• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:王慧明

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 22 >
Secure UAV Random Networks With Minimum Safety Distance EI SCIE
期刊论文 | 2021 , 70 (3) , 2856-2861 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract&Keyword Cite

Abstract :

In this correspondence, we study the physical layer security in a stochastic unmanned aerial vehicles (UAVs) network froma network-wide perspective, where the locations of UAVs are modeled as a Mat ' ern hardcore point process (MHCPP) to characterize the minimum safety distance between UAVs, and the locations of users and eavesdroppers are modeled as a Poisson cluster process and a Poisson point process, respectively. UAVs adopt zero-forcing precoding to serve multiple ground users and emit artificial noise to combat eavesdropping. We derive the approximations for the coverage probability and secrecy probability of a typical user, with which we derive the secrecy throughput of the whole network. Numerical results show the analytical results can well approximate the simulation results. Impacts of parameters on the secrecy performance are shown.

Keyword :

UAV networks Physical layer security Matern hard-core point process

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2856-2861 .
MLA Lyu, Jiawei 等. "Secure UAV Random Networks With Minimum Safety Distance" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2856-2861 .
APA Lyu, Jiawei , Wang, Hui-Ming . Secure UAV Random Networks With Minimum Safety Distance . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2856-2861 .
Export to NoteExpress RIS BibTex
On Covert Communication against Sequential Change-Point Detection EI SCIE
期刊论文 | 2021 , 67 (11) , 7285-7303 | IEEE Transactions on Information Theory
Abstract&Keyword Cite

Abstract :

We investigate covert communication under a sequential change-point detection (SCPD) framework, where a transmitter, Alice, attempts to communicate reliably with a receiver, Bob, over an additive white Gaussian noise channel, while simultaneously ensuring covertness (low probability of detection) with respect to an adversary, Willie. Different from the binary hypothesis test based detection framework considered in prior works where Willie collects all signal samples together and makes a decision in a batch manner, we view Willie's detection process as an SCPD process that works in a real-time manner. We establish a new criterion to evaluate the covertness of the communication between Alice and Bob, and investigate the performance of covert communication accordingly. Subject to the proposed constraint on covertness, we investigate the feasible transmit power and transmission duration under three SCPD algorithms, namely, the Shewhart test, the finite moving average chart (FMAC), and the cumulative sum (CUSUM) test, and characterize how the covert communication throughput scales with the average run length to false alarm (ARL2FA) of Willie's detector as the ARL2FA increases without bound. Our theoretical results can be viewed as upper bounds on the covert communication throughput that can be achieved, and we show that compared with the case where Willie performs the CUSUM test, Alice and Bob achieve a higher covert communication throughput if Willie performs the Shewhart test or the FMAC. © 1963-2012 IEEE.

Keyword :

Decoding Gaussian noise (electronic) White noise Testing

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection [J]. | IEEE Transactions on Information Theory , 2021 , 67 (11) : 7285-7303 .
MLA Huang, Ke-Wen 等. "On Covert Communication against Sequential Change-Point Detection" . | IEEE Transactions on Information Theory 67 . 11 (2021) : 7285-7303 .
APA Huang, Ke-Wen , Wang, Hui-Ming , Poor, H. Vincent . On Covert Communication against Sequential Change-Point Detection . | IEEE Transactions on Information Theory , 2021 , 67 (11) , 7285-7303 .
Export to NoteExpress RIS BibTex
Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage CPCI-S
会议论文 | 2021 | IEEE 93rd Vehicular Technology Conference (VTC-Spring)
Abstract&Keyword Cite

Abstract :

Millimeter-wave(Mmwave) networks with high directional antennas have enhanced security. However, eavesdroppers can still intercept confidential messages by residing in both signal main-lobe and side-lobe areas. This paper investigates the secrecy performance of artificial-noise (AN)-aided transmission in mmWave systems under the capacity-threshold on-off scheme in the presence of randomly distributed eavesdroppers, which utilizes AN to resist eavesdroppers in the side-lobe area. Considering the effects of mmWave channel characteristics, blockages, and directional antenna arrays, we derive the transmission probability (TP) and closed-form expression of secrecy outage probability (SOP) in the non-colluding eavesdropping scenario. What's more, we derive the analytical expression of SOP in the colluding eavesdropping scenario and its lower bound. Specifically, we characterize the impacts of various system parameters on the secrecy performance and verify the contribution of AN-jamming to inhibiting side-lobe information leakage, meanwhile, the optimal power allocation of AN is analyzed in non-colluding scenarios. Besides, our results reveal that with the narrower main beam and higher antenna gain, the secrecy performance is enhanced significantly. The analytical and numerical results show that the capacity-based transmission scheme with AN-jamming can effectively improve the secrecy performance of mmWave systems.

