Wei Wang

ORCID: 0000-0002-6104-7908
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Mobile Ad Hoc Networks
  • Wireless Communication Security Techniques
  • Energy Harvesting in Wireless Networks
  • Advanced Wireless Communication Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Indoor and Outdoor Localization Technologies
  • Advanced Wireless Network Optimization
  • Security in Wireless Sensor Networks
  • Wireless Communication Networks Research
  • Wireless Networks and Protocols
  • Advanced Wireless Communication Techniques
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • IoT-based Smart Home Systems
  • Advanced Sensor and Control Systems
  • UAV Applications and Optimization
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Millimeter-Wave Propagation and Modeling
  • Mobile Agent-Based Network Management
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data

Nanjing University of Aeronautics and Astronautics
2014-2025

San Diego State University
2014-2025

Xi'an Jiaotong University
2009-2025

Beijing University of Posts and Telecommunications
2006-2025

Henan University of Engineering
2009-2024

Dalian University of Technology
2011-2024

China National Petroleum Corporation (China)
2014-2024

Chongqing Medical University
2024

Tianjin University of Technology
2024

Hunan Normal University
2007-2024

To enable large-scale and ubiquitous automotive network access, traditional vehicle-to-everything (V2X) technologies are evolving to the Internet of Vehicles (IoV) for increasing demands on emerging advanced vehicular applications, such as intelligent transportation systems (ITS) autonomous vehicles. In recent years, IoV have been developed achieved significant progress. However, it is still unclear what evolution path challenges opportunities brought by IoV. For aforementioned...

10.1109/jproc.2019.2961937 article EN Proceedings of the IEEE 2020-01-23

Non-orthogonal multiple access has attracted much recent attention due to its capability of improving the system spectral efficiency in wireless communications. Deploying NOMA a heterogeneous network can satisfy users' explosive data traffic requirements, and will likely play an important role next generation mobile communication networks. However, brings new technical challenges on resource allocation mutual cross-tier interference In this article, study trade-off between rate performance...

10.1109/mwc.2018.1700074 article EN IEEE Wireless Communications 2018-04-01

We investigate the benefits of a heterogeneous architecture for wireless sensor networks (WSNs) composed few resource rich mobile relay nodes and large number simple static nodes. The relays have more energy than sensors. They can dynamically move around network help relieve sensors that are heavily burdened by high traffic, thus extending latter's lifetime. first study performance dense with one show lifetime improves over purely up to factor four. Also, needs stay only within two-hop...

10.1109/tnet.2007.906663 article EN IEEE/ACM Transactions on Networking 2008-08-04

In this paper, we present a method of utilizing channel diversity to increase secrecy capacity in wireless communication. With the presence diversity, an intended receiver can achieve relatively high even at low SNRs. We theoretical analysis on outage probability normalized target Rayleigh fading environment. Our numerical results strongly support our conclusion that maximal ratio combining enhance security communication system normal operating scenarios.

10.1109/lcomm.2011.030911.102343 article EN IEEE Communications Letters 2011-03-29

In this paper, we investigate unmanned aerial vehicle (UAV) assisted physical layer security in multi-beam satellite enabled communications. Particularly, the UAV is exploited as a relay to improve secure satellite-to-vehicle link, and simultaneously serves jammer by deliberately generating artificial noise (AN) confuse Eve. The beamforming (BF) power allocation (PA) are jointly optimized maximize secrecy rate of legitimate user within target beam while guaranteeing quality service (QoS)...

10.1109/tits.2021.3090017 article EN IEEE Transactions on Intelligent Transportation Systems 2021-06-23

In this paper, physical layer security in multi-antenna small-cell networks is investigated, where the base stations (BSs), cellular users, and eavesdroppers are all randomly distributed according to three independent Poisson point processes. To improve secrecy performance, artificial noise (AN) aided transmission adopted at each BS. Based on stochastic geometry, we first derive closed-form expressions of connection outage probabilities, then comprehensively analyze impact different...

10.1109/tifs.2017.2663336 article EN IEEE Transactions on Information Forensics and Security 2017-02-07

In the hierarchical control paradigm of a smart grid cyber-physical system, decentralized local agents (LAs) can potentially be compromised by opportunistic attackers to manipulate electricity prices for illicit financial gains. this paper, address such attacks, we propose Dirichlet-based detection scheme, where probabilistic model is built assess reputation levels LAs. Initial LAs are first trained using proposed model, based on their historical operating observations. An adaptive algorithm...

10.1109/tifs.2016.2576898 article EN IEEE Transactions on Information Forensics and Security 2016-06-07

The growing energy consumption driven by dramatic increases in the number of users and data usage becomes key issue for operators meeting demands on cost reduction environmental impact targets. Deployment low power base stations or relay traditional macro cells is expected to reduce total cellular radio networks. This paper investigates cell's efficiency area measured "bit per Joule" "energy unit area". simulation results suggest that introducing pico into form heterogeneous network can...

10.1109/vetecf.2010.5594361 article EN 2010-09-01

Explosive growth in Information Technology has enabled many innovative application areas such as large-scale outdoor vehicular networks for vehicle-to-vehicle communications. By providing time-sensitive and location-aware information, can contribute to a safer more efficient driving experience. However, the performance of requires robust real-time data communications is impacted by high mobility, intermittent connectivity, unreliability wireless channel. In this paper, novel adaptive...

