- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- UAV Applications and Optimization
- Radar Systems and Signal Processing
- Full-Duplex Wireless Communications
- Advanced SAR Imaging Techniques
- Microwave Imaging and Scattering Analysis
- Chaos-based Image/Signal Encryption
- Error Correcting Code Techniques
- Satellite Communication Systems
- Optical Wireless Communication Technologies
- Indoor and Outdoor Localization Technologies
- Antenna Design and Analysis
- Direction-of-Arrival Estimation Techniques
- DNA and Biological Computing
- Energy Efficient Wireless Sensor Networks
- Wireless Signal Modulation Classification
- Millimeter-Wave Propagation and Modeling
- Team Dynamics and Performance
- GNSS positioning and interference
- Radio Wave Propagation Studies
- Cryptographic Implementations and Security
China Mobile (China)
2017-2025
Minzu University of China
2023-2025
Beijing University of Posts and Telecommunications
2015-2024
Chang'an University
2023
Air Force Institute of Aviation Medicine Affiliated Hospital
2023
Southwest University of Science and Technology
2023
PLA Army Engineering University
2019-2022
Xi'an University of Finance and Economics
2022
Lanzhou Jiaotong University
2021
University of Electronic Science and Technology of China
2013-2021
Combination of simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) non-orthogonal multiple access (NOMA) is a win-win strategy which can significantly enhance the coverage performance. However, eavesdroppers may enjoy similar performance gains as legitimate users. To solve this problem, an artificial noise (AN) assisted secure communication proposed to maximize secrecy rate. An alternating optimization (AO) based iterative algorithm leveraging classical...
Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.
In this paper, we consider the secure transmission problem in an unmanned aerial vehicle (UAV) and intelligent reflecting surface (IRS) assisted mmWave networks presence of eavesdropper. The UAV base station (UAV-BS) IRS are deployed to overcome blockages. Artificial noise (AN) is exploited against Aiming maximize secrecy rate, jointly design positions beamforming UAV-BS IRS, where here represent position activation IRS. Meanwhile, maximum transmits power, minimum height constraint for...
This paper investigates the secrecy rate maximization problem for multiple-input-single-output multiple-antenna-eavesdropper (MISOME) wiretap channel with multiple randomly located jammers. The multi-antenna base station (BS) transmits information signals along artificial noise (AN) to disturb eavesdropper. Moreover, friendly jammers are properly selected assist legitimate link better secure transmission some payoffs. With this system model, we first formulate a Stackelberg game between BS...
Security and privacy have become increasingly critical demands in wireless networks, which, however, are particularly susceptible to eavesdropping attacks due the broadcast nature of radio signals. This paper considers problem secure communication multiuser downlink with a passive eavesdropper (Eve), whose channel state information (CSI) is unavailable. The transmitter simultaneously transmits concurrent signals users artificial noise (AN) Eve. We first assume that all users' CSI perfectly...
This paper assesses the intellectual advancement of Human-Computer Interaction (HCI) scholarship as one five research streams Management Information Systems (MIS) discipline. It particularly demonstrates vitality and maturity that HCI stream (or sub-discipline) has achieved in recent years, adds to few studies draw an overarching picture HCI. study uses same approach Zhang Li (2005), delineates development MIS by employing a multifaceted assessment published articles over period 19 years...
Practical difficulty in examining all base stations (BSs) to choose the best one providing secure transmission heterogeneous networks (HetNets), we impose a BS association constraint this letter that BSs an average received signal power at legitimate user greater than predetermined receiving threshold can be candidate serving BSs. With constraint, derive closed-form expressions for secrecy outage probability (SOP) of both homogeneous and K-tier HetNets based on stochastic geometry. Our...
The authors consider the problem of covariance matrix estimation in heterogeneous environments for radar signal processing applications, where secondary data exhibit heterogeneity local power and share same structure. Without resorting to complete statistical characterisation sample support, a class estimators, each them defined as geometric barycenter set basic covariances estimates (obtained from available data) with specific distance employed, is proposed. are obtained by exploiting...
This paper analyzes the secrecy capacity of a cooperative relaying system using non-orthogonal multiple access (NOMA). A new NOMA scheme is proposed, where source actively sends jamming signals while relay forwarding, thereby enhancing security intended communication links. Closed-form expressions for ergodic rate are derived in presence an eavesdropper. Asymptotic approximate established high signal-to-noise ratio (SNR) regime, which provides insights on secure transmission. Numerical...
Physical (PHY) layer authentication has been a significant trend towards ensuring the identity security of terminals in wireless networks due to high and low complexity. However, independence assumption existing literature ignores inherent correlation PHY-layer attributes, which limits its generality. In this paper, we propose multi-attribute-based scheme by taking into account. To cope with exponential growth computational complexity correlated analysis, paper studies reconstruction...
