- Wireless Communication Security Techniques
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- Radar Systems and Signal Processing
- Vehicular Ad Hoc Networks (VANETs)
- Advanced MIMO Systems Optimization
- Full-Duplex Wireless Communications
- Distributed Sensor Networks and Detection Algorithms
- Indoor and Outdoor Localization Technologies
- Hate Speech and Cyberbullying Detection
- Antenna Design and Optimization
- Autonomous Vehicle Technology and Safety
- Target Tracking and Data Fusion in Sensor Networks
- Advanced Steganography and Watermarking Techniques
- Speech and Audio Processing
- Advanced Wireless Communication Techniques
- Tensor decomposition and applications
- Microwave Imaging and Scattering Analysis
- Digital Holography and Microscopy
- Advanced Image Processing Techniques
- Advanced SAR Imaging Techniques
- Traffic Prediction and Management Techniques
- Wireless Body Area Networks
- IoT Networks and Protocols
Beijing Jiaotong University
2024-2025
Tsinghua University
2022-2025
Huawei Technologies (China)
2022
Future University Hakodate
2017-2021
Xidian University
2021
Icahn School of Medicine at Mount Sinai
2010
ABSTRACT This paper investigates the optimal beamforming design for covert communication in a multiple‐input multiple‐output (MIMO) relay system consisting of source, destination, and warden. For both scenarios when each transmitting node knows perfect or partial warden's channel state information (CSI), we first develop theoretical models to depict inherent relationship between matrices at source/relay end‐to‐end performance regard minimum detection error probability capacity. Based on...
This paper investigates the fundamental covert rate performance in a D2D-enabled cellular network consisting of user Alice, base station BS, an active warden Willie, and D2D pair with transmitter <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$D_{t}$</tex-math></inline-formula> full-duplex receiver notation="LaTeX">$D_{r}$</tex-math></inline-formula> . To conduct communication between Alice transmits...
This paper explores a new secure wireless communication scenario for the data collection in Internet of Things (IoT) where physical layer security technology is applied to counteract both detection and eavesdropping attacks, such that critical covertness secrecy properties are jointly guaranteed. We first provide theoretical modeling outage probability (COP), (SOP) transmission (TP) depict covertness, performances system. To understand fundamental performance under system, we then define...
Covert communication aims to achieve secure communications among legitimate network nodes by hiding the existence of transmission in first place. Previous work on covert mainly focus performance analysis single hop systems, while two-hop systems remains largely unknown. This paper, for time, focuses maximum throughput a wireless system where source only communicates with destination via relay node. The hypothesis testing problem is developed model probability false alarms and missed...
In this paper, we propose a practical integrated sensing and communications (ISAC) framework to sense dynamic targets from clutter environment while ensuring users quality. To implement function simultaneously, design multiple beams that can communicate with the as well one beam rotate scan entire space. minimize interference of on existing systems, divide service area into <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">sensing for (S4S)...
Integrated sensing and communications (ISAC) is one of the potential key technologies sixth-generation (6G) that could enhance information interaction ability among network nodes. Since tensor technology can excellently store, process, analyze a large amount multi-dimensional data generated by modern wireless systems, it has aroused great research interest in both academia industry. In this article, we present general review on decompositions for ISAC. We first describe commonly used tensors...
This work investigates the covert communication in a D2D (device-to-device)-enabled cellular network, where user CT wants to transmit message covertly another CR through base station BS without being detected by multiple non-colluding wardens with help of an underlaying pair. Although can confuse wardens, it also interfere link. To fully understand impact on link, we first explore average minimum detection error probability wardens. Then, rate link is studied. Eventually, expansive numerical...
An algorithm is presented for restoration of colour microscopic images with distortions from imperfect microscope lenses having transverse chromatic aberrations, resulting in a magnification that slightly varies wavelengths or colours. The differential each component image computed as the difference between and its magnified version. absolute values are generally higher at edges where greater discontinuities occur. two cross-correlation functions differentials red green colours blue then...
In this letter, we investigate the joint beamspace waveform design and beam selection problem for lens antenna array (LAA)-assisted integrated sensing communication (ISAC) systems. The LAA effectively reduces number of required radio frequency (RF) chains by transforming dense spatial domain channel into a sparse channel. We adopt more practical power consumption model aim to minimize system while guaranteeing performance. involves l0 norm transmitting signal, which makes objective...
This paper exploits the multi-antenna technique to enhance covert communication performance in a relay system, where source S conducts with destination D via R, subjecting detections of transmissions two hops from single-antenna warden W. To demonstrate gain adopting technique, we first consider scenario when S, R and all adopt single antenna, apply hypothesis testing statistics theories develop theoretical framework for modeling terms detection error probability (DEP) throughput. We then...
We propose a novel integrated sensing and communication (ISAC) system, where the base station (BS) passively senses channel parameters using information carrying signals from user. To simultaneously guarantee decoding performance, user adopts sparse regression codes (SPARCs) with cyclic redundancy check (CRC) to transmit its bits. The BS generates an initial coarse estimation of after receiving pilot signal. Then, iterative parameter algorithm is proposed, correctly decoded codewords...
This paper explores a new secure wireless communication paradigm where the physical layer security technology is applied to counteract both detection and eavesdropping attacks, such that critical covertness secrecy properties of are jointly guaranteed. We first provide theoretical modeling for outage probability (COP), (SOP) transmission (TP) depict covertness, performances paradigm. To understand fundamental performance under paradigm, we then define metric - covert rate (CSR), which...
In this paper, we investigate the performance of space-time block-coded multiple-input-multiple-output (STBCMIMO) LoRa system over Nakagami-m and Ricean fading channels with perfect imperfect channel state information (CSI). Specifically, derive closed-form bit-error-rate expressions analyze diversity order STBC-MIMO CSI, where two common estimation error models are considered. Moreover, perform simulations to evaluate coverage verify accuracy theoretical analyses.
Covert communication can be traced back to secret information transmission technology. It aims ensure that the transmitters and receivers establish reliable with a low probability detection by warden in wireless communications. The scenario of this paper assumes covert multiple-input-multiple-output (MIMO) two-hop relay system, which transmitter multi-antenna sends messages receiver via single-antenna half-duplex against warden. We first propose an antenna selection scheme covertness...
This paper focuses on the covert communication in a multi-input multi-output (MIMO) system, where multiantenna transmitter A conducts with multi-antenna receiver B help of jammer J, against detection single-antenna warden W. We first provide theoretical modeling for error probability at W and rate from to B. then explore optimal jamming design J based zero-forcing (ZF) beamforming devise an iterative algorithm determine related precoding matrix maximization. Finally, we extensive numerical...