Ya Gao

ORCID: 0000-0003-3505-516X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Satellite Communication Systems
  • User Authentication and Security Systems
  • Energy Harvesting in Wireless Networks
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • UAV Applications and Optimization
  • Energy Efficient Wireless Sensor Networks
  • Wireless Communication Security Techniques
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • IoT Networks and Protocols
  • Magnetic Properties and Applications
  • Cooperative Communication and Network Coding
  • Wireless Communication Networks Research
  • Advanced Wireless Network Optimization
  • Advanced Wireless Communication Techniques
  • Distributed and Parallel Computing Systems
  • Privacy-Preserving Technologies in Data
  • Biometric Identification and Security
  • IoT and Edge/Fog Computing
  • Full-Duplex Wireless Communications
  • Interconnection Networks and Systems

Beihang University
2018-2025

Zhoushan Hospital
2024

University of Wales Trinity Saint David
2024

Anhui Normal University
2021-2023

Xidian University
2014-2023

Luoyang Normal University
2017-2023

Shenyang Aerospace University
2023

Nanjing Normal University
2020

China Southern Power Grid (China)
2017

Beijing Information Science & Technology University
2014

Leveraging unmanned aerial vehicles (UAVs) as relays, the space-air-ground integrated Internet of Things (SAG-IoT) networks can provide wireless access services to connected devices with high data rate, flexibility, and wide coverage. However, besides bringing lots benefits, SAG-IoT systems also face many challenges due mobility, unreliable satellite links, limited resources. Especially, when multiple UAVs act relays for cross-tier communication transfer collected from ground network tier...

10.1109/access.2020.3047891 article EN cc-by IEEE Access 2020-12-29

Extended reality is changing the educational experience by transforming way we teach and learn. Despite education community promoting XR in actively, their implementation consistently disappointing users, due to lack of interest often failure upgrade time. Our study combines student-centred learning gamification into systems, considering what kind systems are more engaging, efficient, have higher levels user satisfaction. We first reviewed relevant literature understand theoretical...

10.1109/icetsis61505.2024.10459690 article EN 2024-01-28

The wireless energy transfer, which is a promising technology for the sensor networks (WSNs), can efficiently solve scarcity that results from application boosting. However, not only scarcity, but also quality of service (QoS) guarantees need to be taken into account WSNs. Different types applications in WSNs impose new challenge on heterogeneous QoS provisioning To above problem, this paper, we develop joint downlink assignment and uplink power control scheme with statistical (HeP) powered...

10.1109/access.2017.2694046 article EN cc-by-nc-nd IEEE Access 2017-01-01

With the continuous development of fifth-generation technology, number mobile terminal Internet Things devices has increased exponentially. How to effectively improve throughput systems become a challenge. In networks, ultra-dense networks and non-orthogonal multiple access technology have drawn extensive attention in recent years, because they can achieve multiplexing from space domain power domain. To system, this article combines with considers orthogonal frequency division access–based...

10.1177/15501477211064741 article EN cc-by International Journal of Distributed Sensor Networks 2022-01-01

Permission delegation has become a new way for data sharing by delegating the authorized permission to other users. A flexible authorization model with strict access control policies is promising electronic health record (EHR) security. In this paper, blockchain-based multi-hop scheme controllable depth EHR been presented. We use interplanetary file system (IPFS) storing original EHRs. Smart contracts and proxy re-encryption technology are implemented delegation. order ensure security, we...

10.1016/j.hcc.2022.100084 article EN cc-by-nc-nd High-Confidence Computing 2022-10-14

Abstract Due to the unique magnetic, mechanical and thermal properties, magnetic nanoparticles (MNPs) have comprehensive applications as contrast therapeutic agents in biomedical imaging hyperthermia. The linear nonlinear magnetoacoustic responses determined by properties of MNPs attracted more attention engineering. By considering relaxation time MNPs, we derive formulae second harmonic (2H-MARs) for a cylindrical MNP solution model based on oscillations tomography with induction (MAT-MI)....

10.1088/1674-1056/ab6843 article EN Chinese Physics B 2020-01-07

Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast multiple nodes an authenticated way. Symmetric-key-based μTESLA-like schemes are popular solution due their energy efficiency, but most not scalable (e.g. terms of the number senders). On other hand, several based on public key cryptography (PKC) proposed secure multi-user WSNs. However, computation and communication overheads underlying PKC infrastructure restrict its...

10.1109/cis.2014.147 article EN 2014-11-01

Intelligent reconfigurable surface (IRS) is an innovative and promising technology to achieve intelligent wireless environment, thus, enables cost-effective energy-efficient communications. Due the broadcasting nature of signals, reflected signal in IRS-assisted communications networks might suffer from eavesdropping. Thus, it essential tackle secrecy aware problems networks. In this article, we consider aerial IRS (AIRS) assisted relay network scenario, where mounted on platform. The...

