Jie Tang

ORCID: 0000-0003-0619-0338
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Technologies
  • Advanced MIMO Systems Optimization
  • Energy Harvesting in Wireless Networks
  • UAV Applications and Optimization
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Medical Imaging Techniques and Applications
  • Antenna Design and Analysis
  • Advanced X-ray and CT Imaging
  • Millimeter-Wave Propagation and Modeling
  • Advanced Wireless Network Optimization
  • Full-Duplex Wireless Communications
  • Photonic and Optical Devices
  • Advanced MRI Techniques and Applications
  • Parallel Computing and Optimization Techniques
  • Advanced Antenna and Metasurface Technologies
  • Satellite Communication Systems
  • Optical Wireless Communication Technologies
  • Indoor and Outdoor Localization Technologies
  • Meningioma and schwannoma management
  • Radiation Dose and Imaging
  • Underwater Vehicles and Communication Systems
  • Sparse and Compressive Sensing Techniques
  • Advanced Vision and Imaging
  • Advanced Data Storage Technologies

South China University of Technology
2016-2025

Guangdong Polytechnic Normal University
2025

Jiangsu University
2020-2024

Nanjing Institute of Technology
2024

National Engineering Research Center of Electromagnetic Radiation Control Materials
2024

Zhejiang University
2022-2024

Chinese University of Hong Kong, Shenzhen
2022-2024

Capital Normal University
2023

Nanjing University
2005-2023

Xi'an Jiaotong University
2023

OpenAI Gym is a toolkit for reinforcement learning research. It includes growing collection of benchmark problems that expose common interface, and website where people can share their results compare the performance algorithms. This whitepaper discusses components design decisions went into software.

10.48550/arxiv.1606.01540 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Reliable and flexible emergency communication is a key challenge for search rescue in the event of disasters, especially case when base stations are no longer functioning. Unmanned aerial vehicle (UAV)-assisted networking emerging as promising method to establish networks. In this article, unified framework UAV-assisted network established disasters. First, trajectory scheduling UAVs jointly optimized provide wireless service ground devices with surviving BSs. Then transceiver design UAV...

10.1109/mwc.2018.1800160 article EN IEEE Wireless Communications 2019-02-01

The purpose of this study was to report preliminary results an ongoing prospective trial ultralow-dose abdominal MDCT.

10.2214/ajr.12.9382 article EN American Journal of Roentgenology 2012-11-20

Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via wireless backhaul to improve coverage and increase rate. However, the capacity of is limited. In this paper, UAV assisted secure transmission for scalable videos in hyper-dense networks caching studied. proposed scheme, UAVs act as SBSs provide mobile users some small cells. To reduce pressure backhaul, are both equipped with caches store at off-peak time. facilitate UAVs, a single antenna each thus,...

10.1109/tcomm.2018.2792014 article EN IEEE Transactions on Communications 2018-01-11

Of all available reconstruction methods, statistical iterative algorithms appear particularly promising since they enable accurate physical noise modeling. The newly developed compressive sampling/compressed sensing (CS) algorithm has shown the potential to accurately reconstruct images from highly undersampled data. CS can be implemented in framework as well. In this study, we compared performance of two standard (penalized weighted least squares and q-GGMRF) algorithm. assessing image...

10.1088/0031-9155/54/19/008 article EN Physics in Medicine and Biology 2009-09-09

We propose a consumption scheduling mechanism for home area load management in smart grid using integer linear programming (ILP) technique. The aim of the proposed is to minimise peak hourly order achieve an optimal (balanced) daily schedule. able schedule both power and operation time power-shiftable appliances time-shiftable respectively according patterns all individual appliances. Simulation results based on neighbourhood scenarios have been presented demonstrate effectiveness

10.1109/isgt.2012.6175785 article EN 2012-01-01

Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which achieve significant throughput gain owing its mobility and line-of-sight (LoS) channel ground nodes. However, such LoS channels make UAV transmission easy eavesdrop. In this paper, we propose novel scheme guarantee the security of UAV-relayed wireless networks caching via jointly optimizing trajectory time scheduling. For every two users that have cached required file for other, broadcasts...

10.1109/tcomm.2019.2895088 article EN IEEE Transactions on Communications 2019-01-25

Thanks to their flexibility and mobility, unmanned aerial vehicles (UAVs) have been widely applied in wireless networks. However, UAV communications may suffer from blockage eavesdropping practical scenarios due the complex environment. Taking recent advances intelligent reflecting surface (IRS) reconfigure propagation environments, this article, we employ IRS enhance performance of UAV-aided air-ground First, overview combination IRS, by introducing diverse applications appealing advantages...

10.1109/mwc.010.2000528 article EN IEEE Wireless Communications 2021-10-01

Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible to eavesdropping due air-ground line-of-sight channels. Intelligent reflecting surface (IRS) is capable reconfiguring propagation environment, and thus an attractive solution for integrating with facilitate security in wireless networks. In this paper, we investigate secure transmission design IRS-assisted network presence eavesdropper. With aim at maximizing average secrecy rate, trajectory...

10.1109/tcomm.2021.3136563 article EN IEEE Transactions on Communications 2021-12-20

The combination of simultaneous wireless information and power transfer (SWIPT) non-orthogonal multiple access (NOMA) is a potential solution to improve spectral efficiency energy (EE) the upcoming fifth generation (5G) networks, especially in order support functionality Internet things (IoT) massive machine-type communications (mMTC) scenarios. In this paper, we investigate joint allocation time switching (TS) control for EE optimization TS-based SWIPT NOMA system. Our aim optimize system...

