Datong Xu

ORCID: 0000-0003-1080-0872
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Technologies
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Wireless Communication Security Techniques
  • Full-Duplex Wireless Communications
  • Advanced Wireless Communication Techniques
  • Wireless Signal Modulation Classification
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Cognitive Radio Networks and Spectrum Sensing
  • Power Line Communications and Noise
  • Energy Harvesting in Wireless Networks
  • Telecommunications and Broadcasting Technologies
  • Distributed Sensor Networks and Detection Algorithms
  • Advanced Computational Techniques and Applications
  • Advanced Antenna and Metasurface Technologies
  • Advanced Queuing Theory Analysis
  • melanin and skin pigmentation
  • Wireless Body Area Networks
  • Retinal Diseases and Treatments
  • Mobile Agent-Based Network Management
  • E-commerce and Technology Innovations
  • Menstrual Health and Disorders
  • Plant Pathogens and Fungal Diseases
  • Error Correcting Code Techniques

Henan University of Technology
2020-2024

Second Xiangya Hospital of Central South University
2023

Central South University
2022-2023

Xi'an Jiaotong University
2012-2018

Shanghai Institute of Microsystem and Information Technology
2017

Guilin University of Electronic Technology
2015

Shandong Agricultural University
2015

Tianjin University
2013

Tianjin Municipal Education Commission
2013

Coordinated multi‐point (CoMP) techniques can be utilised in several wireless systems, such as LTE‐A and fifth generation. However, inter‐user interferences (IEIs) intra‐user (IAIs) may degrade the quality of service joint transmission (JT), CoMP systems. To suppress these interferences, authors design an interference mitigation scheme via alignment (IA) channel diagonalisation (IMS‐IACD), which is implemented through a local two‐step precoder‐and‐receiver process. First, IA employed to...

10.1049/iet-com.2015.0229 article EN IET Communications 2016-02-01

In power-domain nonorthogonal multiple access, passive eavesdropping may appear among the users by successive interference cancellation. Furthermore, external eavesdropper do active (i.e., plus jamming) a full-duplex technique. To combat this hybrid eavesdropping, we propose novel physical layer security scheme. The main contributions in scheme are as follows: 1) A time constellation is set up concept of timing channel, where each point contains several symbols and intervals between them,...

10.1109/tvt.2018.2802915 article EN IEEE Transactions on Vehicular Technology 2018-02-06

Non-orthogonal multiple access (NOMA) is an important mode in 5G. Nevertheless, eavesdropping may appear between the users NOMA. In this case, physical layer security schemes can be introduced to combat eavesdropping. Different from existing schemes, suppression NOMA should based on several rules: (i) successive interference cancellation (SIC) normally operated; (ii) each user not attain others' privacy information; (iii) adopted scheme had better depend spatial disparity channels (since...

10.1109/icc.2017.7997115 article EN 2017-05-01

Orthogonal frequency division multiplexing (OFDM) signals are widely employed in most wireless comm- unication systems, and the problem of spectrum sensing for OFDM has been extensively investigated. However, available research reports on ignore existence pilots, which usually inserted synchronization, channel estimation control information delivery. To sense weak with periodic pilots reliably cognitive radio networks, we propose two likelihood ratio test (LRT) detectors scenarios without...

10.1109/twc.2020.3012290 article EN IEEE Transactions on Wireless Communications 2020-08-04

We propose a novel physical layer scheme to suppress eavesdropping. Different from the existing schemes which are based on secrecy rate enhancement with Gaussian signal, our is executed actual signal point of view. In scheme, we set several structures constellations for each modulation mode, and then different utilized signals' modulations. this case, one hand, even though eavesdropper knows he#x002F;she difficult demodulate signal. On other information related constellation selection safely...

10.1109/wcnc.2017.7925586 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2017-03-01

Non-orthogonal multiple access (NOMA) is important in 5G, and the users served NOMA are often paired to avoid excessive interference. However, for a two-user network, if channel condition of one user serious, this network may require other relay user's signals. In case, demands these possibly different. Specifically, want node increase spectral efficiency compensating cost relay. On hand, because privacy information be contained signals, indirect communication primarily focus on his or her...

10.1109/glocom.2017.8254022 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

We propose a novel physical layer scheme for improving multiple users' information security e.g., vehicle devises and mobile terminals in the next-generation communication systems. Owing to limitation of service node's antennas, not all users can be concurrently served. Therefore, node only provides services some chosen certain time. On basis this premise, our scheme, access status each user is involved. With status, transmitters increase served transmission rates decrease possibility idle...

10.1002/sec.1592 article EN Security and Communication Networks 2016-08-25

In the 5G system, different units probably do cooperation to satisfy communication requirements. However, when network configuration is limited, these may be difficult adopt globally cooperative style. this case, local considered. This study focuses on cooperation, and mainly aims at interference mitigation between receiving performance improvement for each unit. Generally, a two‐step scheme proposed. First, channel decomposition acted through design of first‐step transmitters receivers....

