- IoT and Edge/Fog Computing
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Energy Harvesting in Wireless Networks
- Age of Information Optimization
- Advanced Wireless Network Optimization
- Wireless Signal Modulation Classification
- Radar Systems and Signal Processing
- Underwater Vehicles and Communication Systems
- Cloud Computing and Resource Management
- Optical Wireless Communication Technologies
- Ferroelectric and Piezoelectric Materials
- Caching and Content Delivery
- Microwave Dielectric Ceramics Synthesis
- Advanced Data and IoT Technologies
- IoT Networks and Protocols
- UAV Applications and Optimization
- Privacy-Preserving Technologies in Data
- Human Mobility and Location-Based Analysis
- Blockchain Technology Applications and Security
- Optical Systems and Laser Technology
- Advanced Neural Network Applications
- Advanced ceramic materials synthesis
Guangzhou University
2018-2024
Shanghai Industrial Technology Institute
2023-2024
Shanghai Jiao Tong University
2018-2024
South China University of Technology
2004-2024
China Shipbuilding Industry Corporation (China)
2022
Hamdard University
2022
Anhui University
2021
Xihua University
2020
Space Engineering University
2020
Huawei Technologies (China)
2019
In this paper, we study a multiuser mobile edge computing (MEC) network, where tasks from users can be partially offloaded to multiple computational access points (CAPs). We consider practical cases task characteristics and capability at the CAPs may time-varying, thus, creating dynamic offloading problem. To deal with problem, first formulate it as Markov decision process (MDP), then introduce state action spaces. further design novel strategy based on deep Q network (DQN), dynamically...
In this paper, we investigate a secure communication system, where one transmitter sends some confidential message to receiver, under the smart attack from unmanned aerial vehicle (UAV). The UAV utilizes programmable radio devices execute multiple types, such as eavesdropping, jamming, and spoofing. We consider practical scenarios there are limited number of pilot signals for channel estimation, estimation at receiver side may be imperfect. To deal with joint impact imperfect use...
It aims to improve the efficiency of information collection and extraction in current intelligent transportation system, accurately mine vehicle trajectory data By using Artificial Intelligence (AI) Deep Learning methods, generated during driving are deeply mined analyzed, characteristics behavior drivers modeled analyzed detail. Then, a method mining based on Convolutional Neural Network (CNN) is proposed. Based mathematical principle wavelet packet Least Square Support Vector Machine...
Worker recruitment in mobile crowdsensing systems aims to recruit the most suitable users perform tasks with high quality and real-time. Many worker or task matching mechanisms have been proposed, especially for crowdsourcing platforms, where content information of from implicit feedback workers' attendance is extensively exploited help workers find preferred efficiently. Different traditional systems, are usually time-sensitive location-dependent which also play a crucial role recruitment....
Abstract This paper investigates a cache-aided mobile edge computing (MEC) network, where the source offloads computation task to multiple destinations with capacity, help of relay. For proposed MEC networks, two destination selection criteria have been maximize capacity selected destination, channel gain relay link and direct link, respectively. Similarly, three for cache-free networks based on capacities gains transmission links, To evaluate system performance regarding latency constraint,...
In this paper, we proposed an enhanced secure scheme for the wireless communication system threatened by intelligent attacker, which can work in eavesdropping, jamming, and spoofing modes. The conventional is to apply Q-learning-based algorithm reach a Nash equilibrium (NE) framework of zero-sum game between transmitter which, however, requires number antennas at be much larger than that attacker. To overcome limitation, first consider scenario where attacker flexibly increase order attack...
YOLO (You Only Look Once) has become the dominant paradigm in real-time object detection. However, deploying detectors on resource-constrained platforms faces challenges due to high computational and memory demands. Quantization addresses this by compressing accelerating CNN models through representation of weights activations with low-precision values. Nevertheless, quantization difficulty between is often imbalanced. In work, we propose MSQuant, an efficient post-training (PTQ) method for...
