Huihui Wu

ORCID: 0009-0002-9890-0877
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Radar Systems and Signal Processing
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced MIMO Systems Optimization
  • Full-Duplex Wireless Communications
  • Distributed Sensor Networks and Detection Algorithms
  • Indoor and Outdoor Localization Technologies
  • Hate Speech and Cyberbullying Detection
  • Antenna Design and Optimization
  • Autonomous Vehicle Technology and Safety
  • Target Tracking and Data Fusion in Sensor Networks
  • Advanced Steganography and Watermarking Techniques
  • Speech and Audio Processing
  • Advanced Wireless Communication Techniques
  • Tensor decomposition and applications
  • Microwave Imaging and Scattering Analysis
  • Digital Holography and Microscopy
  • Advanced Image Processing Techniques
  • Advanced SAR Imaging Techniques
  • Traffic Prediction and Management Techniques
  • Wireless Body Area Networks
  • IoT Networks and Protocols

Beijing Jiaotong University
2024-2025

Tsinghua University
2022-2025

Huawei Technologies (China)
2022

Future University Hakodate
2017-2021

Xidian University
2021

Icahn School of Medicine at Mount Sinai
2010

ABSTRACT This paper investigates the optimal beamforming design for covert communication in a multiple‐input multiple‐output (MIMO) relay system consisting of source, destination, and warden. For both scenarios when each transmitting node knows perfect or partial warden's channel state information (CSI), we first develop theoretical models to depict inherent relationship between matrices at source/relay end‐to‐end performance regard minimum detection error probability capacity. Based on...

10.1002/ett.70063 article EN Transactions on Emerging Telecommunications Technologies 2025-02-01

This paper investigates the fundamental covert rate performance in a D2D-enabled cellular network consisting of user Alice, base station BS, an active warden Willie, and D2D pair with transmitter <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$D_{t}$</tex-math></inline-formula> full-duplex receiver notation="LaTeX">$D_{r}$</tex-math></inline-formula> . To conduct communication between Alice transmits...

10.1109/tmc.2024.3371377 article EN IEEE Transactions on Mobile Computing 2024-03-08

This paper explores a new secure wireless communication scenario for the data collection in Internet of Things (IoT) where physical layer security technology is applied to counteract both detection and eavesdropping attacks, such that critical covertness secrecy properties are jointly guaranteed. We first provide theoretical modeling outage probability (COP), (SOP) transmission (TP) depict covertness, performances system. To understand fundamental performance under system, we then define...

10.1109/jiot.2023.3296368 article EN cc-by-nc-nd IEEE Internet of Things Journal 2023-07-18

Covert communication aims to achieve secure communications among legitimate network nodes by hiding the existence of transmission in first place. Previous work on covert mainly focus performance analysis single hop systems, while two-hop systems remains largely unknown. This paper, for time, focuses maximum throughput a wireless system where source only communicates with destination via relay node. The hypothesis testing problem is developed model probability false alarms and missed...

10.1109/nana.2017.55 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2017-10-01

In this paper, we propose a practical integrated sensing and communications (ISAC) framework to sense dynamic targets from clutter environment while ensuring users quality. To implement function simultaneously, design multiple beams that can communicate with the as well one beam rotate scan entire space. minimize interference of on existing systems, divide service area into <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">sensing for (S4S)...

10.1109/twc.2024.3377184 article EN IEEE Transactions on Wireless Communications 2024-03-25

10.1109/wcnc57260.2024.10570670 article NO 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2024-04-21

Integrated sensing and communications (ISAC) is one of the potential key technologies sixth-generation (6G) that could enhance information interaction ability among network nodes. Since tensor technology can excellently store, process, analyze a large amount multi-dimensional data generated by modern wireless systems, it has aroused great research interest in both academia industry. In this article, we present general review on decompositions for ISAC. We first describe commonly used tensors...

10.1109/mcom.001.2300578 article EN IEEE Communications Magazine 2024-09-01

This work investigates the covert communication in a D2D (device-to-device)-enabled cellular network, where user CT wants to transmit message covertly another CR through base station BS without being detected by multiple non-colluding wardens with help of an underlaying pair. Although can confuse wardens, it also interfere link. To fully understand impact on link, we first explore average minimum detection error probability wardens. Then, rate link is studied. Eventually, expansive numerical...

