• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:王慧明

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 17 >
Joint Spatial Division and Diversity for Massive MIMO Systems Scopus SCIE
期刊论文 | 2019 , 67 (1) , 258-272 | IEEE Transactions on Communications
Abstract&Keyword Cite

Abstract :

IEEE We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive MIMO systems. The beamformer is divided into two parts: a pre-beamforming matrix to separate the users into different beams with no interference between each other, which is designed based on the low rank covariance matrix of the downlink channel, and a linear precoding matrix using partial or even no channel state information (CSI) concatenated by an OSTBC. To construct the pre-beamforming matrix, a simple method that selects columns from DFT matrix is presented. To design the linear precoding matrix with partial CSI of the effective channel after the pre-beamforming, we solve an optimization problem to minimize the pairwise error probability (PEP) of the users under an individual power or sum power constraint, respectively. For the individual power constraint, a semi-definite relaxing (SDR) method with a sufficient condition achieving the globally optimal solution is proposed to provide a performance benchmark. In addition, an efficient iterative successive convex approximation (SCA) method is provided to achieve a suboptimal solution. Furthermore, closed form solutions are derived under some special cases. For the sum power constraint, we consider two different designs, i.e., minimizing the average PEP and minimizing the maximum PEP of all users. We find that both non-convex problems have a similar structure, and proposed a unified SCA-Alternating Direction Method of Multipliers (ADMM) algorithm to handle them. The SCA-ADMM method can be implemented in a parallel manner, and thus is with great efficiency. Simulation results show the efficiency of our proposed JSDD scheme and the optimization method.

Keyword :

ADMM method Massive MIMO orthogonal space-time block code partial channel state information SDR method spatial division

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia et al. Joint Spatial Division and Diversity for Massive MIMO Systems [J]. | IEEE Transactions on Communications , 2019 , 67 (1) : 258-272 .
MLA Huang, Ke-Wen et al. "Joint Spatial Division and Diversity for Massive MIMO Systems" . | IEEE Transactions on Communications 67 . 1 (2019) : 258-272 .
APA Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia , Jin, Shi . Joint Spatial Division and Diversity for Massive MIMO Systems . | IEEE Transactions on Communications , 2019 , 67 (1) , 258-272 .
Export to NoteExpress RIS BibTex
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks SCIE
期刊论文 | 2019 , 67 (2) , 1254-1267 | IEEE TRANSACTIONS ON COMMUNICATIONS
Abstract&Keyword Cite

Abstract :

Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only.

Keyword :

device-to-device (D2D) communication stochastic geometry Physical layer security full-duplex (FD) secrecy outage secrecy throughput

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) : 1254-1267 .
MLA Wang, Hui-Ming et al. "Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks" . | IEEE TRANSACTIONS ON COMMUNICATIONS 67 . 2 (2019) : 1254-1267 .
APA Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) , 1254-1267 .
Export to NoteExpress RIS BibTex
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks EI CPCI-S SCIE Scopus
会议论文 | 2018 , 66 (8) , 3610-3622 | IEEE Global Telecommunications Conference on Trusted Communications with Physical Layer Security (Globecom-TCPLS)
WoS CC Cited Count: 1 SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication, and so on. In this paper, we propose a social ties based hybrid cooperative beamforming and jamming scheme to secure wireless transmissions under a stochastic geometry framework, where the friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. Connection outage probability (COP) and secrecy outage probability (SOP) of such a scheme in a random network have been analyzed. To facilitate a more convenient performance evaluation, we propose a double Gamma ratio approach through the Gamma approximation method. Based on this, the COP and SOP are tractably obtained in closed-forms. We further consider the SOP in the presence of Poisson point process distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.

Keyword :

stochastic geometry secrecy outage connection outage Social ties physical layer security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Xu, Yiming , Huang, Ke-Wen et al. Cooperative Secure Transmission by Exploiting Social Ties in Random Networks [C] . 2018 : 3610-3622 .
MLA Wang, Hui-Ming et al. "Cooperative Secure Transmission by Exploiting Social Ties in Random Networks" . (2018) : 3610-3622 .
APA Wang, Hui-Ming , Xu, Yiming , Huang, Ke-Wen , Han, Zhu , Tsiftsis, Theodoros A. . Cooperative Secure Transmission by Exploiting Social Ties in Random Networks . (2018) : 3610-3622 .
Export to NoteExpress RIS BibTex
IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING EI SCIE Scopus
期刊论文 | 2018 , 6 , 8959-8963 | IEEE ACCESS
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Da Costa, Daniel Benevides , Imran, Muhammad Ali , Duong, Trung Q. et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING [J]. | IEEE ACCESS , 2018 , 6 : 8959-8963 .
MLA Da Costa, Daniel Benevides et al. "IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING" . | IEEE ACCESS 6 (2018) : 8959-8963 .
APA Da Costa, Daniel Benevides , Imran, Muhammad Ali , Duong, Trung Q. , Wang, Hui-Ming , Benjillali, Mustapha , Souza, Richard Demo et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING . | IEEE ACCESS , 2018 , 6 , 8959-8963 .
Export to NoteExpress RIS BibTex
Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization EI SCIE Scopus
期刊论文 | 2018 , 5 (2) , 984-997 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 1 SCOPUS Cited Count: 2
Abstract&Keyword Cite

