• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:王慧明

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 17 >
Joint Spatial Division and Diversity for Massive MIMO Systems Scopus SCIE
期刊论文 | 2019 , 67 (1) , 258-272 | IEEE Transactions on Communications
Abstract&Keyword Cite

Abstract :

IEEE We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive MIMO systems. The beamformer is divided into two parts: a pre-beamforming matrix to separate the users into different beams with no interference between each other, which is designed based on the low rank covariance matrix of the downlink channel, and a linear precoding matrix using partial or even no channel state information (CSI) concatenated by an OSTBC. To construct the pre-beamforming matrix, a simple method that selects columns from DFT matrix is presented. To design the linear precoding matrix with partial CSI of the effective channel after the pre-beamforming, we solve an optimization problem to minimize the pairwise error probability (PEP) of the users under an individual power or sum power constraint, respectively. For the individual power constraint, a semi-definite relaxing (SDR) method with a sufficient condition achieving the globally optimal solution is proposed to provide a performance benchmark. In addition, an efficient iterative successive convex approximation (SCA) method is provided to achieve a suboptimal solution. Furthermore, closed form solutions are derived under some special cases. For the sum power constraint, we consider two different designs, i.e., minimizing the average PEP and minimizing the maximum PEP of all users. We find that both non-convex problems have a similar structure, and proposed a unified SCA-Alternating Direction Method of Multipliers (ADMM) algorithm to handle them. The SCA-ADMM method can be implemented in a parallel manner, and thus is with great efficiency. Simulation results show the efficiency of our proposed JSDD scheme and the optimization method.

Keyword :

ADMM method Massive MIMO orthogonal space-time block code partial channel state information SDR method spatial division

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia et al. Joint Spatial Division and Diversity for Massive MIMO Systems [J]. | IEEE Transactions on Communications , 2019 , 67 (1) : 258-272 .
MLA Huang, Ke-Wen et al. "Joint Spatial Division and Diversity for Massive MIMO Systems" . | IEEE Transactions on Communications 67 . 1 (2019) : 258-272 .
APA Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia , Jin, Shi . Joint Spatial Division and Diversity for Massive MIMO Systems . | IEEE Transactions on Communications , 2019 , 67 (1) , 258-272 .
Export to NoteExpress RIS BibTex
Multi-Antenna Covert Communications in Random Wireless Networks SCIE
期刊论文 | 2019 , 18 (3) , 1974-1987 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Abstract&Keyword Cite

Abstract :

This paper studies multi-antenna-aided covert communications coexisting with randomly located wardens and interferers, considering both centralized and distributed antenna systems (CAS/DAS). The throughput performance of the covert communication is analyzed and optimized under a stochastic geometry framework, where the joint impact of the small-scale channel fading and the large-scale path loss is examined. To be specific, two probabilistic metrics, namely, the covert outage probability and the connectivity probability, are adopted to characterize the covertness and reliability of the transmission, respectively, and analytically tractable expressions for the two metrics are derived. The worst-case covert communication scenario is then investigated, where the wardens invariably can maximize the covert outage probability by adjusting the detection thresholds for their detectors. Afterward, the optimal transmit power and transmission rate are jointly designed to maximize the covert throughput subject to a covertness constraint. Interestingly, it is found that the maximal covert throughput for both the CAS and DAS is invariant to the density of interferers and the interfering power, regardless of the number of transmit antennas. The numerical results demonstrate that the CAS outperforms the DAS in terms of the covert throughput for the random network of interest, and the throughput gap between the two systems increases dramatically when the number of transmit antennas becomes higher.

