Huaiyu Dai (Fellow, IEEE) received the B.E. and M.S. degrees in electrical engineering from Tsinghua University, Beijing, China, in 1996 and 1998, respectively, and the Ph.D. degree in electrical engineering from Princeton University, Princeton, NJ in 2002. He was with Bell Labs, Lucent Technologies, Holmdel, NJ, in summer 2000, and with AT&T Labs-Research, Middletown, NJ, in summer 2001. He is currently a Professor of Electrical and Computer Engineering with NC State University, Raleigh. His research interests are in the general areas of communication systems and networks, advanced signal processing for digital communications, and communication theory and information theory. His current research focuses on networked information processing and crosslayer design in wireless networks, cognitive radio networks, network security, and associated information-theoretic and computation-theoretic analysis. He has served as an editor of IEEE Transactions on Communications, IEEE Transactions on Signal Processing, and IEEE Transactions on Wireless Communications. Currently he is an Area Editor in charge of wireless communications for IEEE Transactions on Communications. He co-edited two special issues of EURASIP journals on distributed signal processing techniques for wireless sensor networks, and on multiuser information theory and related applications, respectively. He co-chaired the Signal Processing for Communications Symposium of IEEE Globecom 2013, the Communications Theory Symposium of IEEE ICC 2014, and the Wireless Communications Symposium of IEEE Globecom 2014. He was a co-recipient of best paper awards at 2010 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), 2016 IEEE INFOCOM BIGSECURITY Workshop, and 2017 IEEE International Conference on Communications (ICC 2017).

Works (204)

Updated: October 31st, 2024 05:01

2024 article

Accelerating the Delivery of Data Services over Uncertain Mobile Crowdsensing Networks

Liwang, M., Cheng, Z., Gong, W., Li, L., Su, Y., Jiao, Z., … Dai, H. (2024, September 9). IEEE WIRELESS COMMUNICATIONS.

By: M. Liwang, Z. Cheng, W. Gong, L. Li, Y. Su, Z. Jiao, S. Hosseinalipour*, X. Wang, H. Dai*

author keywords: Sensors; Mobile computing; Forward contracts; Wireless communication; Vehicle dynamics; Wireless sensor networks; Uncertainty
Source: Web Of Science
Added: September 23, 2024

2024 journal article

Dynamic Power Control for Delay-Optimal Coded Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 23(4), 3283–3297.

By: D. Geng*, X. He*, R. Jin* & H. Dai n

author keywords: Task analysis; Edge computing; Power control; Mobile handsets; Wireless communication; Encoding; Signal to noise ratio; Coded computing; distributed edge computing; dynamic power control; lyapunov optimization
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: June 17, 2024

2024 journal article

GA-DRL: Graph Neural Network-Augmented Deep Reinforcement Learning for DAG Task Scheduling Over Dynamic Vehicular Clouds

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 21(4), 4226–4242.

author keywords: Task analysis; Dynamic scheduling; Topology; Vehicle dynamics; Processor scheduling; Heuristic algorithms; Feature extraction; Vehicular cloud; DAG scheduling; deep reinforcement learning; graph neural network
Source: Web Of Science
Added: September 9, 2024

2024 journal article

Hierarchical Federated Learning in Wireless Networks: Pruning Tackles Bandwidth Scarcity and System Heterogeneity

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 23(9), 11417–11432.

By: M. Pervej n, R. Jin* & H. Dai n

author keywords: Servers; Training; Computational modeling; Convergence; Wireless networks; Adaptation models; Resource management; Heterogeneous network; hierarchical federated learning; model pruning; resource management
Source: Web Of Science
Added: September 23, 2024

2024 journal article

Joint Optimization of Charging Station Placement and UAV Trajectory for Fresh Data Collection

IEEE INTERNET OF THINGS JOURNAL, 11(14), 25057–25073.

author keywords: Autonomous aerial vehicles; Trajectory; Batteries; Internet of Things; Task analysis; Energy efficiency; Data collection; Age of Information (AoI); charging station (CS) placement; unmanned aerial vehicle (UAV) trajectory optimization; UAV
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 5, 2024

2024 journal article

Privacy-Preserving Decentralized Inference With Graph Neural Networks in Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 23(1), 543–558.

By: M. Lee*, G. Yu* & H. Dai n

author keywords: Artificial intelligence; graph neural network; decentralized inference; differential privacy; over-the-air computation
TL;DR: This paper adopts local differential privacy as the metric, and design novel privacy-preserving signals as well as privacy-guaranteed training algorithms to achieve privacy- Preserving inference in decentralized inference with GNNs in wireless networks. (via Semantic Scholar)
Source: Web Of Science
Added: February 12, 2024

2024 article

Sign-Based Gradient Descent With Heterogeneous Data: Convergence and Byzantine Resilience

Jin, R., Liu, Y., Huang, Y., He, X., Wu, T., & Dai, H. (2024, January 12). IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, Vol. 1.

By: R. Jin*, Y. Liu*, Y. Huang*, X. He*, T. Wu n & H. Dai n

author keywords: Byzantine resilience; communication efficiency; data heterogeneity; federated learning (FL); sign-based gradient descent
TL;DR: A novel magnitude-driven stochastic-sign-based gradient compressor is proposed to address the non-convergence issue of signSGD, and the convergence of the proposed method is established in the presence of arbitrary data heterogeneity. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: March 11, 2024

2024 journal article

TDRA: A Truthful Dynamic Reverse Auction for DAG Task Scheduling Over Vehicular Clouds

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 73(3), 4337–4351.

author keywords: Vehicular cloud (VC) computing; directed acyclic graph (DAG); dynamic task scheduling; reverse auctions
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 8, 2024

2024 journal article

Task-Decoding Assisted Cooperative Transmission for Coded Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 23(8), 9044–9058.

By: T. Li*, X. He*, R. Jin* & H. Dai n

author keywords: Task analysis; Encoding; Edge computing; Delays; Wireless communication; Mobile handsets; Downlink; Distributed edge computing; coded computing; task-decoding; cooperative transmission
Source: Web Of Science
Added: October 28, 2024

2024 article

Unleashing the Potential of Stage-Wise Decision-Making in Scheduling of Graph-Structured Tasks over Mobile Vehicular Clouds

Liwang, M., Guo, B., Ma, Z., Su, Y., Jin, J., Hosseinalipour, S., … Dai, H. (2024, July 15). IEEE COMMUNICATIONS MAGAZINE.

By: M. Liwang, B. Guo, Z. Ma, Y. Su, J. Jin, S. Hosseinalipour*, X. Wang, H. Dai*

author keywords: Task analysis; Processor scheduling; Decision making; Dynamic scheduling; Servers; Vehicle dynamics; Uncertainty
Source: Web Of Science
Added: August 5, 2024

2023 journal article

Base Station Antenna Uptilt Optimization for Cellular-Connected Drone Corridors

IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 59(4), 4729–4737.

By: S. Maeng n, M. Chowdhury n, I. Guvenc n, A. Bhuyan* & H. Dai n

author keywords: Drones; Antennas; Interference; Probability; Power system reliability; Communication system security; Signal to noise ratio; Antenna uptilt; drone corridor; national airspace (NAS); outage probability; unmanned aerial vehicle (UAV); unmanned aerial vehicle traffic management
TL;DR: This article considers the use of additional uptilted antennas at each cellular BS and optimize the uptilt angle to maximize the wireless coverage probability across a given drone corridor and characterize the optimal value of the antenna uptilt angles for a given antenna pattern as well as the minimum/maximum altitudes of the drone corridor. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 9, 2023

2023 journal article

Blind Post-Decision State-Based Reinforcement Learning for Intelligent IoT

IEEE INTERNET OF THINGS JOURNAL, 10(12), 10605–10620.

By: J. Zhang*, X. He* & H. Dai n

author keywords: Learning speed; post-decision state (PDS); reinforcement learning (RL); two-timescale stochastic approximation
TL;DR: A novel blind PDS (b-PDS) learning algorithm is proposed in this work by leveraging the generic two-timescale stochastic approximation framework and can achieve a similar improvement of learning speed as conventional PDS learning while excluding the need for prior information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: July 3, 2023

2023 article

CGBA: Curvature-aware Geometric Black-box Attack

2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION, ICCV, pp. 124–133.

By: M. Reza n, A. Rahmati n, T. Wu n & H. Dai n

UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: April 15, 2024

2023 article

Channel Rank Improvement in Urban Drone Corridors Using Passive Intelligent Reflectors

2023 IEEE AEROSPACE CONFERENCE.

By: E. Ozturk n, C. Anjinappa n, F. Erden n, M. Chowdhury n, I. Guvenc n, H. Dai n, A. Bhuyan*

TL;DR: The results at 6 GHz, 28 GHz, and 60 GHz show that the proposed approach increases the average rates for all frequency bands for a given drone corridor when compared with the environment with no IRSs present, and IRS-aided channels perform close to each other at sub-6 and mmWave bands. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: September 18, 2023

2023 journal article

Distributed Learning Over Networks With Graph-Attention-Based Personalization

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 71, 2071–2086.

author keywords: Decentralized network; distributed learning; personalized learning; statistical heterogeneity
TL;DR: A graph-attention-based personalized training algorithm (GATTA) for distributed deep learning that enables each agent to train its local personalized model while exploiting its correlation with neighboring nodes and utilizing their useful information for aggregation. (via Semantic Scholar)
Source: Web Of Science
Added: July 10, 2023

2023 journal article

Efficient Content Delivery in User-Centric and Cache-Enabled Vehicular Edge Networks with Deadline-Constrained Heterogeneous Demands

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 73(1), 1129–1145.

By: M. Pervej n, R. Jin*, S. Lin n & H. Dai n

author keywords: Connected vehicle (CV); content caching; delay minimization; software-defined networking (SDN); user-centric networking; vehicular edge network (VEN)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: April 22, 2024

2023 journal article

Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks

IEEE TRANSACTIONS ON SERVICES COMPUTING, 16(5), 3397–3411.

author keywords: Air-ground integrated vehicular network; power allocation; task scheduling; undirected graph; vehicular cloud
TL;DR: It is revealed that satisfying constraints related to graph task structure requires addressing the non-trivial subgraph isomorphism problem over a dynamic vehicular topology, and a decoupling approach is proposed by segregating template searching from transmission power allocation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: November 13, 2023

2023 journal article

Location Privacy-Aware and Energy-Efficient Offloading for Distributed Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 22(11), 7975–7988.

By: Y. He*, X. He*, R. Jin* & H. Dai n

author keywords: Distributed edge computing; location-privacy; matrix sequential probability ratio test (MSPRT); Lyapunov optimization
TL;DR: A location inference attack based on matrix sequential probability ratio test (MSPRT) is identified and a countermeasure based on dynamic multi-EN selection is proposed, together with a location privacy-aware and energy-efficient distributed offloading scheme based on the generic Lyapunov optimization framework. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: January 16, 2024

2023 journal article

On the Privacy Guarantees of Gossip Protocols in General Networks

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 10(6), 3114–3130.

By: R. Jin*, Y. Huang n, Z. Zhang* & H. Dai n

author keywords: Protocols; Privacy; Differential privacy; Uncertainty; Monitoring; Wireless sensor networks; Social networking (online); Information processing; Prediction methods; Information spreading; gossip protocols; differential privacy; prediction uncertainty
TL;DR: The privacy guarantees of gossip protocols in general networks in terms of differential privacy and prediction uncertainty are studied, and it is found that source anonymity is closely related to some key network structure parameters in the general network setting. (via Semantic Scholar)
Source: Web Of Science
Added: November 27, 2023

2023 journal article

On the outage probability of uplink IRS-aided networks: NOMA and OMA

PHYSICAL COMMUNICATION, 59.

