Xianbin Wang

ORCID: 0000-0003-4890-0748
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Techniques
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • IoT and Edge/Fog Computing
  • Wireless Communication Networks Research
  • UAV Applications and Optimization
  • PAPR reduction in OFDM
  • Indoor and Outdoor Localization Technologies
  • Full-Duplex Wireless Communications
  • Power Line Communications and Noise
  • Telecommunications and Broadcasting Technologies
  • Privacy-Preserving Technologies in Data
  • Millimeter-Wave Propagation and Modeling
  • Wireless Signal Modulation Classification
  • IoT Networks and Protocols
  • Cognitive Radio Networks and Spectrum Sensing
  • Error Correcting Code Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Network Optimization
  • Energy Efficient Wireless Sensor Networks
  • Radar Systems and Signal Processing
  • Blockchain Technology Applications and Security
  • Age of Information Optimization

Western University
2016-2025

Beijing Children’s Hospital
2022-2025

Capital Medical University
2022-2025

Affiliated Hospital of Guizhou Medical University
2022-2025

Guiyang Medical University
2022-2025

Northeast Forestry University
2010-2025

Center for Children
2023-2025

Xiamen University
2023-2024

Tongji University
2023-2024

Baotou Medical College
2022-2024

Due to the broadcast nature of radio propagation, wireless air interface is open and accessible both authorized illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables node without direct association unable access network for illicit activities. The communications environment makes transmissions more vulnerable than malicious attacks, including passive eavesdropping data interception active jamming disrupting...

10.1109/jproc.2016.2558521 article EN cc-by Proceedings of the IEEE 2016-05-10

A companding technique is proposed to reduce the peak-to-average-power ratio of orthogonal frequency division multiplexing (OFDM) signal in this paper. The probability density function amplitude OFDM determined. Because Gaussian distribution signal, can be quite effective, since a large only occurs infrequently. peak-to-average power an system and optimal coefficient are determined symbol error rate systems after derived. performances with without also compared.

10.1109/11.796272 article EN IEEE Transactions on Broadcasting 1999-01-01

In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. We propose AF DF based optimal relay selection (i.e., AFbORS DFbORS) schemes to improve against eavesdropping attack. For purpose of comparison, examine traditional DFbORS schemes, denoted by T-AFbORS TDFbORS, respectively. also investigate a so-called combining (MRC) framework present MRC called...

10.1109/jsac.2013.131011 article EN IEEE Journal on Selected Areas in Communications 2013-09-17

The ever-increasing number of resource-constrained Machine-Type Communication (MTC) devices is leading to the critical challenge fulfilling diverse communication requirements in dynamic and ultra-dense wireless environments. Among different application scenarios that upcoming 5G beyond cellular networks are expected support, such as eMBB, mMTC URLLC, brings unique technical supporting a huge MTC devices, which main focus this paper. related challenges include QoS provisioning, handling...

10.1109/comst.2019.2916177 article EN IEEE Communications Surveys & Tutorials 2019-05-10

Cognitive small cell networks have been envisioned as a promising technique for meeting the exponentially increasing mobile traffic demand. Recently, many technological issues pertaining to cognitive studied, including resource allocation and interference mitigation, but most studies assume non-cooperative schemes or perfect channel state information (CSI). Different from existing works, we investigate joint uplink subchannel power problem in cells using cooperative Nash bargaining game...

10.1109/twc.2015.2407355 article EN IEEE Transactions on Wireless Communications 2015-02-26

Automatic modulation classification (AMC), which plays critical roles in both civilian and military applications, is investigated this paper through a deep learning approach. Conventional AMCs can be categorized into maximum likelihood (ML) based (ML-AMC) feature-based AMC. However, the practical deployment of ML-AMCs difficult due to its high computational complexity, manually extracted features require expert knowledge. Therefore, an end-to-end convolution neural network (CNN) AMC...

10.1109/tvt.2018.2868698 article EN IEEE Transactions on Vehicular Technology 2018-09-04

The fields of photovoltaics, photodetection and light emission have seen tremendous activity in recent years with the advent hybrid organic-inorganic perovskites. Yet, there been far fewer reports perovskite-based field-effect transistors. lateral interfacial transport requirements transistors make them particularly vulnerable to surface contamination defects rife polycrystalline films bulk single crystals. Here, we demonstrate a spatially-confined inverse temperature crystallization...

