, where both power-splitting (PS) time-switching (TS) schemes at are considered linear nonlinear energy harvesting models. The harvests from confidential signal artificial noise sent by source destination, respectively, forwards amplified to presence an...
This work investigates the security issue of energy-constrained untrusted relay network with imperfect channel reciprocity, where without built-in power supply can only scavenge energy from radio-frequency signals radiated by source and destination. A hybrid power-splitting (PS)- time-switching (TS)-based relaying (HPTR) protocol is presented to improve degraded secrecy performance due incomplete self-interference cancellation at To evaluate throughput (ST) studied system, analytical...
For decades, advances in integrated circuits (IC) have been driven by continuous scaling down of planar IC technologies. As rapidly approaches to technical brick wall, 3D heterogeneous integration emerges as a viable solution for future electronics. Future complex system-on-a-chip (SoC) requires high-performance active devices, and novel passive supporting devices. This paper reviews recent develop magnetic-enhanced inductors on-chip electrostatic discharging (ESD) structures achieve ICs...
For the intelligent reflecting surface (IRS) assisted sensing system, this letter investigates joint design problem of active and passive beamforming with imperfect channel state information (CSI). To begin with, beamformer is formulated as a stochastic optimization inner-layer variable (active vector) outer-layer (passive phase-shift matrix), subject to available transmit power constant modulus constraints. Then, utilizing equivalent reformulation preceding problem, we conceive successive...