By: S. Benmahmoud*, E. Meftah* & H. Dai n

author keywords: Intelligent reflecting surfaces (IRS); Non-orthogonal; orthogonal; multiple-access (NOMA; OMA); Uplink NOMA; OMA; Outage probability (OP)
Source: Web Of Science
Added: May 30, 2023

2023 journal article

Optimal Relay Probing for UAV Millimeter Wave Communications with Beam Training Overhead

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 72(6), 7351–7363.

By: Z. Song*, J. An*, H. Ding* & H. Dai n

author keywords: Index Terms-Unmanned aerial vehicle (UAV); cooperative communications; millimeter wave (mmWave) communications; relay selection
TL;DR: The design of relay probing strategies for UAV mmWave A2G communications is studied to maximize the expected achievable throughput between the UAV under blockage and the BS and derives the closed-form expression for the distribution of achievable throughput. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 7, 2023

2023 journal article

RFID: Towards Low Latency and Reliable DAG Task Scheduling Over Dynamic Vehicular Clouds

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 72(9), 12139–12153.

author keywords: Vehicular cloud computing; directed acyclic graph; task scheduling; network dynamics; volatile resources
TL;DR: This paper forms DAG task scheduling as a 0-1 integer programming problem, aiming to minimize the overall task completion time while ensuring a high execution success rate, which turns out to be NP-hard. (via Semantic Scholar)
Source: Web Of Science
Added: December 18, 2023

2023 journal article

Resource Constrained Vehicular Edge Federated Learning With Highly Mobile Connected Vehicles

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 41(6), 1825–1844.

By: M. Pervej n, R. Jin* & H. Dai n

author keywords: Index Terms- Connected vehicle (CV); energy efficiency (EE); federated learning (FL); vehicular edge network (VEN)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: May 17, 2023

2022 article

60 GHz Outdoor Propagation Measurements and Analysis Using Facebook Terragraph Radios

2022 IEEE RADIO AND WIRELESS SYMPOSIUM (RWS), pp. 156–159.

By: K. Du n, O. Mujumdar n, O. Ozdemir n, E. Ozturk n, I. Guvenc n, M. Sichitiu n, H. Dai n, A. Bhuyan*

author keywords: 60 GHz; AERPAW; channel sounding measurements; delay spread; drone; LOS; mmWave; MPCs; path loss
TL;DR: This work investigated the propagation and scattering behavior of 60 GHz mmWave signals in outdoor environments at a travel distance of 98 m for an aerial link (rooftop to rooftop), and 147 m for a ground link (light-pole to light-pole). (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: June 13, 2022

2022 journal article

Communication Efficient Federated Learning With Energy Awareness Over Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(7), 5204–5219.

By: R. Jin n, X. He* & H. Dai n

author keywords: Mobile handsets; Servers; Training; Performance evaluation; Energy consumption; Computational modeling; Wireless networks; Federated learning; wireless communications; communication efficiency; data heterogeneity
TL;DR: The idea of SignSGD in which only the signs of the gradients are exchanged is adopted, and two optimization problems are formulated and solved, which optimize the learning performance given the energy consumption requirement, and vice versa. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 29, 2022

2022 journal article

Communication-Efficient Federated Learning via Predictive Coding

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 16(3), 369–380.

By: K. Yue n, R. Jin n, C. Wong n & H. Dai n

author keywords: Predictive models; Servers; Collaborative work; Predictive coding; Entropy coding; Costs; Quantization (signal); Federated learning; distributed optimization; predictive coding
TL;DR: This paper proposes a predictive coding based compression scheme for federated learning that has shared prediction functions among all devices and allows each worker to transmit a compressed residual vector derived from the reference. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 31, 2022

2022 article

Federated Learning via Plurality Vote

Yue, K., Jin, R., Wong, C.-W., & Dai, H. (2022, December 7). IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, Vol. 12.

By: K. Yue n, R. Jin*, C. Wong n & H. Dai n

author keywords: Distributed optimization; efficient communication; federated learning; neural network quantization
TL;DR: This work proposes a new scheme named federated learning via plurality vote (FedVote), which can reduce quantization error and converges faster compared to the methods directly quantizing the model updates. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: January 9, 2023

2022 journal article

Graph Neural Networks Meet Wireless Communications: Motivation, Applications, and Future Directions

IEEE WIRELESS COMMUNICATIONS, 29(5), 12–19.

By: M. Lee*, G. Yu*, H. Dai n & G. Li*

TL;DR: GNN4Com based on how graphical models are constructed and Com4GNN with corresponding incentives are discussed, which highlights potential research directions to promote future research endeavors for GNNs in wireless communications. (via Semantic Scholar)
Source: Web Of Science
Added: January 17, 2023

2022 journal article

Hybrid Beamforming and Adaptive RF Chain Activation for Uplink Cell-Free Millimeter-Wave Massive MIMO Systems

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 71(8), 8739–8755.

By: N. Nguyen*, K. Lee* & H. Dai n

author keywords: Radio frequency; Massive MIMO; Array signal processing; Power demand; Channel estimation; Antennas; Uplink; Cell-free massive MIMO; hybrid beamforming; mmWave communication; RF chain activation
TL;DR: A novel adaptive radio frequency (RF) chain-activation (ARFA) scheme, which dynamically activates/deactivates RF chains and their connected analog-to-digital converters (ADCs) and phase shifters (PSs) at the APs based on the CSI. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: September 12, 2022

2022 journal article

Learning-Based Data Gathering for Information Freshness in UAV-Assisted IoT Networks

IEEE INTERNET OF THINGS JOURNAL, 10(3), 2557–2573.

author keywords: Data collection; Internet of Things; Trajectory; Energy efficiency; Autonomous aerial vehicles; Trajectory planning; Wireless sensor networks; Age of Information (AoI); deep reinforcement learning (DRL); Internet of Things (IoT) network; sampling mode; unmanned aerial vehicle (UAV)
TL;DR: Two learning algorithms based on the Sarsa and value-decomposition network (VDN), respectively, are proposed, which allow the UAVs to fulfill data collection tasks requested by the SNs and validate the effectiveness of the proposed two learning-based algorithms compared with baseline policies. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: March 13, 2023

2022 article

Mobility, Communication and Computation Aware Federated Learning for Internet of Vehicles

2022 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), pp. 750–757.

author keywords: Internet of Vehicle; online federated learning; vehicle-to-everything communication; on-board computation power; vehicle-specific power prediction
Sources: Web Of Science, NC State University Libraries
Added: October 17, 2022

2022 journal article

Multi-Job Intelligent Scheduling With Cross-Device Federated Learning

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 34(2), 535–551.

By: J. Liu*, J. Jia*, B. Ma*, C. Zhou*, J. Zhou*, Y. Zhou*, H. Dai n, D. Dou*

author keywords: Federated learning; scheduling; multi-job; parallel execution; distributed learning
TL;DR: A novel intelligent scheduling approach based on multiple scheduling methods, including an original reinforcement learning- based scheduling method and an original Bayesian optimization-based scheduling method, which corresponds to a small cost while scheduling devices to multiple jobs. (via Semantic Scholar)
Source: Web Of Science
Added: January 23, 2023

2022 article

Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks

Hosseinalipour, S., Azam, S. S., Brinton, C. G., Michelusi, N., Aggarwal, V., Love, D. J., & Dai, H. (2022, February 3). IEEE-ACM TRANSACTIONS ON NETWORKING.

author keywords: Collaborative work; Device-to-device communication; Training; Servers; Topology; Computational modeling; Convergence; Fog learning; device-to-device communications; peer-to-peer learning; cooperative learning; distributed machine learning; semi-decentralized federated learning
TL;DR: This work develops multi-stage hybrid federated learning (<monospace>MH-FL</monospace), a hybrid of intra-and inter-layer model learning that considers the network as a multi-layer cluster-based structure and derives the upper bound of convergence for MH-FL with respect to parameters of the network topology. (via Semantic Scholar)
Source: Web Of Science
Added: March 7, 2022

2022 journal article

Precoder Design for Physical-Layer Security and Authentication in Massive MIMO UAV Communications

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 71(3), 2949–2964.

By: S. Maeng n, Y. Yapici, I. Guvenc n, A. Bhuyan* & H. Dai n

author keywords: Authentication; Autonomous aerial vehicles; Rician channels; Precoding; Security; Antennas; Massive MIMO; Artificial noise; authentication; fingerprinting; massive MIMO; physical layer security; precoding; UAV
TL;DR: This paper considers cellular connected UAVs (C-UAVs) that are served by massive multiple-input-multiple-output (MIMO) links to extend coverage range, while also improving physical layer security and authentication. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: March 16, 2022

2021 journal article

A Truthful Auction for Graph Job Allocation in Vehicular Cloud-Assisted Networks

IEEE TRANSACTIONS ON MOBILE COMPUTING, 21(10), 3455–3469.

author keywords: Vehicular cloud-assisted networks; truthful auction; graph job allocation; subgraph isomorphism
TL;DR: A structure-preserved matching algorithm is developed by maximizing the utility-of-service-gain, and the corresponding payment rule which offers economical properties and low computation complexity is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
8. Decent Work and Economic Growth (OpenAlex)
Source: Web Of Science
Added: September 12, 2022

2021 journal article

Application of Deep Learning to Sphere Decoding for Large MIMO Systems

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 20(10), 6787–6803.

By: N. Nguyen*, K. Lee* & H. DaiIEEE

author keywords: Massive MIMO; deep learning; deep neural network; sphere decoding; K-best sphere decoding
TL;DR: This work proposes fast deep learning (DL)-aided SD (FDL-SD) and fast DL-aided $K$-best SD (KSD, FDL-KSD) algorithms, which are more advantageous in both offline training and online application phases. (via Semantic Scholar)
Source: Web Of Science
Added: November 1, 2021

2021 journal article

Controlling Metastable Infection Patterns in Multilayer Networks via Interlink Design

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 8(4), 3242–3256.

By: S. Chattopadhyay n, H. Dai n & D. Eun n

author keywords: Epidemics; Nonhomogeneous media; Steady-state; Network topology; Transient analysis; Thermodynamics; Interlink design; localized epidemics; multilayer networks; susceptible-infected-susceptible model
TL;DR: This work compares the interlinking strategies developed in this work to some popular heuristics and demonstrates their superiority by extensive simulation experiments on both synthetic and real-world networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Source: Web Of Science
Added: January 3, 2022

2021 journal article

Decentralized Inference With Graph Neural Networks in Wireless Communication Systems

IEEE TRANSACTIONS ON MOBILE COMPUTING, 22(5), 2582–2598.

By: M. Lee n, G. Yu* & H. Dai n

author keywords: Wireless communication; Robustness; Training; Predictive models; Data models; Resource management; Prediction algorithms; Machine learning; graph neural network; decentralized algorithm; retransmission; robustness
TL;DR: This paper develops a methodology to verify whether the predictions are robust, and analyzes and enhances the robustness of the decentralized GNN during the inference stage in different wireless communication systems, and proposes novel retransmission mechanisms. (via Semantic Scholar)
Source: Web Of Science
Added: May 30, 2023

2021 journal article

Dynamic Interference Management for UAV-Assisted Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(4), 2637–2653.

author keywords: Interference; Trajectory; Three-dimensional displays; Wireless communication; Jamming; Resource management; Unmanned aerial vehicles; Unmanned aerial vehicle (UAV); jammer; trajectory optimization; power allocation; interference management; smart interferer; spectral graph theory; Cheeger constant
TL;DR: This work designs the 3D trajectories and power allocation for the UAVs to maximize the data flow of the network while keeping the interference on the existing communication network below a threshold, and proposes an alternating-maximization approach. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: April 14, 2022

2021 article

Joint Service Placement and Resource Allocation for Multi-UAV Collaborative Edge Computing

2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC).

