- Wireless Communication Security Techniques
- Advanced Wireless Communication Technologies
- Satellite Communication Systems
- Cooperative Communication and Network Coding
- Optical Wireless Communication Technologies
- UAV Applications and Optimization
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Full-Duplex Wireless Communications
- Particle accelerators and beam dynamics
- Underwater Vehicles and Communication Systems
- Space Satellite Systems and Control
- Millimeter-Wave Propagation and Modeling
- Particle Accelerators and Free-Electron Lasers
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- Radio Astronomy Observations and Technology
- IoT Networks and Protocols
- Advanced Wireless Communication Techniques
- Traffic control and management
- Cognitive Radio Networks and Spectrum Sensing
- Space exploration and regulation
- Superconducting Materials and Applications
- Traffic and Road Safety
- Nuclear Physics and Applications
Beijing Institute of Technology
2018-2025
Zhongnan Hospital of Wuhan University
2025
China Institute of Atomic Energy
2010-2024
Southwest Jiaotong University
2009-2024
Mudanjiang Medical University
2024
State Key Laboratory of Industrial Control Technology
2024
Zhejiang Sci-Tech University
2024
Zhejiang University of Technology
2018-2024
Chengdu University
2024
Ningbo University
2024
Abstract The Five-hundred-meter Aperture Spherical radio Telescope (FAST) has passed national acceptance and finished one pilot cycle of ‘Shared-Risk’ observations. It will start formal operation soon. In this context, paper describes testing results key fundamental parameters for FAST, aiming to provide basic support observation data reduction FAST scientific researchers. 19-beam receiver covering 1.05–1.45 GHz was utilized most these fluctuation in electronic gain the system is better than...
This paper investigates physical layer security (PLS) in cognitive radio inspired non-orthogonal multiple access (CR-NOMA) networks with primary and secondary users. To manage the interferences among users guarantee quality of services users, a new secure NOMA transmission strategy is designed, where are paired according to their channel gains, respectively, power-domain employed transmit signal. Then, closed-form expressions for connection outage probability, secrecy effective throughput...
Non-orthogonal multiple access (NOMA) has been shown in the literature to have a better performance than OMA terms of sum channel capacity; however, capacity superiority NOMA over only proved for single antenna systems, and proof multiple-input multiple-output (MIMO-NOMA) conventional MIMO-OMA not available yet. In this paper, we will provide our demonstrate that MIMO-NOMA is strictly (except case where one user being communicated to), i.e., any rate pair achieved by MIMO-OMA, there power...
In this letter, we study the secrecy capacity of classic Wyner's model over α - μ fading channels, where and specify nonlinearity clustering respectively. The average (ASC) is derived in closed-form by using extended generalized bivariate Fox's H-function. Moreover, asymptotic analysis ASC high signal-to-noise ratio (SNR) regime conducted. results unveil that follows scaling law Θ (ln ρ), p stands for between powers main channels eavesdropping channels. can be enhanced increasing transmit...
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is lack literature on the security reliability issues LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, critically appraise inherent characteristics SCSs elaborate their requirements. In light this, further discuss vulnerabilities, including potential attacks launched against them...
This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output multiple-input systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether base station has global channel state information both main wiretap channels, exact closed-form expressions for outage probability (SOP) suboptimal optimal schemes obtained compared traditional space-time transmission scheme. To...
In this paper, a hybrid visible light communication-radio frequency (RF) system, including legitimate receiver (R) and an eavesdropper (E) is considered. R can harvest energy from the emitted by emitting diodes (LEDs), which used for information transmission between RF close to LED. It assumed that E tries eavesdrop delivered with finite storage. Considering randomness of locations E, statistical characteristics received signal-to-noise ratio at are characterized; then, we derive analytical...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple antennas, desired single-antenna receiver (IR), N (N > 1) energy-harvesting receivers (ERs) is considered. Assuming that the signal to IR may be eavesdropped by ERs if are malicious, we investigate secrecy performance of target MISO SWIPT system when imperfect channel state (CSI) available adopted for transmit antenna...
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over Nakagami-m channels with generalized selection combining (GSC), where confidential messages transmitted from multiple-antenna transmitter to legitimate receiver are overheard by eavesdropper. Depending on whether the source node has global channel state information (CSI) of both main and channels, we investigate secrecy outage performances optimal antenna (OAS) suboptimal (SAS) schemes for MIMO...
In this letter, we study the secrecy performance of classic Wyner's wiretap model over generalized Gamma fading channels. The closed-form expressions for probability strictly positive capacity and lower bound secure outage are derived. Monte-Carlo simulations performed to verify derived analysis.
This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time slots are utilized to transmit signals from base station destination. At first slot, broadcasts superposition signal two users all decode-and-forward relays by message mapping strategy. Subsequently, selected relay transmits via power-domain NOMA technology. Three selection schemes, i.e., optimal single (OSRS) scheme,...
