• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:王慧明

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 17 >
Joint Spatial Division and Diversity for Massive MIMO Systems Scopus SCIE
期刊论文 | 2019 , 67 (1) , 258-272 | IEEE Transactions on Communications
Abstract&Keyword Cite

Abstract :

IEEE We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive MIMO systems. The beamformer is divided into two parts: a pre-beamforming matrix to separate the users into different beams with no interference between each other, which is designed based on the low rank covariance matrix of the downlink channel, and a linear precoding matrix using partial or even no channel state information (CSI) concatenated by an OSTBC. To construct the pre-beamforming matrix, a simple method that selects columns from DFT matrix is presented. To design the linear precoding matrix with partial CSI of the effective channel after the pre-beamforming, we solve an optimization problem to minimize the pairwise error probability (PEP) of the users under an individual power or sum power constraint, respectively. For the individual power constraint, a semi-definite relaxing (SDR) method with a sufficient condition achieving the globally optimal solution is proposed to provide a performance benchmark. In addition, an efficient iterative successive convex approximation (SCA) method is provided to achieve a suboptimal solution. Furthermore, closed form solutions are derived under some special cases. For the sum power constraint, we consider two different designs, i.e., minimizing the average PEP and minimizing the maximum PEP of all users. We find that both non-convex problems have a similar structure, and proposed a unified SCA-Alternating Direction Method of Multipliers (ADMM) algorithm to handle them. The SCA-ADMM method can be implemented in a parallel manner, and thus is with great efficiency. Simulation results show the efficiency of our proposed JSDD scheme and the optimization method.

Keyword :

ADMM method Massive MIMO orthogonal space-time block code partial channel state information SDR method spatial division

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia et al. Joint Spatial Division and Diversity for Massive MIMO Systems [J]. | IEEE Transactions on Communications , 2019 , 67 (1) : 258-272 .
MLA Huang, Ke-Wen et al. "Joint Spatial Division and Diversity for Massive MIMO Systems" . | IEEE Transactions on Communications 67 . 1 (2019) : 258-272 .
APA Huang, Ke-Wen , Wang, Hui-Ming , Hou, Jia , Jin, Shi . Joint Spatial Division and Diversity for Massive MIMO Systems . | IEEE Transactions on Communications , 2019 , 67 (1) , 258-272 .
Export to NoteExpress RIS BibTex
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks SCIE
期刊论文 | 2019 , 67 (2) , 1254-1267 | IEEE TRANSACTIONS ON COMMUNICATIONS
Abstract&Keyword Cite

Abstract :

Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only.

Keyword :

device-to-device (D2D) communication stochastic geometry Physical layer security full-duplex (FD) secrecy outage secrecy throughput

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) : 1254-1267 .
MLA Wang, Hui-Ming et al. "Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks" . | IEEE TRANSACTIONS ON COMMUNICATIONS 67 . 2 (2019) : 1254-1267 .
APA Wang, Hui-Ming , Zhao, Bing-Qing , Zheng, Tong-Xing . Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2019 , 67 (2) , 1254-1267 .
Export to NoteExpress RIS BibTex
Identifying the Fake Base Station: A Location Based Approach EI SCIE Scopus
期刊论文 | 2018 , 22 (8) , 1604-1607 | IEEE COMMUNICATIONS LETTERS
Abstract&Keyword Cite

Abstract :

Fake base station (FBS) attack is a great security challenge to wireless user equipment (UE). During the cell selection stage, the UE receives multiple synchronization signals (SSs) from multiple nearby base stations (BSs) and then synchronizes itself with the strongest SS. An FBS also can transmit an SS with sufficient power to confuse the UE, which makes the UE connect to the FBS, and may lead to the leakage of private information. In this letter, countermeasure to the FBS attack by utilizing the location information is investigated. Two location awareness based FBS-resistance schemes are proposed by checking the received signal strength according to the position of the UE and a legitimate BS map. The successful cheating rate (SCR) defined as the probability that the UE will connect to the FBS is investigated. Numeric results show that with the two proposed schemes, the SCR can be greatly reduced especially when the transmit power of the FBS is large. Beyond that, a cooperation-aided method is further proposed to improve the performance, and we show that the cooperation-aided method can further suppress the SCR when the signal strength from the FBS is similar to that from the legitimate BS.

