Chao Li

ORCID: 0000-0003-2505-0701
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Energy Harvesting in Wireless Networks
  • Age of Information Optimization
  • Advanced Wireless Network Optimization
  • Wireless Signal Modulation Classification
  • Radar Systems and Signal Processing
  • Underwater Vehicles and Communication Systems
  • Cloud Computing and Resource Management
  • Optical Wireless Communication Technologies
  • Ferroelectric and Piezoelectric Materials
  • Caching and Content Delivery
  • Microwave Dielectric Ceramics Synthesis
  • Advanced Data and IoT Technologies
  • IoT Networks and Protocols
  • UAV Applications and Optimization
  • Privacy-Preserving Technologies in Data
  • Human Mobility and Location-Based Analysis
  • Blockchain Technology Applications and Security
  • Optical Systems and Laser Technology
  • Advanced Neural Network Applications
  • Advanced ceramic materials synthesis

Guangzhou University
2018-2024

Shanghai Industrial Technology Institute
2023-2024

Shanghai Jiao Tong University
2018-2024

South China University of Technology
2004-2024

China Shipbuilding Industry Corporation (China)
2022

Hamdard University
2022

Anhui University
2021

Xihua University
2020

Space Engineering University
2020

Huawei Technologies (China)
2019

In this paper, we study a multiuser mobile edge computing (MEC) network, where tasks from users can be partially offloaded to multiple computational access points (CAPs). We consider practical cases task characteristics and capability at the CAPs may time-varying, thus, creating dynamic offloading problem. To deal with problem, first formulate it as Markov decision process (MDP), then introduce state action spaces. further design novel strategy based on deep Q network (DQN), dynamically...

10.1109/tvt.2021.3058995 article EN IEEE Transactions on Vehicular Technology 2021-02-13

In this paper, we investigate a secure communication system, where one transmitter sends some confidential message to receiver, under the smart attack from unmanned aerial vehicle (UAV). The UAV utilizes programmable radio devices execute multiple types, such as eavesdropping, jamming, and spoofing. We consider practical scenarios there are limited number of pilot signals for channel estimation, estimation at receiver side may be imperfect. To deal with joint impact imperfect use...

10.1109/access.2018.2880979 article EN cc-by-nc-nd IEEE Access 2018-01-01

It aims to improve the efficiency of information collection and extraction in current intelligent transportation system, accurately mine vehicle trajectory data By using Artificial Intelligence (AI) Deep Learning methods, generated during driving are deeply mined analyzed, characteristics behavior drivers modeled analyzed detail. Then, a method mining based on Convolutional Neural Network (CNN) is proposed. Based mathematical principle wavelet packet Least Square Support Vector Machine...

10.1109/tits.2022.3178182 article EN IEEE Transactions on Intelligent Transportation Systems 2023-01-02

Worker recruitment in mobile crowdsensing systems aims to recruit the most suitable users perform tasks with high quality and real-time. Many worker or task matching mechanisms have been proposed, especially for crowdsourcing platforms, where content information of from implicit feedback workers' attendance is extensively exploited help workers find preferred efficiently. Different traditional systems, are usually time-sensitive location-dependent which also play a crucial role recruitment....

10.1109/tmc.2020.2973990 article EN IEEE Transactions on Mobile Computing 2020-02-14

Abstract This paper investigates a cache-aided mobile edge computing (MEC) network, where the source offloads computation task to multiple destinations with capacity, help of relay. For proposed MEC networks, two destination selection criteria have been maximize capacity selected destination, channel gain relay link and direct link, respectively. Similarly, three for cache-free networks based on capacities gains transmission links, To evaluate system performance regarding latency constraint,...

10.1186/s13638-019-1612-0 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2020-01-13

In this paper, we proposed an enhanced secure scheme for the wireless communication system threatened by intelligent attacker, which can work in eavesdropping, jamming, and spoofing modes. The conventional is to apply Q-learning-based algorithm reach a Nash equilibrium (NE) framework of zero-sum game between transmitter which, however, requires number antennas at be much larger than that attacker. To overcome limitation, first consider scenario where attacker flexibly increase order attack...

10.1109/access.2019.2912420 article EN cc-by-nc-nd IEEE Access 2019-01-01

YOLO (You Only Look Once) has become the dominant paradigm in real-time object detection. However, deploying detectors on resource-constrained platforms faces challenges due to high computational and memory demands. Quantization addresses this by compressing accelerating CNN models through representation of weights activations with low-precision values. Nevertheless, quantization difficulty between is often imbalanced. In work, we propose MSQuant, an efficient post-training (PTQ) method for...

10.3390/electronics14030504 article EN Electronics 2025-01-26

Massive MIMO attains high spectral and power efficiency transmission by leveraging a large number of transmit antennas. However, to capture the benefits massive MIMO, each antenna should be accompanied with dedicated RF chain, consequently, hardware costs would scale up tremendously increase Cheap implementations have recently gained considerable attention, constant modulus (CM) signaling is seen as promising solution, owing its low peak-to-average ratio (PAPR). This paper investigates...

