- Wireless Communication Security Techniques
- Wireless Signal Modulation Classification
- Full-Duplex Wireless Communications
- Time Series Analysis and Forecasting
- Energy Harvesting in Wireless Networks
- Ultra-Wideband Communications Technology
- Data Mining Algorithms and Applications
- Advanced Computational Techniques and Applications
- Advanced SAR Imaging Techniques
- Radar Systems and Signal Processing
- Speech and Audio Processing
- Cooperative Communication and Network Coding
Xidian University
2020-2024
Identifying non-cooperative drones has attracted much attentions in recent years, which is critical to public safety. Extensive research demonstrated that state-of-the-art deep learning (DL) well suited address this problem. This paper aims improve the performance of DL-based radio frequency identification (RFI) systems for considering some major challenges faced practical applications, including unknown drone operating channels, applicability signal representations DL models, and variation...
This letter studies a challenging physical layer security problem for downlink transmissions when facing randomly located active eavesdropper. Artificial noise (AN) is transmitted in conjunction with confidential signal to defend against the However, eavesdropper changeable location can perform both eavesdropping and malicious jamming simultaneously, which yields secrecy outage probability as an unsuitable performance metric. In this case, more appropriate metric, hybrid takes transmission...
The security problem in wireless sensor networks faces severe challenges, due to the openness of network channel and mobility diversity terminals. When facing randomly located eavesdroppers, situation is much more complex. This paper studies performance a where passive active eavesdroppers are both considered. Compared eavesdropper, an eavesdropper can perform eavesdropping malicious jamming simultaneously network. Based on beamforming artificial noise (AN), we propose practical way defend...