Keyword :

location awareness physical layer authentication detection Fake base station

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming . Identifying the Fake Base Station: A Location Based Approach [J]. | IEEE COMMUNICATIONS LETTERS , 2018 , 22 (8) : 1604-1607 .
MLA Huang, Ke-Wen et al. "Identifying the Fake Base Station: A Location Based Approach" . | IEEE COMMUNICATIONS LETTERS 22 . 8 (2018) : 1604-1607 .
APA Huang, Ke-Wen , Wang, Hui-Ming . Identifying the Fake Base Station: A Location Based Approach . | IEEE COMMUNICATIONS LETTERS , 2018 , 22 (8) , 1604-1607 .
Export to NoteExpress RIS BibTex
Non-Orthogonal Multiple Access Assisted Multi-Region Geocast EI SCIE Scopus
期刊论文 | 2018 , 6 , 2340-2355 | IEEE ACCESS
WoS CC Cited Count: 1 SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

This paper proposes a novel location-based multi-group multicast framework, which is termed non-orthogonal multiple access (NOMA)-assisted multi-region geocast. This novel spectrum sharing framework exploits the NOMA technology to realize the simultaneous delivery of different messages to different user groups characterized by different geographical locations. The essence of the proposed framework is that the geographical information of user groups unites NOMA and multi-group multicast to enhance the spectral efficiency (SE) and the energy efficiency (EE) of wireless transmissions. Specifically, we investigate the downlink beamforming design of the proposed framework in multiple-input single-output settings. The decoding strategy for NOMA is designed and guaranteed by users' geographical information and required quality of service. The majorization and minimization algorithm is exploited to solve the non-convex and intractable problems therein. Comprehensive numerical experiments are further provided to show that NOMA holds tremendous promise but also limitations in terms of SE and EE, compared with spatial division multiple access and orthogonal multiple access.

Keyword :

design of decoding order multi-group multicast geographical information quality of service Non-orthogonal multiple access

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Yi , Wang, Hui-Ming , Ding, Zhiguo et al. Non-Orthogonal Multiple Access Assisted Multi-Region Geocast [J]. | IEEE ACCESS , 2018 , 6 : 2340-2355 .
MLA Zhang, Yi et al. "Non-Orthogonal Multiple Access Assisted Multi-Region Geocast" . | IEEE ACCESS 6 (2018) : 2340-2355 .
APA Zhang, Yi , Wang, Hui-Ming , Ding, Zhiguo , Lee, Moon Ho . Non-Orthogonal Multiple Access Assisted Multi-Region Geocast . | IEEE ACCESS , 2018 , 6 , 2340-2355 .
Export to NoteExpress RIS BibTex
IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY EI SCIE Scopus
期刊论文 | 2018 , 6 , 30612-30616 | IEEE ACCESS
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming et al. IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY [J]. | IEEE ACCESS , 2018 , 6 : 30612-30616 .
MLA Zhao, Nan et al. "IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY" . | IEEE ACCESS 6 (2018) : 30612-30616 .
APA Zhao, Nan , Yu, F. Richard , Wang, Hui-Ming , Duong, Trung Q. , Chang, Zheng . IEEE ACCESS SPECIAL SECTION EDITORIAL: EXPLOITING THE BENEFITS OF INTERFERENCE IN WIRELESS NETWORKS: ENERGY HARVESTING AND SECURITY . | IEEE ACCESS , 2018 , 6 , 30612-30616 .
Export to NoteExpress RIS BibTex
Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization EI SCIE Scopus
期刊论文 | 2018 , 5 (2) , 984-997 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 1 SCOPUS Cited Count: 2
Abstract&Keyword Cite

Abstract :

In the fifth generation era, the pervasive applications of Internet of Things and massive machine-type communications have initiated increasing research interests on the backscatter wireless powered communication (B-WPC) technique due to its ultrahigh energy efficiency and low cost. The ubiquitous B-WPC network is characterized by nodes with dynamic spatial positions and sporadic short packets, of which the performance has not been fully investigated. In this paper, we give a comprehensive analysis of a multiantenna B-WPC network with sporadic short packets under a stochastic geometry framework. By exploiting a time-space Poisson point process model, the behavior of the network is well captured in a decentralized and asynchronous transmission way. We then analyze the energy and information outage performance in the energy harvest and backscatter modulation phases of the backscatter network, respectively. The optimal transmission slot length and division are obtained by maximizing the network-wide spatial throughput. Moreover, we find an interesting result that there exists the optimal tradeoff between the durations of the energy harvest and backscatter modulation phases for spatial throughput maximization. Numerical results are demonstrated to verify our analytical findings and show that this tradeoff region gets shrunk when the outage constraints become more stringent.