By: X. He*, R. Jin n & H. Dai n

TL;DR: This work is among the first to consider the joint service placement and resource allocation problem for multi-UAV edge computing, and finds that this problem can be divided into two subproblems that are submodular and convex, respectively. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: November 1, 2021

2021 journal article

Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing

IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344.

By: X. He*, R. Jin n & H. Dai n

author keywords: Task analysis; Edge computing; Servers; Resource management; Unmanned aerial vehicles; Computational modeling; Wireless communication; Edge computing; UAV; resource allocation; deployment
TL;DR: A multi-hop task offloading with on-the-fly computation scheme is proposed in this work to enable a more powerful multi-UAV remote edge computing network and two efficient algorithms are proposed to solve the corresponding joint resource allocation and deployment problem. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 7, 2022

2021 article

Optimal Position Planning of UAV Relays in UAV-assisted Vehicular Networks

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021).

author keywords: Vehicular networks; unmanned aerial vehicles (UAVs); position planing; power control
TL;DR: This paper considers unmanned aerial vehicle (UAV)-assisted infrastructure-to-vehicle (I2V) communication employing UAVs as relays to increase the throughput between a roadside unit and a vehicular user equipment (VUE) while considering the mobility of the VUE, aiming to maximize the data rate of the system. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: December 13, 2021

2021 journal article

Outage Analysis for Cooperative mmWave UAV Communications With Beam Training Overhead

IEEE WIRELESS COMMUNICATIONS LETTERS, 10(10), 2249–2253.

By: H. Ding n, H. Dai n, I. Guvenc n & A. Bhuyan*

author keywords: Relays; Signal to noise ratio; Probability; Power system reliability; Training; Azimuth; Probes; Unmanned aerial vehicle (UAV); cooperative communications; millimeter wave (mmWave) communications
TL;DR: This letter analyzes how outage probability varies with the number of neighboring UAVs being probed as potential relays for relay selection in cooperative millimeter wave (mmWave) unmanned aerial vehicle (UAV) communications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, ORCID, NC State University Libraries
Added: October 7, 2021

2021 journal article

Physical Layer Security for NOMA Transmission in mmWave Drone Networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 70(4), 3568–3582.

By: Y. Yapici*, N. Rupasinghe, I. Guvenc n, H. Dai n & A. Bhuyan*

author keywords: NOMA; Unmanned aerial vehicles; Shape; Wireless networks; Receivers; Jamming; Decoding; Millimeter-wave (mmWave); non-orthogonal multiple access (NOMA); physical layer security (PLS); protected zone; unmanned aerial vehicle (UAV)
TL;DR: This work proposes a protected-zone approach to enhance the secrecy-rate performance by preventing the most vulnerable subregion (outside the user region) from the presence of malicious receivers, and shows that the optimal protected zone shape for mmWave links appears as a compromise between protecting the angle versus distance dimension. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: May 6, 2021

2021 article

Placement of mmWave Base Stations for Serving Urban Drone Corridors

2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING).

By: S. Singh n, U. Bhattacherjee n, E. Ozturk n, I. Guvenc n, H. Dai n, M. Sichitiu n, A. Bhuyan*

author keywords: Drone corridor; mmWave; beamforming; A* search
TL;DR: This work develops a mathematical model of the drone corridor and proposes a brute force algorithm that leverages A* search to meet the quality of service (QoS) requirements of the corridor by choosing the minimal set of BS locations from a pre-determined initial set. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: September 20, 2021

2021 article

Power Allocation for Fingerprint-Based PHY-Layer Authentication with mmWave UAV Networks

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021).

By: S. Maeng n, Y. Yapici*, I. Guvenc n, H. Dai n & A. Bhuyan*

author keywords: 5G; authentication; artificial noise; eavesdropping; fingerprinting; millimeter-wave; physical layer security; power allocation; precoder
TL;DR: This paper considers the authentication technique that uses fingerprint embedding to defend 5G cellular networks with unmanned aerial vehicle (UAV) systems from eavesdroppers and intruders, and proposes a power allocation technique that jointly takes into account splitting of the transmit power between the precoder and the authentication tag. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: December 13, 2021

2021 journal article

Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 16, 2535–2547.

By: L. Xiao*, X. Lu*, T. Xu*, W. Zhuang* & H. Dai n

author keywords: Authentication; Voltage measurement; Telematics; Reinforcement learning; Monitoring; Intrusion detection; Tools; Controller area networks; authentication; spoofing attacks; reinforcement learning
TL;DR: This paper proposes a CAN bus authentication framework that exploits physical layer features of the messages, including message arrival intervals and signal voltages, and applies reinforcement learning to choose the authentication mode and parameter, and improves the utility in terms of authentication accuracy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 22, 2021

2021 article

Secure 5G Network for a Nationwide Drone Corridor

2021 IEEE AEROSPACE CONFERENCE (AEROCONF 2021).

By: A. Bhuyan*, I. Guvenc n, H. Dai n, M. Sichitiu n, S. Singh n, A. Rahmati n, S. Maeng n

TL;DR: This paper presents research findings in the following areas critical to validating the effectiveness of providing required 5G access to the drones with security, reliability, and spectral efficiency and plans for future research to provide further scientific basis for the proposed cellular drone network. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: September 13, 2021

2021 article

Spectral Graph Theory Based Resource Allocation for IRS-Assisted Multi-Hop Edge Computing

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021).

By: H. Zhang*, X. He*, Q. Wu* & H. Dai n

TL;DR: It is shown that the network throughput can be well approximated by the second smallest eigenvalue of the network Laplacian matrix, which allows us to develop an effective iterative algorithm for solving the considered problem. (via Semantic Scholar)
Source: Web Of Science
Added: September 6, 2022

2021 article

Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell

2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: R. Zou n, W. Wang n & H. Dai n

author keywords: dynamic spectrum access; spectrum hole distribution; measurement granularity; power law
TL;DR: This work analyzes the spectrum hole distributions in fine resolutions along both the temporal and the spectral dimensions, and investigates the performance of two widely used spectrum tenancy models, the Markov and the on/off models, in terms of their capabilities on capturing the distributions of spectrum holes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 23, 2022

2021 journal article

UAV Anti-Jamming Video Transmissions With QoE Guarantee: A Reinforcement Learning-Based Approach

IEEE TRANSACTIONS ON COMMUNICATIONS, 69(9), 5933–5947.

author keywords: Jamming; Modulation; Unmanned aerial vehicles; Streaming media; Signal to noise ratio; Encoding; Adaptation models; Unmanned aerial vehicles; video transmission; quality-of-experience; jamming; reinforcement learning
TL;DR: A reinforcement learning (RL)-based UAV anti-jamming video transmission scheme to choose the video compression quantization parameter, the channel coding rate, the modulation and power control strategies against jamming attacks is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: September 27, 2021

2021 journal article

UAV-Aided Data Collection for Information Freshness in Wireless Sensor Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 20(4), 2368–2382.

TL;DR: Simulation results show that the proposed strategy can improve the freshness of information collected from all the SNs and can always strike a balance between theSNs’ uploading time and the UAV’s flight time in various scenarios. (via Semantic Scholar)
Source: Web Of Science
Added: May 17, 2021

2020 journal article

A Fast Graph Neural Network-Based Method for Winner Determination in Multi-Unit Combinatorial Auctions

IEEE TRANSACTIONS ON CLOUD COMPUTING, 10(4), 2264–2280.

author keywords: Machine learning; graph neural network; multi-unit combinatorial auction; winner determination problem; resource allocation; cloud computing
TL;DR: This work model the multi-unit WDP as an augmented bipartite bid-item graph and use a graph neural network with half-convolution operations to learn the probability of each bid belonging to the optimal allocation, and proposes two different sample generation processes that improve the sample generation efficiency and decrease the number of needed labeled instances. (via Semantic Scholar)
Source: Web Of Science
Added: January 9, 2023

2020 journal article

Accelerating Generalized Benders Decomposition for Wireless Resource Allocation

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 20(2), 1233–1247.

By: M. Lee n, N. Ma*, G. Yu* & H. Dai n

author keywords: Resource management; Acceleration; Wireless networks; Complexity theory; Programming; Training; Machine learning; generalized Benders decomposition; device-to-device communications; resource allocation; mixed integer nonlinear programming
TL;DR: This work proposes to leverage machine learning (ML) techniques to accelerate GBD aiming at decreasing the complexity of the master problem, and utilizes two different ML techniques, classification and regression, to deal with this acceleration task. (via Semantic Scholar)
Source: Web Of Science
Added: March 15, 2021

2020 article

Differential Privacy and Prediction Uncertainty of Gossip Protocols in General Networks

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: Y. Huang n, R. Jin n & H. Dai n

TL;DR: Lower bounds of the differential privacy guarantees are derived for the gossip protocols in general networks in both synchronous and asynchronous settings and it is found that source anonymity is closely related to some key network structure parameters in the general network setting. (via Semantic Scholar)
Source: Web Of Science
Added: October 26, 2021

2020 article

Distributed ADMM With Synergetic Communication and Computation

Tian, Z., Zhang, Z., Wang, J., Chen, X., Wang, W., & Dai, H. (2021, January). IEEE TRANSACTIONS ON COMMUNICATIONS, Vol. 69, pp. 501–517.

author keywords: Alternating direction method of multipliers (ADMM); synergetic communication and computation; distributed algorithms
TL;DR: The convergence of the proposed algorithm is proved and an upper bound of the convergence variance brought by randomness is provided, to reduce the total communication and computation cost of the system. (via Semantic Scholar)
Source: Web Of Science
Added: February 15, 2021

2020 journal article

Energy-Aware Stochastic UAV-Assisted Surveillance

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 20(5), 2820–2837.

By: S. Hosseinalipour n, A. Rahmati n, D. Eun n & H. Dai n

author keywords: Surveillance; Inspection; Batteries; Trajectory; Unmanned aerial vehicles; Approximation algorithms; Programming; Unmanned aerial vehicles (UAVs); surveillance; random walks; energy-aware design; Markov chains
TL;DR: A novel framework for stochastic UAV-assisted surveillance that inherently considers the battery constraints of the UAVs, proposes random moving patterns modeled via random walks, and adds another degree of randomness to the system via considering probabilistic inspections is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: June 10, 2021

2020 article

Energy-Efficient Beamforming and Power Control for Uplink NOMA in mmWave UAV Networks

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: A. Rahmati n, S. Hosseinalipour n, Y. Yapici n, I. Guvenc n, H. Dai n & A. Bhuyan*

TL;DR: This work considers the uplink millimeter-wave (mmWave) transmission between a set of UAVs and a base station (BS) and proposes a solution aided by the Dinkelbach's algorithm and successive convex approximation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: October 26, 2021

2020 journal article

From Federated to Fog Learning: Distributed Machine Learning over Heterogeneous Wireless Networks

IEEE COMMUNICATIONS MAGAZINE, 58(12), 41–47.

author keywords: Training; Network topology; Computational modeling; Wireless networks; Collaborative work; Topology; Device-to-device communication
TL;DR: Fog learning enhances federated learning along three major dimensions: network, heterogeneity, and proximity, which will intelligently distribute ML model training across the continuum of nodes from edge devices to cloud servers. (via Semantic Scholar)
Source: Web Of Science
Added: February 1, 2021

2020 journal article

Interference Analysis and Mitigation for Aerial IoT Considering 3D Antenna Patterns

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 70(1), 490–503.

