Loading [MathJax]/extensions/MathMenu.js
Xiaoqi Qin - IEEE Xplore Author Profile

Showing 1-25 of 115 results

Filter Results

Show

Results

Benefiting from the performance enhancement brought by multistatic cooperative sensing, integrated sensing and communication (ISAC) can capture more environmental information to address the security risk of information leakage caused by the openness of wireless channels. In this paper, we study the multistatic cooperative sensing assisted secure transmission via intelligent reflecting surface (IRS...Show More
Aerial hybrid reconfigurable intelligent surface (AHRIS) -assisted integrated sensing and communication (ISAC) has recently emerged as a promising candidate for practical deployment in the sixth generation (6G) wireless networks. System design and gain rely heavily on accurately modeling of the underlying channel characteristics, which is challenging due to the high mobility of AHRIS and the uniqu...Show More
Reconfigurable intelligent surface (RIS)-aided vehicle-to-everything (V2X) communication has emerged as a crucial solution for providing reliable data services to vehicles on the road. However, in delay-sensitive or high-mobility communications, the rapid movement of vehicles can lead to random scattering in the environment and time-selective fading in the channel. In view of this, we investigate ...Show More
We introduce NeRFCom, a novel communication system designed for end-to-end 3D scene transmission. Compared to traditional systems relying on handcrafted NeRF semantic feature decomposition for compression and well-adaptive channel coding for transmission error correction, our NeRFCom employs a nonlinear transform and learned probabilistic models, enabling flexible variable-rate joint source-channe...Show More
Mobile edge caching (MEC) is a promising technique to improve the quality of service (QoS) for mobile users (MU) by bringing data to the network edge. However, optimizing the crucial QoS aspects of message freshness and service promptness, measured by age of information (AoI) and service delay, respectively, entails a tradeoff due to their competition for shared edge resources. This paper investig...Show More
Recent advancements in neural image codecs (NICs) are of significant compression performance, but limited attention has been paid to their error resilience. These resulting NICs tend to be sensitive to packet losses, which are prevalent in real-time communications. In this paper, we investigate how to elevate the resilience ability of NICs to combat packet losses. We propose ResiComp, a pioneering...Show More
In this paper, we propose “SoundSpring”, a cutting-edge error-resilient audio transceiver that marries the robustness benefits of joint source-channel coding (JSCC) while also being compatible with current digital communication systems. Unlike recent deep JSCC transceivers, which learn to directly map audio signals to analog channel-input symbols via neural networks, our SoundSpring adopts the lay...Show More
Intelligent reflecting surface (IRS) is considered as one of the revolutionary technologies for sixth-generation (6G) wireless communication as it can be adapted to assist communication systems by adaptively manipulating the propagation environment and greatly expanding network coverage. In this case, the aerial IRS (AIRS)-assisted communications have unique advantages, such as more flexible deplo...Show More
As one of the key techniques to realize semantic communications, end-to-end optimized neural joint source-channel coding (JSCC) has made great progress over the past few years. A general trend in many recent works pushing the model adaptability or the application diversity of neural JSCC is based on the convolutional neural network (CNN) backbone, whose model capacity is yet limited, inherently le...Show More
Quantum networks show promise in enhancing the overall functional advantages of the Internet and enabling applications that are incomparable in the classical world. Supported by quantum communication, quantum networks are expected to offer almost unconditional security. However, securing personal privacy within quantum networks is of paramount importance. The aim of this paper is to extend the dif...Show More
Quantum computing is a promising paradigm for efficiently solving large and high-complexity problems. However, ensuring privacy within this quantum computing necessitates innovative approaches. Existing research has introduced the concept of quantum differential privacy (QDP) to protect data privacy in quantum computing by leveraging quantum noise. Yet, this method faces limitations due to the fix...Show More
In this paper, we investigate the sensing-assisted secure transmission for an integrated sensing and commu-nication (ISAC) system, where the semi-intelligent reflecting surface (IRS) is deployed to facilitate the secure communication and sensing. First, we adopt the multiple signal classification algorithm to estimate the target's direction with Cramér-Rao bound (CRB) serving as the performance me...Show More