Keyword :

Internet of Things (IoT) energy harvest stochastic geometry radio frequency identification (RFID) Backscatter wireless powered communications (B-WPCs)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing et al. Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization [J]. | IEEE INTERNET OF THINGS JOURNAL , 2018 , 5 (2) : 984-997 .
MLA Yang, Qian et al. "Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization" . | IEEE INTERNET OF THINGS JOURNAL 5 . 2 (2018) : 984-997 .
APA Yang, Qian , Wang, Hui-Ming , Zheng, Tong-Xing , Han, Zhu , Lee, Moon Ho . Wireless Powered Asynchronous Backscatter Networks With Sporadic Short Packets: Performance Analysis and Optimization . | IEEE INTERNET OF THINGS JOURNAL , 2018 , 5 (2) , 984-997 .
Export to NoteExpress RIS BibTex
Combating the Control Signal Spoofing Attack in UAV Systems EI SCIE Scopus
期刊论文 | 2018 , 67 (8) , 7769-7773 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

Unmanned aerial vehicle (UAV) system is vulnerable to the control signal spoofing attack due to the openness of the wireless communications. In this correspondence, a physical layer approach is proposed to combat the control signal spoofing attack, i.e., to determine whether the received control signal packet is from the ground control station or a potential malicious attacker (MA), which does not need to share any secret key. We consider the worst case where the UAV does not have any prior knowledge about the MA. Utilizing the channel feature of the angles of arrival, the distance-based path loss, and the Rician-kappa factor, we construct a generalized log-likelihood radio test framework to handle the problem. Accurate approximations of the false alarm and successful detection rate are provided to efficiently evaluate the performance.

Keyword :

false alarm rate Physical layer authentication spoofing attack UAV system generalized likelihood radio

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming . Combating the Control Signal Spoofing Attack in UAV Systems [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (8) : 7769-7773 .
MLA Huang, Ke-Wen et al. "Combating the Control Signal Spoofing Attack in UAV Systems" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 67 . 8 (2018) : 7769-7773 .
APA Huang, Ke-Wen , Wang, Hui-Ming . Combating the Control Signal Spoofing Attack in UAV Systems . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2018 , 67 (8) , 7769-7773 .
Export to NoteExpress RIS BibTex
Enhancing the Physical Layer Security of Uplink Non-orthogonal Multiple Access in Cellular Internet of Things EI Scopus CSSCI-E SCIE
期刊论文 | 2018 , 6 , 58405-58417 | IEEE Access
Abstract&Keyword Cite

Abstract :

This paper investigates the physical layer security of uplink non-orthogonal multiple access (NOMA) in cellular Internet of Things (IoT) with invoking stochastic geometry. Poisson cluster process based model is applied to characterize the NOMA uplink transmission scenario where IoT terminals are located around the serving base station. Considering the severe interference brought by large number of IoT terminals, inter-cell interference is also taken into account. To enhance the physical layer security of uplink NOMA transmission with limited overhead increment at IoT terminals, the base stations not only receive the signals from IoT terminals, but also keep emitting jamming signals all the time to degrade the performance of any potential eavesdroppers. In order to characterize the physical layer security performances, we derive expressions of coverage probability and secrecy outage probability. To obtain further insights, network-wide secrecy throughput (NST) and network-wide secrecy energy efficiency (NSEE) are analyzed. It is demonstrated that the security performance can be improved by the proposed full-duplex base station jamming scheme at the cost of reliable performance. The analytical and simulation results show the effects of BS intensity and jamming power on network performances. We also verify that NST and NSEE can be significantly enhanced by our proposed scheme. Using these results, the security of confidential information transmitted by low-complexity IoT terminals can be protected from overhearing. OAPA