Massive MIMO attains high spectral and power efficiency transmission by leveraging a large number of transmit antennas. However, to capture the benefits massive MIMO, each antenna should be accompanied with dedicated RF chain, consequently, hardware costs would scale up tremendously increase Cheap implementations have recently gained considerable attention, constant modulus (CM) signaling is seen as promising solution, owing its low peak-to-average ratio (PAPR). This paper investigates...
Abstract This paper investigates cache-enabled physical-layer secure communication in a no-orthogonal multiple access (NOMA) network with two users, where an intelligent unmanned aerial vehicle (UAV) is equipped attack module which can perform as modes. We present power allocation strategy to enhance the transmission security. To this end, we propose algorithm adaptively control factor for source station NOMA based on reinforcement learning. The interaction between and UAV regarded dynamic...
In this paper, we study a tracking service vehicular edge computing (VEC) network that provides computation offloading for Intelligent vehicles, where computational tasks with different urgency and dependency are required to be completed efficiently within strict time constraints. We consider the actual scenario environmental parameters fluctuate randomly their distributions unknown, thus, long-term scheduling policy optimization problem needs solved. For motivation, first define queueing...
Within this specific record, our group study the two-way interact body (TWRN) that has a number of amplify-and-forward (AF) relays. In that, best one is actually really got to help info communication among sources. A option according obsolete channel problem information (CSI) in addition analyze its own very personal effect on system effectiveness Rayleigh fading atmospheres. Especially, we extremely preliminary acquire restricted decreased connected for outage opportunity and afterward...
Recently, deep federated learning has attracted much attention from researchers in the fields of wireless communications, where relaying technique been shown as a powerful technology to assist signals and enhance transmission quality, which is very important development mobile edge computing (MEC) based Internet Things (IoT) networks. In relaying-aided MEC-IoT system, it vital importance deeply investigate system signal-to-noise ratio (SNR) at receiver side, mainly determines performance...
In this paper, we investigate the problem of optimizing joint offloading policy in a distributed manner for multiple intelligent vehicles (IVs). During journey vehicular edge computing (VEC) networks, IVs continually optimize their to minimize longterm accumulated costs generated by executing computational tasks. The stochastic and repetitive interactions among is modeled as Markov game process. way, optimization transformed approximate perfect equilibrium general-sum game. Moreover, argue...
This paper studies the impacts of antenna selection algorithms in decode‐and‐forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where secure information from relay can be overheard by an eavesdropper networks. In order to ensure transmission, optimal algorithm is proposed choose one best relay’s assist transmission. We study impact on system communication through deriving analytical expression secrecy outage probability along with asymptotic high regime signal‐to‐noise...
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, which nodes apt encounter some serious leakage of data. Hence, privacy-preserving is becoming an increasingly important issue security data aggregation for wireless networks. In this paper, we propose a balance model (BPDA) based on slicing mixing technology. Compared fixed or random slicing, BPDA gives mechanism ensure that slice can be sent the have lower privacy preservation...
With the deployment and commercialization of fifth-generation (5G) mobile communication network, access nodes data volume wireless network show a massive blowout growth trend. Taking beyond 5G (B5G) edge intelligent as research object, based on deep integration storage / computing communication, this paper focuses theory key technology system transmission, so to effectively support related applications B5G in future. This analyzes status storage, studies real field distributed system,...
An accurate traffic model is a key factor in the research and design of 5G heterogeneous networks. The literature on mixture non-uniform uniform models very limited. mixed includes UEs at same time, which represents more realistic distribution. In this paper, we give that based available K-tier network, each tier has its own transmit power, density, signal to interference ratio (SIR) coverage threshold path loss exponent. This also contains an adjustable parameter p correlation between BS UE...
The multi-input single-output multi-eavesdropper (MISOME) wiretap channel is one of the generic channels in physical layer security. In Khisti and Wornell's classical work [1], optimal secure beamformer for MISOME has been derived under total power constraint. this work, we revisit focus on large-scale transmit antenna regime constant modulus design. former motivated by significant spectral efficiency gains provided massive antennas, latter due to consideration cheap hardware implementation...