Xiaoming Xu

ORCID: 0009-0009-4670-8411
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Full-Duplex Wireless Communications
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Antenna Design and Analysis
  • Indoor and Outdoor Localization Technologies
  • Cognitive Radio Networks and Spectrum Sensing
  • Chaos-based Image/Signal Encryption
  • Antenna Design and Optimization
  • Wireless Body Area Networks
  • Reservoir Engineering and Simulation Methods
  • Cryptographic Implementations and Security
  • Millimeter-Wave Propagation and Modeling
  • Speech and Audio Processing
  • Wireless Communication Networks Research
  • Hydraulic Fracturing and Reservoir Analysis
  • Hydrocarbon exploration and reservoir analysis
  • Human Resource and Talent Management
  • Flexible and Reconfigurable Manufacturing Systems
  • IoT Networks and Protocols
  • Wireless Signal Modulation Classification
  • Advanced Authentication Protocols Security
  • UAV Applications and Optimization

PLA Information Engineering University
2020-2024

Xinjiang University
2023-2024

Shanghai Institute of Technology
2021

Daqing Oilfield General Hospital
2021

PLA Army Engineering University
2012-2019

System Equipment (China)
2017-2018

Zhengzhou University of Science and Technology
2018

Louisiana State University Health Sciences Center New Orleans
2018

Research Institute of Petroleum Exploration and Development
2013-2016

China Institute Of Communications
2014

In this letter, we investigate the secure transmission in a cognitive satellite-terrestrial network with multi-antennas eavesdropper, where interference from terrestrial base station is introduced to enhance security of satellite link. Our objective minimize transmit power by jointly optimizing cooperative beamforming and artificial noise while guaranteeing secrecy rate constraint for link, information link total constraint. Both scenarios perfect imperfect channel cases are considered. The...

10.1109/lwc.2017.2755014 article EN IEEE Wireless Communications Letters 2017-09-21

Spectrum efficiency (SE) and energy (EE) in secure communications have attracted much attention recently due to the fact that future wireless networks need address issues of high throughput, low power consumption, level security. However, maximizing EE SE are conflicting objectives, which can hardly be achieved simultaneously. In this paper, we develop a framework study for transmission underlay random cognitive radio (CR) where primary, secondary, eavesdropper nodes randomly distributed...

10.1109/jsac.2016.2605901 article EN IEEE Journal on Selected Areas in Communications 2016-09-02

CSI-Based physical layer authentication is a promising candidate to achieve fast and lightweight for wireless communication. However, the current methods usually cannot initial are susceptible channel noise. Besides, learning-aided requires illegitimate state information (CSI) samples that difficult obtain. This letter proposes newly deep-CSI-based scheme solve above problems. We map CSI device's location further its authenticated identity via deep learning in static environment. Therefore,...

10.1109/lwc.2022.3180901 article EN IEEE Wireless Communications Letters 2022-06-08

Reconfigurable intelligent surface (RIS), which can manipulate the wireless environment, has recently been integrated into physical-layer key generation (PKG) systems to establish randomness symmetric keys in static environments. However, few studies have jointly considered optimization and randomization of RIS elements simultaneously achieve a high rate (KGR) communication performance. This study proposes RIS-assisted security-integrated protocol for dual-function integration enhancement...

10.1109/jiot.2024.3390677 article EN IEEE Internet of Things Journal 2024-04-23

Millimeter wave (mm-wave) communications, especially mm-wave relay systems, have been considered as a key technology for next-generation wireless networks due to the rich spectrum resources. However, problem of information leakage in systems has not well investigated. In this paper, artificial noise (AN) aided two-stage secure hybrid beamforming algorithm is proposed MIMO system from perspective physical layer security. each time slot RF analog matrices are designed first stage, and baseband...

10.1109/access.2019.2902144 article EN cc-by-nc-nd IEEE Access 2019-01-01

The authors study the secure transmission design in random cognitive radio networks where primary users, secondary users and eavesdroppers are randomly distributed according to Poisson point processes. Centring on this scenario, propose a simple decentralised scheme by jointly incorporating secrecy guard zone artificial noise. In particular, helps enhance performance via differentiating between transmitters accordance with eavesdropping environment. They then analyse connection outage of...