Keyword :

artificial noise mmWave blockage secrecy outage sector Physical layer security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Haoyu , Ju, Ying , Pei, Qingqi et al. Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage [C] . 2021 .
MLA Wang, Haoyu et al. "Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage" . (2021) .
APA Wang, Haoyu , Ju, Ying , Pei, Qingqi , Wang, Hui-Ming . Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage . (2021) .
Export to NoteExpress RIS BibTex
Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels CPCI-S
会议论文 | 2021 | IEEE Wireless Communications and Networking Conference (WCNC)
Abstract&Keyword Cite

Abstract :

This paper studies covert communications between a pair of legitimate transmitter-receiver against a watchful warden over fading channels. There coexist multiple friendly helper nodes who are willing to protect the covert communication from being detected by the warden. An uncoordinated jammer selection scheme is proposed where those helpers whose instantaneous channel gains to the legitimate receiver fall below a pre-established selection threshold will be chosen as jammers radiating jamming signals to defeat the warden. Afterwards, we jointly design the optimal selection threshold and transmission rate for maximizing covert throughput under the premise that the detection error of the warden exceeds a certain level. Numerical results demonstrate that the maximal covert throughput improves significantly as the total number of helpers increases.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen et al. Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels [C] . 2021 .
MLA Zhengy, Tong-Xing et al. "Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels" . (2021) .
APA Zhengy, Tong-Xing , Yang, Ziteng , Liu, Hao-Wen , Wen, Yating , Mu, Pengcheng , Wang, Hui-Ming . Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels . (2021) .
Export to NoteExpress RIS BibTex
Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure EI SCIE
期刊论文 | 2021 , 20 (1) , 345-359 | IEEE Transactions on Wireless Communications
WoS CC Cited Count: 2
Abstract&Keyword Cite

Abstract :

Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in order to wiretap the data transmitted from a transmitter, Alice, to a receiver, Bob. We propose a new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses an intelligent reflecting surface (IRS) to reflect the pilot sent by Bob to Alice. The proposed new PCA scheme, referred to as IRS-PCA, increases the signal leakage from Alice to the IRS during the data transmission phase, which is then reflected by the IRS to Eve in order to improve the wiretapping capability of Eve. The proposed IRS-PCA scheme disables many existing countermeasures on PCA due to the fact that with IRS-PCA, Eve no longer needs to know the pilot sequence of Bob, and therefore, poses severe threat to the security of the legitimate wireless communication system. In view of this, the problems of 1) IRS-PCA detection and 2) secure transmission under IRS-PCA are considered in this paper. For IRS-PCA detection, a generalized cumulative sum (GCUSUM) detection procedure is proposed based on the framework of quickest detection, aiming at detecting the occurrence of IRS-PCA as soon as possible once it occurs. For secure transmission under IRS-PCA, a cooperative channel estimation scheme is proposed to estimate the channel of the IRS, based on which zero-forcing beamforming is designed to reduce signal leakage. © 2002-2012 IEEE.

Keyword :

Electrical engineering Data transfer Mobile telecommunication systems

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure [J]. | IEEE Transactions on Wireless Communications , 2021 , 20 (1) : 345-359 .
MLA Huang, Ke-Wen et al. "Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure" . | IEEE Transactions on Wireless Communications 20 . 1 (2021) : 345-359 .
APA Huang, Ke-Wen , Wang, Hui-Ming . Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure . | IEEE Transactions on Wireless Communications , 2021 , 20 (1) , 345-359 .
Export to NoteExpress RIS BibTex
Detection of Hijacking DDoS Attack Based on Air Interface Traffic EI SCIE
期刊论文 | 2021 , 10 (10) , 2225-2229 | IEEE WIRELESS COMMUNICATIONS LETTERS
Abstract&Keyword Cite

Abstract :

Massive machine type communication (mMTC) network contains massive access devices, which increases the risk of distributed denial of service (DDoS) attacks. Especially, the DDoS attack launched by hijacked devices cannot be detected through traditional cryptography-based authentication because that the hijacked devices have legitimate identities. In this letter, we propose to exploit the characteristics of access traffic at the air interface to detect this kind of DDoS attack, and then identify the suspicious devices. We analyze both the characteristics of access traffic based on MTC traffic arrival model and the random access mechanism proposed by 3GPP to construct test statistics, and propose a sequential change point detection (SCPD) scheme to test whether there are anomalies as quickly as possible. After that, we identify the hijacked devices based on the abnormal traffic. Simulation experiments confirm the effectiveness of our detection scheme.

