Match!
Xiao Tang
Xi'an Jiaotong University
27Publications
6H-index
130Citations
Publications 25
Newest
#1Hongliang He (Xi'an Jiaotong University)
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Xiao Tang (Xi'an Jiaotong University)H-Index: 6
view all 3 authors...
The broadcast nature of wireless communications makes transmission susceptible to eavesdropping. Recently, physical-layer security has been extensively studied to secure the wireless transmissions, but the security is severely compromised when the eavesdropper has the superiority in the channel quality. Toward this issue, we in this paper propose a joint ARQ and network coding method exploiting the characteristics of both the physical layer and the link layer. Specifically, we relate the message...
Source
#1Yichen Wang (Xi'an Jiaotong University)H-Index: 15
#2Xiao Tang (NPU: Northwestern Polytechnical University)H-Index: 6
Last.Tao Wang (Xi'an Jiaotong University)H-Index: 1
view all 3 authors...
Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for primary users (PUs) and protecting information security for secondary users (SUs) are two crucial and fundamental issues for CRNs. Consequently, in this paper, we establish a unified QoS and security provisioning framework for wiretap CRNs. Specifically, different from the widely used deterministic QoS provisioning method and...
1 CitationsSource
#1Saeed Ahmadian (UH: University of Houston)H-Index: 3
#2Xiao Tang (NPU: Northwestern Polytechnical University)H-Index: 6
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 4 authors...
With the development of communication infrastructure in smart grids, cyber security reinforcement has become one of the most challenging issues for power system operators. In this paper, an attacker is considered a participant in the virtual bidding procedure in the day-ahead (DA) and real-time (RT) electricity markets to maximize its profit. The cyber attacker attempts to identify the optimal power system measurements to attack along with the false data injected into measurement devices. Toward...
2 CitationsSource
Dec 1, 2018 in GLOBECOM (Global Communications Conference)
#1Xiao Tang (Xi'an Jiaotong University)H-Index: 6
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 3 authors...
Small cell networks are envisioned as one of the critical enabling technologies for the next-generation wireless systems. However, due to the limited capability of small cell base stations as compared with the macro-cell base stations, the secure wireless communication faces significant challenges. Towards this issue, we target at enhancing the wireless security for small cell networks by employing the physical layer security techniques. Specifically, we maximize the secrecy rate for each indivi...
Source
#1Xiao Tang (Xi'an Jiaotong University)H-Index: 6
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 3 authors...
This paper concentrates on energy efficient visible light communication (VLC) under illumination constraint. To facilitate the implementation in practice, we investigate the problem from a distributed perspective that each user attempts to maximize its own energy efficiency (EE) of VLC while subject to the shared constraint on the illumination. The competition is formulated as a generalized Nash equilibrium problem (GNEP), and the optimal transmission strategy is proposed for each individual use...
Source
Aug 1, 2018 in VTC (Vehicular Technology Conference)
#1Yichen Wang (Xi'an Jiaotong University)H-Index: 15
#2Tao Wang (Xi'an Jiaotong University)H-Index: 1
Last.Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
view all 4 authors...
In this paper, we establish a unified Quality-of-Service (QoS) and security provisioning framework for wiretap cognitive radio networks (CRN) by employing the theories of statistical queueing analysis, effective bandwidth, and effective capacity, which can quantitatively characterize the QoS and security requirements. Based on our developed framework, we formulate the nonconvex optimization problem that aims at maximizing the average throughput of secondary user (SU) subject to PU's QoS requirem...
2 CitationsSource
#1Xiao Tang (Xi'an Jiaotong University)H-Index: 6
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 3 authors...
Information security is a critical yet challenging issue for wireless communications. In this paper, we consider the distributed resource competition in a network that consists of both security-oriented users (SeUs) and regular users (ReUs) which, respectively, intend for secrecy rate and transmission rate maximization. To enhance wireless security, the SeUs are given higher priorities such that they are allowed to take action first in the competition, which gives rise to the multi-leader-follow...
7 CitationsSource
#1Xiao Tang (Xi'an Jiaotong University)H-Index: 6
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 3 authors...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming model, the reactive nature enables highly efficient and long-lasting attacks with limited energy supply, which thus presents a significant threat upon the secure communications in IoT. In this paper, we investigate the anti-reactive-jamming transmission stra...
5 CitationsSource
#1Xiao Tang (Xi'an Jiaotong University)H-Index: 6
#2Ren Pinyi (Xi'an Jiaotong University)H-Index: 20
Last.Qinghe Du (Xi'an Jiaotong University)H-Index: 21
view all 4 authors...
Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the uplink transmissions in ultra-dense networks, where the increased interference along with the increased density significantly challenges the efficient utilization of network resources as well as the provisioning of users’ quality of services (QoS). Targeting these issues, we consider the QoS in terms of target signal-to-interference-plus-no...
5 CitationsSource
Dec 1, 2017 in GLOBECOM (Global Communications Conference)
#1Huaqing Zhang (UH: University of Houston)H-Index: 7
#2Xiao Tang (Xi'an Jiaotong University)H-Index: 6
Last.Zhu Han (UH: University of Houston)H-Index: 79
view all 6 authors...
With large coverage area, high data rate, low latency and high spectral efficiency, LTE-V has been considered as a promising communication technology in the vehicular networks. However, as all vehicles share the same wireless resource, in LTE-V, how to design power allocation strategy for each vehicle while motivating other vehicles to forward the data remains challenging. In this paper, we model the data transmission in the uplink scenario of the vehicular network as an equilibrium program with...
4 CitationsSource
123