10.1109/tifs.2019.2916687 article EN IEEE Transactions on Information Forensics and Security 2019-05-14

Abstract This paper investigates cache-enabled physical-layer secure communication in a no-orthogonal multiple access (NOMA) network with two users, where an intelligent unmanned aerial vehicle (UAV) is equipped attack module which can perform as modes. We present power allocation strategy to enhance the transmission security. To this end, we propose algorithm adaptively control factor for source station NOMA based on reinforcement learning. The interaction between and UAV regarded dynamic...

10.1186/s13638-019-1595-x article EN cc-by EURASIP Journal on Wireless Communications and Networking 2020-01-06

In this paper, we study a tracking service vehicular edge computing (VEC) network that provides computation offloading for Intelligent vehicles, where computational tasks with different urgency and dependency are required to be completed efficiently within strict time constraints. We consider the actual scenario environmental parameters fluctuate randomly their distributions unknown, thus, long-term scheduling policy optimization problem needs solved. For motivation, first define queueing...

10.1109/tiv.2022.3224057 article EN IEEE Transactions on Intelligent Vehicles 2022-11-24

Within this specific record, our group study the two-way interact body (TWRN) that has a number of amplify-and-forward (AF) relays. In that, best one is actually really got to help info communication among sources. A option according obsolete channel problem information (CSI) in addition analyze its own very personal effect on system effectiveness Rayleigh fading atmospheres. Especially, we extremely preliminary acquire restricted decreased connected for outage opportunity and afterward...

10.4108/eetinis.v9i32.1909 article EN cc-by EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2022-08-10

Recently, deep federated learning has attracted much attention from researchers in the fields of wireless communications, where relaying technique been shown as a powerful technology to assist signals and enhance transmission quality, which is very important development mobile edge computing (MEC) based Internet Things (IoT) networks. In relaying-aided MEC-IoT system, it vital importance deeply investigate system signal-to-noise ratio (SNR) at receiver side, mainly determines performance...

10.1155/2022/8425975 article EN cc-by Journal of Engineering 2022-09-28

In this paper, we investigate the problem of optimizing joint offloading policy in a distributed manner for multiple intelligent vehicles (IVs). During journey vehicular edge computing (VEC) networks, IVs continually optimize their to minimize longterm accumulated costs generated by executing computational tasks. The stochastic and repetitive interactions among is modeled as Markov game process. way, optimization transformed approximate perfect equilibrium general-sum game. Moreover, argue...

10.1109/tiv.2024.3352422 article EN IEEE Transactions on Intelligent Vehicles 2024-01-10

This paper studies the impacts of antenna selection algorithms in decode‐and‐forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where secure information from relay can be overheard by an eavesdropper networks. In order to ensure transmission, optimal algorithm is proposed choose one best relay’s assist transmission. We study impact on system communication through deriving analytical expression secrecy outage probability along with asymptotic high regime signal‐to‐noise...

10.1155/2018/2390834 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, which nodes apt encounter some serious leakage of data. Hence, privacy-preserving is becoming an increasingly important issue security data aggregation for wireless networks. In this paper, we propose a balance model (BPDA) based on slicing mixing technology. Compared fixed or random slicing, BPDA gives mechanism ensure that slice can be sent the have lower privacy preservation...

10.1155/2015/937280 article EN International Journal of Distributed Sensor Networks 2015-06-01

With the deployment and commercialization of fifth-generation (5G) mobile communication network, access nodes data volume wireless network show a massive blowout growth trend. Taking beyond 5G (B5G) edge intelligent as research object, based on deep integration storage / computing communication, this paper focuses theory key technology system transmission, so to effectively support related applications B5G in future. This analyzes status storage, studies real field distributed system,...

10.4108/eetmca.v7i2.2415 article EN cc-by ICST Transactions on Mobile Communications and Applications 2022-08-25

An accurate traffic model is a key factor in the research and design of 5G heterogeneous networks. The literature on mixture non-uniform uniform models very limited. mixed includes UEs at same time, which represents more realistic distribution. In this paper, we give that based available K-tier network, each tier has its own transmit power, density, signal to interference ratio (SIR) coverage threshold path loss exponent. This also contains an adjustable parameter p correlation between BS UE...

10.1109/icuwb.2015.7324477 article EN 2015-10-01

The multi-input single-output multi-eavesdropper (MISOME) wiretap channel is one of the generic channels in physical layer security. In Khisti and Wornell's classical work [1], optimal secure beamformer for MISOME has been derived under total power constraint. this work, we revisit focus on large-scale transmit antenna regime constant modulus design. former motivated by significant spectral efficiency gains provided massive antennas, latter due to consideration cheap hardware implementation...

10.23919/eusipco.2017.8081669 article EN 2021 29th European Signal Processing Conference (EUSIPCO) 2017-08-01
Coming Soon ...