- Wireless Networks and Protocols
- Cooperative Communication and Network Coding
- Cognitive Radio Networks and Spectrum Sensing
- Advanced MIMO Systems Optimization
- Mobile Ad Hoc Networks
- UAV Applications and Optimization
- Advanced Wireless Network Optimization
- Wireless Communication Networks Research
- Opportunistic and Delay-Tolerant Networks
- Distributed Control Multi-Agent Systems
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Wireless Signal Modulation Classification
- IoT and Edge/Fog Computing
- DNA Repair Mechanisms
- Distributed Sensor Networks and Detection Algorithms
- Age of Information Optimization
- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Cancer Immunotherapy and Biomarkers
- Satellite Communication Systems
- IoT Networks and Protocols
- Air Traffic Management and Optimization
- Thermochemical Biomass Conversion Processes
- Video Surveillance and Tracking Methods
National University of Defense Technology
2016-2025
Nanjing University of Posts and Telecommunications
2010-2025
Chinese Academy of Medical Sciences & Peking Union Medical College
2018-2025
Peking Union Medical College Hospital
2018-2025
Human Factors (Norway)
2024
Check Point (Israel)
2024
Texas Medical Board
2024
Leukemia and Lymphoma Society
2024
University of Science and Technology Beijing
2023-2024
East China University of Science and Technology
2020-2024
Due to the flying nature of unmanned aerial vehicles (UAVs), it is very attractive deploy UAVs as base stations and construct airborne networks provide service for on-ground users at temporary events (such disaster relief, military operation, so on). In constructing UAV networks, a challenging problem how multiple on-demand coverage while same time maintaining connectivity among UAVs. To solve this problem, we propose two algorithms: centralized deployment algorithm distributed motion...
Unmanned aerial vehicle (UAV) has been witnessed as a promising approach for offering extensive coverage and additional computation capability to smart mobile devices (SMDs), especially in the scenario without available infrastructures. In this paper, UAV-assisted edge computing system with stochastic tasks is investigated. The aims minimize average weighted energy consumption of SMDs UAV, subject constraints on offloading, resource allocation, flying trajectory scheduling UAV. Due...
Unmanned aerial vehicle (UAV) networks are playing an important role in various areas due to their agility and versatility, which have attracted significant attentions from both the academia industry recent years. As integration of embedded systems with communication devices, computation capabilities control modules, UAV network could build a closed loop data perceiving, information exchanging, decision making final execution, tightly integrates cyber processes into physical devices....
The sixth generation (6G) mobile networks will reshape the world by offering instant, efficient, and intelligent hyper-connectivity, as envisioned previously proposed Ubiquitous-X 6G networks. Such hyper-massive global connectivity introduce tremendous challenges into operation management of networks, calling for revolutionary theories technological innovations. To this end, we propose a new route to boost network capabilities toward wisdom-evolutionary primitive-concise (WePCN) vision...
Exploiting unmanned aerial vehicles (UAVs) as flying base stations (BSs) to assist the terrestrial cellular networks is promising in 5G and beyond. Despite inherent potentials, one challenging problem how optimally deploy multiple UAVs achieve on-demand coverage for ground user equipment (UE). In this article, we model deployment minimizing number of maximizing load balance among them, which subject two main constraints, i.e., should form a robust backbone network they keep connected with...
Due to the flexibility in 3-D space and high probability of line-of-sight (LoS) air-to-ground communications, unmanned aerial vehicles (UAVs) have been considered as means support energy-efficient data collection. However, emergency applications, mission completion time should be main concerns. In this article, we propose a UAV-aided collection design gather from number ground users (GUs). The objective is optimize UAV's trajectory, altitude, velocity, links with GUs minimize total time....
With the development of wireless communication and Internet Things (IoT), there are massive devices that need to share limited spectrum resources. Dynamic access (DSA) is a promising paradigm remedy problem inefficient utilization brought upon by historical command-and-control approach allocation. In this article, we investigate distributed DSA for multiusers in typical multichannel cognitive radio network. The formulated as decentralized partially observable Markov decision process...