By: S. Maeng n, M. Deshmukh n, I. Guvenc n, A. Bhuyan* & H. Dai n

author keywords: Three-dimensional displays; Antenna radiation patterns; Interference; Dipole antennas; Transmitters; Topology; Receiving antennas; 5G; 3D topology; antenna radiation pattern; IoT; UAV; uncoordinated network
TL;DR: This paper proposes a low-complexity interference mitigation scheme that utilizes 3D antenna radiation pattern with different dipole antenna settings, and shows that using the proposed scheme, the ergodic achievable rate improves as the height of the aerial receivers increases. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, ORCID, NC State University Libraries
Added: February 18, 2021

2020 article

Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He*, R. Jin n & H. Dai n

TL;DR: A more efficient algorithm that has a complexity only linear in the number of UAVs is developed by exploiting the special structure of this problem to overcome the challenge of finding the optimal UAV power allocation and deployment. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2020 journal article

Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents

IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067.

By: R. Jin n, X. He* & H. Dai n

author keywords: Mobile agents; Privacy; Sensors; Task analysis; Differential privacy; Information age; Base stations; Age of information; mobile crowd sensing; location privacy; differential privacy
TL;DR: A location privacy-aware payment mechanism, which can stimulate the mobile agents to report their locations with differential privacy levels desired by the BS, is proposed, and a cost-efficient mobile agent selection algorithm is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 29, 2021

2020 journal article

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.

By: X. He*, R. Jin n & H. Dai n

author keywords: Servers; Jamming; Security; Mobile handsets; Wireless communication; Task analysis; Interference cancellation; Mobile-edge computing; secure offloading; physical-layer
TL;DR: A novel physical-layer assisted secure offloading scheme is proposed in this work, in which the edge server proactively broadcasts jamming signals to impede eavesdropping and leverages full-duplex communication technique to effectively suppress the self-interference. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 13, 2020

2020 journal article

UAV-AIDED CELLULAR COMMUNICATIONS WITH DEEP REINFORCEMENT LEARNING AGAINST JAMMING

IEEE WIRELESS COMMUNICATIONS, 27(4), 48–53.

By: X. Lu*, L. Xiao*, C. Dai* & H. Dai*

TL;DR: An unmanned aerial vehicle (UAV) aided cellular framework against jamming is presented, in which an UAV uses reinforcement learning to choose the relay policy for a mobile user whose serving base station is attacked by a jammer. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: September 14, 2020

2019 journal article

A COMPUTATION OFFLOADING INCENTIVE MECHANISM WITH DELAY AND COST CONSTRAINTS UNDER 5G SATELLITE-GROUND IOV ARCHITECTURE

IEEE WIRELESS COMMUNICATIONS, 26(4), 124–132.

TL;DR: A novel architecture by integrating the satellite network with the 5G cloud-enabled Internet of Vehicles to efficiently support seamless coverage and efficient resource management is established and an incentive mechanism based joint optimization problem of opportunistic computation offloading under delay and cost constraints is formulated. (via Semantic Scholar)
Source: Web Of Science
Added: September 16, 2019

2019 journal article

A Two-Stage Auction Mechanism for Cloud Resource Allocation

IEEE TRANSACTIONS ON CLOUD COMPUTING, 9(3), 881–895.

By: S. Hosseinalipour n & H. Dai n

author keywords: Auction theory; cloud of clouds networks; sequential auctions; options-based sequential auctions; proxy agent; cloud resource allocation; Hamilton-Jacobi-Bellman equation; dynamic markets
TL;DR: A comprehensive framework is introduced in which the process of resource gathering and allocation is addressed via two stages, and a theoretical framework for market analysis is provided and the bidding behavior of CCN managers is described. (via Semantic Scholar)
Source: Web Of Science
Added: September 13, 2021

2019 journal article

Allocation of Computation-Intensive Graph Jobs Over Vehicular Clouds in IoV

IEEE INTERNET OF THINGS JOURNAL, 7(1), 311–324.

author keywords: Resource management; Cloud computing; Task analysis; Servers; Computational modeling; Internet of Things; Mobile handsets; Computation-intensive graph jobs; computation offloading; subgraph isomorphism; vehicular clouds (VCs)
TL;DR: This article presents a novel framework for VCs that maps components of graph jobs to service providers via opportunistic vehicle-to-vehicle communication and proposes a novel low complexity randomized graph job allocation mechanism by considering hierarchical tree-based subgraph isomorphism extraction. (via Semantic Scholar)
Source: Web Of Science
Added: February 10, 2020

2019 journal article

Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping

IEEE TRANSACTIONS ON COMMUNICATIONS, 67(10), 6994–7005.

author keywords: Eavesdropping; visible light communication; secrecy rate; beamforming; deep reinforcement learning
TL;DR: Simulation results show that the proposed learning-based VLC beamforming control schemes can significantly decrease the bit error rate of the legitimate receiver and increase the secrecy rate and utility of the anti-eavesdropping MISO VLC system, compared with the benchmark strategy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: December 30, 2019

2019 journal article

Maximization of Robustness of Interdependent Networks Under Budget Constraints

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 7(3), 1441–1452.

By: S. Chattopadhyay n, H. Dai n & D. Eun n

author keywords: Robustness; Measurement; Nonhomogeneous media; Mathematical model; Network topology; Optimization; Power system faults; Multilayer failure propagation; cost constrained optimization; network robustness; interdependent networks
TL;DR: This work presents a surrogate metric based framework for constructing interlinks and proposes metrics to track the network robustness for each of these mechanisms, and is able to introduce the cost of construction into the interlink design problem, a practical feature largely ignored in relevant literature. (via Semantic Scholar)
Source: Web Of Science
Added: September 21, 2020

2019 journal article

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.

By: R. Jin n, X. He* & H. Dai n

author keywords: Quantitative information flow; game theory; collaborative security; privacy
TL;DR: The interplay between the attacker and the collaborative entities is formulated as Quantitative Information Flow (QIF) games, in which the QIF theory is adapted to measure the collaboration gain and the privacy loss of the entities in the information sharing process. (via Semantic Scholar)
Source: Web Of Science
Added: September 16, 2019

2019 journal article

Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.

By: X. He*, R. Jin n & H. Dai n

author keywords: Mobile-edge computing; privacy; task offloading; Lyapunov optimization
TL;DR: A novel privacy-preserving and cost-efficient (PEACE) task offloading scheme that can preserve user privacy while still ensure the best possible user experience is developed in this work based on the generic Lyapunov optimization framework. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 14, 2020

2019 journal article

Power-Aware Allocation of Graph Jobs in Geo-Distributed Cloud Networks

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 31(4), 749–765.

By: S. Hosseinalipour n, A. Nayak n & H. Dai n

author keywords: Resource management; Cloud computing; Power demand; Servers; Task analysis; Twitter; Distributed algorithms; Big-data; graph jobs; geo-distributed cloud networks; datacenter power consumption; job allocation; integer programming; convex optimization; online learning
TL;DR: A framework for efficient allocation of graph jobs in geo-distributed cloud networks (GDCNs), explicitly considering the power consumption of the datacenters (DCs) is developed, and a novel low-complexity (decentralized) sub-graph extraction method is provided. (via Semantic Scholar)
Source: Web Of Science
Added: February 10, 2020

2019 journal article

Prevention and Mitigation of Catastrophic Failures in Demand-Supply Interdependent Networks

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 7(3), 1710–1723.

By: S. Hosseinalipour n, J. Mao*, D. Eun n & H. Dai n

author keywords: Power system faults; Power system protection; Robustness; Stress; Load modeling; Adaptation models; Resource management; Interdependent networks; demand-supply networks; robustness; resource and load fluctuations; cascading failures
TL;DR: A generic system model for a special category of interdependent networks, demand-supply networks, in which the demand and the supply nodes are associated with heterogeneous loads and resources, which sheds a light on a unique cascading failure mechanism induced by resource/load fluctuations. (via Semantic Scholar)
Source: Web Of Science
Added: September 21, 2020

2019 journal article

Principles of Effective and Robust Innate Immune Response to Viral Infections: A Multiplex Network Analysis

FRONTIERS IN IMMUNOLOGY, 10.

By: Y. Huang n, H. Dai n & R. Ke n

author keywords: immune response; interferon; viral infection; mathematical modeling; multiplex network
MeSH headings : Humans; Immunity, Innate; Interferon Type I / immunology; Models, Immunological; Signal Transduction / immunology; Virus Diseases / immunology; Viruses / immunology
TL;DR: It is shown that in general, the IFN response works effectively to stop viral infection when virus infection spreads spatially (a most likely scenario for initial virus infection of a host at the peripheral tissue). (via Semantic Scholar)
Source: Web Of Science
Added: August 12, 2019

2019 journal article

QR-Decomposition-Aided Tabu Search Detection for Large MIMO Systems

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 68(5), 4857–4870.

By: N. Nguyen*, K. Lee* & H. Dai n

author keywords: Tabu search detection; massive MIMO; ordering schemes
TL;DR: An improved TS algorithm based on the QR decomposition of the channel matrix (QR-TS), which allows for finding the best neighbor with a significantly lower complexity compared with the conventional TS algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: June 24, 2019

2018 journal article

A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 20(4), 3098–3130.

By: I. Parvez*, A. Rahmati n, I. Guvenc n, A. Sarwat* & H. Dai n

author keywords: 5G; cloud; caching; haptic communications; latency; massive connectivity; real-time communication; SDN; tactile Internet; ultra-high reliability; ultra-low latency
TL;DR: This paper presents a detailed survey on the emerging technologies to achieve low latency communications considering three different solution domains: 1) RAN; 2) core network; and 3) caching. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: December 10, 2018

2018 journal article

A Truthful Reverse-Auction Mechanism for Computation Offloading in Cloud-Enabled Vehicular Network

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4214–4227.

author keywords: Cloud-enabled vehicular network; mobile computation offloading (MCO); unilateral matching; vehicle-to-vehicle (V2V) communication; Vickrey-Clarke-Groves (VCG)-based reverse auction
TL;DR: Simulation results show that, as compared with baseline methods, the proposed unilateral-matching-based mechanism can greatly improve the system efficiency of vehicular networks in all traffic scenarios. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 15, 2019

2018 journal article

A unified framework for the performance evaluation of single-branch dual-hop AF relaying in the presence of transceiver hardware impairments

PHYSICAL COMMUNICATION, 32, 231–241.

By: S. Benmahmoud* & H. Dai n

author keywords: Amplify-and-forward (AF); Dual-hop relaying; Transceiver hardware impairments; Signal-to-noise with distortion ratio (SNDR)
TL;DR: A general four-parameter end- to-end signal-to-noise with distortion ratio (SNDR) model for single-branch dual-hop amplify-and-forward AF relaying with/without the presence of transceiver hardware impairments is proposed. (via Semantic Scholar)
Source: Web Of Science
Added: February 25, 2019

2018 book

Advances in Mechanics of Microstructured Media and Structures

In ADVANCES IN MECHANICS OF MICROSTRUCTURED MEDIA AND STRUCTURES (Vol. 87, pp. 1–369).

Xiaofan He; Huaiyu Dai

Source: Web Of Science
Added: October 19, 2018

2018 book

Adversary Detection For Cognitive Radio Networks

In SpringerBriefs in Electrical and Computer Engineering.

By: X. He*, H. Dai n, X. He & H. Dai

Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 73–74.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Introduction

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 1–6.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 journal article

Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks

IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.

By: X. He*, R. Jin n & H. Dai n

author keywords: Location privacy; cognitive radio; database-driven; mobile
TL;DR: A novel scheme that can camouflage mobile PUs through generating low-cost fake trajectories in the database is developed, and its effectiveness is validated by numerical results. (via Semantic Scholar)
Source: Web Of Science
Added: March 11, 2019

2018 article

Case Study I: Link Signature Assisted PUE Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 45–50.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme, and an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study II: HMM-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 51–62.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: Under this modeling, a novel HMM-based Byzantine attack detection technique can be developed to enforce the robustness of collaborative spectrum sensing and the sought-after multi-HMM inference algorithm is introduced. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study III: CFC-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 63–72.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 journal article

Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.

