Li Wang

ORCID: 0000-0002-0973-1614
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Caching and Content Delivery
  • Advanced Wireless Communication Technologies
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Wireless Communication Security Techniques
  • Advanced Wireless Communication Techniques
  • Wireless Communication Networks Research
  • Advanced Wireless Network Optimization
  • UAV Applications and Optimization
  • Full-Duplex Wireless Communications
  • Energy Harvesting in Wireless Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Cryptography and Data Security
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Traffic and Congestion Control
  • IoT Networks and Protocols
  • Adversarial Robustness in Machine Learning
  • Advanced Optical Network Technologies
  • Distributed Control Multi-Agent Systems

Beijing University of Posts and Telecommunications
2016-2025

Langley Research Center
2023-2024

Zhejiang Normal University
2024

China Academy of Space Technology
2015-2024

Southeast University
2013-2023

Fiberhome Technology Group (China)
2007-2023

State Key Laboratory of Digital Medical Engineering
2023

Huazhong University of Science and Technology
2017-2023

China Southern Power Grid (China)
2023

University of Science and Technology Liaoning
2023

Today's manufacturing environments are very dynamic and turbulent. Traditional enterprise information systems (EISs) have mostly been implemented upon hierarchical architectures, which inflexible to adapt changes uncertainties promptly. Next-generation EISs must be agile adaptable accommodate without significant time delays. It is essential for an EIS obtain real-time data from the distributed environment decision making. Wireless sensor networks (WSNs) radio-frequency identification (RFID)...

10.1109/tii.2013.2250510 article EN IEEE Transactions on Industrial Informatics 2014-01-03

In this article, we investigate the UAV-aided edge caching to assist terrestrial vehicular networks in delivering high-bandwidth content files. Aiming at maximizing overall network throughput, formulate a joint and trajectory optimization (JCTO) problem make decisions on placement, delivery, UAV simultaneously. As interact with each other energy is limited, formulated JCTO intractable directly timely. To end, propose deep supervised learning scheme enable intelligent for real-time...

10.1109/jsac.2020.3005469 article EN IEEE Journal on Selected Areas in Communications 2020-06-29

At the time of writing, vehicle-to-vehicle (V2V) communication is enjoying substantial research attention as a benefit its compelling applications. However, ever-increasing tele-traffic expected to result in overcrowding available band. As first resort, multiple input output (MIMO) can be utilized enhance attainable bandwidth efficiency or link reliability. hostile V2V wireless propagation environments, achievable multiple-antenna gain eroded by channel correlation. promising MIMO technique,...

10.1109/jsac.2017.2726006 article EN IEEE Journal on Selected Areas in Communications 2017-07-12

The emergence of the D2D communications paradigm has transformed way in which cellular networks are operated. Previous work communications, however, mainly focused on interference management and capacity maximization both links links. Recent literature observed that QoE can be greatly enhanced by caching contents mobile devices, with a carefully designed strategy. In this article, we propose novel hypergraph framework designs based communication scheme taking social ties among users common...

10.1109/mwc.2016.7553029 article EN IEEE Wireless Communications 2016-08-01

Computation offloading is a proven successful paradigm for enabling resource-intensive applications on mobile devices. Moreover, in view of emerging collaborative application, the offloaded tasks can be duplicated when multiple users are same proximity. This motivates us to design scheme and cache popular computation results that likely reused by other users. In this paper, we consider scenario where offload network edge, share among them. Our goal develop optimal fine-grained strategies...

10.1109/tvt.2018.2869144 article EN IEEE Transactions on Vehicular Technology 2018-09-21

In the fifth generation (5G) of mobile broadband systems, radio resource management (RRM) will reach unprecedented levels complexity. To cope with ever more sophisticated RRM functionalities and growing variety scenarios, while carrying out prompt decisions required in 5G, this manuscript presents a lean architecture that capitalizes on recent advances field machine learning combination large amount data readily available network from measurements system observations. The consists learner...