Keyword :

Full-duplex NOMA Non-orthogonal multiple access Physical layer security Security Uplink

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Shuai , Xu, Xiaoming , Wang, Huiming et al. Enhancing the Physical Layer Security of Uplink Non-orthogonal Multiple Access in Cellular Internet of Things [J]. | IEEE Access , 2018 , 6 : 58405-58417 .
MLA Zhang, Shuai et al. "Enhancing the Physical Layer Security of Uplink Non-orthogonal Multiple Access in Cellular Internet of Things" . | IEEE Access 6 (2018) : 58405-58417 .
APA Zhang, Shuai , Xu, Xiaoming , Wang, Huiming , Peng, Jianhua , Zhang, Di , Huang, Kaizhi . Enhancing the Physical Layer Security of Uplink Non-orthogonal Multiple Access in Cellular Internet of Things . | IEEE Access , 2018 , 6 , 58405-58417 .
Export to NoteExpress RIS BibTex
Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack EI SCIE Scopus
期刊论文 | 2018 , 36 (4) , 860-876 | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
WoS CC Cited Count: 2 SCOPUS Cited Count: 2
Abstract&Keyword Cite

Abstract :

Transmitter-side channel state information of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel training (RCT)-based secure downlink transmission framework for a time division duplex multiple antennas base station. In the proposed RCT scheme, multiple orthogonal pilot sequences (PSs) are simultaneously allocated to the legitimate user (LU), and the LU randomly selects one PS from the assigned PS set to transmit. Under either the PSA or PJA, we provide the detailed steps for the BS to identify the PS transmitted by the LU, and to simultaneously estimate channels of the LU and Eve. The probability that the BS makes an incorrect decision on the PS of the LU is analytically investigated. Finally, closed form secure beamforming vectors are designed and optimized to enhance the secrecy rates during the downlink transmissions. Numerical results show that the secrecy performance is greatly improved compared to the conventional channel training scheme wherein only one PS is assigned to the LU.

Keyword :

pilot spoofing attack channel estimation Physical layer security secure transmission jamming attack

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Huang, Ke-Wen , Tsiftsis, Theodoros A. . Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack [J]. | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2018 , 36 (4) : 860-876 .
MLA Wang, Hui-Ming et al. "Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack" . | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 36 . 4 (2018) : 860-876 .
APA Wang, Hui-Ming , Huang, Ke-Wen , Tsiftsis, Theodoros A. . Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack . | IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2018 , 36 (4) , 860-876 .
Export to NoteExpress RIS BibTex
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks EI CPCI-S SCIE Scopus
会议论文 | 2018 , 66 (8) , 3610-3622 | IEEE Global Telecommunications Conference on Trusted Communications with Physical Layer Security (Globecom-TCPLS)
WoS CC Cited Count: 1 SCOPUS Cited Count: 1
Abstract&Keyword Cite

Abstract :

Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication, and so on. In this paper, we propose a social ties based hybrid cooperative beamforming and jamming scheme to secure wireless transmissions under a stochastic geometry framework, where the friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. Connection outage probability (COP) and secrecy outage probability (SOP) of such a scheme in a random network have been analyzed. To facilitate a more convenient performance evaluation, we propose a double Gamma ratio approach through the Gamma approximation method. Based on this, the COP and SOP are tractably obtained in closed-forms. We further consider the SOP in the presence of Poisson point process distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.

Keyword :

stochastic geometry secrecy outage connection outage Social ties physical layer security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Hui-Ming , Xu, Yiming , Huang, Ke-Wen et al. Cooperative Secure Transmission by Exploiting Social Ties in Random Networks [C] . 2018 : 3610-3622 .
MLA Wang, Hui-Ming et al. "Cooperative Secure Transmission by Exploiting Social Ties in Random Networks" . (2018) : 3610-3622 .
APA Wang, Hui-Ming , Xu, Yiming , Huang, Ke-Wen , Han, Zhu , Tsiftsis, Theodoros A. . Cooperative Secure Transmission by Exploiting Social Ties in Random Networks . (2018) : 3610-3622 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 17 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:3147/55031869
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.