Match!
Zhu Han
University of Houston
Wireless networkDistributed computingComputer networkComputer scienceWireless
1,246Publications
86H-index
30.9kCitations
What is this?
Publications 1189
Newest
#1Lin Liu (Nanjing University of Science and Technology)
#2Zhengwang Wang (Nanjing University of Science and Technology)
Last. Feng Shu (Nanjing University of Science and Technology)H-Index: 19
view all 8 authors...
Abstract In this work, we investigate linear precoding for secure spatial modulation. With secure spatial modulation, the achievable secrecy rate does not have an easy-to-compute mathematical expression, and hence, has to be evaluated numerically, which leads to high complexity in the optimal precoder design. To address this issue, an accurate and analytical approximation of the secrecy rate is derived in this work. Using this approximation as the objective function, two low-complexity linear pr...
Source
#2Long ZhangH-Index: 7
Last. Zhu HanH-Index: 86
view all 6 authors...
In this paper, a laser-powered aerial mobile edge computing (MEC) architecture is proposed, where a high-altitude platform (HAP) integrated with an MEC server transfers laser energy to charge aerial user equipments (AUEs) for offloading their computation tasks to the HAP. Particularly, we identify a new privacy vulnerability caused by the transmission of wireless power transfer (WPT) signaling in the presence of a malicious smart attacker (SA). To address this vulnerability, the interaction betw...
Source
#1Haobo Zhang (PKU: Peking University)
#2Hongliang Zhang (PKU: Peking University)H-Index: 12
Last. Lingyang Song (UH: University of Houston)H-Index: 49
view all 6 authors...
The received signal strength (RSS) based technique is widely utilized for ubiquitous positioning due to its advantage of simple implementability. However, its accuracy is limited because the RSS values of adjacent locations can be very difficult to distinguish. Against this background, we propose the novel RSS-based positioning scheme enabled by reconfigurable intelligent surface (RIS). By modifying the reflection coefficient of the RIS, the propagation channels are programmed in such a way that...
#1Yali Chen (Beijing Jiaotong University)H-Index: 2
#2Bo Ai (Beijing Jiaotong University)H-Index: 37
Last. H. Vincent Poor (Princeton University)H-Index: 71
view all 7 authors...
With the evolution of the 5G, 6G and beyond, device-to-device (D2D) communication has been developed as an energy-, and spectrum-efficient solution. In cellular network, D2D links need to share the same spectrum resources with the cellular link. A reconfigurable intelligent surface (RIS) can reconfigure the phase shifts of elements and create favorable beam steering, which can mitigate aggravated interference caused by D2D links. In this paper, we study a RIS-assisted single cell uplink communic...
#1Sai Mounika Errapotu (UH: University of Houston)H-Index: 4
#2Hongning Li (Xidian University)H-Index: 3
Last. Zhu Han (UH: University of Houston)H-Index: 86
view all 7 authors...
Data centers are key participants in emergency demand response (EDR), where the grid coordinates large electricity consumers for reducing their consumption during emergency situations to prevent major economic losses. While existing literature concentrates on owner-operated data centers (e.g., Google), this work studies EDR in multi-tenant colocation data centers (e.g., Equinix) where servers are owned and managed by individual tenants and which are better targets of EDR. Existing EDR mechanisms...
Source
#1Dinh Thai HoangH-Index: 19
#2Diep N. NguyenH-Index: 15
Last. Zhu HanH-Index: 86
view all 7 authors...
In this article, we introduce a novel deception strategy inspired by the "Borrowing Arrows with Thatched Boats" strategy, one of the most famous military tactics in history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive jammers by leveraging their own jamming signals. More specifically, by stimulating the jammer to attack the channel through transmitting fake transmissio...
Source
#1Chunxia Su (HEU: Harbin Engineering University)H-Index: 1
#2Fang Ye (HEU: Harbin Engineering University)H-Index: 3
Last. Zhu Han (UH: University of Houston)H-Index: 86
view all 6 authors...
In the emerging Internet-of-Things (IoT) paradigm, the lifetime of energy-constrained devices (ECDs) cannot be ensured due to the limited battery capacity. In this article, unmanned aerial vehicles (UAVs) are served as carriers of wireless power chargers (WPCs) to charge the ECDs. Aiming at maximizing the total amount of charging energy under the constraints of the UAVs and WPCs, a multiple-period charging process problem is formulated. To address this problem, bipartite matching with one-sided ...
1 CitationsSource
#1Anselme Ndikumana (Kyung Hee University)H-Index: 8
#2Nguyen H. Tran (USYD: University of Sydney)H-Index: 22
Last. Choong Seon Hong (Kyung Hee University)H-Index: 31
view all 7 authors...
The concept of Multi-access Edge Computing (MEC) has been recently introduced to supplement cloud computing by deploying MEC servers to the network edge so as to reduce the network delay and alleviate the load on cloud data centers. However, compared to the resourceful cloud, MEC server has limited resources. When each MEC server operates independently, it cannot handle all computational and big data demands stemming from users' devices. Consequently, the MEC server cannot provide significant ga...
29 CitationsSource
#1Jinglin ZhangH-Index: 1
#2Wenjun XuH-Index: 11
Last. ZHANGPing
view all 6 authors...
Millimeter wave (mmWave) communications can potentially meet the high data-rate requirements of unmanned aerial vehicle (UAV) networks. However, as the prerequisite of mmWave communications, the narrow directional beam tracking is very challenging because of the three-dimensional (3D) mobility and attitude variation of UAVs. Aiming to address the beam tracking difficulties, we propose to integrate the conformal array (CA) with the surface of each UAV, which enables the full spatial coverage and ...
#1Anupam Kumar Bairagi (Kyung Hee University)H-Index: 6
#2Mehedi Masud (Taif University)H-Index: 10
Last. Zhu Han (UH: University of Houston)H-Index: 86
view all 11 authors...
COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective to control this pandemic. In this paper, we provide an analytical model on the effectiveness of the sustainable lockdown policy that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we analyze a noncooperative game environment that provides an incentive for maintaining social distancing. Furt...
Source
12345678910