Binbin Su

ORCID: 0000-0003-4860-0032
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • IoT Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Wireless Communication Security Techniques
  • Optical Wireless Communication Technologies
  • Radar Systems and Signal Processing
  • Advanced SAR Imaging Techniques
  • Air Quality Monitoring and Forecasting
  • Quantum Mechanics and Applications
  • IoT and Edge/Fog Computing
  • Image and Signal Denoising Methods
  • Quantum Information and Cryptography
  • Speech and Audio Processing
  • Atmospheric chemistry and aerosols
  • Network Security and Intrusion Detection
  • Flow Measurement and Analysis
  • Security in Wireless Sensor Networks
  • Random Matrices and Applications
  • Power Line Communications and Noise
  • Guidance and Control Systems
  • Photonic and Optical Devices
  • Quantum Computing Algorithms and Architecture
  • Ocular Disorders and Treatments
  • Network Packet Processing and Optimization

Naval University of Engineering
2016-2025

Lancaster University
2018-2021

Xi'an Polytechnic University
2018

National Taiwan University of Science and Technology
2016

University of Electronic Science and Technology of China
2013

In this article, we investigate the application of user cooperation (UC) and non-orthogonal multiple access (NOMA) schemes for a wireless powered mobile edge computing (MEC) system under non-linear energy harvesting model, in which two single-antenna users first harvest from multi-antenna point (AP) integrated with an MEC server. Then, during computation offloading phase, both simultaneously offload tasks to server harvested energy, by performing NOMA protocol. To better enhance performance,...

10.1109/tgcn.2021.3056770 article EN IEEE Transactions on Green Communications and Networking 2021-02-03

In this paper, we study the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with cooperative non-orthogonal multiple access (NOMA) protocol applied. A novel NOMA scheme is proposed, where strong user better channel conditions adopts splitting (PS) acts as an energy-harvesting relay to transmit weak user. The presence of uncertainties considered incorporated in our formulations improve robustness communication reliability....

10.1109/tcomm.2019.2900318 article EN IEEE Transactions on Communications 2019-02-19

LoRa has been recognized as one of the most promising low-power wide-area (LPWA) techniques. Since devices are usually powered by batteries, energy efficiency (EE) is an essential consideration. In this paper, we investigate efficient resource allocation in networks to maximize system EE (SEE) and minimal (MEE) users, respectively. Specifically, our objective corresponding jointly exploiting user scheduling, spreading factor (SF) assignment, transmit power allocations. To solve them...

10.1109/tcomm.2020.2993085 article EN IEEE Transactions on Communications 2020-05-07

The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence untrustworthy network nodes, referred as internal eavesdroppers. To address this potential and reliability flaw, by assuming all users are untrusted, letter investigates effective secrecy throughput (EST) for a NOMA system, where near user serves an amplify-and-forward relay help forward information far user. Considering...

10.1109/lwc.2021.3098935 article EN publisher-specific-oa IEEE Wireless Communications Letters 2022-02-25

Deinterleaving pulses of various pulse repetition interval (PRI) modulation modes constitute a vital and challenging task for an electronic measures system (ESM). A deinterleaving method based on multi-receiver time-difference-of-arrival (TDOA) is proposed in this paper. Firstly, paper theoretically analyzes the distribution feature TDOA, providing basis deinterleaving. Then, SSC (Sorting Skipping Clustering)-DBSCAN algorithm to achieve TDOA clustering by pre-sorting traversing key points,...

10.3390/electronics14091833 article EN Electronics 2025-04-29

To address the stringent demands of next-generation networks for massive connectivity, ultralow latency, and ultrahigh spectral efficiency, win–win integration reconfigurable intelligent surface (RIS) nonorthogonal multiple access (NOMA) is considered as a promising solution. In this article, we investigate downlink RIS-empowered NOMA system with short packet communications (SPCs) in presence hardware impairments at transceiver nodes. characterize performance proposed network, approximate...

10.1109/jiot.2023.3294257 article EN IEEE Internet of Things Journal 2023-07-11

With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels spread malicious codes. The protocol formats reverse engineering technique can be used detect such attacks, however, previous works are focused on application layer analysis, and hardly work under scenarios that captured is only in binary format due lack semantics. In this paper, we propose a novel framework, which utilizes association...

10.1109/trustcom.2013.21 article EN 2013-07-01

Non orthogonal multiple access (NOMA) and mobile edge computing (MEC) are evolving as key enablers for fifth generation (5G) networks this combination can provide high spectral efficiency, improved quality-of-service (QoS), lower latency. This letter aims to minimize the transaction time difference of two NOMA paired users offloading data MEC servers by optimizing their transmission powers computational resources severs using a successive convex approximation method. The equalization reduces...

