Rui Chen

ORCID: 0000-0003-4820-0223
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • graph theory and CDMA systems
  • Network Security and Intrusion Detection
  • Full-Duplex Wireless Communications
  • Power Line Communications and Noise
  • Error Correcting Code Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Cellular Automata and Applications

China Three Gorges University
2023-2024

Xidian University
2020-2023

In this paper, we investigate the covert communications in an overlay cognitive radio (CR) network, where multiple secondary transmitters (STs) opportunistically send confidential information to a receiver (SR). contrast current studies with ensuring security of transmitted, are motivated protect communication behavior CR which is considered as higher-level security. To address rate and fairness performance, three joint user-jammer scheduling schemes proposed, namely, rate-oriented user...

10.1109/tvt.2020.3034928 article EN IEEE Transactions on Vehicular Technology 2020-10-30

In this paper, we investigate a covert cooperative cognitive radio (CCCR) system, where multiple primary transmitters (PTs) transmit information with the aid of secondary (STs) in order to conserve power consumption. return, by opportunistically accessing PT's spectrum, STs send confidential receiver (SR) presence external eavesdropper (Eve). Aiming maximize rate, model our CCCR framework as an evolutionary game which each PT and ST make decisions based on their utility histories. By...

10.1109/tvt.2023.3274254 article EN IEEE Transactions on Vehicular Technology 2023-05-08

Differential frequency hopping (DFH) technique is widely used in wireless communications by exploiting its capabilities of mitigating tracking interference and confidentiality. However, electronic attacks systems become more rigorous, which imposes a lot challenges on the DFH sequences designed based linear congruence theory, fuzzy chaotic etc. In this article, we investigate sequence design equivalence principle between G-function algorithm encryption algorithm, order to achieve high...

10.1109/jsyst.2020.3018115 article EN IEEE Systems Journal 2020-09-15

10.1109/vtc2024-fall63153.2024.10757580 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2024-10-07

Covert communications can enhance users's privacy by hiding the existence of communication. In this paper, we analyze a covert cooperative cognitive radio (CCCR) networks, where primary transmitter (PT) transmits information with aid one secondary (ST). return, ST attempts to transmit private exploiting PT's spectrum in presence an eavesdropper (Eve). Specifically, full-duplex receiver (SR) sends jamming signals Eve cause uncertainty varying power. Then, closed-form expression minimal...

10.1109/icc45041.2023.10279220 article EN ICC 2022 - IEEE International Conference on Communications 2023-05-28
Coming Soon ...