Semantic communication is a promising technology used to overcome the challenges of large bandwidth and power requirements caused by data explosion. representation an important issue in semantic communication. The knowledge graph, powered deep learning, can improve accuracy while removing ambiguity. Therefore, we propose system based on graph. Specifically, our system, transmitted sentences are converted into triplets using Triplets be viewed as basic symbols for extraction restoration...
Unmanned aerial vehicles as base stations (UAV-BSs) are recognized effective means for tackling eruptive communication service requirements especially when terrestrial infrastructures unavailable. Quality of (QoS) received by ground terminals (GTs) highly depends on the spatial movement UAV-BSs. In this paper, we investigate cooperative trajectory design problem multiple UAV-BSs towards fair throughput maximization GTs. Considering restriction coverage and sensing, first propose a...
Cognitive radio (CR) has emerged as an advanced and promising technology to exploit the wireless spectrum opportunistically. In cognitive networks (CRNs), any pairwise communicating nodes are required rendezvous on a commonly available channel prior exchange information. earlier research, most popular method is selecting Common Control Channel (CCC) in CRNs establish rendezvous. However, employing CCC many problems such control saturation, vulnerability jamming attacks, inapplicability...
Collective motion is a fundamental operation of robot swarms by which group robots move from source to destination in cohesive way (i.e., connectivity preserved during these movements). However, the collective along preplanned paths has not been well studied. In this paper, we propose self-adaptive algorithms for swarm 3-D space. Using proposed algorithms, are able path while satisfying following requirements: 1) use only one-hop neighbor information; 2) maintain network topology information...
To meet the demand of increasing mobile data traffic and provide better user experience, heterogeneous cellular networks (HCNs) have become a promising solution to improve both system capacity coverage. However, due dense self-deployment small cells in limited area, serious interference from nearby base stations may occur, which results severe performance degradation. mitigate downlink utilize spectrum resources more efficiently, we present novel graph-based resource allocation management...
With innovative applications of unmanned aerial vehicle (UAV) ad hoc networks in various areas, their demands on broad bandwidth, large capacity and low latency become prominent. The combination millimeter wave, directional antenna time division multiple access techniques, which enables concurrent transmissions, is promising to deal with it. In this paper, we study the resource allocation problem UAV networks. Specifically, slot assignment, boresight transmit power are jointly optimized...
Due to the flying nature of Unmanned Aerial Vehicles (UAVs), it is very attractive deploy UAV network as aerial base stations, relays or scouters. However, management airborne not easy due following two facts. First, massive information exits in networks including flight and control UAVs, protocol stack network, sensing obtained from ground terminals. Second, wireless links topologies are changing result motion. How manage utilize information, deal with intermittent links, at same time...
Devices in the Internet of Things (IoT) are usually limited computing resources and energy capacity, which means that encryption schemes with higher complexity not suitable for them to ensure secure communication. As a promising solution this problem, physical layer key generation suggests shared secret keys can be generated from noisy wireless channel measurements enhance security communications. In article, we propose scheme extremely low implementation complexity, allows implemented on...
This letter investigates an unmanned aerial vehicle (UAV)-aided data collection system, where a UAV is deployed to gather information from terrestrial Internet of Things (IoT) devices. We aim minimize the mission completion time by optimizing trajectory, while ensuring all target can be successfully collected with given energy budget. Firstly, problem formulated as constrained Markov Decision Process (CMDP). Then, soft actor-critic (CSAC) algorithm proposed incorporating Lagrangian...
Standard digital communication techniques allow us to set aside the meaning of messages concentrate on transmission bits efficiently and reliably. However, with integration artificial intelligence into communications technology merging computation within devices, increasing evidence suggests that semantic aspect cannot be aside. We propose a part-of-speech-based encoding strategy context-based decoding strategies, in which various deep learning models are presented learn contextual features...
The distributed mobile robotic network consists of a group nodes, such as sensors, unmanned vehicles, submarines, air or robots. keeping regular topology can utilize efficient protocols and is also promising in many application scenarios. We propose algorithm that controls multiple nodes to form topology, including straight line, ring, triangular lattice, square lattice. Our generates artificial forces, the attractive force towards reference point gather repulsive from neighboring keep...