Abstract :

In the fifth generation era, the pervasive applications of Internet of Things and massive machine-type communications have initiated increasing research interests on the backscatter wireless powered communication (B-WPC) technique due to its ultrahigh energy efficiency and low cost. The ubiquitous B-WPC network is characterized by nodes with dynamic spatial positions and sporadic short packets, of which the performance has not been fully investigated. In this paper, we give a comprehensive analysis of a multiantenna B-WPC network with sporadic short packets under a stochastic geometry framework. By exploiting a time-space Poisson point process model, the behavior of the network is well captured in a decentralized and asynchronous transmission way. We then analyze the energy and information outage performance in the energy harvest and backscatter modulation phases of the backscatter network, respectively. The optimal transmission slot length and division are obtained by maximizing the network-wide spatial throughput. Moreover, we find an interesting result that there exists the optimal tradeoff between the durations of the energy harvest and backscatter modulation phases for spatial throughput maximization. Numerical results are demonstrated to verify our analytical findings and show that this tradeoff region gets shrunk when the outage constraints become more stringent.

Keyword :

Internet of Things (IoT) energy harvest stochastic geometry radio frequency identification (RFID) Backscatter wireless powered communications (B-WPCs)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing et al. Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization [J]. | IEEE INTERNET OF THINGS JOURNAL , 2018 , 5 (2) : 984-997 .
MLA Yang, Qian et al. "Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization" . | IEEE INTERNET OF THINGS JOURNAL 5 . 2 (2018) : 984-997 .
APA Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing , Han, Zhu , Lee, Moon Ho . Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization . | IEEE INTERNET OF THINGS JOURNAL , 2018 , 5 (2) , 984-997 .
Export to NoteExpress RIS BibTex
Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack EI SCIE Scopus
期刊论文 | 2018 , 36 (4) , 860-876 | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
WoS CC Cited Count: 2 SCOPUS Cited Count: 2
Abstract&Keyword Cite

Abstract :

Transmitter-side channel state information of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel training (RCT)-based secure downlink transmission framework for a time division duplex multiple antennas base station. In the proposed RCT scheme, multiple orthogonal pilot sequences (PSs) are simultaneously allocated to the legitimate user (LU), and the LU randomly selects one PS from the assigned PS set to transmit. Under either the PSA or PJA, we provide the detailed steps for the BS to identify the PS transmitted by the LU, and to simultaneously estimate channels of the LU and Eve. The probability that the BS makes an incorrect decision on the PS of the LU is analytically investigated. Finally, closed form secure beamforming vectors are designed and optimized to enhance the secrecy rates during the downlink transmissions. Numerical results show that the secrecy performance is greatly improved compared to the conventional channel training scheme wherein only one PS is assigned to the LU.

Keyword :

pilot spoofing attack channel estimation Physical layer security secure transmission jamming attack

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Huang, Ke-Wen , Tsiftsis, Theodoros A. . Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack [J]. | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2018 , 36 (4) : 860-876 .
MLA Wang, Hui-Ming et al. "Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack" . | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 36 . 4 (2018) : 860-876 .
APA Wang, Hui-Ming , Huang, Ke-Wen , Tsiftsis, Theodoros A. . Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack . | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2018 , 36 (4) , 860-876 .
Export to NoteExpress RIS BibTex
Non-Orthogonal Multiple Access Assisted Multi-Region Geocast EI SCIE Scopus
期刊论文 | 2018 , 6 , 2340-2355 | IEEE ACCESS
WoS CC Cited Count: 1 SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

This paper proposes a novel location-based multi-group multicast framework, which is termed non-orthogonal multiple access (NOMA)-assisted multi-region geocast. This novel spectrum sharing framework exploits the NOMA technology to realize the simultaneous delivery of different messages to different user groups characterized by different geographical locations. The essence of the proposed framework is that the geographical information of user groups unites NOMA and multi-group multicast to enhance the spectral efficiency (SE) and the energy efficiency (EE) of wireless transmissions. Specifically, we investigate the downlink beamforming design of the proposed framework in multiple-input single-output settings. The decoding strategy for NOMA is designed and guaranteed by users' geographical information and required quality of service. The majorization and minimization algorithm is exploited to solve the non-convex and intractable problems therein. Comprehensive numerical experiments are further provided to show that NOMA holds tremendous promise but also limitations in terms of SE and EE, compared with spatial division multiple access and orthogonal multiple access.