10.1109/jstsp.2019.2898114 article EN IEEE Journal of Selected Topics in Signal Processing 2019-02-07

Combination of unmanned aerial vehicle (UAV) and non-orthogonal multiple access (NOMA) is deemed as an promising solution to achieving massive connectivity in future wireless networks. In this paper, a UAV-aided NOMA scheme proposed achieve simultaneous information power transfer (SWIPT) guarantee the secure transmission for ground passive receivers (PRs), which nonlinear energy harvesting model applied. Each time frame divided into two phases. first phase, received at each PR maximized...

10.1109/tcomm.2020.2990994 article EN IEEE Transactions on Communications 2020-04-28

This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit devices in demand. During the hovering periods, works on full-duplex mode simultaneously collect data from target device and charge other within its coverage. Practical propulsion power consumption model non-linear energy harvesting are taken into account. We formulate multi-objective optimization problem jointly...

10.1109/tcomm.2021.3089476 article EN IEEE Transactions on Communications 2021-06-15

The intelligent reflecting surface (IRS)-assisted millimeter wave (mmWave) communication system has emerged as a promising technology for coverage extension and capacity enhancement. Prior works on IRS have mostly assumed perfect channel state information (CSI), which facilitates in deriving the upper-bound performance but is difficult to realize practice due passive elements of without signal processing capabilities. In this paper, we propose compressive estimation techniques IRS-assisted...

10.1109/twc.2021.3105405 article EN IEEE Transactions on Wireless Communications 2021-08-24

In this paper, we investigate the fundamental multiple access (MA) scheme in an active intelligent reflecting surface (IRS) aided energy-constrained Internet-of-Things (IoT) system, where IRS is deployed to assist uplink transmission from IoT devices point (AP). Our goal maximize sum throughput by optimizing beamforming vectors across time and resource allocation. To end, first study two typical MA schemes, namely division (TDMA) non-orthogonal (NOMA), analytically comparing their achievable...

10.1109/twc.2022.3206332 article EN IEEE Transactions on Wireless Communications 2022-09-20

Runtime and memory consumption are two important aspects for efficient image super-resolution (EISR) models to be deployed on resource-constrained devices. Recent advances in EISR [16], [32] exploit distillation aggregation strategies with plenty of channel split concatenation operations fully use limited hierarchical features. In contrast, sequential network avoid frequently accessing preceding states extra nodes, thus beneficial reducing the runtime overhead. Following this idea, we design...

10.1109/cvprw56347.2022.00101 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2022-06-01

Deep learning can enable Internet of Things (IoT) devices to interpret unstructured multimedia data and intelligently react both user environmental events but has demanding performance power requirements. The authors explore two ways successfully integrate deep with low-power IoT products.

10.1109/mc.2017.3641648 article EN Computer 2017-01-01

Spectral efficiency (SE) and energy (EE) are the main metrics for designing wireless networks. Rather than focusing on either SE or EE separately, recent works have focused relationship between provided good insight into joint EE-SE tradeoff. However, such assumed that bandwidth was fully occupied regardless of transmission requirements therefore only valid this type scenario. In paper, we propose a new paradigm tradeoff, namely resource (RE) orthogonal frequency division multiple access...

10.1109/twc.2014.2316791 article EN IEEE Transactions on Wireless Communications 2014-04-11

In this paper, we develop a non-orthogonal multiple access (NOMA)-based two-way relay network with secrecy considerations, in which two users wish to exchange their NOMA signals via trusted the presence of single and eavesdroppers. To ensure secure communications, not only forwards confidential information legitimate but also keeps emitting jamming all time degrade performance any potential eavesdropper. Moreover, equip each user full-duplex technique multiple-access phase combat...

10.1109/jsac.2018.2824624 article EN IEEE Journal on Selected Areas in Communications 2018-04-09

Purpose: To reduce radiation dose in CT imaging, the statistical model based iterative reconstruction (MBIR) method has been introduced for clinical use. Based on principle of MBIR and its nonlinear nature, noise performance is expected to be different from that well‐understood filtered backprojection (FBP) method. The purpose this work experimentally assess unique characteristics using a state‐of‐the‐art system. Methods: Three physical phantoms, including water cylinder two pediatric head...

10.1118/1.4867863 article EN Medical Physics 2014-03-13

Security is a challenging issue for cognitive radio (CR) to be used in future 5G mobile systems.Conventionally, interference will degrade the performance of primary user (PU) when spectrum shared with secondary users (SUs).However, properly designed, SUs can serve as friendly jammers guarantee secure transmission PU.Thus, this paper, we propose two schemes improve sum rate while guaranteeing secrecy PU.In first scheme, transceivers are jointly designed maximize their satisfying threshold on...

10.1109/jsac.2018.2824360 article EN IEEE Journal on Selected Areas in Communications 2018-04-01

Simultaneous wireless information and power transfer (SWIPT) multi-carrier non-orthogonal multiple access (MC-NOMA) are promising technologies for future fifth generation beyond networks due to their potential capabilities in energy-efficient spectrum-efficient system designs, respectively. In this paper, the joint downlink resource allocation problem a SWIPT-enabled MC-NOMA with time switching-based receivers is investigated, where pattern division (PDMA) technique employed. We focus on...

10.1109/access.2019.2895201 article EN cc-by-nc-nd IEEE Access 2019-01-01

The interference alignment (IA) is a promising technique to efficiently mitigate and enhance capacity of wireless communication network. This paper proposes an scheme for network with multiple cells multiple-input multiple-output (MIMO) users under Gaussian broadcast channel (IFBC) scenario. We first extend grouping method already known in the literature multiple-cells scenario jointly design transmit receiver beamforming vectors using closed-form expression without iterative computation....

10.1109/tcomm.2012.100912.110644 article EN IEEE Transactions on Communications 2012-10-22
Coming Soon ...