10.1038/s41467-018-07706-9 article EN cc-by Nature Communications 2018-12-11

Due to the broadcast nature of radio propagation, wireless transmission can be readily overheard by unauthorized users for interception purposes and is thus highly vulnerable eavesdropping attacks. To this end, physical-layer security emerging as a promising paradigm protect communications against attacks exploiting physical characteristics channels. This article focused on investigation diversity techniques improve security, differing from conventional artificial noise generation...

10.1109/mnet.2015.7018202 article EN IEEE Network 2015-01-01

As the next generation digital TV (DTV) standard, ATSC 3.0 system is developed to provide significant improvements on spectrum efficiency, service reliability, flexibility, and forward compatibility. One of top-priority requirements for capability deliver reliable mobile services a large variety indoor devices. Layered-division-multiplexing (LDM) physical-layer non-orthogonal-multiplexing technology efficiently multiple with different robustness throughputs in one channel. A two-layer LDM...

10.1109/tbc.2015.2505408 article EN IEEE Transactions on Broadcasting 2016-01-13

Recently, big data analytics has received important attention in a variety of application domains including business, finance, space science, healthcare, telecommunication and Internet Things (IoT). Among these areas, IoT is considered as an platform bringing people, processes, things/objects together order to enhance the quality our everyday lives. However, key challenges are how effectively extract useful features from massive amount heterogeneous generated by resource-constrained devices...

10.1109/access.2017.2682640 article EN cc-by-nc-nd IEEE Access 2017-01-01

Full-duplex (FD) wireless technology enables a radio to transmit and receive on the same frequency band at time, it is considered be one of candidate technologies for fifth generation (5G) beyond communication systems due its advantages, including potential doubling capacity increased spectrum utilization efficiency. However, main challenges FD mitigation strong self-interference (SI). Recent advances in different SI cancellation techniques, such as antenna cancellation, analog digital...

10.1109/comst.2017.2773628 article EN IEEE Communications Surveys & Tutorials 2017-11-15

While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes root security vulnerabilities in communications. In light this, physical-layer authentication, which is based on exploitation dynamics physical layer attributes, emerging as an effective approach to enhancing security. this article, we first review existing authentication techniques and identify their current limitations, ranging from low reliability difficulties integrating these with...

10.1109/mcom.2016.7498103 article EN IEEE Communications Magazine 2016-06-01

Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along stringent latency requirements in brings new challenges security provisioning due to the potential frequent handovers and authentications cells HetNets. In article, we review related studies introduce SDN into platform enable efficient authentication hand-over privacy protection. Our...

10.1109/mcom.2015.7081072 article EN IEEE Communications Magazine 2015-04-01

Cognitive radio (CR) has been considered as a potential candidate for addressing the spectrum scarcity problem of future wireless networks. Since its conception, several researchers, academic institutions, industries, and regulatory standardization bodies have put their significant efforts toward realization CR technology. However, this technology adapts transmission based on surrounding environment, practical issues may need to be considered. In practice, imperfections, such noise...

10.1109/comst.2015.2452414 article EN IEEE Communications Surveys & Tutorials 2015-01-01

In this paper, we consider a cognitive radio network that consists of one base station (CBS) and multiple users (CUs) in the presence eavesdroppers, where CUs transmit their data packets to CBS under primary user's quality service (QoS) constraint while eavesdroppers attempt intercept transmissions from CBS. We investigate physical-layer security against eavesdropping attacks propose user scheduling scheme achieve multiuser diversity for improving level with QoS constraint. Specifically,...

10.1109/tcomm.2013.111213.130235 article EN IEEE Transactions on Communications 2013-12-01

A novel physical layer authentication scheme is proposed in this paper by exploiting the time-varying carrier frequency offset (CFO) associated with each pair of wireless communications devices. In realistic scenarios, radio oscillators transmitter-and-receiver always present device-dependent biases to nominal oscillating frequency. The combination these and mobility-induced Doppler shift, characterized as a CFO, can be used radiometric signature for device authentication. scheme, variable...