10.1109/jiot.2023.3332038 article EN IEEE Internet of Things Journal 2023-11-13

In this paper, we develop statistical quality of service (QoS)-driven power control policies to maximize the effective energy efficiency (EEE), which is defined as spectrum under given specified QoS constraints per unit harvested energy, for harvesting based wireless networks. particular, first, analyze long-term available and formulate EEE maximization problem. Then, derive closed-form solutions optimal problem battery capacity dominated constraint, average both constraints, respectively....

10.1109/glocom.2017.8254041 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Three‐factor multiserver authentication protocols become a prevalence in recent years. Among these protocols, almost all of them do not involve the registration center into process. To improve protocol’s efficiency, common secret key is shared among severs, which leads to serious weakness; i.e., we find that cannot resist passive attack from honest‐but‐curious servers. This paper takes Wang et al. ’s protocol as an example, exhibit how server attacks their protocol. remedy this weakness,...

10.1155/2018/3284324 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Energy harvesting, which offers a never-ending energy supply, has emerged as prominent technology to prolong the lifetime and reduce costs for battery-powered wireless sensor networks. However, how improve efficiency while guaranteeing quality of service (QoS) harvesting based networks is still an open problem. In this paper, we develop statistical delay-bounded QoS-driven power control policies maximize effective (EEE), defined spectrum under given specified QoS constraints per unit...

10.3390/s17091933 article EN cc-by Sensors 2017-08-23

Combining mobile edge computing (MEC), the multi-drone aided space-air-ground integrated Internet of things (SAG-IoT) networks can provide ground IoT devices (GIDs) high-quality wireless access and services. However, diverse tasks, moving drones, limited network resources reveal great challenges for task offloading resource allocation scheme exploitation. Especially, given restricted computation resources, how to make full use available applications deployed on MEC servers (MECSs) compute...

10.23919/jcn.2022.000016 article EN Journal of Communications and Networks 2022-06-01

In this paper, we develop the resource allocation scheme with heterogeneous statistical QoS provisioning for wireless powered sensor networks (WPSNs). particular, build up downlink energy transfer and uplink data transmission models, where aggregate effective capacity (AEC) is defined as throughput under constraints, WPSNs. Based on formulate AEC maximization problem to jointly optimize assignment power control scheme. To efficiently solve problem, divide it into hybrid access point...

10.1109/glocom.2017.8253949 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

As the latest evolving architecture of space networks, Internet Satellites (IoSat) is regarded as a promising paradigm in future beyond 5G and 6G wireless systems. However, due to extremely large number satellites open links, it challenging ensure communication security IoSat, especially for wiretap resisting. To best our knowledge, an entirely new problem study issue since existing works concerning physical layer (PLS) satellite networks mainly focused on space-to-terrestrial links. It also...

10.1109/iccc49849.2020.9238951 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2020-08-09

针对星上交换的特殊要求,该文提出了基于MSM (Memory-Space-Memory)型Clos交换网络的分治调度算法。通过引入冲突域的概念,分治调度算法将MSM型Clos网络中的匹配问题分解成在冲突域内为每个中间级模块选择信元的问题。该调度算法限制了冲突发生的范围,简化了调度的复杂度,并且具有硬件实现简单、能适应多种业务等优点。仿真表明,分治调度算法在各种业务模型下的吞吐率都能接近100%,并具有良好的时延性能,满足了卫星通信的要求。

10.3724/sp.j.1146.2012.00553 article ZH-CN JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2013-07-11

In this article, it is investigated a multi-user multiple-input single-output wireless communication scenario (MISO) in which base station (BS) serves multiple users with the assistance of reconfigurable intelligent surface (RIS). Specifically, delay sensitivity QoS aware total effective capacity (TEC) maximized. By employing Zero-Forcing (ZF) beamforming at BS, optimization converted power allocation. Then, we alternately optimize provisioning allocation schemes and RIS phase shifts....

10.1109/tvt.2023.3314825 article EN IEEE Transactions on Vehicular Technology 2023-09-13

Abstract Internet of Medical Things (IoMT) enable physicians to provide precise care over the for registered patients anywhere, bringing convenience people’s everyday life. Considering importance patient’s privacy in IoMT, data security between and medical servers should be protected. Therefore, authentication identity agreement a shared secret key are particularly important. In this work, we propose lightweight anonymous scheme IoMT. We combine blockchain technology with biometric order...

10.21203/rs.3.rs-1226695/v1 preprint EN cc-by Research Square (Research Square) 2022-07-05

This article unveils the importance of statistical quality service (QoS) for resource allocation in a two-hop network. Particularly, an access point (AP) serves multiple IoT devices information transfer with assistance energy harvesting (EH) relaying. To explore maximum constant data arrival metric, we aim to maximize effective capacity (EC) under specified QoS requirements. Also, inspired policies are investigated half/full duplex (HD/FD) modes, respectively, jointly optimize power and...

10.1109/access.2020.3021832 article EN cc-by IEEE Access 2020-01-01
Coming Soon ...