10.1049/iet-com.2016.0117 article EN cc-by IET Communications 2016-06-28

Abstract The propagation of electromagnetic waves will produce multi‐path fading wireless channel, which degrades communication performance substantially. If can be separated, better signal transmission and reception strategies designed to weaken or eliminate improve performance. However, it is challenging for nodes with limited number antennas. A general separation measurement framework based on single dynamic metasurface antenna established rapidly changes patterns within a pilot symbol...

10.1049/cmu2.12341 article EN cc-by IET Communications 2022-01-22

This work investigates the secure transmission in wireless information and power transfer system where a source node communicates with wireless-powered full-duplex destination presence of passive eavesdropper. In particular, we propose such two-phase time-sharing (TS) communication protocol: first phase, energy harvesting is conducted from to node, while second transmits information-bearing signal under protection artificial noise sent node. It worth mention that this at converted harvested...

10.1109/wcsp.2015.7341300 article EN 2015-10-01

This study investigates the physical-layer security in random cognitive radio network (CRN) consisting of randomly distributed primary nodes, secondary relay nodes and eavesdroppers, where share spectrum eavesdroppers attempt to intercept transmissions. The authors develop a framework analysis reliability–reliability tradeoff (RRT) security–reliability (SRT) CRNs, reliability are quantified terms secrecy outage probability connection probability. RRT evaluates performance between networks...

10.1049/iet-com.2016.0702 article EN IET Communications 2016-09-21

Existing handover authentication schemes are implemented in the upper layer through cryptographic techniques with different protocols and parameters involved under scenarios, introducing high latency complexity especially next generation (5G) highly heterogeneous network (HetNet). The authors propose to introduce wireless link signatures decided by users' locations as data achieve unified fast at physical 5G software defined networking‐based HetNet. Specifically, unique channel...

10.1049/iet-com.2018.5405 article EN IET Communications 2018-09-16

Delay and security are both highly concerned in massive internet of things (IoT) which is a promising application scenario 5G wireless communication system. In this study, the authors develop an integrated framework to study delay performance secrecy IoT. First, stochastic geometry queuing theory applied model spatially location IoT devices temporal arrival packets. To enhance physical layer with limited overhead increment at devices, low‐complexity noise injection scheme applied. Then,...

10.1049/iet-com.2018.5570 article EN IET Communications 2018-10-04

Essentially, array signal processing should jointly consider design and element design. However, conventional structure based technologies separate multi-stream signals by the different receptions among uncorrelated elements, which utilize gains only ignore antenna gains. When aperture is limited, receiving matrix ill-conditioned with reduced rank signal-separation capability cannot be further improved increasing number of elements. This paper propose space-time isomeric array, in each has...

10.1109/wcsp49889.2020.9299669 article EN 2020-10-21

In this paper, we investigate the secrecy outage probability (SOP) for cooperative decode-and-forward (DF) underlay cognitive radio networks (CRNs). Duo to spectrum sharing approach in CRNs, secondary transmitters (secondary source (SU <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">S</sub> ) and relay xmlns:xlink="http://www.w3.org/1999/xlink">R</sub> )) are subjected interference power constraint at primary user (PU), SU receivers destination...

10.1109/wcnc.2014.6952044 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2014-04-01

In this paper, secure communication for RF-powered cognitive networks has been investigated in which the secondary source (SS) transmits confidential information to destination (SD) using harvested energy form primary transmitter (PT) presence of a passive eavesdropper (SE). Note that transmission power at SS is subject two important constraint: 1) maximum determined by energy, 2) peak interference permitted receiver (PR). order obtain practical design insights into reliability and security...

10.1109/wcsp.2016.7752665 article EN 2016-10-01

In this paper, we investigate the physical layer key generation scheme in most realistic scenarios where correlation between legitimate channel and eavesdropping is considered. To degrade improve capacity, a through scrambling correlated proposed. Firstly, artificial noise sent superimposed over pilots from transmitter to confuse eavesdropper. The precoding matrix randomly selected decomposed unitary matrices orthogonal resulting having no effect on channel. Then, vector quantization...