The multi-probe anechoic chamber (MPAC) method is widely regarded as the most promising for 5G multiple-input multiple-output (MIMO) dynamic channel over-the-air (OTA) testing. However, the probes used in the testing system is varying to reproduce the channel in a laboratory environment, which leads to a dramatic increase in the complexity of probe selection. In this paper, a concept of context ch...Show More
The multi-probe anechoic chamber (MPAC) method is considered the most promising approach for over-the-air (OTA) testing of 5G massive multiple-input multiple-output (MIMO) devices. Since the cost of the MPAC system is directly influenced by the number of ports on the channel emulator, which corresponds to the number of OTA probes, the selection of probes is crucial for OTA testing. However, the cl...Show More
In this paper, we propose a constructive interference precoding (CIP) enabled secure intelligent reflecting surface (IRS)-non-orthogonal multiple access (NOMA) scheme, lever-aging both the inter-user interference and artificial noise to boost the legitimate transmission of far user, while inducing the eavesdropper to decode the deceptive information. Based on this CIP-NOMA scheme, we minimize the ...Show More
Multicasting is an efficient technique for simultaneously transmitting common messages from the base station (BS) to multiple mobile users (MUs). Multicast scheduling over multiple channels, which aims to jointly minimize the energy consumption of the BS and the latency of serving asynchronized requests from the MUs, is formulated as an infinite-horizon Markov decision process (MDP) problem with a...Show More
End-to-end image transmission has recently become a crucial trend in intelligent wireless communications, driven by the increasing demand for high bandwidth efficiency. However, existing methods primarily optimize the trade-off between bandwidth cost and objective distortion, often failing to deliver visually pleasing results aligned with human perception. In this paper, we propose a novel rate-di...Show More
Existing studies in grant-free random access (GF-RA) for massive machine-type communications focus mainly on improving the accuracy of user detection and data recovery, treating all devices as equally important. However, in many emerging Internet of Things applications like smart city and smart agriculture, the information freshness becomes a major concern. In this paper, we concentrate on minimiz...Show More
We study a semi-passive intelligent reflecting surface (IRS) enabled ISAC, where IRS is employed to assist the secure communication and perform target sensing. Specifically, we model two types of targets, namely point targets and extended targets. The direction-of-arrival (DoA) of the former and the complete target response matrix of the latter should be estimated. We derive the Cramér-Rao bound (...Show More
Quantum computing changes the way of solving complex problems and handling vast datasets. The introduction of quantum search algorithms, notably Grover's algorithm, addresses the inefficiencies of classical search methods in handling vast datasets by offering substantial speed improvements. However, an inherent aspect of quantum searches is their failure probability. This paper aims to explore the...Show More
Quantum computing revolutionizes the way of solving complex problems and handling vast datasets, which shows great potential to accelerate the machine learning process. However, data leakage in quantum machine learning (QML) may present privacy risks. Although differential privacy (DP), which protects privacy through the injection of artificial noise, is a well-established approach, its applicatio...Show More
Mobile edge caching (MEC) is a promising technique to improve the quality of service (QoS) for mobile users (MU) by bringing data to the network edge. However, optimizing the crucial QoS aspects of message freshness and service promptness, measured by age of information (AoI) and service delay, respectively, entails a tradeoff due to their competition for shared edge resources. This paper investig...Show More
With the significant progress in recent decades, wireless rechargeable sensor networks (WRSNs) have been widely deployed in smart cities, lakes, forests and other intelligent scenarios to perceive physical environment. To remotely power these sensor nodes (SNs), unmanned aerial vehicle (UAV) can provide far-field wireless charging by electromagnetic waves. Designing a trajectory for the UAV to “vi...Show More
Information and communication technology (ICT) has been an essential part of modern society. However, the current communication systems are not sufficient to meet the demands of emerging applications. Intellicise (intelligent and concise) wireless networks, with their inherent characteristics of intelligence-endogenous and primitive-concise, have been proposed as a promising research direction. In...Show More
From 1G to 5G, multiple access technology plays a critical role in the field of wireless communications. Among the potential multiple access technologies for future wireless communication networks, Model Division Multiple Access (MDMA) stands out due to its ability to enhance both spectrum efficiency and feasibility regions. In comparison to conventional schemes, the MDMA scheme offers superior pe...Show More