Keyword :

Denial-of-service attack massive MTC network Delays Authentication Uplink Device hijacking access traffic DDoS attack sequential change point detection Real-time systems Object recognition 3GPP

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic [J]. | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) : 2225-2229 .
MLA Fu, Qing-Yi et al. "Detection of Hijacking DDoS Attack Based on Air Interface Traffic" . | IEEE WIRELESS COMMUNICATIONS LETTERS 10 . 10 (2021) : 2225-2229 .
APA Fu, Qing-Yi , Wang, Hui-Ming . Detection of Hijacking DDoS Attack Based on Air Interface Traffic . | IEEE WIRELESS COMMUNICATIONS LETTERS , 2021 , 10 (10) , 2225-2229 .
Export to NoteExpress RIS BibTex
Jamming Aided Covert Communication With Multiple Receivers EI SCIE
期刊论文 | 2021 , 20 (7) , 4480-4494 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

We consider that a transmitter covertly communicates with multiple receivers under the help of a friendly jammer. The messages intended for different receivers are transmitted in mutually orthogonal frequency bands. An adversary observes all these frequency bands aiming at detecting whether or not communication occurs, while the friendly jammer broadcasts jamming signals to degrade the detection performance of the adversary. We consider a block Rayleigh fading channel model and evaluate the performance of covert communication in two situations: 1) the wireless channels vary slowly such that the transmission ends within one channel coherent time block, and 2) the wireless channels vary fast such that the wireless channels have changed several times before the whole transmission is finished. In the former case, subject to a covertness constraint, we maximize the sum of the effective rates by optimizing the transmit power allocation and the transmission rate for each receiver. In the latter case, we take the channel training process into consideration, and subject to a covertness constraint, we maximize the sum of the ergodic rates by optimizing the power allocation and the pilot length. Though both of the two optimization problems are non-convex, we presented methods to find their global optimal solutions. Besides, we also present methods to find sub-optimal solutions with lower computational complexities. Numerical results are presented to evaluate the performance under the two situations.

Keyword :

power control Transmitters Wireless communication resource allocation Communication system security Receivers Jamming Fading channels jamming Resource management wireless security Covert communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) : 4480-4494 .
MLA Huang, Ke-Wen et al. "Jamming Aided Covert Communication With Multiple Receivers" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 20 . 7 (2021) : 4480-4494 .
APA Huang, Ke-Wen , Deng, Hao , Wang, Hui-Ming . Jamming Aided Covert Communication With Multiple Receivers . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) , 4480-4494 .
Export to NoteExpress RIS BibTex
Massive Random Access With Sporadic Short Packets: Joint Active User Detection and Channel Estimation via Sequential Message Passing EI SCIE
期刊论文 | 2021 , 20 (7) , 4541-4555 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Abstract&Keyword Cite

Abstract :

This paper considers an uplink massive machine-type communication (mMTC) scenario, where a large number of user devices are connected to a base station (BS). A novel grant-free massive random access (MRA) strategy is proposed, considering both the sporadic user traffic and short packet features. Specifically, the notions of active detection time (ADT) and active detection period (ADP) are introduced so that active user detection can be performed multiple times within one coherence time. By taking sporadic user traffic and short packet features into consideration, we model the joint active user detection and channel estimation issue into a dynamic compressive sensing (CS) problem with the underlying sparse signals exhibiting substantial temporal correlation. This paper builds a probabilistic model to capture the temporal structure and establishes a corresponding factor graph. A novel sequential approximate message passing (S-AMP) algorithm is designed to sequentially perform inference and recover sparse signal from one ADT to the next. The Bayes active user detector and the corresponding channel estimator are then derived. Numerical results show that the proposed S-AMP algorithm enhances active user detection and channel estimation performances over competing algorithms under our scenario.

Keyword :

Wireless communication Message passing Uplink sporadic short packet joint active user detection and channel estimation dynamic compressive sensing Performance evaluation Coherence time sequential approximate message passing Heuristic algorithms Channel estimation Massive random access

