Loading [MathJax]/extensions/MathZoom.js
Chao Wang - IEEE Xplore Author Profile

Showing 1-21 of 21 results

Results

Due to the open accessibility of wireless networks with severe privacy risks, covert communication has gained increasing attention, where the effective range is limited by the low transmit power. Fortunately, employing intelligent reflecting surface (IRS) as a relay has become an appealing solution to extend the range of covert communication. To this end, we investigate the covert communication in...Show More
Dynamic pruning is an effective model compression method to reduce the computational cost of networks. However, existing dynamic pruning methods are limited to pruning along a single dimension (channel, spatial, or depth), which cannot maximally excavate the redundancy of the network. Meanwhile, most of the current state-of-the-arts usually implement dynamic pruning via masked-out partial channels...Show More
This correspondence investigates the robust unmanned aerial vehicle (UAV) enabled covert communication system with active ground wardens of collusive detection and location uncertainty. The three-dimensional (3D) trajectory and transmit power of UAV are jointly optimized to maximize the average covert transmission rate subject to the worst-case covertness constraint. The problem is intractable due...Show More
The proliferation of users and data traffic poses substantial pressure on resource management in the Internet of Things (IoT). In addition to beneficially allocating scarce network resources, it also needs to meet differentiated users’ Quality-of-Service (QoS) requirements, such as low delay, high security, etc. The distributed management architecture of blockchain and its inherent security featur...Show More
With the benefits of unmanned aerial vehicle (UAV) and intelligent reflecting surface (IRS), they can be combined to further enhance the communication performance. However, the high-quality air-ground channel is more vulnerable to the adversarial eavesdropping. Therefore, in this paper, we propose a covert communication scheme assisted by the UAV-IRS to maximize the covert transmission rate. Speci...Show More
With the advent of the 6G era, the construction of space networks is gradually entering a peak period. Tiansuan constellation came into being in this context, which aims to provide an open research platform for researchers. Tiansuan constellation can be used as the coverage supplement of terrestrial networks and the traffic supplement in hotspot areas, providing flexible, efficient, and seamless c...Show More
In this paper, we propose a covert communication scheme assisted by UAV-IRS to maximize the covert transmission rate. The ground transmitter, Alice, secretly delivers the private message to a legitimate receiver, Bob, via the UAV-IRS, wishing that the transmission will not be noticed by the warden, Willie. Willie is adversarial to Alice and the UAV-IRS, which makes his accurate location difficult ...Show More
Missing data reconstruction is a classical, yet challenging problem in remote sensing (RS) image processing due to the complex atmospheric environment and variability of satellite sensors. Most of the contemporary reconstruction methods either handle only one specific task or require supplementary data, while the single input for multitask reconstruction has not been explored yet. In this article,...Show More
Deep autoencoder-based approaches have achieved significant improvements on restoring damaged images, yet they still suffer from artifacts due to the inadequate representation and inaccurate regularization of existing features. In this paper, we propose a dual-pyramidal inpainting framework called DPNet to address these two limitations, which seamlessly integrates sufficient feature learning and d...Show More
Space-air-ground integrated network (SAGIN) is a new type of wireless network mode. The effective management of SAGIN resources is a prerequisite for high-reliability communication. However, the storage capacity of space-air network segment is extremely limited. The air servers also do not have sufficient storage resources to centrally accommodate the information uploaded by each edge server. So t...Show More
The location information for tasks may expose sensitive information, which impedes the practical use of mobile crowdsensing in the industrial Internet. In this article, to our knowledge, we are the first to discuss the privacy protection of task locations and propose a codebook-based task allocation mechanism to protect it. Considering the cost of system utility caused by privacy protection techno...Show More
Traditional ground wireless communication networks cannot provide high-quality services for artificial intelligence (AI) applications such as intelligent transportation systems (ITS) due to deployment, coverage and capacity issues. The space-air-ground integrated network (SAGIN) has become a research focus in the industry. Compared with traditional wireless communication networks, SAGIN is more fl...Show More
Network virtualization (NV) is a technology with broad application prospects. Virtual network embedding (VNE) is the core orientation of VN, which aims to provide more flexible underlying physical resource allocation for user function requests. The classical VNE problem is usually solved by the heuristic method, but this method often limits the flexibility of the algorithm and ignores the time lim...Show More
The development of intelligent cyber–physical systems (ICPSs) in the virtual network environment is facing severe challenges. On the one hand, the Internet of Things (IoT) based on ICPSs construction needs a large amount of reasonable network resources support. On the other hand, ICPSs are facing severe network security problems. The integration of ICPSs and network virtualization (NV) can provide...Show More
Missing data reconstruction is a classical yet challenging problem in remote sensing images. Most current methods based on traditional convolutional neural network require supplementary data and can only handle one specific task. To address these limitations, we propose a novel generative adversarial network-based missing data reconstruction method in this letter, which is capable of various recon...Show More
As the number of end users served by wireless networks continues to grow, modern wireless communication systems have put forward higher requirements for the diversity of wireless network forms. The unmanned aerial vehicle (UAV) wireless network communication system will occupy an important position in the future wireless communication system. With the explosive growth of 5G data traffic and Intern...Show More
The smart grid must ensure that power providers can obtain substantial benefits by selling energy, while at the same time, they need to consider the cost of consumers. To realize this win-win situation, the smart grid relies on dynamic pricing mechanisms. However, most of the existing dynamic pricing schemes are based on artificial objective rules or conventional models, which cannot ensure the de...Show More
The outbreak of coronavirus COVID-19 not only brings great disaster to the people of the world, but also brings heavy burden to the medical and health network system. Massive network data traffic and resource optimization requests make traditional network architectures unable to calmly deal with the impact of COVID-19. Artificial intelligence (AI) can effectively raise the upper limit of the medic...Show More
The continuous expanded scale of the industrial Internet of Things (IIoT) leads to IIoT equipments generating massive amounts of user data every moment. According to the different requirement of end users, these data usually have high heterogeneity and privacy, while most of users are reluctant to expose them to the public view. How to manage these time series data in an efficient and safe way in ...Show More
The rapid development of virtual network architecture makes it possible for wireless network to be widely used. With the popularity of artificial intelligence (AI) industry in daily life, efficient resource allocation of wireless network has become a problem. Especially when network users request wireless network resources from different management domains, they still face many practical problems....Show More
The traditional Internet has encountered a bottleneck in allocating network resources for emerging technology needs. Network virtualization (NV) technology as a future network architecture, the virtual network embedding (VNE) algorithm it supports shows great potential in solving resource allocation problems. Combined with the efficient machine learning (ML) algorithm, a neural network model close...Show More