By: R. Jin n, X. He* & H. Dai n

author keywords: Collaborative intrusion detection systems; game theory; Nash-Q learning
TL;DR: A centralized Vickrey–Clarke–Groves auction based collaboration scheme and a distributed game-theoretic incentive mechanism are proposed and the effectiveness of the proposed schemes is validated through both analysis and numerical experiments. (via Semantic Scholar)
Source: Web Of Science
Added: January 14, 2019

2018 journal article

Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.

By: X. He*, R. Jin n & H. Dai n

author keywords: Deep learning; Internet-of-Things (IoT); mobile-edge computing (MEC); post-decision state (PDS); privacy
TL;DR: In this paper, a new privacy vulnerability caused by the wireless offloading feature of MEC-enabled IoT is identified and an effective privacy-aware offloading scheme is developed based on a newly proposed deep post-decision state (PDS)-learning algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: July 15, 2019

2018 book

Dynamic Games for Network Security

In SpringerBriefs in Electrical and Computer Engineering (pp. 1–74).

By: X. He* & H. Dai n

Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Dynamic Games for Network Security Conclusion and Future Work

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 73–74.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Deception

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 61–71.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: The objective of this chapter is to illustrate a foresighted deception framework that allows the defender to better align its deception strategy with its conventional defense strategy and the dynamics in the environment. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Extra Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 25–42.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter will focus on scenarios where the defender has extra information and present two novel algorithms, termed minimax-PDS and WoLF-P DS, to solve the corresponding dynamic security games with extra information. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Incomplete Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 43–60.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: A new algorithm, termed Bayesian Nash-Q, that allows the defender to infer the missing information based on repeated interactions with the attacker and the dynamic environment will be presented. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 journal article

Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4307–4316.

author keywords: Energy harvesting (EH); healthcare systems; Internet of Things (IoT); mobile edge offloading; privacy; reinforcement learning (RL)
TL;DR: This scheme enables a healthcare IoT device to choose the offloading rate that improves the computation performance, protects user privacy, and saves the energy of the IoT device without being aware of the privacy leakage, IoT energy consumption, and edge computation model. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: July 15, 2019

2018 journal article

Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 13(6), 1524–1534.

By: X. He*, R. Jin n & H. Dai n

author keywords: Location privacy; privacy metric; location-based service (LBS); spatial diversity; optimal stopping
TL;DR: New ambient environment-dependent location privacy metrics are proposed in this paper, together with a stochastic model that can capture their spatial variations along the user’s route that allows mobile users to fully leverage the spatial diversity and achieve a substantially better performance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2018 journal article

Multiplex Conductance and Gossip Based Information Spreading in Multiplex Networks

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 6(3), 391–401.

By: Y. Huang n & H. Dai n

author keywords: Multiplexing; Nonhomogeneous media; Measurement; Social network services; Heuristic algorithms; Mathematical model; Dynamic scheduling; Information spreading; multiplex networks; gossip algorithm; multiplex conductance
TL;DR: The information spreading time in multiplex networks is studied, adopting the gossip (random-walk) based information spreading model and a new metric called multiplex conductance is defined based on the multiplex network structure and used to quantify the information spreadingTime in a general severalx network in the idealized setting. (via Semantic Scholar)
Source: Web Of Science
Added: November 11, 2019

2018 article

Overview of Adversary Detection in CR Networks

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 19–44.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter intends to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, it will switch gear towards the Byzantine attack detection schemes. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Overview of Dynamic Network Security Games

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 17–23.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: The applications of the SG in addressing security issues in cyber networks, wireless communication networks, and cyber-physical networks are presented, respectively and a brief survey of the recent efforts in this direction is provided. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 1–16.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries of Analytical Tools

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 7–17.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter mainly focuses on reviewing some of the important analytic tools used in existing literature for adversary detection in CR networks, including two widely employed statistical inference tools, sequential hypothesis testing, and belief propagation. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2017 journal article

A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

author keywords: Resource sharing; delay tolerant; opportunistic resource; game theory; optimal stopping
TL;DR: The derived Stackelberg equilibrium strategy of the LF-C-MSG can be used to guide the behaviors of both the network users and the resource seller for better performance and resource utilization efficiency. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2017 journal article

A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning

IEEE Transactions on Information Forensics and Security, 13(1), 35–47.

By: L. Xiao*, Y. Li*, G. Han*, H. Dai n & H. Poor*

author keywords: Mobile crowdsensing; game theory; deep reinforcement learning; faked sensing attacks; deep Q-networks
TL;DR: Simulation results show that the proposed M CS system stimulates high-quality sensing services and suppresses faked sensing attacks, compared with a Q-learning-based MCS system. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Crossref
Added: July 20, 2019

2017 journal article

Designing Optimal Interlink Patterns to Maximize Robustness of Interdependent Networks Against Cascading Failures

IEEE TRANSACTIONS ON COMMUNICATIONS, 65(9), 3847–3862.

By: S. Chattopadhyay n, H. Dai n, D. Eun n & S. Hosseinalipour n

author keywords: Interdependent networks; optimal interlinks; targeted attack; network robustness
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Designing optimal interlink structures for interdependent networks under budget constraints

2017 ieee international conference on communications (icc).

By: S. Chattopadhyay n & H. Dai n

TL;DR: This work designs algorithms for obtaining the optimal interlink structures, which maximizes the robustness of networks against random node failures, in a cost constrained setting and demonstrates the importance of cost in network design. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

Detection of infections using graph signal processing in heterogeneous networks

Globecom 2017 - 2017 ieee global communications conference.

By: S. Hosseinalipour n, J. Wang n, H. Dai n & W. Wang n

TL;DR: This paper focuses on infection detection in heterogeneous networks and model the network situation as a graph signal based on the nodes' status, which helps distinguish between random failures and epidemic scenarios. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 conference paper

Dynamic advertising in VANETs using repeated auctions

Globecom 2017 - 2017 ieee global communications conference.

By: A. Nayak n, S. Hosseinalipour n & H. Dai n

TL;DR: This paper proposes an algorithm which is a combination of adaptive linear prediction and nonparametric Bayesian belief update, enabling smart bidding and improving the utilities of the competing advertising companies significantly in the long- run. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

Foresighted deception in dynamic security games

2017 ieee international conference on communications (icc).

By: X. He*, M. Islam*, R. Jin n & H. Dai n

TL;DR: A stochastic deception game (SDG) framework is developed in this work to enable the defender to conduct foresighted deception in unknown dynamic environments and to improve security performance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Fountain-Coded File Spreading Over Mobile Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 16(10), 6766–6778.

author keywords: File spreading; mobile networks; fountain codes
TL;DR: A fountain-coded two-hop relaying (FTTR) protocol is proposed to further reduce the packet duplication ratio so that the spreading performance does not degrade with network size. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Game theoretic study of protecting MIMO transmissions against smart attacks

2017 ieee international conference on communications (icc).

By: Y. Li*, L. Xiao*, H. Dai n & H. Poor*

TL;DR: Simulation results show that the proposed power control strategy based on Q-learning can reduce the attack rate of smart attackers and improve the secrecy capacity compared with the benchmark strategy. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Mobile Crowdsensing Games in Vehicular Networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 67(2), 1535–1545.

author keywords: Game theory; mobile crowdsensing (MCS); reinforcement learning; vehicular networks
TL;DR: A Q-learning-based MCS payment strategy and sensing strategy is proposed for the dynamic vehicular crowdsensing game, and a postdecision state learning technique is applied to exploit the known radio channel model to accelerate the learning speed of each vehicle. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Multiplex conductance and gossip based information spreading in multiplex networks

2017 ieee international symposium on information theory (isit), 406–410.

By: Y. Huang n & H. Dai n

TL;DR: A new metric called multiplex conductance is defined based on themultiplex network structure and used to quantify the information spreading time in a general multiplex network in the idealized setting. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

One-Bit Quantized Massive MIMO Detection Based on Variational Approximate Message Passing

IEEE Transactions on Signal Processing, 66(9), 2358–2373.

author keywords: Variational approximate message passing (VAMP); variational Bayesian inference (VBI); bilinear generalized approximated message passing (BiG-AMP); massive MIMO; one-bit quantization
TL;DR: A novel inference algorithm called variational approximate message passing (VAMP) for one-bit quantized massive MIMO receiver is developed, which attempts to exploit the advantages of both the variational Bayesian inference algorithm and the bilinear generalized approximated message passing algorithm to accomplish joint channel estimation and data detection in a closed form with first-order complexity. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Crossref
Added: July 28, 2019

2017 conference paper

Options-based sequential auctions for dnamic cloud resource allocation

2017 ieee international conference on communications (icc).

By: S. Hosseinalipour n & H. Dai n

TL;DR: This paper proposes an options-based sequential auction that not only provides a good match with the dynamic structure of the problem, but also solves the entrance time problem and possesses the truthfulness property. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

Privacy-aware offloading in mobile-edge computing

Globecom 2017 - 2017 ieee global communications conference.

By: X. He*, J. Liu*, R. Jin n & H. Dai n

TL;DR: A constrained Markov decision process (CMDP) based privacy-aware task offloading scheduling algorithm is proposed, which allows the mobile device to achieve the best possible delay and energy consumption performance while maintain a pre-specified level of privacy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

QoS-Based Interference Alignment With Similarity Clustering for Efficient Subchannel Allocation in Dense Small Cell Networks

IEEE TRANSACTIONS ON COMMUNICATIONS, 65(11), 5054–5066.

By: H. Zhang*, H. Li*, J. Lee* & H. Dai n

author keywords: Dense small cell networks; interference alignment; QoS guarantee; similarity clustering; subchannel allocation
TL;DR: A centralized efficient subchannel allocation scheme based on IA with similarity clustering in dense SCNs underlaying a macrocell, which aims at maximizing the number of QoS guaranteed SUEs performing IA and achieves a performance close to the optimal solution. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Real-time strategy selection for mobile advertising in VANETs

Globecom 2017 - 2017 ieee global communications conference.

By: S. Hosseinalipour n, A. Nayak n & H. Dai n

TL;DR: The regret-based minimization method is adopted to tackle the problem of mobile advertising in VANETs and a good potential of the proposed algorithm is revealed through simulations. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming

IEEE Transactions on Vehicular Technology, 67(4), 3377–3389.

By: L. Xiao*, Y. Li*, C. Dai*, H. Dai n & H. Poor*

author keywords: Nonorthogonal multiple access (NOMA); smart jamming; power allocation; game theory; reinforcement learning
TL;DR: Simulation results show that the proposed reinforcement learning-based power control scheme for the downlink NOMA transmission can significantly increase the sum data rates of users, and thus, the utilities compared with the standard Q-learning-based strategy. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2017 article

Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach

2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), pp. 72–83.

By: R. Jin n, X. He*, H. Dai n, R. Dutta n & P. Ning*

author keywords: collaborative security; game theory; privacy
TL;DR: A repeated two-layer single-leader multi-follower game is proposed and the expected behaviors of both the attacker and the security entities are derived and the utility-privacy tradeoff curve is obtained. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 conference paper

A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

TL;DR: A multi-player Markov stopping game (M-MSG) is developed in this work, and the derived Nash equilibrium (NE) strategy of this M- MSG can guide network users to properly handle the potential competition from other peers and thus exploit the time diversity of the opportunistic resource more effectively, which improves the resource utilization efficiency. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 journal article

A reverse auction algorithm for carrier allocation in femtocells for multimedia applications

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 21(3), 171–179.

