- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Energy Harvesting in Wireless Networks
- Privacy-Preserving Technologies in Data
- Advanced Wireless Network Optimization
- Vehicular Ad Hoc Networks (VANETs)
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Advanced Wireless Communication Technologies
- UAV Applications and Optimization
- Software-Defined Networks and 5G
- Age of Information Optimization
- Mobile Ad Hoc Networks
- Caching and Content Delivery
- Cryptography and Data Security
- Wireless Networks and Protocols
- Millimeter-Wave Propagation and Modeling
- Wireless Communication Security Techniques
- Antenna Design and Analysis
- Opportunistic and Delay-Tolerant Networks
- Antenna Design and Optimization
- Network Security and Intrusion Detection
- Distributed Control Multi-Agent Systems
- Indoor and Outdoor Localization Technologies
- Cloud Computing and Resource Management
Commonwealth Scientific and Industrial Research Organisation
2016-2025
Data61
2016-2025
University of Technology Sydney
2017-2025
Health Sciences and Nutrition
2015-2024
Macquarie University
2024
Shaanxi Provincial Hospital of Traditional Chinese Medicine
2024
Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai)
2023
Southern Marine Science and Engineering Guangdong Laboratory (Guangzhou)
2023
Beijing University of Posts and Telecommunications
2017-2022
Seth Research Foundation
2018-2022
The world is resorting to the Internet of Things (IoT) for ease control and monitoring smart devices. ubiquitous use IoT ranges from industrial systems (ICS) e-Health, e-Commerce, cities, supply chain management, cars, cyber physical (CPS), a lot more. Such reliance on resulting in significant amount data be generated, collected, processed, analyzed. big analytics no doubt beneficial business development. However, at same time, numerous threats availability privacy user data, message, device...
Mobile edge computing is of particular interest to Internet Things (IoT), where inexpensive simple devices can get complex tasks offloaded and processed at powerful infrastructure. Scheduling challenging due stochastic task arrivals wireless channels, congested air interface, more prominently, prohibitive feedbacks from thousands devices. In this paper, we generate asymptotically optimal schedules tolerant out-of-date network knowledge, thereby relieving stringent requirements on feedbacks....
Future 5th generation networks are expected to enable three key services-enhanced mobile broadband, massive machine type communications and ultra-reliable low latency (URLLC). As per the 3rd partnership project URLLC requirements, it is that reliability of one transmission a 32 byte packet will be at least 99.999% most 1 ms. This unprecedented level yield various new applications, such as smart grids, industrial automation intelligent transport systems. In this survey we present potential...
The Blockchain technology, featured with its decentralized tamper-resistance based on a Peer-to-Peer network, has been widely applied in financial applications, and even further extended to industrial applications. However, the weak scalability of traditional technology severely affects wide adoption due well-known trillema decentralization-security-scalability Blockchains. In regards this issue, number solutions have proposed, targeting boost while preserving decentralization security. They...
Task admission is critical to delay-sensitive applications in mobile edge computing, but technically challenging due its combinatorial mixed nature and consequently limited scalability. We propose an asymptotically optimal task approach which able guarantee delays achieve (1-ϵ)-approximation of the computationally prohibitive maximum energy saving at a time-complexity linearly scaling with devices. ϵ linear quantization interval energy. The key idea transform integer programming (IP) problem...
Airborne relaying can extend wireless sensor networks (WSNs) to remote human-unfriendly terrains. However, lossy airborne channels and limited battery of unmanned aerial vehicles (UAVs) are critical issues, adversely affecting success rate network lifetime, especially in real-time applications. We propose an energy-efficient cooperative scheme which extends lifetime while guaranteeing the rate. The optimal transmission schedule UAVs is formulated minimize maximum (min-max) energy consumption...
Intelligent reflecting surface (IRS) is envisioned as a promising solution for controlling radio propagation environments in future wireless systems. In this paper, we propose distributed intelligent assisted multi-user millimeter wave (mmWave) system, where IRSs are exploited to enhance the mmWave signal coverage when direct links between base station and users unavailable. First, joint active passive beamforming problem established weighted sum-rate maximization. Then, an alternating...
The growth of technical revolution towards 5G Next generation networks is expected to meet various communication requirements future Intelligent Transportation Systems (ITS). Motivated by the consumer needs for variety ITS applications, bandwidth, high speed and ubiquity, researches are currently exploring different network architectures techniques, which could be employed in ITS. To provide flexible management, control resource utilization Vehicular Ad-hoc Networks (VANETs) on large scale,...