10.1109/access.2020.2979515 article EN cc-by IEEE Access 2020-01-01

<title>Abstract</title> The characteristic mode method is used to design a miniaturized dual-band dual circularly polarized (CP) implantable antenna operating in ISM bands. miniaturization and characteristics are gained by using the slotting inserting short-circuit probe between radiation patch ground plane. We use study current distribution of circular patches with T-shaped slots different modes. After opening cross-shaped slot at center plane, we obtained two orthogonal modes equal...

10.21203/rs.3.rs-4140931/v1 preprint EN cc-by Research Square (Research Square) 2024-04-04

When Internet of Things (IoT) nodes access the network through wireless channels, is vulnerable to spoofing attacks and Sybil attack. However, connection massive devices in IoT makes it difficult manage distribute keys, thus limiting application traditional high-level authentication schemes. Compared with scheme, physical layer scheme realizes lightweight users by comparing channel characteristics adjacent packets. schemes still adopt one-to-one method, which will consume numerous resources...

10.23919/jcc.2021.00.014 article EN China Communications 2021-12-15

The characteristic mode method is used to design a miniaturized dual-band dual circularly polarized (CP) implantable antenna operating in ISM bands. miniaturization and characteristics are gained by using the slotting inserting short-circuit probe between radiation patch ground plane. We use study current distribution of circular patches with T-shaped slots different modes. After opening cross-shaped slot at center plane, we obtained two orthogonal modes equal amplitude phase difference 90°...

10.1038/s41598-024-67027-4 article EN cc-by Scientific Reports 2024-07-16

Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize network delay performance secrecy performance. Firstly, stochastic geometry queueing theory adopted model location devices temporal arrival packets. Based on model, low-complexity on-off scheme is proposed improve Then, evaluated terms packet outage probability. It demonstrated that intensity arouse tradeoff between can...

10.1109/wcsp.2017.8171138 article EN 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP) 2017-10-01

The open and broadcast nature of wireless channels makes eavesdropping possible, leading to the inherent problem information leakage. Inherent problems should be solved by endogenous security functions. Accordingly, resolved channel-based mechanisms. Firstly, this paper analyzes principle physical-layer-secret-key method. Afterward, we propose a novel conjecture that in fast-fading environment, there must exist systems where secret key rate can match user data rate. Moreover, is well founded...

10.1109/iccc49849.2020.9238873 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2020-08-09

Full duplex (FD) protocol has been widely used in wireless communications, which could transmit and receive signals at the meantime. In this paper, considering worst-case channel uncertainty, opportunistic relaying jamming strategy decode-and-forward (DF) hybrid full/half-duplex (HD) relay system is proposed to enhance security. Specifically, works FD confidential first time slot. Then, switches HD decoded signals. Meanwhile, jammers emit cooperative (CJ) interfere eavesdropper two...

10.1186/s13638-016-0621-5 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2016-05-09

Many denture wearers suffer from fungal infections, particularly Candida albicans, due to failure properly clean or remove the prosthesis. These infections can cause stomatitis, which often leads irritated traumatized tissues. Current base materials do not have antifungal properties. We recently synthesized several new compounds containing 1,4-diazabicyclo [2.2.2] octane (DABCO) (DC16NF, DC11MAF, C2-DC11MAF) that shown significant properties.1 The purpose of this study is incorporate these...

10.31532/oralhealthdentstud.1.1.005 article EN Oral Health and Dental Studies 2018-08-29

This paper investigates the secrecy outage performance of amplify-and-forward (AF) relaying cooperative cognitive radio networks (CCRNs) over Rayleigh fading channels. Specifically, collaborative distributed beamforming is employed at relays to avoid interfering primary users. Moreover, passive eavesdropping scenario considered in this work, while channel state information not available secondary transmitter. The closed-form expression probability as well asymptotic have been derived....

10.1109/wocc.2016.7506623 article EN 2016-05-01

Spectral efficiency (SE) and energy (EE) in secure communications is of primary importance due to the fact that 5G wireless networks aim achieve high throughput, low power consumption level security. Nevertheless, maximizing SE EE are not achievable simultaneously. In this paper, we investigate tradeoff for transmission cognitive relay where all nodes randomly distributed. We first introduce opportunistic selection policy, each transmitter communicates with receiver help a secondary user as...

10.1109/cc.2017.8246336 article EN China Communications 2017-12-01
Coming Soon ...