Loading [MathJax]/extensions/MathZoom.js
Yanyu Cheng - IEEE Xplore Author Profile

Showing 1-24 of 24 results

Filter Results

Show

Results

Generative AI-enabled wireless communications enhance efficiency and offer new tools for supply chain finance (SCF) innovation. SCF optimizes capital efficiency and reduces risk, but information asymmetry hinders risk assessment. Blockchain technology addresses these challenges by solving information asymmetry and regulatory issues. However, issues of privacy protection, reliability, and traceabil...Show More
The paper applies covert communications to a ratesplitting multiple access (RSMA) network, where an authorized transmitter sends common and private messages to legitimate users. At the same time, a warden aims to identify legitimate transmissions of private messages. We hide the existence of the transmission of private messages from the warden by exploiting the nature of RSMA, i.e., allocating hig...Show More
Recently, millimeter-wave (mmWave) and unmanned aerial vehicle (UAV) communication have attracted considerable attention owing to their advantages in terms of high data rates, low latency, and seamless coverage. However, mmWave-UAV communication performance is significantly compromised by the mmWave molecular absorption and UAV movement, resulting in a drastic deterioration in the performance and ...Show More
Recent studies have demonstrated that malicious adversaries are capable of fingerprinting Internet of Things (IoT) devices in a smart home and further causing privacy breaches. However, many existing anti-fingerprinting schemes, either by traffic padding or traffic mutation, are less effective in defending against state-of-the-art fingerprinting methods. To meet this gap, we in this paper propose ...Show More
Image transmission over wireless communications can be used in a variety of applications, such as smart city, surveillance systems, and Metaverse construction. Massive image transmission can indeed be a burden for wireless communication networks, especially in situations where a large number of users are trying to transmit high-resolution images simultaneously. An efficient image transmission fram...Show More
Image transmission over wireless communications can be used in a variety of applications, such as smart cities, surveillance systems, and Metaverse construction. In this paper, we propose a task-oriented semantic information transmission (SIT) framework with rate-splitting multiple access (RSMA) for image transmission. As such, only the semantic information of interest is transmitted to each user,...Show More
Mobile edge computing (MEC) is a key enabling technology for the sixth-generation (6G) wireless networks. In this paper, we apply covert communications to MEC to prevent information leakage, where two candidate technologies of 6G, reconfigurable intelligent surface (RIS) and non-orthogonal multiple access (NOMA), are adopted. Specifically, a legitimate transmitter sends messages to a pair of legit...Show More
In this paper, we propose an interest-based semantic information transmission framework with rate splitting multiple access (RSMA), to reduce the amount of transmitted data, thereby reducing the burden of data transmission and data processing. In the framework, only the semantic information of interest is transmitted to each user. In the process of semantic information transmission, RSMA is adopte...Show More
The construction of virtual transportation networks requires massive data to be transmitted from edge devices to Virtual Service Providers (VSP) to facilitate circulations between the physical and virtual domains in Metaverse. Leveraging semantic communication for reducing information redundancy, VSPs can receive semantic data from edge devices to provide varied services through advanced technique...Show More
In this paper, we apply covert communications to reconfigurable intelligent surface (RIS)-assisted non-orthogonal multiple access (NOMA) networks, where a legitimate transmitter sends messages to a pair of legitimate users while a warden aims to detect whether the legitimate transmission exists. We can hide the existence of the strong user's transmission from a warden by exploiting the nature of N...Show More
Autonomous vehicles produce high data rates of sensory information from sensing systems. To achieve the advantages of sensor fusion among different vehicles in a cooperative driving scenario, high data-rate communication becomes essential. Current strategies for joint radar-communication (JRC) often rely on specialized hardware, prior knowledge of the system model, and entail diminished capability...Show More
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention in serving as aerial base stations (BSs). To protect the data privacy without being detected by a warden, we investigate a jammer-aided UAV covert communication system, aiming to maximize the user's covert rate with optimized transmit and jamming power. By considering the general composite fading and shadowing channel model...Show More