10.1049/iet-com.2019.0734 article EN IET Communications 2020-02-03

In the hybrid communication scenario of Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion interference controlling caused by reuse are still challenges. this article, a novel resource management method, consisting power channel allocation, is proposed to solve problem. An optimization model maximum system throughput system, which constrained Signal Interference plus Noise Ratio requirements all users diverse layers, established. To non-convex...

10.1177/1550147720951337 article EN cc-by International Journal of Distributed Sensor Networks 2020-08-01

Joint transmission (JT) allows multiple base stations (BSs) to serve users (UEs) in the same time and frequency resources, which will causes inter-user interference (IUI). Moreover, different signals from BSs can't be executed coherent combination directly non-coherent JT. In this paper, a two-step precoding scheme (TSPS) is proposed solve these problems. Firstly, an alternating minimization algorithm over precoders at subspace matrixes UEs based on alignment (IA) applied, can force each UE...

10.1109/vtcfall.2012.6399019 article EN 2012-09-01

As the Internet of Things(IoT) and its intelligent applications continue to proliferate, forthcoming 6G networks will confront dual challenge heightened communication computing capacity demands. To address this, D2D collaborative is being explored. However, current ignores integrity communication. For a single-task device, offloading operations intertwine communication, internal coupling causes due parallel executed between local offloading. In addition, external arises among devices...

10.1016/j.adhoc.2024.103526 article EN cc-by-nc Ad Hoc Networks 2024-06-12

Summary The coexistence of a macrocell and number femtocells often leads to two‐tier heterogeneous network, where the co‐tier interference (CotIN) cross‐tier (CrotIN) both degrade users' quality service. In order suppress these interferences, we propose precoding scheme in network with cooperative femtocells, called CotIN elimination CrotIN suppression criterion selection (ESPS) scheme. this scheme, first eliminate CotINs each user by applying QR decomposition channel matrix. Then CrotINs...

10.1002/dac.3072 article EN International Journal of Communication Systems 2015-10-02

Joint transmission (JT) allows base stations (BSs) to serve multiple users (UEs) in the same time and frequency resources, wherefore inter-user interference (IUI) will arise. To solve this problem, an suppressed precoding (IUISP) scheme is proposed paper. IUISP contains two steps: firstly, we utilize system degree of freedom suppress generated by signal any UE leaking all others at each BS independently with sharing linear combination matrixes designed UEs before precoding; secondly, based...

10.1109/pimrc.2012.6362648 article EN 2012-09-01

Eavesdropping in wireless communication environment should be suppressed. However, most existing schemes ordinarily focus on secrecy rate enhancement, which may not achieved with the non-Gaussian signals. Therefore, we consider this security problem from actual signal point of view. On basis premise, a novel scheme is proposed. In our scheme, each original one constellation converted as transmitted another constellation, and principle variation can safely told to user without being learned...

10.1109/vtcspring.2017.8108520 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2017-06-01

Through interacting with wireless environments continuously, continuous spectrum sensing (CSS) had been proposed in the literature to alleviate problems introduced by quiet periods cognitive radio systems. However, conventional bandwidth-fixed CSS (BF-CSS) schemes, precious and finite time-frequency resources are not sufficiently utilized. In this article, we design a bandwidth-adaptive (BA-CSS) scheme improve resource utilization, analyze its performance terms of average delay, transmission...

10.1109/jsyst.2021.3116273 article EN IEEE Systems Journal 2021-10-20

Inter-user interferences (IEIs) and intra-user (IAIs) may degrade the quality-of- service in JT (joint transmission)-CoMP (coordinated multi-point) systems. Interference alignment (IA) with prefect channel state information (CSI) can efficiently mitigate these interferences. However, realistic systems, effect of IA is obviously decreased via uncertainty estimation quantization errors. In this case, we propose a novelly robust precoder-and-receiver design scheme (NRIA) for interference...

10.1109/vtcspring.2015.7146066 article EN 2015-05-01

The coexistence of a macrocell and number femtocells often leads to two-tier heterogeneous network, where the co-tier interference (CotIN) cross-tier (CrotIN) both degrade users' quality service. In order mitigate two types interferences, we propose precoding scheme for cooperative femtocells, called CotIN elimination CrotIN suppression (CECRS) precoding. this scheme, first eliminate CotINs each user by applying QR decomposition channel matrix. Then, CrotINs MUs FUs are suppressed base...

10.1109/vtcfall.2014.6966017 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2014-09-01

In view of the blowout growth Internet Things(IoT) devices and intelligent applications, network will face demand ofboth large-scale links high-intensive computing in future. How to reduce burden mobile edge andcommunication is an urgent problem be solved environment with limited resources. Considering coupling relationshipbetween communication resources, a D2D offload scheme under spectrum reuse proposed, who jointlyoptimizes task scheduling, policy resource allocation execution costs. The...

10.2139/ssrn.4500521 preprint EN 2023-01-01
Coming Soon ...