10.1109/lcomm.2020.2966442 article EN IEEE Communications Letters 2020-01-14

In this paper, we investigate energy efficiency for uplink LoRa, which is one of the most promising and widely deployed low-power wide-area (LPWA) networks. considered networks, explore user scheduling, spreading factor (SF) assignment, power allocation jointly. A nonconvex optimization problem maximizing system formulated, with targeted SNR requirement range as constraints each LoRa user. To solve problem, first propose a low-complexity suboptimal algorithm, includes energy-efficient...

10.1109/glocom.2018.8647416 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

This paper considers a hybrid wireless powered non-orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) systems. The transmit energy beamforming, power and time allocations are jointly optimized to maximize the computation rate of strong user, while satisfying requirement weak user harvested constraints. optimal solution is proposed in semi-closed form by adopting Lagrange duality method. Simulation results show that system yields better performance than existing schemes.

10.1109/iccsn52437.2021.9463665 article EN 2021-06-04

Abstract Active‐passive composite monopulse radar (APCMR) enhances the anti‐jamming capability by combing advantages of active radars and passive radars. Previous studies have discussed effectiveness cross‐eye jamming against APCMR in a simplified scenario for isolating platform echo. In this paper, echo signals are jointly considered to analyse performance on APCMR. A mathematical model is established presence echo, evaluated compared terms gain its probability. order ensure both radars,...

10.1049/rsn2.12636 article EN cc-by-nc-nd IET Radar Sonar & Navigation 2024-09-06

This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) system in which imperfect channel state information (CSI) of eavesdropper links is considered. We propose novel robust beamforming strategies direct NOMA (DT NOMA) and cooperative jamming (CJ with a helper. formulate our problem as worst-case sum power minimization subject to secrecy rate constraint. The semidefinite relaxation (SDR) method firstly applied relax...

10.1109/pimrc.2018.8580844 article EN 2018-09-01

Carry out research on the variation rule of average mutual information between Alice and Eve I <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">AE</sub> , Bob xmlns:xlink="http://www.w3.org/1999/xlink">AB</sub> bit error rate q xmlns:xlink="http://www.w3.org/1999/xlink">e</sub> (AE), (AB), when eavesdropper uses same measurement basis as Bob, eavesdropping communication intercepting-retransmission pattern. Based symmetrical characteristic source...

10.1109/icccbda.2016.7529556 article EN 2016-07-01

10.1016/j.aeue.2024.155422 article EN AEU - International Journal of Electronics and Communications 2024-07-08

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4693780 preprint EN 2024-01-01

Abstract Precise radar pulse detection is the premise of electronic support measures. A constant false alarm rate (CFAR) algorithm based on difference box (DOB) filter proposed to realise low‐complexity and environment‐adaptive detection, principle behind revealed. Specifically, DOB adopted extract rising edges falling pulses, signal variation law probability density functions (PDFs) during process are first theoretically analysed. Based derived PDFs, dynamic threshold fixed factor for CFAR...

10.1049/rsn2.12573 article EN cc-by-nc-nd IET Radar Sonar & Navigation 2024-04-22

Abstract This article proposes a cooperative jamming (CJ) architecture based on the coded signal of interest (SOI). The CJ is superimposed SOI directly at transmitter, and authorized user reconstructs received cancels prior knowledge coding information, then different radiation patterns after cancellation are created for CJ, which effectively while retaining SOI. Eavesdropper, however, unaware information will cause significant loss to cancelling therefore unable achieve eavesdropping...

10.1049/ell2.70001 article EN cc-by-nc-nd Electronics Letters 2024-08-01

We investigate the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with cooperative non-orthogonal multiple access (NOMA) protocol applied. A novel NOMA scheme is proposed, where strong user better channel conditions adopts splitting (PS) acts as an energy-harvesting relay to forward decoded signal weak user. The presence of uncertainties considered by introducing outage-based constraints interference plus noise ratio (SINR)....

10.1109/icc.2019.8761158 article EN 2019-05-01

Based on the technical characteristics of leaky coaxial cables, application scenarios regional monitoring system and closed-area mobile communication for cables are first analyzed. Then structure diagram is introduced, radiation mechanism analysis method electromagnetic simulation model established by software HFSS. The direction pattern loss feature simulated results show that signal cable has uniform coverage low attenuation.

10.1109/iccsn52437.2021.9463639 article EN 2021-06-04

Physical-layer security has drawn ever-increasing attention in the next generation wireless communications. In this paper, we focus on studying secure communication an HPN-to-devices (HTD) network, which a new type of MAC spoofing attack is considered. To detect malicious attack, propose novel algorithm, namely, eigenvalue test using random matrix theory (ETRMT) needs no prior information about channel. particular, when number samples finite at receiver or devices large, sampled signal...

10.1109/pimrc.2018.8580677 article EN 2018-09-01
Coming Soon ...