10.1109/mcom.2018.1701031 article EN IEEE Communications Magazine 2018-09-01

Millimeter-wave (mmWave) and sub-Terahertz (THz) communications are compelling as an enabler for next-generation wireless networks. In this paper, we study mmWave sub-THz systems with array-of-subarray architecture. To accommodate the ultrabroad bandwidth in bands, time-delay phase shifters introduced system design. Our goal is to investigate beamforming training hybrid processing extract dominant channel information, which would fully exploit characteristics while respecting nature of...

10.1109/jsac.2017.2720038 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2017-06-27

Device-to-device (D2D) communication has attracted substantial research attention recently, due to its potential improve coverage, spectrum efficiency, and energy efficiency within the existing cellular infrastructure. One major challenge for resource sharing in D2D underlay lies mutual interference between user equipments (CUEs) (DUEs). Considering this constraint, work investigates problem of optimal matching links CUEs form spectrum-sharing partners maximize ergodic sum rates under...

10.1109/tvt.2016.2553124 article EN publisher-specific-oa IEEE Transactions on Vehicular Technology 2016-04-12

In this article, we discuss full duplex for heterogenous networks that accommodate the coexistence of device-to-device communications. The short link distance and lower transmit power communications make them excellent candidates to exploit inband transmission. By incorporating allocation self-interference cancellation based on antenna isolation, analog cancellation, digital full-duplex device-to-device, FD-D2D, nodes can potentially improve spectrum efficiency in HetNets. We provide a...

10.1109/mcom.2015.7105653 article EN IEEE Communications Magazine 2015-05-01

Device-to-device (D2D) communications has attracted substantial research attention recently owing to its simplicity and potential improve spectrum energy efficiency within the existing cellular infrastructure. This work presents a low complexity method for matching D2D links with user equipments (CUEs) form partners sharing. The overall objective is maximize well defined performance metrics of all CUEs after successful pairing under power QoS constraints. We begin by identifying set link...

10.1109/lcomm.2014.2351400 article EN IEEE Communications Letters 2014-09-26

In multiple-input–multiple-output (MIMO) wireless communications, spatial modulation (SM) has recently emerged as a new transmission method. This letter explores the physical-layer security in typical SM systems. We present secrecy rate analysis for multiple antenna destination and eavesdroppers receivers. Targeting against passive unknown locations, we study efficacy of active measure through joint signal jamming without requirement eavesdropper channel information. demonstrate power...

10.1109/lcomm.2015.2440353 article EN IEEE Communications Letters 2015-06-02

Distributed storage that leverages cellular device-to-device (D2D) underlay has attracted rising research interest due to its potential offload traffic, improve spectral efficiency and energy efficiency, reduce transmission delay. This paper investigates the overall cost minimization problem based on a content encoding strategy download new item or repair lost in D2D-based distributed systems while guaranteeing users' quality of service. In addition optimization coding parameters, also...

10.1109/jsac.2016.2605239 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2016-09-01

In wireless sensor networks that consist of a large number low-power, short-lived, unreliable sensors, one the main design challenges is to maintain sufficient sensing coverage and reliability. order address this challenge, paper introduces novel strategy controllable communication based on loop theorem. Proactive nodes utilize perceptual effect theorem, substituting failure using excellent or covering blank path shortest move path. Theoretical analysis performance evaluation reveal proposed...

10.1109/icicip.2018.8606711 article EN 2018-11-01

Nowadays, there is an ever-increasing interests in federated learning, which allows end devices to collaboratively train a global machine learning model decentralized paradigm without sharing individual data. Despite the advantages of low communication cost and preserving data privacy, also facing with new challenges address. Practically, will consider resources willingness caused by training when they are invited participate task. So, how assign preferable tasks high has be considered....

10.1109/jiot.2021.3053283 article EN IEEE Internet of Things Journal 2021-01-21

Cross Domain Recommendation (CDR) has been popularly studied to alleviate the cold-start and data sparsity problem commonly existed in recommender systems. CDR models can improve recommendation performance of a target domain by leveraging other source domains. However, most existing assume information directly 'transfer across bridge', ignoring privacy issues. To solve concern CDR, this paper, we propose novel two stage based privacy-preserving framework (PriCDR). In first stage, methods,...