10.1109/nana60121.2023.00114 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2023-08-01

An algorithm is presented for restoration of colour microscopic images with distortions from imperfect microscope lenses having transverse chromatic aberrations, resulting in a magnification that slightly varies wavelengths or colours. The differential each component image computed as the difference between and its magnified version. absolute values are generally higher at edges where greater discontinuities occur. two cross-correlation functions differentials red green colours blue then...

10.1111/j.1365-2818.2010.03443.x article EN Journal of Microscopy 2010-08-26

In this letter, we investigate the joint beamspace waveform design and beam selection problem for lens antenna array (LAA)-assisted integrated sensing communication (ISAC) systems. The LAA effectively reduces number of required radio frequency (RF) chains by transforming dense spatial domain channel into a sparse channel. We adopt more practical power consumption model aim to minimize system while guaranteeing performance. involves l0 norm transmitting signal, which makes objective...

10.1109/lwc.2024.3388001 article EN IEEE Wireless Communications Letters 2024-04-12

10.1109/wcnc57260.2024.10570636 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2024-04-21

This paper exploits the multi-antenna technique to enhance covert communication performance in a relay system, where source S conducts with destination D via R, subjecting detections of transmissions two hops from single-antenna warden W. To demonstrate gain adopting technique, we first consider scenario when S, R and all adopt single antenna, apply hypothesis testing statistics theories develop theoretical framework for modeling terms detection error probability (DEP) throughput. We then...

10.48550/arxiv.2407.11882 preprint EN arXiv (Cornell University) 2024-07-16

We propose a novel integrated sensing and communication (ISAC) system, where the base station (BS) passively senses channel parameters using information carrying signals from user. To simultaneously guarantee decoding performance, user adopts sparse regression codes (SPARCs) with cyclic redundancy check (CRC) to transmit its bits. The BS generates an initial coarse estimation of after receiving pilot signal. Then, iterative parameter algorithm is proposed, correctly decoded codewords...

10.48550/arxiv.2411.05531 preprint EN arXiv (Cornell University) 2024-11-08

This paper explores a new secure wireless communication paradigm where the physical layer security technology is applied to counteract both detection and eavesdropping attacks, such that critical covertness secrecy properties of are jointly guaranteed. We first provide theoretical modeling for outage probability (COP), (SOP) transmission (TP) depict covertness, performances paradigm. To understand fundamental performance under paradigm, we then define metric - covert rate (CSR), which...

10.48550/arxiv.2008.00147 preprint EN other-oa arXiv (Cornell University) 2020-01-01

In this paper, we investigate the performance of space-time block-coded multiple-input-multiple-output (STBCMIMO) LoRa system over Nakagami-m and Ricean fading channels with perfect imperfect channel state information (CSI). Specifically, derive closed-form bit-error-rate expressions analyze diversity order STBC-MIMO CSI, where two common estimation error models are considered. Moreover, perform simulations to evaluate coverage verify accuracy theoretical analyses.

10.1109/vtc2022-spring54318.2022.9860864 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2022-06-01

Covert communication can be traced back to secret information transmission technology. It aims ensure that the transmitters and receivers establish reliable with a low probability detection by warden in wireless communications. The scenario of this paper assumes covert multiple-input-multiple-output (MIMO) two-hop relay system, which transmitter multi-antenna sends messages receiver via single-antenna half-duplex against warden. We first propose an antenna selection scheme covertness...

10.1109/nana53684.2021.00019 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2021-10-01

This paper focuses on the covert communication in a multi-input multi-output (MIMO) system, where multiantenna transmitter A conducts with multi-antenna receiver B help of jammer J, against detection single-antenna warden W. We first provide theoretical modeling for error probability at W and rate from to B. then explore optimal jamming design J based zero-forcing (ZF) beamforming devise an iterative algorithm determine related precoding matrix maximization. Finally, we extensive numerical...

10.1109/nana60121.2023.00028 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2023-08-01
Coming Soon ...