This paper investigates and optimizes the performance of simultaneous wireless information power transfer (SWIPT) in sensor networks over Nakagami-m fading channels. In considered system, there is one mobile reader (R), which equipped with transmit antenna receive antenna, a group passive sensors. The delivery includes two stages: (1) R broadcasts command radio-frequency energy to sensors, adopt time splitting (TS)/power (PS) schemes harvest (2) sensors deliver their orthogonal channels by...
In this paper, we consider an underlay multiple-input-multiple-output (MIMO) cognitive radio network (CRN) including a pair of primary nodes, couple secondary and eavesdropper, where the transmitter is powered by renewable energy harvested from in order to improve both efficiency spectral efficiency. Based on whether channel state information wiretap links are available or not, secrecy outage performance optimal antenna selection (OAS) scheme suboptimal (SAS) for MIMO CRN with harvesting...
In this letter, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-to-UAV system, where a UAV acts as source ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula> ) transmitting information to legitimate receiver while group UAVs trying eavesdrop delivery between and receiver. The locations eavesdropping are randomly distributed in coverage space . We...
In this paper, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and FSO link experiences Gamma-Gamma fading. The effect pointing error two types detection techniques (i.e., heterodyne intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound outage probability (SOP) exact average capacity (ASC). Furthermore, by utilizing expansion Meijer's...
In this letter, the secrecy performance of classic Wyner's wiretap model over generalized-K fading channels is studied. The closed-form expressions for average capacity, secure outage probability, and probability strictly positive capacity are derived. new provide a unified form, which can handle several well-known composite environments as special or limiting cases. Monte-Carlo simulations performed to verify proposed analysis models.
We analyze a secure dual-hop mixed radio frequency-free space optical (RF-FSO) downlink simultaneous wireless information and power transfer system. The FSO link all RF links experience Gamma-Gamma, independent, identical Nakagami-m fading, respectively. the effects of atmospheric turbulence, pointing error, detection technology, path loss, energy harvesting on secrecy performance. Signalto-noise ratios at both legitimate illegitimate receivers are not independent since they simultaneously...
We analyze the secrecy outage performance of a mixed radio frequency-free space optical (RF-FSO) transmission system with imperfect channel state information (CSI). deal single-input multiple-output wiretap model, where base station (works as relay) forwards signal transmitted from user (source) to data center destination), while an eavesdropper wiretaps confidential by decoding received signal. Both relay and are armed multiple antennas, maximal ratio combining scheme is utilized improve...
This letter investigates the secrecy performance of a visible light communication (VLC) system with legitimate receiver and group eavesdroppers. Considering randomness locations eavesdroppers, statistical characteristics signal-to-noise ratio over VLC downlinks are characterized; then, we derive closed-form analytical expressions for outage probability average capacity by using stochastic geometry method. Finally, simulations carried on to verify our proposed models.
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of cell-edge users cannot be guaranteed due to severe channel fading. On other hand, presence eavesdroppers can severely threaten secure open nature wireless channel. Thus, two-user NOMA system assisted by multi-antenna decode-and-forward relay is considered in this paper, and two-stage jamming scheme, full-duplex-jamming (FDJam), proposed ensure users. FDJam using full-duplex, transmits signal eavesdropper...
In this work, we analyze the secrecy outage performance of a dual-hop relay system composed multipleinput-multiple-output radio-frequency (RF) links and freespace optical (FSO) link while multiple-antenna eavesdropper wiretaps confidential information by decoding received signals from source node.The channel state (CSI) RF FSO is considered to be outdated imprecise, respectively.We propose four transmit antenna selection (TAS) schemes enhance systems.The with different TAS analyzed effects...
This paper investigates the performances of secure communications over non-small-scale fading channels. Specifically, considering three different cases when main and eavesdropper channels experience independent lognormal fading, correlated or composite we study average secrecy capacity outage [including probability nonzero (PNSC) (SOP)] for these channel conditions. The approximated closed-form expressions capacity, PNSC, SOP are derived types non-small accuracy our performance analysis is...
This paper considers a secure nonorthogonal multiple access system, where confidential messages are transmitted from base station to legitimate destinations and wiretapped by illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model nodes equipped with antennas, respectively. Both noncolluding colluding eavesdroppers considered, A max-min (MM) transmit antenna selection (TAS) strategy adopted improve secrecy performance of target in which both users user...
In this paper, we analyze the performance of a dual-hop radio frequency-underwater wireless optical communication (RF-UWOC) transmission systems wherein RF and UWOC links experience Nakagami-m fading mixture Exponential-Generalized Gamma fading, respectively. The location S is uniformly distributed in space hemisphere where relay located center hemisphere. effect bubbles level, temperature gradient, water types, detection techniques are considered. We derive closed-form expressions for...