By: Z. Gao*, H. Chiang*, L. Huang*, Y. Yuan*, H. Dai n & Y. Huang*

author keywords: carrier allocation; small-scale network; reverse auction algorithm; network capacity
TL;DR: This paper proposes a distributed algorithm for carrier allocation using a reverse auction algorithm, wherein the original cells affected by newly added cells self-organise into auction groups to facilitate new carrier allocation. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Cluster-Based Resource Allocation for Spectrum-Sharing Femtocell Networks

IEEE ACCESS, 4, 8643–8656.

author keywords: Femtocells; clustering; resource allocation; branch-and-bound; the simplex algorithm; LINGO
TL;DR: A femtocells clustering scheme, which uses a mathematical modeling idea based on LINGO, an optimization software that can solve the joint clustering problem for the femtocell access points (FAPs), and a novel algorithm that can reduce the interference more effectively and achieve higher data-rate fairness among FUEs are proposed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Collaborative IDS configuration: A two-layer game-theoretical approach

2016 ieee global communications conference (globecom).

By: R. Jin n, X. He n & H. Dai n

TL;DR: Simulation results show that the proposed algorithm can provide an effective collaborative configuration scheme, leading to significant detection performance gain, and the conditions under which there is a guaranteed improvement in expected system performance have been derived. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Connectivity for overlaid wireless networks with outage constraints

International conference on acoustics speech and signal processing, 3771–3775.

By: Y. Liu n, C. Li n, C. Yin* & H. Dai n

TL;DR: This work provides a new perspective for better understanding of the connectivity of large-scale overlaid networks by using percolation theory to specify a 2-dimensional connectivity region defined as the set of density pairs within which the secondary network is percolated. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Estimation of robustness of interdependent networks against failure of nodes

2016 ieee global communications conference (globecom).

By: S. Chattopadhyay n & H. Dai n

TL;DR: The system equations relating the fractional size of the connected component of the network, surviving the cascading failure, to the intra-layer degree distribution of the nodes are developed and closed form expressions for the metrics of robustness can be obtained for the Erdos-Renyi (ER) model of random graph generation. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cloud computing; cognitive radio; energy harvesting; jamming; reinforcement learning; security; stochastic game
TL;DR: Two new MARL algorithms are proposed, termed minimax post-decision state (minimax-PDS) and Win-or-Learn Fast post- Decisive state (WoLF-P DS), which enable the LS to learn and adapt faster in dynamic environments by exploiting its information advantage. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Mobile offloading game against smart attacks

2016 ieee conference on computer communications workshops (infocom wkshps), 4, 2281–2291.

TL;DR: Simulation results show that the proposed Q-learning-based mobile offloading strategy can improve the utility of the mobile device and reduce the attack rate of smart attackers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Relay Selection for Cooperative NOMA

IEEE WIRELESS COMMUNICATIONS LETTERS, 5(4), 416–419.

By: Z. Ding*, H. Dai n & H. Poor*

author keywords: Non-orthogonal multiple access (NOMA); cooperative NOMA; relay selection; and max-min relaying
TL;DR: Simulation results show that cooperative NOMA with this two-stage RS scheme outperforms that based on the conventional max-min approach, and can also yield a significant performance gain over orthogonal multiple access. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Zero-determinant Strategies for Multi-player Multi-action Iterated Games

IEEE Signal Processing Letters, 23(3), 311–315.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

author keywords: Game theory; multi-action; multi-player; zero-determinant
TL;DR: Targeting wider applications and better performance, the ZD strategies along with corresponding existence conditions for general multi-player multi-action iterated games are developed in this work, including existing ones as special cases. (via Semantic Scholar)
Source: Crossref
Added: July 20, 2019

2015 conference paper

A A stochastic multi-channel spectrum access game with incomplete information

2015 ieee international conference on communications (icc), 4799–4804.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

TL;DR: A joint reinforcement learning and type identification algorithm is developed and results show that using the proposed algorithm, a wireless user can gradually achieve the same performance as that in the corresponding complete information game. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

A unified framework for wireless connectivity study subject to general interference attack

2015 ieee international conference on communications (icc), 7174–7179.

By: Y. Liu*, C. Li n, C. Yin* & H. Dai n

TL;DR: This paper proposes a unified framework to study the connectivity of wireless networks under a general type of interference attack, which can address diverse applications including Cognitive Radio, Jamming attack and shadowing effect and investigates a 3-dimensional connectivity region. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

Anti-Jamming transmission Stackelberg game with observation errors

IEEE Communications Letters, 19(6), 949–952.

By: L. Xiao*, T. Chen*, J. Liu* & H. Dai n

TL;DR: Simulation results show that the transmission of an SU benefits from the observation error of the jammer with a higher signal-to-interference-plus-noise ratio and utility. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Beamforming games with quantized CSI in two-user interference channels

2015 International Conference on ICT Convergence (ICTC), 1303–1306.

By: J. Lee* & H. Dai n

TL;DR: This work considers a beamforming game of the transmitters in a two-user multiple-input single-output interference channel using limited feedback and investigates how each transmitter should find a strategy from the quantized channel state information (CSI). (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

Delay Optimal Scheduling for Energy Harvesting Based Communications

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 33(3), 452–466.

By: J. Liu n, H. Dai n & W. Chen*

author keywords: Energy harvesting; packet scheduling; Markov chain; queueing delay; delay-power tradeoff
TL;DR: This paper addresses the delay optimal scheduling problem for a bursty communication link powered by a capacity-limited battery storing harvested energy together with one RES, and derives the optimal threshold-based scheduling policy together with the corresponding transmission parameters. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 article

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He n, H. Dai n & P. Ning n

TL;DR: Two new MARL algorithms, termed minimax-PDS and WoLF-P DS, are proposed, which enable the LS to learn and adapt faster in dynamic environments by exploiting its private local information. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Jamming Games in Underwater Sensor Networks with Reinforcement Learning

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: L. Xiao, Q. Li, T. Chen, E. Cheng & H. Dai*

author keywords: Jamming; underwater sensor networks; reinforcement learning; game theory
UN Sustainable Development Goal Categories
14. Life Below Water (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Joint User Selection and Feedback Bit Allocation Based on Sparsity Constraint in MIMO Virtual Cellular Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2069–2079.

By: J. Lee n, W. Choi* & H. Dai n

author keywords: Multiple-input multiple-output (MIMO); virtual cellular network; limited feedback; user selection
TL;DR: This paper considers the user selection and feedback design problems in a virtual cellular network (VCN), where multiple base stations (BSs) share a user set, and proposes an efficient algorithm with significantly reduced computational complexity by relaxing the sparsity constraint on the feedback sizes. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Mobile Conductance in Sparse Networks and Mobility-Connectivity Tradeoff

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(4), 2954–2965.

By: H. Zhang n, H. Dai n, Z. Zhang* & Y. Huang n

author keywords: Mobile Conductance; Gossip; Information Spreading; Sparse Networks; Mobility Models
TL;DR: The recently proposed mobile-conductance based analytical framework is extended to the sparse settings, thus offering a unified tool for analyzing information spreading in mobile networks. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: J. Lee n & H. Dai n

author keywords: Beamforming; Nash bargaining; limited feedback; multiple-input single-output; interference channels
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

TL;DR: Fast friendly jamming is proposed, which eliminates the need for demodulation and enables the friendly jammer to verify the received signals directly on the physical layer and achieve the accurate distinction between allies' and enemies' transmissions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

On Throughput Maximization of Time Division Multiple Access With Energy Harvesting Users

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65(4), 2457–2470.

By: J. Liu n, H. Dai n & W. Chen*

author keywords: Energy harvesting; energy management; Markov processes; power allocation; queueing analysis; time division multiple access
TL;DR: This paper considers a multiple-access channel, where multiple users equipped with energy harvesting batteries communicate to an access point, and considers an equal-time TDMA scheme, which assigns equal-length subslots to each user, and analyzes its system performance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Optimal Resource Allocation in Random Access Cooperative Cognitive Radio Networks

IEEE TRANSACTIONS ON MOBILE COMPUTING, 14(6), 1245–1258.

By: M. Pandian n, M. Sichitiu n & H. Dai n

author keywords: Cooperative cognitive radio networks; WLAN optimization; Wi-Fi; spectrum leasing; game theory
TL;DR: Simulation results show that the users achieve higher throughput via the proposed CCRN scheme, thus providing the mobile operator and the private Wi-Fi provider with incentives for cooperation. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 journal article

Robust blind image watermarking based on chaotic mixtures

NONLINEAR DYNAMICS, 80(3), 1329–1355.

By: N. Liu*, H. Li*, H. Dai n, D. Guo* & D. Chen*

author keywords: Blind watermarking; Chaotic map; Wavelet transform; Robustness; Security
TL;DR: Experimental results demonstrate that the proposed blind image watermarking scheme exhibits very good properties including imperceptibility, robustness and security against conventional image processing and geometrical attacks such as JPEG compression, low-pass filtering, median filtering, Gaussian noise, scaling, rotating, cropping and translation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Toward Proper Guard Zones for Link Signature

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.

By: X. He n, H. Dai n, W. Shen n, P. Ning n & R. Dutta n

author keywords: Link signature; channel correlation model; guard zone; physical-layer security
TL;DR: Various well-established channel correlation models are investigated and a set of important physical factors that have significant influence on LS security are identified, and with the obtained insights, extensive simulations are conducted to explore suitable guard zone sizes for LS in several typical indoor and outdoor environments. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Towards Optimal Link Patterns for Robustness of Interdependent Networks against Cascading Failures

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: S. Chattopadhyay n & H. Dai n

author keywords: Interdependent networks; optimal inter-links; targeted attack; network robustness
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Virtual-MIMO-Boosted Information Propagation on Highways

IEEE Transactions on Wireless Communications, 15(2), 1420–1431.

author keywords: Information propagation; vehicular communications; virtual MIMO; mobility
TL;DR: A novel virtual-MIMO-enabled information dissemination scheme in which the vehicles opportunistically form virtual antenna arrays to boost the transmission range, and therefore, accelerate information propagation along the highway, is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Crossref
Added: July 20, 2019

2014 journal article

Dynamic Adaptive Anti-Jamming via Controlled Mobility

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.

By: X. He n, H. Dai n & P. Ning n

author keywords: Jamming/anti-jamming; mobility control; conductance; cognitive radio network; security
Source: Web Of Science
Added: August 6, 2018

2014 article

Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS

2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), pp. 237–242.

By: N. Liu*, H. Dai n & D. Guo*

author keywords: PARADIS; physical feature identification; wireless device; authentication protocol; wireless security
TL;DR: An overview of various schemes for PARADIS identification using physical layer characteristics is provided and a new authentication scheme based on PRARDIS is proposed and discussed its security and feasibility in the SAE/LTE application. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Single-Hop Transport Throughput of Secondary Networks in Spectrum Sharing Systems

IEEE Transactions on Mobile Computing, 14(8), 1726–1736.

By: C. Li* & H. Dai n

author keywords: Cognitive radio; network throughput; outage analysis and transmission capacity
TL;DR: This paper investigates the configuration of the secondary network and its single-hop transport throughput (STT) with outage constraints imposed on both networks, and develops a new metric, STT, that inherits the merits of both the traditional transport capacity and transmission capacity. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: July 20, 2019

2014 journal article

Throughput Scaling of Primary and Secondary Ad Hoc Networks With Same-Order Dimensions

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 63(8), 3957–3966.