Keyword :

design of decoding order multi-group multicast geographical information quality of service Non-orthogonal multiple access

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Yi , Wang, Hui-Ming , Ding, Zhiguo et al. Non-Orthogonal Multiple Access Assisted Multi-Region Geocast [J]. | IEEE ACCESS , 2018 , 6 : 2340-2355 .
MLA Zhang, Yi et al. "Non-Orthogonal Multiple Access Assisted Multi-Region Geocast" . | IEEE ACCESS 6 (2018) : 2340-2355 .
APA Zhang, Yi , Wang, Hui-Ming , Ding, Zhiguo , Lee, Moon Ho . Non-Orthogonal Multiple Access Assisted Multi-Region Geocast . | IEEE ACCESS , 2018 , 6 , 2340-2355 .
Export to NoteExpress RIS BibTex
MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback EI SCIE Scopus
期刊论文 | 2018 , 67 (3) , 2454-2463 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract&Keyword Cite

Abstract :

This paper presents a two-phase process consisting of advantage distillation (AD) and information reconciliation for achieving secret sharing over a wiretap channel. By using the feedback bits from the legitimate receiver to transmitter, we propose a novel AD scheme for multiple-input multiple-output (MIMO) wiretap (MIMO-WT) channels. We first generalize the extended orthogonal space-time block codes (EO-STBCs). Then, based on the generalized EO-STBCs (GEO-STBCs) and channel state information (CSI), the feedback bits transmitted from the legitimate receiver to the transmitter are generated to increase the signal-to-noise ratio (SNR) gap between the legitimate receiver and the eavesdropper. Simulation results show that the feedback performance gain of the proposed AD scheme increases rapidly with the number of transmit antennas and the value of SNR. A bit error rate (BER) performance gain up to 5.5 dB is obtained by the legitimate receiver over the eavesdropper at the BER of 10(-5). Moreover, it is also shown that the secrecy capacity of two-way MIMO-WT channels with feedback grows rapidly in low SNR regime and grows slowly in high SNR regime.

Keyword :

secrecy capacity extended orthogonal space-time block codes (EO-STBCs) Advantage distillation (AD) two-way MIMO-WT channels with feedback (TW-MIMO-WTF) MIMO wiretap (MIMO-WT) channels

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Cao, Yuwen , Jiang, Xue-Qin , Wang, Hui-Ming et al. MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (3) : 2454-2463 .
MLA Cao, Yuwen et al. "MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 67 . 3 (2018) : 2454-2463 .
APA Cao, Yuwen , Jiang, Xue-Qin , Wang, Hui-Ming , Bai, Enjian . MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (3) , 2454-2463 .
Export to NoteExpress RIS BibTex
IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY EI SCIE Scopus
期刊论文 | 2018 , 6 , 30612-30616 | IEEE ACCESS
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY [J]. | IEEE ACCESS , 2018 , 6 : 30612-30616 .
MLA Zhao, Nan et al. "IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY" . | IEEE ACCESS 6 (2018) : 30612-30616 .
APA Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming , Duong, Trung Q. , Chang, Zheng . IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY . | IEEE ACCESS , 2018 , 6 , 30612-30616 .
Export to NoteExpress RIS BibTex
Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers EI SCIE Scopus
期刊论文 | 2018 , 17 (4) , 2675-2689 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
WoS CC Cited Count: 1 SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

Mm-wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output mm-wave system, where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of mm-wave, we investigate two secure transmission schemes, namely maximum ratio transmitting beamforming and artificial noise (AN) beamforming. Specifically, we first derive closed-form expressions of the connection probability for both schemes. We then analyze the secrecy outage probability in both non-colluding eavesdroppers and colluding eavesdroppers scenarios. Also, we maximize the secrecy throughput under a secrecy outage probability constraint, and obtain optimal transmission parameters, especially the power allocation between AN and the information signal for AN beamforming. Numerical results are provided to verify our theoretical analysis. We observe that the density of eavesdroppers, the spatially resolvable paths of the destination and eavesdroppers all contribute to the secrecy performance and the parameter design of mm-wave systems.

Keyword :

artificial noise Physical layer security mm-wave stochastic geometry secrecy outage multipath secrecy throughput

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ju, Ying , Wang, Hui-Ming , Zheng, Tong-Xing et al. Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2018 , 17 (4) : 2675-2689 .
MLA Ju, Ying et al. "Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 17 . 4 (2018) : 2675-2689 .
APA Ju, Ying , Wang, Hui-Ming , Zheng, Tong-Xing , Yin, Qinye , Lee, Moon Ho . Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2018 , 17 (4) , 2675-2689 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 17 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:2897/54776146
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.