10.1109/jsac.2011.110108 article EN IEEE Journal on Selected Areas in Communications 2011-01-01

Adopting small cells, including femtocells, is a promising evolution of future wireless cellular systems to meet the explosive demand for high data rates. As number distributively deployed femtocell access points increases rapidly, interference coordination becomes primary challenge in such heterogeneous networks. In this article, we apply several cognitive radio inspired approaches enhance First, spectrum sensing and statistical analysis estimate cross-tier between macrocells femtocells....

10.1109/mcom.2013.6525593 article EN IEEE Communications Magazine 2013-06-01

In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently connected vehicle (ICV) networks, aiming to minimize overall latency of computing via offloading part computational tasks nearby servers small cell base stations (SBSs), while securing the information delivered during and feedback phases physical layer security. Existing computation schemes usually neglected time-varying characteristics channels their corresponding secrecy rates, resulting an...

10.1109/twc.2021.3051772 article EN IEEE Transactions on Wireless Communications 2021-01-22

In this paper, we investigate secure transmissions in integrated satellite-terrestrial communications and the green interference based symbiotic security scheme is proposed. Particularly, co-channel induced by spectrum sharing between satellite terrestrial networks inter-beam due to frequency reuse among multi-beam serve as assist transmission, where of both links are guaranteed simultaneously. Specifically, realize security, formulate a problem maximize sum secrecy rate users cooperatively...

10.1109/twc.2022.3181277 article EN IEEE Transactions on Wireless Communications 2022-06-15

The channel-assignment problem (CAP) for cellular radio networks is an NP-complete problem. Previous techniques solving this have used graph-coloring algorithms, neural networks, simulated annealing, and pattern-based optimization procedures. We describe efficient two-phase adaptive local-search algorithm the This has been applied to several existing benchmark problems with encouraging results. In many cases it outperforms algorithms in quality of solution obtained. When conjunction...

10.1109/25.533761 article EN IEEE Transactions on Vehicular Technology 1996-01-01

The wireless sensor networks (WSN) is one of the most significant technologies in 21st century. In recent years, achievements micro-sensor technology and low-power electronics make WSN become realities applications. this paper, we propose a system for based on environmental monitoring. can monitor several parameters such as underground water level, barometric pressure, ambient temperature, atmospheric humidity, wind direction, speed rainfall provide various convenient services end users who...

10.1109/peits.2009.5407035 article EN 2009-12-01

In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The can help to forward received signal and they may also try decode such information, which be regarded as potential eavesdroppers (Eves). To deal a challenging issue, successive scheme adopted, where multi-antenna source transmits two selected alternately, conventional detrimental inter-relay interference used jam without external helpers. Considering different complexity...

10.1109/tifs.2016.2584006 article EN IEEE Transactions on Information Forensics and Security 2016-06-23

In this letter, the issue of security for device-to-device (D2D) underlaying cellular networks is considered. The communication overheard by randomly distributed eavesdroppers. By sharing spectrum between D2D users and users, interference generated used as a source jamming to confuse We first derive connection probability links secrecy outage link based on stochastic geometry tools. then propose joint guard zone threshold-based access control scheme maximize achievable throughput. Moreover,...

10.1109/lwc.2016.2634559 article EN IEEE Wireless Communications Letters 2016-01-01

Device-to-device (D2D) communication is a recently emerged disruptive technology for enhancing the performance of current cellular systems. To successfully implement D2D communications underlaying networks, resource allocation to links critical issue, which far from trivial due mutual interference between users and users. Most existing research has primarily focused on intracell scenario while leaving intercell settings not considered. In this paper, we investigate issue scenarios where link...

10.1109/tetc.2014.2384372 article EN publisher-specific-oa IEEE Transactions on Emerging Topics in Computing 2014-12-24

In this letter, a generalized multi-relay selection scheme is proposed to improve the security in cooperative relay network. Assuming that only statistical channel state information of eavesdropper available at transmitter, semiclosed-form expression secrecy outage probability (SOP) derived. Based on this, both power allocation factor and number nodes are jointly optimized minimize SOP. Simulation results show outperforms conventional single-relay without increasing overhead.

10.1109/lwc.2015.2488660 article EN IEEE Wireless Communications Letters 2015-10-08

As one of the promising candidates for next generation network, Named Data Networking (NDN) has more advantages than TCP/IP network in areas such as mobility, content distribution and security. Although NDN is designed to defense majority Distributed Denial Service (DDoS) attack current Internet, it anticipates some new varietal DDoS attacks. A representative form called Interest Flooding Attacks (IFA), which can be launched easily by overflowing PIT do immeasurable damage NDN. The existing...

10.1109/glocom.2016.7841526 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

This paper investigates the ergodic achievable secrecy rate (EASR) of multiple-antenna amplify-and-forward relay systems, where one eavesdropper can wiretap relay. To reveal capability in improving performance, we derive new tight closed-form expressions EASR for three secure transmission schemes: artificial noise aided precoding (ANP), destination based jamming (DBJ) and eigen-beamforming (EB). We also lower bounds ANP DBJ with a large antenna array at relay, investigate their corresponding...

10.1109/twc.2015.2504526 article EN IEEE Transactions on Wireless Communications 2015-12-01

To enable secure and efficient dynamic spectrum sharing (DSS) with guaranteed revenue quality of service (QoS) in future wireless communications, we present a consortium blockchain based DSS framework, where the regulators supervise whole process DSS, thus each participant can be guaranteed. Each mobile network operator (MNO) on chain adaptively act as provider or requestor their demand, resource allocation is recorded smart contract. The optimal pricing buying strategies are solved...

10.1109/tccn.2022.3212369 article EN IEEE Transactions on Cognitive Communications and Networking 2022-10-06
Coming Soon ...