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian military applications. Criminals or terrorists can potentially use UAVs committing crimes terrorism, thus endangering public safety. In this paper, we consider that a legitimate UAV is employed to track flight of suspicious preventing safety security threats. To obtain information the UAVs, intentionally jams receiver so as force reduce its data rate, hence increase eavesdropping success. An energy-efficient...
ML has been increasingly adopted in wireless communications, with popular techniques, such as supervised, unsupervised, and reinforcement learning, applied to traffic classification, channel encoding/ decoding, cognitive radio. This article discusses a different class of technique, stochastic online its promising applications MEC. Based on gradient descent, learning learns from the changes dynamic systems (i.e., Lagrange multipliers) rather than training data, decouples tasks between time...
In Vehicular Ad Hoc Networks (VANETs), vehicles driving along highways can be grouped into clusters to facilitate communication. The design of the clusters, e.g., size and geographical span, has significant impacts on communication quality. Such is affected by Media Access Control (MAC) operations at Data Link layer, wireless channel conditions Physical mobility vehicles. Previous works investigated these effects separately. this paper, we present a comprehensive analysis that integrates...
Distributed machine learning (DML) techniques, such as federated learning, partitioned and distributed reinforcement have been increasingly applied to wireless communications. This is due improved capabilities of terminal devices, explosively growing data volume, congestion in the radio interfaces, increasing concern privacy. The unique features systems, large scale, geographically dispersed deployment, user mobility, massive amount data, give rise new challenges design DML techniques. There...
The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access control in blockchains, especially blockchain-enabled tampering-resistant Internet-of-Things (IoT) systems. However, its adoption been severely hindered by the incompatibility between immutability typical blockchains and attribute updates/revocations ABE. In this article, we propose new blockchain-based IoT system, which is compatible with ABE technique, implemented update enabled integrating Chameleon...
Unmanned Aerial Vehicles (UAVs) with Microwave Power Transfer (MPT) capability provide a practical means to deploy large number of wireless powered sensing devices into areas no access persistent power supplies. The UAV can charge the remotely and harvest their data. A key challenge is online MPT data collection in presence on-board control (e.g., patrolling velocity) for preventing battery drainage queue overflow devices, while up-to-date knowledge on level not available at UAV. In this...
In this paper, we study optimal spatio-temporal power mask design to maximize mutual information (MI) for a joint communication and (radio) sensing (JCAS, a.k.a., radar-communication) multi-input multi-output (MIMO) downlink system. We consider typical packet-based signal structure which includes training data symbols. first derive the conditional MI both under correlated channels by considering overhead channel estimation error (CEE). Then, lower bound CEE optimize energy arrangement...
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different networks. Cross-chain overcomes the "information island" problem of closed network increasingly applied to multiple critical areas such as finance internet things (IoT). Blockchain can be divided into three main categories networks: public blockchains, private consortium blockchains. However, there are differences in block structures, consensus mechanisms, complex working...
License-assisted access (LAA) is a promising technology to offload dramatically increasing cellular traffic unlicensed bands. Challenges arise from the provision of quality-of-service (QoS) and quantification capacity, due distributed heterogeneous nature LAA legacy systems (such as Wi-Fi) coexisting in In this paper, we develop new theories effective capacity measure under statistical QoS requirements. A four-state semi-Markovian model developed capture transmission collisions, random...
In a rechargeable wireless sensor network, the data packets are generated by nodes at specific rate, and transmitted to base station. Moreover, station transfers power using transfer (WPT) extend their battery life. However, inadequately scheduling WPT collection causes some of drain have buffer overflow, whereas other waste harvested energy, which is more than they need transmit packets. this paper, we investigate novel optimal strategy, called EHMDP, aiming minimize packet loss from...
Scalability is a key issue in large scale WDNs, such as vehicular networks and device-to-device networks. To address the issue, this article extends SDN concept, presents new network architecture that eliminates need of multi-hop flooding for route discovery, thereby enabling WDNs to scale. The idea split control data forwarding by using two separate frequency bands. Another important aspect computational complexity routing between controller nodes, allowing nodes make distributed decisions....
This paper analyzes the link capacity between autonomous unmanned aerial vehicles (UAVs) with random three-dimensional (3-D) trajectories. is distinctively different from existing works typically under assumption of either two-dimensional (2-D) or deterministic trajectories, and particularly interesting to applications such as surveillance air combat. The key idea that we geometrically derive probability distributions UAV-to-UAV (U2U) distances which, by exploiting Jensen's inequality, can...