Keyword :

stochastic geometry optimization outage probability multi-antenna techniques Covert communications

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zheng, Tong-Xing , Wang, Hui-Ming , Ng, Derrick Wing Kwan et al. Multi-Antenna Covert Communications in Random Wireless Networks [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2019 , 18 (3) : 1974-1987 .
MLA Zheng, Tong-Xing et al. "Multi-Antenna Covert Communications in Random Wireless Networks" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 18 . 3 (2019) : 1974-1987 .
APA Zheng, Tong-Xing , Wang, Hui-Ming , Ng, Derrick Wing Kwan , Yuan, Jinhong . Multi-Antenna Covert Communications in Random Wireless Networks . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2019 , 18 (3) , 1974-1987 .
Export to NoteExpress RIS BibTex
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks SCIE
期刊论文 | 2019 , 67 (2) , 1254-1267 | IEEE TRANSACTIONS ON COMMUNICATIONS
Abstract&Keyword Cite

Abstract :

Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only.

Keyword :

device-to-device (D2D) communication stochastic geometry Physical layer security full-duplex (FD) secrecy outage secrecy throughput

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) : 1254-1267 .
MLA Wang, Hui-Ming et al. "Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks" . | IEEE TRANSACTIONS ON COMMUNICATIONS 67 . 2 (2019) : 1254-1267 .
APA Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) , 1254-1267 .
Export to NoteExpress RIS BibTex
Secure routing with power optimization for Ad-Hoc networks EI Scopus SCIE
期刊论文 | 2018 , 66 (10) , 4666-4679 | IEEE Transactions on Communications
Abstract&Keyword Cite

Abstract :

In this paper, we consider the problem of joint secure routing and transmit power optimization for a multi-hop ad-hoc network under the existence of randomly distributed eavesdroppers following a Poisson point process. Secrecy messages are delivered from a source to a destination through a multi-hop route connected by multiple legitimate relays in the network. Our goal is to minimize the end-to-end connection outage probability under the constraint of a secrecy outage probability threshold, by optimizing the routing path and the transmit power of each hop jointly. We show that the globally optimal solution could be obtained by a two-step procedure where the optimal transmit power has a closed-form and the optimal routing path can be found by Dijkstra's algorithm. Then a friendly jammer with multiple antennas is applied to enhance the secrecy performance further, and the optimal transmit power of the jammer and each hop of the selected route is investigated. This problem can be solved optimally via an iterative outer polyblock approximation with 1-D search algorithm. Furthermore, suboptimal transmit powers can be derived using the successive convex approximation method with a lower complexity. Simulation results show the performance improvement of the proposed algorithms for both non-jamming and jamming scenarios, and also reveal a non-trivial tradeoff between the numbers of hops and the transmit power of each hop for secure routing. © 1972-2012 IEEE.

Keyword :

Monotonic optimization Physical layer security Poisson point process Relay network Routing Secure routing Security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Zhang, Yan , Ng, Derrick Wing Kwan et al. Secure routing with power optimization for Ad-Hoc networks [J]. | IEEE Transactions on Communications , 2018 , 66 (10) : 4666-4679 .
MLA Wang, Hui-Ming et al. "Secure routing with power optimization for Ad-Hoc networks" . | IEEE Transactions on Communications 66 . 10 (2018) : 4666-4679 .
APA Wang, Hui-Ming , Zhang, Yan , Ng, Derrick Wing Kwan , Lee, Moon Ho . Secure routing with power optimization for Ad-Hoc networks . | IEEE Transactions on Communications , 2018 , 66 (10) , 4666-4679 .
Export to NoteExpress RIS BibTex
Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization EI Scopus SCIE
期刊论文 | 2018 , 67 (11) , 11309-11313 | IEEE Transactions on Vehicular Technology
Abstract&Keyword Cite

Abstract :

IEEE Wireless caching has been widely recognized as a promising technique for efficient content delivery. In this paper, by taking different file secrecy levels into consideration, physical-layer security oriented content placement is optimized in a stochastic cache-enabled cellular network. We propose an analytical framework to investigate the nontrivial file deliverysecrecy tradeoff. Specifically, we first derive the closed-form expressions for the file hit and secrecy probabilities. The global optimal probabilistic content placement policy is then analytically derived in terms of hit probability maximization under file secrecy constraints. Numerical results are demonstrated to verify our analytical findings and show that the targeted file secrecy levels are crucial in balancing the file delivery-secrecy tradeoff.