Unmanned aerial vehicles (UAVs) are anticipated to be a potential data collection solution for wireless sensor networks (WSNs). The main challenges of integrating UAVs in WSNs security threats and UAV's onboard energy limitation. To cope with these two challenges, this article examines the secrecy efficiency (SEE) maximization problem UAV-enabled WSN. Specifically, full-duplex (FD) UAV gathers confidential information from ground nodes (SNs) uplink while sending jamming signals confound...
In this letter, a novel aerial reconfigurable intelligent surface (ARIS) assisted covert communication framework is proposed, where RIS mounted on unmanned vehicle (UAV) to enhance the performance of ground transceivers in presence warden. The detection warden first analyzed, and then energy efficiency (CEE) maiximization problem formulated by jointly optimizing power control, passive beamforming, UAV trajectory. To solve non-convex problem, an algorithm based alternating optimization...
This paper investigates the ergodic secrecy sum-rate for downlink multiuser MIMO system with independent confidential messages, each of which is intended one users and should keep secret from others. We adopt zero-forcing beamforming limited channel state information (CSI) feedback at transmitter, derive closed-form expression sum-rate. Moreover, we analyze some its asymptotic characteristics, provide guidance on secure transmission design. Finally, all theoretical results are validated by...
The intelligent reflecting surface (IRS) technology can significantly enhance the flexibility of non-orthogonal multiple access (NOMA) by reconfiguring channel gains according to users' communication requirements. We propose use IRS internal secrecy among NOMA users in multiple-input-single-output downlink networks. objective is minimize total transmit power under heterogeneous constraints, jointly optimizing beamforming vectors and factors. To efficiently solve this non-convex problem, an...
With the large-scale commercial launch of fifth generation (5G) mobile network, development new services and applications catering to year 2030, along with deep convergence information, communication, data technologies (ICDT), lessons experiences from 5G practice will drive evolution next networks. This article surveys history driving forces network architecture proposes a logical function for sixth (6G) network. The proposed 6G is termed SOLIDS (related following basic features: soft,...
A rapid synthesis of structurally novel s-indacene-1,5-dione and cyclopentanone-fused isoxazole derivatives in generally moderate yields was achieved through the NaNO2-catalyzed/involved transformation cyclopentenone-MBH acetates. Under similar reaction conditions, two different pathways were observed depending on type aryl substituent MBH In formation s-indacene-1,5-diones, NaNO2 is proposed to act as a nucleophilic catalyst initiate stepwise dimeric cyclization/oxidative aromatization,...
We consider the problem of secure communication in multiuser downlink with an external eavesdropper. The transmitter simultaneously transmits concurrent information signals to users and artificial noise (AN) derive a closed-form expression for secrecy sum-rate large system limit use it as objective function optimize power allocation between AN maximize sum-rate. obtain simple approximation optimal high signal-to-noise ratio regime, which proves be generic near-optimal strategy. Analytical...
As a NP‐hard problem that needs to be solved in real time, the dynamic task allocation of unmanned aerial vehicle (UAV) swarm has gradually become difficulty and hotspot current planning field. Aiming at problems poor real‐time performance low quality solution heterogeneous UAV uncertain environment, this paper establishes model can meet actual uses binary wolf pack algorithm (BWPA) solve it, so as propose method environment. In method, mechanism attacking while searching priority important...
Space-air-ground integrated network (SAGIN) is a prominent architecture for the future wireless communication system. Due to long distance transmission of satellite and limited battery capacity aircrafts, energy cost has become one dominant problems SAGIN. Mobile edge computing (MEC) offers potential solution by offloading partial tasks nodes with higher computational capability. In this paper, we study hybrid problem where both unmanned aerial vehicles (UAVs) ground users have be processed,...
A novel covert communication framework is proposed to enhance the privacy of unmanned aerial vehicle (UAV)-enabled relaying systems. Specifically, full-duplex (FD) UAV covertly relays data from each ground sensor remote base station (BS) against a warden (Willie). Considering noise uncertainty model, minimum detection error probability (DEP) Willie first derived. Under constraint derived DEP, average transmission rate (ACTR) then maximized by jointly designing association, transmit power,...
Relay power control for two-way (TW) full-duplex (FD) relay network is studied in this letter. In the prior literature, assumed to always use its full transmit a TW FD network. However, high will increase loopback self-interference at node and thus make incoming link become bottleneck end-to-end performance. Therefore, it suboptimal utilize capability of relay. Thus, we propose three schemes, which can, respectively, maximize 1) data rate an individual end node, 2) minimum two nodes, 3) sum...
Unmanned aerial vehicle (UAV)-enabled mobile relaying technique is a promising approach in providing high data rate transmission. Limitations of the UAV's hardware and line-of-sight link air-to-ground channel make UAV ground communication more vulnerable to wiretap spoof threats. This paper tackles secure transmission problem with physical layer security (PLS) technologies. A four-node UAV-enabled relay considered eavesdroppers' location information partially known that they are certain area...