Xuefei Zhang

ORCID: 0000-0001-7096-9667
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Indoor and Outdoor Localization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • Age of Information Optimization
  • Wireless Signal Modulation Classification
  • Caching and Content Delivery
  • Advanced Wireless Network Optimization
  • Underwater Vehicles and Communication Systems
  • Antibiotic Resistance in Bacteria
  • Satellite Communication Systems
  • Mobile Ad Hoc Networks
  • Energy Efficient Wireless Sensor Networks
  • Vibrio bacteria research studies
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • Complex Network Analysis Techniques
  • IoT Networks and Protocols
  • Transportation and Mobility Innovations
  • Image Processing and 3D Reconstruction

Beijing University of Posts and Telecommunications
2016-2025

China Centre for Resources Satellite Data and Application
2024

Ministry of Natural Resources
2020-2024

Tianjin Research Institute of Electric Science (China)
2020-2024

Fudan University
2020-2024

Linyi University
2010-2024

Huashan Hospital
2020-2024

First Hospital of Shijiazhuang
2024

Network Technologies (United States)
2022-2024

Qingdao University
2024

The deployment of cloud and edge computing forms a three-tier mobile network, where each task can be processed locally, by the nodes, or remote server. In this paper, we consider cooperative network leveraging vertical cooperation among devices, nodes servers, as well horizontal between nodes. jointly optimize offloading decision computation resource allocation to minimize average duration subject limited battery capacity devices. However, formulated problem is large-scale mixed integer...

10.1109/tvt.2019.2892176 article EN IEEE Transactions on Vehicular Technology 2019-01-10

In recent years, the privacy issue in Vehicular Edge Computing (VEC) has gained a lot of concern. The problem is even more severe autonomous driving business than other businesses VEC such as ordinary navigation. Federated learning (FL), which privacy-preserved strategy proposed by Google, become hot trend to solve many fields including VEC. Therefore, we introduce FL into preserve vehicular keeping original data local vehicle and sharing training model parameter only with help MEC server....

10.1109/tits.2021.3081560 article EN IEEE Transactions on Intelligent Transportation Systems 2021-06-16

The demand for lithium resources is increasing sharply with the rapid development of electric vehicles. It great economic significance to expand geological and improve utilization rate lithium-containing salt lakes. In this paper, hydrochemical types lakes in Tibet Plateau were classified according a large amount data obtained from recent investigation on Plateau. addition, extraction methods used within each type area analyzed summarized, which provided reference selection processes same...

10.1016/j.gsf.2022.101485 article EN cc-by-nc-nd Geoscience Frontiers 2022-10-04

Facing the dramatic increase of mobile devices and scarcity spectrum resources, grant-free nonorthogonal multiple access (NOMA) emerges as an enabling technology for massive access, which also reduces signaling overhead latency effectively. However, in NOMA systems, collisions resulting from uncoordinated resource selection can cause severe interference reduce system throughput. In this article, we apply deep reinforcement learning (DRL) decision making to mitigate improve throughput unknown...

10.1109/jiot.2020.2972274 article EN IEEE Internet of Things Journal 2020-02-07

Low latency/delay is one of the most critical requirements for application vehicular networks. However, frequent real-time information update caused by vehicles high mobility liable to aggravate delay. Meanwhile, task migration between different edge computing (VEC) servers results in an amount delay if cannot be completed before vehicle moves out coverage current VEC server. In this paper, problem concluded as when and whom offload VEC, which formulated a finite horizon Markov decision...

10.1109/tvt.2020.2965159 article EN IEEE Transactions on Vehicular Technology 2020-01-09

To alleviate the backhaul burden and reduce user-perceived latency, content caching at base stations has been identified as a key technology. However, strategy design wireless edge is challenging, especially when both wired condition channel quality are considered in optimization. In this paper, taking into account conditions of terms delay quality, joint optimization user association policy to minimize average download studied cache-enabled heterogeneous network. We first prove problem...

10.1109/access.2016.2633488 article EN cc-by-nc-nd IEEE Access 2016-01-01

Purpose . To investigate the activity of antioxidative enzymes and products oxidative stress in patients with age-related cataracts compare findings those healthy control subjects. Method Sixty cataract sixty controls matched age gender were included this study. Serum samples obtained to detect superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GSH-Px), oxidation degradation malondialdehyde (MDA), 4-hydroxynonenal (4-HNE), conjugated diene (CD), advanced protein (AOPP),...

10.1155/2013/587826 article EN Oxidative Medicine and Cellular Longevity 2013-01-01

In a cache-enabled D2D underlaid cellular network, cooperation of BS caching and can further exploit the limited storage capacity achieve more efficient wireless resource utilization. this complex network scenario, closed form expression for successful transmission probability is firstly derived using stochastic geometry, to measure proportion users satisfying delay guarantee. On basis, cooperative placement problem formulated maximize probability. We prove it be transformed equivalently...