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their high mobility and low cost in serving as temporary aerial base stations (BSs) and providing high data rates for next-generation communication networks. To protect user privacy while avoiding detection by a warden, we investigate a jammer-aided UAV covert communication system, which aims to maximize the user...Show More
Current strategies for joint radar-communication (JRC) rely on prior knowledge of the communication and radar systems within the vehicle network. In this paper, we propose a framework for intelligent vehicles to conduct JRC, with minimal prior knowledge, in an environment where surrounding vehicles execute radar detection periodically, which is typical in contemporary protocols. We introduce a met...Show More
The semantic communication system enables wireless devices to communicate effectively with the semantic meaning of the data. Wireless powered Internet of Things (IoT) that adopts the semantic communication system relies on harvested energy to transmit semantic information. However, the issue of energy constraint in the semantic communication system is not well studied. In this paper, we propose a ...Show More
In this letter, we propose an efficient federated transfer learning (FTL) framework with client selection for intrusion detection (ID) in mobile edge computing (MEC). Specifically, we leverage federated learning (FL) to preserve privacy by training model locally, and utilize transfer learning (TL) to improve training efficiency by knowledge transfer. For FL, unreliable and low-quality clients shou...Show More
In this article, we investigate two-tier nonorthogonal multiple access (NOMA)-based wireless powered communication networks. The considered network consists of a hybrid access point and two groups of users, namely near and far users. A near user and a far user are selected to form a NOMA pair, which harvest energy during the downlink phase and transmit information during the uplink phase. Specific...Show More
In this paper, non-orthogonal multiple access (NOMA) networks assisted by multiple intelligent reflecting surfaces (IRSs) with discrete phase shifts are investigated, in which each user device (UD) is served by an IRS to improve the quality of the received signal. Two scenarios are considered according to whether there is a direct link between the base station (BS) and each UD, and the outage perf...Show More
Intelligent reflecting surfaces (IRSs) are envisioned to provide reconfigurable wireless environments for future communication networks. In this paper, both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) networks are studied, in which an IRS is deployed to enhance the coverage by assisting a cell-edge user device (UD) to communicate with th...Show More
In this paper, a downlink non-orthogonal multiple access (NOMA) system is studied, in which an intelligent reflecting surface (IRS) is deployed to enhance the coverage by assisting a cell-edge user device (UD) to communicate with the base station (BS). To characterize system performance, new channel statistics for the BS-IRS-UD link with Nakagami-m fading are investigated. Based on the new channel...Show More
In this letter, we propose a two-step user-paring scheme for an orthogonal frequency-division multiplexing (OFDM)-based cooperative non-orthogonal multiple-access (NOMA) system where far users cannot communicate with the base station directly. The first step is for allocating near users, and the second step is for allocating far users. To evaluate the performance of the proposed scheme, we derive ...Show More
In this paper, we study the mode selection and subchannel allocation for the downlink of a multi-user multi-subchannel cooperative non-orthogonal multiple access (C-NOMA) system. Specifically, each non-orthogonal multiple access (NOMA) pair can work in two different modes, i.e., non-cooperative NOMA (NC-NOMA) and C-NOMA, where the mode selection is based on the users’ channel conditions. We propos...Show More
A joint user clustering and subcarrier allocation scheme for downlink non-orthogonal multiple access (NOMA) systems is examined in this paper. We propose the scheme for downlink NOMA systems which maximizes the achievable diversity order. The closed-form expression of the outage probability of the worst-performance user in the worst case is derived and validated by simulations. Numerical results s...Show More
In this paper, we investigate the issues of joint user pairing and subchannel allocation (JUP-SA) in a multisubchannel multiuser nonorthogonal multiple access (NOMA) system. We first investigate the uplink and propose a JUP-SA scheme so that the minimum achievable diversity order of users is maximized. By deriving the upper and lower bounds of the outage probability of the worst-performance user, ...Show More