Keyword :

Cache-enabled cellular networks Cellular networks content placement Interference physical-layer security Probability Security stochastic geometry Stochastic processes Streaming media Transmitters

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing . Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization [J]. | IEEE Transactions on Vehicular Technology , 2018 , 67 (11) : 11309-11313 .
MLA Yang, Qian et al. "Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization" . | IEEE Transactions on Vehicular Technology 67 . 11 (2018) : 11309-11313 .
APA Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing . Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization . | IEEE Transactions on Vehicular Technology , 2018 , 67 (11) , 11309-11313 .
Export to NoteExpress RIS BibTex
Buffer-Aided Two-Hop Secure Communications with Power Control and Link Selection EI Scopus SCIE
期刊论文 | 2018 , 17 (11) , 7635-7647 | IEEE Transactions on Wireless Communications
Abstract&Keyword Cite

Abstract :

IEEE This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by an eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information to the destination by employing the randomize-and-forward (RF) scheme. Both the source and the relay transmissions are assumed to be vulnerable to the eavesdropper. The perfect channel side information (CSI) of the network is assumed to be available at the source and the relay. Initially, conventional relaying protocols where equal partition of the time for the reception and transmission of the relay is considered. Then, the optimal time fraction with the optimal power control policy that maximizes the secrecy throughput is identified. Moreover, the optimal joint link selection and power control policy that maximizes the secrecy throughput is derived. Subsequently, a low complexity and asymptotically optimal link selection with on/off power control is proposed. Numerical results demonstrate that the proposed link selection policies with power control can significantly improve the achievable secrecy throughput of the buffer-aided two-hop communication system.

Keyword :

Power control Protocols Radio frequency Relays Resource management Throughput Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wan, Jing , Qiao, Deli , Wang, Huiming et al. Buffer-Aided Two-Hop Secure Communications with Power Control and Link Selection [J]. | IEEE Transactions on Wireless Communications , 2018 , 17 (11) : 7635-7647 .
MLA Wan, Jing et al. "Buffer-Aided Two-Hop Secure Communications with Power Control and Link Selection" . | IEEE Transactions on Wireless Communications 17 . 11 (2018) : 7635-7647 .
APA Wan, Jing , Qiao, Deli , Wang, Huiming , Qian, Haifeng . Buffer-Aided Two-Hop Secure Communications with Power Control and Link Selection . | IEEE Transactions on Wireless Communications , 2018 , 17 (11) , 7635-7647 .
Export to NoteExpress RIS BibTex
Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization EI Scopus SCIE
期刊论文 | 2018 , 66 (11) , 5554-5567 | IEEE Transactions on Communications
Abstract&Keyword Cite

Abstract :

IEEE This paper studies physical-layer security for a cache-enabled heterogeneous cellular network comprised of a macro base station and multiple small base stations (SBSs). We investigate a joint design on caching placement and file delivery for realizing secure and energy-efficient transmissions against randomly distributed eavesdroppers. We propose a novel hybrid &#x201C;most popular content&#x201D; and &#x201C;largest content diversity&#x201D; caching placement policy to distribute files of different popularities. Depending on the availability and placement of the requested file, we employ three cooperative transmission schemes, namely, distributed beamforming, frequency-domain orthogonal transmission, and best SBS relaying, respectively. We derive analytical expressions for the connection outage probability and secrecy outage probability for each transmission scheme. Afterwards, we design the optimal transmission rates and caching allocation successively to achieve a maximal overall secrecy throughput and secrecy energy efficiency, respectively. Numerical results verify the theoretical analyses and demonstrate the superiority of the proposed hybrid caching policy.