10.1109/lcomm.2017.2664805 article EN IEEE Communications Letters 2017-02-07

This article investigates the prominent dilemma between capacity and reliability in heterogeneous ultra-dense distributed networks, advocates a new measure of effective to quantify maximum sustainable data rate link while preserving quality service such networks. Recent breakthroughs are brought forth developing theory Potential applications demonstrated on admission control, power resource allocation with substantial gains revealed over existing technologies. is particular interest...

10.1109/mcom.2018.1700474 article EN IEEE Communications Magazine 2018-06-01

In heterogeneous Internet of Things (IoT) networks, various communication technologies lead to different transmission ranges nodes, and they can cooperatively provide seamless communication. Unfortunately, the flexible mode offers more chances for malware invade IoT devices. To maintain its cyber security, two key issues, i.e. critical threshold onset propagation lowest-cost defense strategy after it occurs, need be addressed. solve first challenge, we construct a dynamics model by using...

10.1109/tifs.2023.3284214 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT). Two SWIPT relaying strategies, namely, splitting (SPS) time switching (STS), are studied objective of secrecy rate (SR) energy efficiency (SEE) maximization. First, high signal-to-noise ratio approximations SR SEE established, based on which non-convex SPS-based convex STS-based maximization problems formulated to...

10.1109/access.2018.2804903 article EN cc-by-nc-nd IEEE Access 2018-01-01

Grant-free transmission is considered as a promising technology to support sporadic data in massive machine-type communications (mMTC). Due the distributed manner, high collision probability an inherent drawback of grant-free access techniques. Non-orthogonal multiple (NOMA) expected be used uplink transmission, multiplying connection opportunities by exploiting power domain resources. However, it usually applied for coordinated transmissions where base station performs coordination with...

10.1109/pimrc.2018.8580806 article EN 2018-09-01

Ultra-low latency communication for mobile intelligent machines, such as autonomous vehicles and robots, is a central technology in Internet of Things (IoT) to achieve system reliability. Proactive network association has been suggested ultra-low under the assistance edge computing. Highly dynamic stochastic nature IoT machines suggests applying machine learning methodology effectively enhance proactive association. In this paper, an online proposed distributed computing networking scenario,...

10.1109/twc.2020.2984599 article EN IEEE Transactions on Wireless Communications 2020-04-07

In the emerging Internet-of-Things (IoT) paradigm, freshness of sensory information plays a crucial role in online data-analyzing and application-level decision-making. As tailor-made performance metric freshness, age (AoI) depends on data transmission efficiency update frequency, which are energy demanding for IoT devices with limited battery capacity. To alleviate constraints low-power devices, we propose an AoI-oriented unmanned aerial vehicle (UAVs)-enabled wireless power scheme, where...

10.1109/wcnc51071.2022.9771588 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022-04-10

End-to-end semantic communications (ESC) rely on deep neural networks (DNN) to boost communication efficiency by only transmitting the semantics of data, showing great potential for high-demand mobile applications. We argue that central success ESC is robust interpretation conveyed at receiver side, especially security-critical applications such as automatic driving and smart healthcare. However, robustifying challenging extremely vulnerable physical-layer adversarial attacks due openness...

10.1109/jsac.2023.3288249 article EN IEEE Journal on Selected Areas in Communications 2023-06-23

In this paper, we study the coverage probability and average data rate of user pairing in cooperative non-orthogonal multiple access (NOMA) networks. With fixed locations source typical user, candidate users for follow homogeneous Poisson point process. Considering geometric distance between nodes, close-to-user (CUP) close-to-source (CSP) schemes are investigated with near acting as half-duplex relay or full-duplex (FD) relay. Lower bounds on approximately obtained using stochastic geometry...

10.1109/access.2018.2884014 article EN cc-by-nc-nd IEEE Access 2018-01-01

To balance the contradiction between rapid growth of data service demands and limited spectrum resources, wireless network virtualization (WNV) has been proposed as a promising technology by isolating sharing resources among different virtual networks in future networks. In this paper, two-dimension-time-scale hierarchical resource allocation scheme is multi-service virtualized network, which consists three 5G generic scenarios. The slicing problem decomposed into two time scales including...

10.1109/tvt.2020.3019217 article EN IEEE Transactions on Vehicular Technology 2020-08-24

Consensus is one of the most important issues a blockchain system because it necessary process to reach an agreement between group separated nodes that do not trust each other in decentralized framework. Most existing consensus works assume time block propagation among during ignorable, i.e., always successfully reaches every participating node period far shorter than mining time. However, when used vehicular <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/jiot.2021.3074924 article EN IEEE Internet of Things Journal 2021-04-22
Coming Soon ...