By: C. Li n & H. Dai n

author keywords: Ad hoc cognitive radio; network capacity; scaling law
TL;DR: This paper investigates the scaling law of the network throughput of a special type of heterogeneous networks where a secondary network composed of cognitive users shares the same resources opportunistically with a primary network of licensed users with a weaker condition that the dimensions of the two overlaid networks are on the same order, under the extended network model. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(5), 2512–2523.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cognitive radio network; collaborative spectrum sensing; malicious user detection; security
TL;DR: A new malicious user detection method using two proposed conditional frequency check (CFC) statistics is developed under the Markovian model for the spectrum state to improve the collaborative spectrum sensing performance significantly. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen n, P. Ning n, X. He n & H. Dai n

author keywords: Wireless; friendly jamming; interference cancellation
TL;DR: Both the analytical and experimental results indicate that the proposed techniques can effectively disable enemy wireless communication and at the same time maintain wireless communication between authorized devices. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He n, H. Dai n & P. Ning n

TL;DR: Two new spectral quantities, single- and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Gossip-Based Information Spreading in Mobile Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(11), 5918–5928.

By: H. Zhang*, Z. Zhang* & H. Dai n

author keywords: Conductance; gossip; information spreading; mobile networks; mobility models
TL;DR: A new performance metric, mobile conductance, is proposed, which allows to separate the details of mobility models from the study of mobile spreading time, and geometrical properties are utilized to explore this metric for several popular mobility models, and offer insights on the corresponding results. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing

IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cognitive radio network; security; collaborative spectrum sensing; malicious user detection; Byzantine attacks; HMM
TL;DR: By using two hidden Markov models corresponding to honest and malicious users respectively, high malicious user detection accuracy can be achieved at the fusion center, leading to more robust and reliable collaborative spectrum sensing performance in the presence of malicious users, as compared to the baseline approaches. (via Semantic Scholar)
Sources: Crossref, Web Of Science
Added: August 6, 2018

2013 conference paper

Is link signature dependable for wireless security?

2013 proceedings ieee infocom, 200–204.

By: X. He n, H. Dai n, W. Shen n & P. Ning n

TL;DR: A Correlation ATtack (CAT) is proposed to demonstrate the potential vulnerability of the link signature based security mechanisms in such circumstances as with poor scattering and/or a strong line-of-sight (LOS) component. (via Semantic Scholar)
UN Sustainable Development Goal Categories
1. No Poverty (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

On the Capacity Region of Cognitive Multiple Access over White Space Channels

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31(11), 2517–2527.

By: H. Zhang*, Z. Zhang* & H. Dai n

author keywords: Cognitive multiple access channel (CogMAC); cognitive radio; white space channel; three-switch channel; capacity region; optimal rate and power allocation
TL;DR: This paper considers the fundamental problem of rate regions achievable for multiple secondary users (SUs) which send their information to a common receiver over a white space channel and proposes an optimal rate and power allocation scheme that maximizes the sum rate. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Structured Variational Methods for Distributed Inference in Networked Systems: Design and Analysis

IEEE Transactions on Signal Processing, 61(15), 3827–3839.

By: H. Dai n, Y. Zhang* & J. Liu n

author keywords: Convergence analysis; distributed inference; Markov chain; variational methods
TL;DR: The overall performance of structured variational methods, modeled as a mixed vertex-edge process, is quantitatively characterized via a coupling approach and the tradeoff between performance and complexity of this inference approach is addressed. (via Semantic Scholar)
Source: Crossref
Added: July 20, 2019

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He n, H. Dai n & P. Ning n

TL;DR: A new malicious user detection method based on two proposed Conditional Frequency Check statistics is developed with a Markovian spectrum model that can achieve high malicious users detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Channel-aware adaptive resource allocation for multicast and unicast services in orthogonal frequency division multiplexing systems

IET COMMUNICATIONS, 6(17), 3006–3014.

By: H. Zhang*, X. Wang*, F. Li* & H. Dai*

TL;DR: A channel-aware adaptive resource allocation algorithm is proposed to maximise the total throughput of the unicast service while guaranteeing the required quality of service (QoS) for the multicast service. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks

IEEE Transactions on Signal Processing, 60(10), 5281–5292.

By: C. Li n, H. Dai n, L. Xiao* & P. Ning n

author keywords: Anti-jamming communication; collaborative broadcast; frequency hopping; multi-channel wireless networks
TL;DR: The optimal number of relays in CUFH is derived such that the packet reception rate is maximized, and the optimal cooperation gain achieved by CUFH over UFH is quantified, which demonstrates a significant improvement achieved by cooperative relays and the feasibility of UFH-based schemes in large-scale networks. (via Semantic Scholar)
Source: Crossref
Added: July 20, 2019

2012 journal article

Efficient In-Network Computing with Noisy Wireless Channels

IEEE TRANSACTIONS ON MOBILE COMPUTING, 12(11), 2167–2177.

By: C. Li* & H. Dai n

author keywords: Distributed computing; noisy multihop network; clustering
TL;DR: This paper designs a general protocol for evaluating any divisible functions, addressing both one-shot and block computation, and both constant and large m scenarios, and analyzes the bottleneck of this general protocol in different scenarios, which provides insights into designing more efficient protocols for specific functions. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

MAC Design of Uncoordinated FH-Based Collaborative Broadcast

IEEE Wireless Communications Letters, 1(3), 261–264.

By: L. Xiao*, H. Dai n & P. Ning n

author keywords: Collaborative broadcast; frequency hopping; MAC; jamming; wireless networks
TL;DR: This letter takes a first step to investigate efficient Media Access Control strategies for the UFH-based collaborative broadcast, and derive closed-form expressions of the channel access probabilities for time-slotted systems to minimize the broadcast delay and to significantly reduce the energy cost. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: July 20, 2019

2012 journal article

Opportunistic Decode-and-Forward Relaying With Beamforming in Two-Wave With Diffuse Power Fading

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 61(7), 3050–3060.

By: Y. Lu*, N. Yang*, H. Dai n & X. Wang*

author keywords: Decode and forward (DF); multiple-input multiple-output; opportunistic relaying; optimal power allocation; two-wave with diffuse power (TWDP) fading
TL;DR: This paper derives the optimal power allocation factor, which provides a practical design rule to optimally distribute the total transmission power between the source and the selected relay to minimize the outage probability, and demonstrates that the scheme preserves the maximum diversity order. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2011 journal article

Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping

IEEE Transactions on Information Forensics and Security, 7(1), 297–309.

By: L. Xiao*, H. Dai n & P. Ning n

author keywords: Antijamming communication; collaborative broadcast; frequency hopping; wireless networks
TL;DR: A jamming-resistant collaborative broadcast scheme for wireless networks, which utilizes the Un coordinated Frequency Hopping technique to counteract jamming without preshared keys, and exploits node cooperation to achieve higher communication efficiency and stronger jamming resistance. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2011 conference paper

On the throughput scaling of cognitive radio ad hoc networks

2011 proceedings ieee infocom, 241–245.

By: C. Li n & H. Dai n

TL;DR: Surprisingly, this analysis shows that this weaker condition that the dimensions of the two overlaid networks are on the same order does not degrade either network throughput in terms of scaling law, and further reveals the potentials of CR technology in real applications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Transport throughput of secondary networks in spectrum sharing systems

2011 proceedings ieee infocom, 2732–2740.

By: C. Li n & H. Dai n

TL;DR: The limit of STT, single hop transport capacity (STC), is derived together with a practical upper bound for it, and the broadcast transport throughput (BTT) of the secondary networks is investigated as an extension ofSTT, and its similarity with STT in the nearest neighbor model is revealed. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2010 article

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.

By: Y. Liu n, P. Ning n & H. Dai n

author keywords: cognitive radio networks; primary user detection; link signatures
TL;DR: A novel physical layer authentication technique that enables the helper node to authenticate signals from its associated primary user, and thus does not require any training process is developed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Collaborative Quickest Spectrum Sensing via Random Broadcast in Cognitive Radio Systems

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 9(7), 2338–2348.

By: H. Li*, H. Dai n & C. Li*

author keywords: Cognitive radio; spectrum sensing; quickest detection; random broadcast
TL;DR: To alleviate the difficulty of computing the optimal broadcast probability, a simple threshold broadcast scheme is proposed that can achieve substantial performance gain over schemes of random broadcast without regulation and single-user spectrum sensing. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Location-Aided Fast Distributed Consensus in Wireless Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, 56(12), 6208–6227.

By: W. Li n, H. Dai n & Y. Zhang n

author keywords: Clustering; distributed computation; distributed consensus; message complexity; mixing time; nonreversible Markov chains; time complexity
TL;DR: The idea of Markov chain lifting is studied to accelerate the convergence of distributed consensus, and two general pseudoalgorithms are presented that achieve the same scaling law in averaging time as the centralized scheme in wireless networks for all r satisfying the connectivity requirement. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

Towards efficient designs for in-network computing with noisy wireless channels

2010 proceedings ieee infocom.

By: C. Li n & H. Dai n

TL;DR: This paper adopts the adversarial noise model, for which independent binary symmetric channels are assumed for any point-to-point transmissions, with (not necessarily identical) crossover probabilities bounded above by some constant. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2010 article

Transport Capacity and Connectivity of Cognitive Radio Networks with Outage Constraint

2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, pp. 1743–1747.

By: C. Li n & H. Dai n

TL;DR: The characterization of a capacity metric, single-hop transport capacity, with respect to arbitrarily and randomly located receivers, and a fundamental connectivity metric, node isolation probability, are explored. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING.

By: Y. Zhang n & H. Dai n

TL;DR: A comparison of the proposed space-time coding scheme for impulse radio UWB systems with the direct sequence spread spectrum (DSSS) technique demonstrates that proper combination of UWB and space- time coding can provide substantial enhancement to wireless secure communications over other concurrent systems. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Analysis on the Diversity-Multiplexing Tradeoff for Ordered MIMO SIC Receivers

IEEE TRANSACTIONS ON COMMUNICATIONS, 57(1), 125–133.

By: H. Zhang*, H. Dai n & B. Hughes n

author keywords: Diversity-multiplexing tradeoff; multiple access channels; ordered SIC receiver; SDMA; V-BLAST
TL;DR: This paper rigorously verify that under general settings, the optimal ordering rule for a V-BLAST SIC receiver will not improve its performance regarding diversity-multiplexing tradeoff in point-to- point channels and reveals that when the rates of data streams are fixed, the diversity order is not improved by user ordering. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Cluster-Based Distributed Consensus

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 8(1), 28–31.

By: W. Li* & H. Dai n

author keywords: Clustering; distributed computing; distributed consensus; sensor networks
TL;DR: This paper designs cluster-based distributed consensus algorithms in forms of both fixed linear iteration and randomized gossip in order to achieve faster convergence and better energy efficiency. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Structured variational methods for distributed inference in wireless ad hoc and sensor networks

International conference on acoustics speech and signal processing, 2773–2776.

By: Y. Zhang n & H. Dai n

TL;DR: A variational message passing framework is proposed for Markov random fields, which is computationally more efficient and admits wider applicability compared to the belief propagation algorithm. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

adaptive quickest change detection with unknown parameter

International conference on acoustics speech and signal processing, 3241–3244.

By: C. Li n, H. Dai n & H. Li*

TL;DR: A novel adaptive approach is proposed to tackle this problem, which is shown to outperform the celebrated Parallel CUSUM Test and is evaluated through theoretical analysis and numerical simulations. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Asynchronous interference mitigation in cooperative base station systems

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 7(1), 155–165.

By: H. Zhang, N. Mehta, A. Molisch, J. Zhang & H. Dai*

author keywords: base station cooperation; interference leakage; jitter; linear precoding; mean square error; multiuser MIMO; spectral efficiency; timing-advance
TL;DR: The insights of this paper are critical for the practical implementation of BS cooperation in multiuser MIMO systems, a topic that is typically oversimplified in the literature. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 chapter

Design Fundamentals and Interference Mitigation for Cellular Networks

In G. Min, Y. Pan, & P. Fan (Eds.), Advances in Wireless Networks: Performance Modelling, Analysis and Enhancement. Nova Science Publishers.