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Jia-Cheng , Wang, Hui-Ming . Massive Random Access With Sporadic Short Packets: Joint Active User Detection and Channel Estimation via Sequential Message Passing [J]. | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) : 4541-4555 .
MLA Jiang, Jia-Cheng et al. "Massive Random Access With Sporadic Short Packets: Joint Active User Detection and Channel Estimation via Sequential Message Passing" . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 20 . 7 (2021) : 4541-4555 .
APA Jiang, Jia-Cheng , Wang, Hui-Ming . Massive Random Access With Sporadic Short Packets: Joint Active User Detection and Channel Estimation via Sequential Message Passing . | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , 2021 , 20 (7) , 4541-4555 .
Export to NoteExpress RIS BibTex
Secure Cognitive Radio Communication via Intelligent Reflecting Surface EI SCIE
期刊论文 | 2021 , 69 (7) , 4678-4690 | IEEE TRANSACTIONS ON COMMUNICATIONS
WoS CC Cited Count: 3
Abstract&Keyword Cite

Abstract :

YYY In this paper, an intelligent reflecting surface (IRS) assisted spectrum sharing underlay cognitive radio (CR) wiretap channel (WTC) is studied, and we aim at enhancing the secrecy rate of secondary user in this channel subject to total power constraint at secondary transmitter (ST), interference power constraint (IPC) at primary receiver (PR) as well as unit modulus constraint at IRS. Due to extra IPC and eavesdropper (Eve) are considered, all the existing solutions for enhancing secrecy rate of IRS-assisted non-CR WTC as well as enhancing transmission rate in IRS-assisted CR channel without eavesdropper fail in this work. Therefore, we propose new numerical solutions to optimize the secrecy rate of this channel under full primary, secondary users' channel state information (CSI) and three different cases of Eve's CSI: full CSI, imperfect CSI with bounded estimation error, and no CSI. To solve the difficult non-convex optimization problem, an efficient alternating optimization (AO) algorithm is proposed to jointly optimize the beamformer at ST and phase shift coefficients at IRS. In particular, when optimizing the phase shift coefficients during each iteration of AO, a Dinkelbach based solution in combination with successive approximation and penalty based solution is proposed under full CSI and a penalty convex-concave procedure solution is proposed under imperfect Eve's CSI. For no Eve's CSI case, artificial noise (AN) aided approach is adopted to help enhancing the secrecy rate. Simulation results show that our proposed solutions for the IRS-assisted design greatly enhance the secrecy performance compared with the existing numerical solutions with and without IRS under full and imperfect Eve's CSI. And positive secrecy rate can be achieved by our proposed AN aided approach given most channel realizations under no Eve's CSI case so that secure communication also can be guaranteed. All of the proposed AO algorithms are guaranteed to monotonic convergence.

Keyword :

secrecy rate CSI intelligent reflecting surface MISO Cognitive radio

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface [J]. | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) : 4678-4690 .
MLA Dong, Limeng et al. "Secure Cognitive Radio Communication via Intelligent Reflecting Surface" . | IEEE TRANSACTIONS ON COMMUNICATIONS 69 . 7 (2021) : 4678-4690 .
APA Dong, Limeng , Wang, Hui-Ming , Xiao, Haitao . Secure Cognitive Radio Communication via Intelligent Reflecting Surface . | IEEE TRANSACTIONS ON COMMUNICATIONS , 2021 , 69 (7) , 4678-4690 .
Export to NoteExpress RIS BibTex
Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection EI SCIE
期刊论文 | 2021 , 70 (3) , 2912-2916 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
WoS CC Cited Count: 5
Abstract&Keyword Cite

Abstract :

In this correspondence, we use double intelligent reflecting surface (IRS) assisted design to enhance the secrecy performance of wireless transmission. Different from the existing studies in the literature, the inter-surface signal reflection is considered in this work, which makes the formulated secrecy rate (SR) optimization problem difficult to tackle. In particular, to solve this problem, we propose a product Riemmanian manifold (PRM) based alternating optimization (AO) algorithm to jointly optimize the beamformer at transmitter as well as phase shift coefficients at double IRS, in which the PRM optimization algorithm is applied to optimize the phase shift coefficients at both IRSs simultaneously. Simulation results show that the proposed algorithm greatly enhance the SR compared with the existing benchmark schemes. And compared with conventional semi-definite relaxation based AO algorithm, the proposed PRM based AO algorithm can achieve much lower computational complexity as well as faster speed of convergence.

Keyword :

Manifolds Transmitters Linear programming Convergence inter-surface signal reflection intelligent reflecting surface product Riemmanian manifold secrecy rate Optimization Wireless communication MISO communication Alternating optimization

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Dong, Limeng , Wang, Hui-Ming , Bai, Jiale et al. Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) : 2912-2916 .
MLA Dong, Limeng et al. "Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 70 . 3 (2021) : 2912-2916 .
APA Dong, Limeng , Wang, Hui-Ming , Bai, Jiale , Xiao, Haitao . Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2021 , 70 (3) , 2912-2916 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 22 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:643/98472151
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.