Keyword :

Base stations Cellular networks Communication system security cooperative transmission energy efficiency heterogeneous cellular network Physical-layer security Probability secrecy outage probability Security stochastic geometry wireless caching Wireless networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zheng, Tong-Xing , Wang, Hui-Ming , Yuan, Jinhong . Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization [J]. | IEEE Transactions on Communications , 2018 , 66 (11) : 5554-5567 .
MLA Zheng, Tong-Xing et al. "Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization" . | IEEE Transactions on Communications 66 . 11 (2018) : 5554-5567 .
APA Zheng, Tong-Xing , Wang, Hui-Ming , Yuan, Jinhong . Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization . | IEEE Transactions on Communications , 2018 , 66 (11) , 5554-5567 .
Export to NoteExpress RIS BibTex
IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING EI SCIE Scopus
期刊论文 | 2018 , 6 , 8959-8963 | IEEE ACCESS
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Da Costa, Daniel Benevides , Imran, Muhammad Ali , Duong, Trung Q. et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING [J]. | IEEE ACCESS , 2018 , 6 : 8959-8963 .
MLA Da Costa, Daniel Benevides et al. "IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING" . | IEEE ACCESS 6 (2018) : 8959-8963 .
APA Da Costa, Daniel Benevides , Imran, Muhammad Ali , Duong, Trung Q. , Wang, Hui-Ming , Benjillali, Mustapha , Souza, Richard Demo et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: SECURITY IN WIRELESS COMMUNICATIONS AND NETWORKING . | IEEE ACCESS , 2018 , 6 , 8959-8963 .
Export to NoteExpress RIS BibTex
IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY EI SCIE Scopus
期刊论文 | 2018 , 6 , 30612-30616 | IEEE ACCESS
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY [J]. | IEEE ACCESS , 2018 , 6 : 30612-30616 .
MLA Zhao, Nan et al. "IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY" . | IEEE ACCESS 6 (2018) : 30612-30616 .
APA Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming , Duong, Trung Q. , Chang, Zheng . IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY . | IEEE ACCESS , 2018 , 6 , 30612-30616 .
Export to NoteExpress RIS BibTex
MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback EI SCIE Scopus
期刊论文 | 2018 , 67 (3) , 2454-2463 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract&Keyword Cite

Abstract :

This paper presents a two-phase process consisting of advantage distillation (AD) and information reconciliation for achieving secret sharing over a wiretap channel. By using the feedback bits from the legitimate receiver to transmitter, we propose a novel AD scheme for multiple-input multiple-output (MIMO) wiretap (MIMO-WT) channels. We first generalize the extended orthogonal space-time block codes (EO-STBCs). Then, based on the generalized EO-STBCs (GEO-STBCs) and channel state information (CSI), the feedback bits transmitted from the legitimate receiver to the transmitter are generated to increase the signal-to-noise ratio (SNR) gap between the legitimate receiver and the eavesdropper. Simulation results show that the feedback performance gain of the proposed AD scheme increases rapidly with the number of transmit antennas and the value of SNR. A bit error rate (BER) performance gain up to 5.5 dB is obtained by the legitimate receiver over the eavesdropper at the BER of 10(-5). Moreover, it is also shown that the secrecy capacity of two-way MIMO-WT channels with feedback grows rapidly in low SNR regime and grows slowly in high SNR regime.

Keyword :

secrecy capacity extended orthogonal space-time block codes (EO-STBCs) Advantage distillation (AD) two-way MIMO-WT channels with feedback (TW-MIMO-WTF) MIMO wiretap (MIMO-WT) channels

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Cao, Yuwen , Jiang, Xue-Qin , Wang, Hui-Ming et al. MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (3) : 2454-2463 .
MLA Cao, Yuwen et al. "MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 67 . 3 (2018) : 2454-2463 .
APA Cao, Yuwen , Jiang, Xue-Qin , Wang, Hui-Ming , Bai, Enjian . MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (3) , 2454-2463 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 17 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:2605/65829118
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.