By: H. Zhang & H. Dai

Ed(s): G. Min, Y. Pan & P. Fan

Source: NC State University Libraries
Added: July 28, 2019

2008 article

Distributed signal processing techniques for wireless sensor networks

EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING.

TL;DR: This paper aims to demonstrate the efforts towards in-situ applicability of EMMARM, as to provide real-time information about concrete mechanical properties such as E-modulus and compressive strength. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Energy-efficient distributed detection via multihop transmission in sensor networks

IEEE SIGNAL PROCESSING LETTERS, 15, 265–268.

By: W. Li n & H. Dai n

author keywords: distributed detection; energy efficiency; multihop fusion
TL;DR: Simulation results show that transmission energy is significantly reduced by multihop fusion schemes as compared to direct transmission, with LF outperforming the others and exhibits the most favorable energy scaling law with the network size among these schemes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 article

Theory and applications in multiuser/multiterminal communications

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING.

By: H. Dai n, M. Gastpar*, N. Jindal* & L. Xie*

TL;DR: This poster presents a probabilistic procedure to characterize the response of the immune system to laser-spot assisted, 3D image recognition and quantifies the number of cells that respond to laser beams. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

Asymptotic analysis on the interaction between spatial diversity and multiuser diversity in wireless networks

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 55(8), 4271–4283.

By: Q. Zhou n & H. Dai n

author keywords: average system capacity; multiple-input multiple-output (MIMO); multiuser diversity; scheduling gain; spatial diversity
TL;DR: Through asymptotic analysis of the average system capacity and scheduling gain, this paper investigates the cross-layer interaction between these two forms of diversity in wireless networks. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

Distributed detection in wireless sensor networks using a multiple access channel

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 55(3), 822–833.

By: W. Li n & H. Dai n

author keywords: autoregressive processes; distributed detection; error exponents; multiple access channel; sensor networks
TL;DR: It is demonstrated that for the deterministic signal in correlated noise problem, with a specially chosen mapping rule, MAC fusion achieves the same asymptotic performance as centralized detection under the average power constraint (APC), while there is always a loss in error exponents associated with PAC fusion. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

Energy-efficiency and transmission strategy selection in cooperative wireless sensor networks

JOURNAL OF COMMUNICATIONS AND NETWORKS, 9(4), 473–481.

By: Y. Zhang n & H. Dai n

author keywords: energy efficiency; sensor networks; virtual multiple-input multiple-output (MIMO)
TL;DR: Analysis in the wideband regime reveals that, while receive diversity introduces significant improvement in both energy efficiency and spectral efficiency, further improvement due to the transmit diversity of STBC is limited, as opposed to the superiority of the SM scheme especially for non-trivial spectral efficiency. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

Some Analysis in Distributed MIMO Systems

Journal of Communications, 2(3).

By: H. Dai*, H. Zhang & Q. Zhou

TL;DR: Through asymptotic large-system analysis, this paper provides solid justifications on the advantages of distributed MIMO over co-located MIMo when communication channels are subject to spatial correlation and shadow fading and exploits inherent macrodiversity in distributing antennas to devise a cost- effective link adaptation scheme that achieves significant performance gain. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2006 journal article

Asymptotic analysis in MIMO MRT/MRC systems

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING.

By: Q. Zhou n & H. Dai n

TL;DR: The analysis of the probability density function of the squared largest singular value of a complex Gaussian matrix at the origin and tail reveals a simple connection with system parameters, providing good insights for the design of MIMO diversity systems. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2006 conference paper

Asymptotic analysis on spatial diversity versus multiuser diversity in wireless networks

2006 ieee international conference on communications, vols 1-12, 1464–1469.

By: Q. Zhou n & H. Dai n

TL;DR: This paper investigates the cross-layer interaction between spatial diversity and multiuser diversity by studying the average system capacity of opportunistic scheduling and scheduling gain and focuses on the asymptotic scenarios, by allowing either the number of users or thenumber of antennas to go to infinity. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Fast MIMO transmit antenna selection algorithms: A geometric approach

IEEE COMMUNICATIONS LETTERS, 10(11), 754–756.

By: H. Zhang n & H. Dai n

author keywords: MIMO; antenna selection; fading correlation
TL;DR: This novel scheme is shown to achieve many advantages over other existing algorithms, and to develop a fast transmit antenna selection algorithm for MIMO systems: the G-circles method. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2006 conference paper

Joint Tomlinson-Harashima Precoding and Scheduling for Multiuser MIMO with Imperfect Feedback

2006 ieee wireless communications and networking conference (wcnc 2006), vols 1-4, 1233–1238.

By: Q. Zhou n, H. Dai n & H. Zhang n

TL;DR: A crosslayer approach that explores Tomlinson-Harashima precoding (THP) at the physical layer to reduce the multiuser scheduling burden at the MAC layer, and improves the sum rate of the downlinkMultiuser MIMO system. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Joint antenna selection and link adaptation for MIMO systems

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 55(1), 243–255.

By: Q. Zhou n & H. Dai n

author keywords: Cholesky decomposition; multi-input multi-output (MIMO) systems; QR decomposition
TL;DR: This paper proposes one simplified antenna selection and link adaptation rule based on the expected optimal number of active antennas for uncorrelated MIMO with Raleigh fading, and one for correlated MIMo channels only based onThe slowly varying channel correlation information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2006 chapter

Multiuser Receiver Design

In E. Bilgieri, A. R. Calderbank, A. G. Constantinides, A. Goldsmith, A. Paulraj, & H. V. Poor (Eds.), MIMO Wireless Communications. Cambridge, UK: Cambridge University Press.

By: H. Dai, S. Jayaweera, H. Poor, D. Reynolds & X. Wang

Ed(s): E. Bilgieri, A. Calderbank, A. Constantinides, A. Goldsmith, A. Paulraj & H. Poor

Source: NC State University Libraries
Added: July 10, 2019

2006 article

On the diversity order of spatial multiplexing systems with transmit antenna selection: A geometrical approach

Zhang, H., Dai, H., Zhou, Q., & Hughes, B. L. (2006, December). IEEE TRANSACTIONS ON INFORMATION THEORY, Vol. 52, pp. 5297–5311.

By: H. Zhang*, H. Dai n, Q. Zhou n & B. Hughes n

author keywords: antenna selection; diversity order; diversity and multiplexing tradeoff; multiple-input-multiple-output (MIMO); spatial multiplexing
TL;DR: A geometrical framework is proposed to theoretically analyze the diversity order achieved by transmit antenna selection for separately encoded spatial multiplexing systems with linear and decision-feedback receivers. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2006 conference paper

On the diversity-multiplexing Tradeoff for ordered SIC receivers over MIMO channels

2006 ieee international conference on communications, vols 1-12, 1368–1373.

By: H. Zhang n, H. Dai n & B. Hughes n

TL;DR: It is proved that under general settings, any ordering rule for a V-BLAST SIC receiver will not improve its performance regarding diversity-multiplexing tradeoff, and it is predicted that the whole tradeoff curve is the same as that of fixed-order detectors. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Optimal Throughput and Energy Efficiency for Wireless Sensor Networks: Multiple Access and Multipacket Reception

EURASIP Journal on Wireless Communications and Networking, 2005(4), 670575.

By: W. Li n & H. Dai n

TL;DR: It is shown that multiuser scheduling greatly enhances system performance in a shadow fading environment and the minimum effective energy grows rapidly as the throughput constraint approaches the maximum asymptotic throughput. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Crossref
Added: July 28, 2019

2004 journal article

CDMA Downlink Transmission with Transmit Antenna Arrays and Power Control in Multipath Fading Channels

EURASIP Journal on Wireless Communications and Networking, 2004(1), 219825.

By: H. Dai n, L. Mailaender* & H. Poor*

TL;DR: It is found that the traffic type impacts the algorithm choice in downlink transmission, and that there is no need to seek optimum power control/allocation schemes, which are either too complex or infeasible in practice. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2004 journal article

Cochannel Interference Mitigation and Cooperative Processing in Downlink Multicell Multiuser MIMO Networks

EURASIP Journal on Wireless Communications and Networking, 2004(2), 202654.

By: H. Zhang n & H. Dai n

Source: Crossref
Added: July 28, 2019

2004 journal article

Downlink Capacity of Interference-Limited MIMO Systems With Joint Detection

IEEE Transactions on Wireless Communications, 3(2), 442–453.

By: H. Dai n, A. Molisch* & H. Poor*

author keywords: adaptive detection; BLAST; co-channel interference; multiple-input multiple-output (MIMO) systems; multiuser detection; turbo processing
TL;DR: An adaptive detection scheme is developed, which together with a Turbo ST MUD structure offers substantial performance gain over the well-known V-BLAST techniques with coding in this interference-limited cellular environment. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2003 journal article

Advanced signal processing for power line communications

IEEE Communications Magazine, 41(5), 100–107.

By: H. Dai n & H. Poor*

TL;DR: It is argued that these methods can successfully mitigate the influence of the principal impairments in PLC channels: time-varying channel attenuation, multipath frequency-selective fading, multiple access interference, and background noise. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Asymptotic spectral efficiency of multicell MIMO systems with frequency-flat fading

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 51(11), 2976–2988.

By: H. Dai n & H. Poor*

author keywords: cellular communications; channel capacity; co-channel interference; large-system asymptotic analysis; MIMO systems; multiuser detection; spectral efficiency
TL;DR: The spectral efficiency of multiple-input multiple-output (MIMO) systems operating in multicell frequency-flat fading environments is studied for situations in which co-channel interference is the dominant channel impairment instead of ambient noise. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2002 journal article

Iterative space-time processing for multiuser detection in multipath CDMA channels

IEEE Transactions on Signal Processing, 50(9), 2116–2127.

By: H. Dai* & H. Poor*

author keywords: antenna arrays; CDMA; iterative processing; multiuser detection; SAGE; space-time processing
TL;DR: The EM-based (SAGE) iterative space-time multiuser receiver introduced here achieves the best performance with excellent convergence properties and approaches the optimum performance with reasonable complexity. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: July 28, 2019

2002 journal article

Turbo multiuser detection for coded DMT VDSL systems

IEEE Journal on Selected Areas in Communications, 20(2), 351–362.

By: H. Dai* & V. Poor*

author keywords: coded discrete multitone; crosstalk; gray coding; impulse noise; multiuser detection; turbo decoding; very-high-rate digital subscriber line
TL;DR: The proposed iterative DMT receiver is shown to achieve an overall 7.0 dB gain over the uncoded optimum receiver at a bit error rate of 10/sup -7/ for a channel with severe intersymbol interference and additive white Gaussian noise and with one dominant crosstalk signal. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

2001 journal article

Crosstalk mitigation in DMT VDSL with impulse noise

IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(10), 1205–1213.

By: H. Dai* & H. Poor*

author keywords: crosstalk; DMT; DSL; impulse noise; M-estimation; multiuser detection
TL;DR: This paper explores signal processing methods that can jointly mitigate crosstalk and impulse noise based on a recently developed robust M-detector structure for MUD in non-Gaussian ambient noise in very-high-rate digital subscriber line transmission systems. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

1998 journal article

Study of IMBE Vocoder with Speech Enhancement

Journal of China Institute of Communications, 19(4), 43–49.

By: H. Dai & Z. Cao

Source: NC State University Libraries
Added: July 28, 2019

Employment

Updated: February 22nd, 2018 08:37

2003 - present

North Carolina State University Raleigh, NC, US
Professor Electrical and Computer Engineering

Education

Updated: February 22nd, 2018 08:34

1998 - 2002

Princeton University Princeton, NJ, US
Ph.D. Electrical Engineering

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.