10.1145/3485447.3512192 article EN Proceedings of the ACM Web Conference 2022 2022-04-25

It is envisioned that the Internet of Things (IoT) will provide promising opportunities to users, manufacturers, and service providers with a wide applicability in many fields. By employing social networking device-to-device (D2D) communications IoT, resulting IoT can potentially services more effectively efficiently. This paper focuses on content sharing among smart objects (devices) D2D-based cooperative coded caching. Generally, complete items or fragments are allowed be delivered via...

10.1109/twc.2017.2785250 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2017-12-22

A pair of salient tradeoffs have driven the multiple-input multiple-output (MIMO) systems developments. More explicitly, early era MIMO developments was predominantly motivated by multiplexing-diversity tradeoff between Bell Laboratories layered space-time and block coding. Later, linear dispersion code concept introduced to strike a flexible tradeoff. The more recent system designs were performance-complexity tradeoff, where spatial modulation shift keying concepts eliminate problem...

10.1109/access.2017.2707182 article EN cc-by IEEE Access 2017-01-01

The past decade has witnessed the prosperous growth of augmented reality (AR) devices, as they provide immersive and interactive experience for customers. AR applications have properties high data rate latency sensitivity. Currently, available bandwidth is relatively limited to transmit process enormous generated data. Meanwhile, it challenging accurately detect classify object in order perfectly combine corresponding virtual contents with real world. In this work, we focus on how solve...

10.1109/icnc47757.2020.9049708 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2020-02-01

This letter generalizes the precoding-aided spatial modulation (PSM) to a multiuser (MU) downlink scenario. With precoding vectors elaborately designed, proposed MU-PSM scheme has capability resist multiple antenna eavesdropper. Specifically, signal matrices (SPMs) are designed cancel MU interference and modulate partial information bits on indices of receive antennas. To improve physical layer security, scrambling SPMs is conceived construct fast-varying matrix, which contributes...

10.1109/lcomm.2016.2549014 article EN IEEE Communications Letters 2016-03-31

With explosive attention on data-sensing services, the unmanned aerial vehicle (UAV) has been applied to accelerate information collection. Particularly, as for deadline-sensitive data, age of (AoI) become a significant metric avoid messages expiration. In this letter, we propose UAV trajectory planning model data collection with minimizing expired packets in whole sensor system, and then relax obscure original problem into min-max-AoI-optimal path scheme due complex constraints. We utilize...

10.1109/lwc.2019.2925796 article EN IEEE Wireless Communications Letters 2019-07-12

In the emerging Internet-of-Things (IoT) paradigm, lifetime of energy-constrained devices (ECDs) cannot be ensured due to limited battery capacity. this article, unmanned aerial vehicles (UAVs) are served as carriers wireless power chargers (WPCs) charge ECDs. Aiming at maximizing total amount charging energy under constraints UAVs and WPCs, a multiple-period process problem is formulated. To address problem, bipartite matching with one-sided preferences introduced model relationship between...

10.1109/jiot.2020.2968346 article EN publisher-specific-oa IEEE Internet of Things Journal 2020-01-23

Point-of-Interest (POI) recommendation has been extensively studied and successfully applied in industry recently. However, most existing approaches build centralized models on the basis of collecting users’ data. Both private data are held by recommender, which causes serious privacy concerns. In this article, we propose a novel Privacy preserving POI Recommendation (PriRec) framework. First, to protect privacy, (features actions) kept their own side, e.g., Cellphone or Pad. Meanwhile,...

10.1145/3394138 article EN ACM Transactions on Intelligent Systems and Technology 2020-07-05

To enable ever-increasing vehicular applications, heterogeneous networks (HetVNets) are recently emerged to provide enhanced and cost-effective wireless network access. Meanwhile, edge caching is imperative future content delivery reduce the delay alleviate unprecedented backhaul pressure. This work investigates in HetVNets where Wi-Fi roadside units (RSUs), TV white space (TVWS) stations, cellular base stations considered cache contents delivery. Particularly, characterize intermittent...

10.1109/twc.2020.3003339 article EN IEEE Transactions on Wireless Communications 2020-06-25
Coming Soon ...