10.1109/tcomm.2014.032914.120921 article EN IEEE Transactions on Communications 2014-04-23

By leveraging direct device-to-device interaction, LTE vehicle-to-vehicle (V2V) communication becomes a promising solution to meet the stringent requirements of vehicular communication. In this paper, we propose jointly optimizing radio resource, power allocation, and modulation/coding schemes V2V communications, in order guarantee latency reliability user equipments (VUEs) while maximizing information rate cellular equipment (CUE). To ensure solvability optimization problem, packet...

10.1109/twc.2018.2816942 article EN IEEE Transactions on Wireless Communications 2018-03-29

With the emergence of 4k/8k video, throughput requirement video delivery will keep grow to tens Gbps. Other new high-throughput and low-latency applications including augmented reality (AR), virtual (VR), online gaming, are also proliferating. Due related stringent requirements, supporting these over wireless local area network (WLAN) is far beyond capabilities WLAN standard - IEEE 802.11ax. To meet emerging demands, 802.11 release a amendment 802.11be Extremely High Throughput (EHT), known...

10.1109/comst.2020.3012715 article EN IEEE Communications Surveys & Tutorials 2020-01-01

In the practical radar with multiple antennas, antenna imperfections degrade system performance. this paper, problem of estimating direction arrival (DOA) in multiple-input and multiple-output (MIMO) unknown mutual coupling effect between antennas is investigated. To exploit target sparsity spatial domain, compressed sensing (CS)-based methods have been proposed by discretizing detection area formulating dictionary matrix, so an \emph{off-grid} gap caused discretization processes. different...

10.1109/tsp.2018.2881663 article EN IEEE Transactions on Signal Processing 2018-11-16

Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique that relies on the intrinsic hardware characteristics of wireless devices. This paper designs a deep learning-based RFFI scheme for Long Range (LoRa) systems. Firstly, instantaneous carrier offset (CFO) found to drift, which could result in misclassification and significantly compromise stability system. CFO compensation demonstrated be effective mitigation. Secondly, three signal representations...

10.1109/jsac.2021.3087250 article EN IEEE Journal on Selected Areas in Communications 2021-06-08

Unmanned Aerial Vehicles (UAVs) have received a wide range of attention for military and commercial applications. Enhanced with communication capability, UAVs are considered to play important roles in the Sixth Generation (6G) networks due their low cost flexible deployment. 6G is supposed be an all-coverage network provide ubiquitous connections space, air, ground underwater. able air-borne wireless coverage flexibly, serving as aerial base stations users, relays connect isolated nodes, or...

10.1016/j.cja.2021.04.025 article EN cc-by-nc-nd Chinese Journal of Aeronautics 2021-05-28

Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations provide effective coverage for terrestrial users. However, the security of NOMA-UAV systems remains a challenge due line-of-sight air-to-ground channels and higher transmission power weaker users NOMA. In this paper, we propose two schemes guarantee secure UAV-NOMA networks. When only one user requires transmission, derive...

10.1109/tvt.2020.2972617 article EN IEEE Transactions on Vehicular Technology 2020-02-11

Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a promising technology that aids in achieving full-space coverage on both sides of the surface, by splitting incident signal into transmitted reflected signals. This paper investigates resource allocation problem STAR-RIS-assisted multi-carrier communication networks. To maximize system sum-rate, joint optimization comprising channel assignment, power allocation, transmission reflection beamforming at...

10.1109/twc.2022.3160151 article EN IEEE Transactions on Wireless Communications 2022-03-23

The autonomous interpretation of application intent (APPI) represents the primary step towards achieving closed-loop autonomy in zero-touch networking (ZTN) and also a prerequisite for intent-based (IBN). However, understanding APPIs invoking corresponding network resources require professionals with extensive technical expertise to customize service requests (NSRs), which presents significant challenges large-scale deployment ZTN. This paper investigates an interesting problem ZTN, where...

10.1109/tcomm.2025.3529260 article EN IEEE Transactions on Communications 2025-01-01
Coming Soon ...