Bin Li - IEEE Xplore Author Profile

Showing 1-25 of 186 results

Filter Results

Show

Results

The rotatable reconfigurable intelligent surface (RIS) can enhance mobile edge computing (MEC) performance by optimizing its orientation to improve the gain of received and transmitted signals. This correspondence investigates a rotatable RIS-assisted MEC system, aimed at minimizing energy consumption for multiple moving user equipment (UEs) through the joint design of RIS orientation, discrete ph...Show More
In recent years, vehicular communications have attached great interests in both academy and industry for its potential of promoting safety and autonomous driving. Unlike classical communication scenarios, in vehicular communications the optimal resource allocation must be accomplished in a real-time manner, in order to maximally reduce the response delay. This presents a substantial challenge for ...Show More
The emerging field of graph learning, which aims to learn reasonable graph structures from data, plays a vital role in Graph Signal Processing (GSP) and finds applications in various data processing domains. However, the existing approaches have primarily focused on learning deterministic graphs, and thus are not suitable for applications involving topological stochasticity, such as epidemiologica...Show More
The synchronization of digital twins (DT) serves as the cornerstone for effective operation of the DT framework. However, the limitations of channel capacity can greatly affect the data transmission efficiency of wireless communication. Unlike traditional communication methods, semantic communication transmits the intended meanings of physical objects instead of raw data, effectively saving bandwi...Show More
rgb0,0,0For an unmanned aerial vehicle (UAV)-aided energy-harvesting non-orthogonal multiple access (EH-NOMA) network, where an untrusted far user (UFU) overhears the confidential transmissions from base station (BS) to the trusted near user (TNU), how to ensure the security of TNU and achieve the reliability of UFU becomes an open issue. The traditional artificial noise (TAN) scheme just guarante...Show More
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) can expand the coverage of mobile edge computing (MEC) services by reflecting and transmitting signals simultaneously, enabling full-space coverage. The orientation of the STAR-RIS plays a crucial role in optimizing the gain of received and transmitted signals, and a rotatable STAR-RIS offers potential enhance...Show More
This paper investigates the physical layer security (PLS) of a satellite-terrestrial integrated network (STIN) consisting of a satellite (S), a destination (D), and several friendly jammers in the presence of an eavesdropper (E). For improving PLS of the STIN, we propose three friendly jammer assisted communication schemes to help S securely send confidential information to D, i.e., the random jam...Show More
Data compression technology is able to reduce data size, which can be applied to lower the cost of task offloading in mobile edge computing (MEC). This paper addresses the practical challenges for robust trajectory and scheduling optimization based on data compression in the uncrewed aerial vehicle (UAV)-assisted MEC, aiming to minimize the sum energy cost of terminal users while maintaining robus...Show More
Traditional video transmission systems assisted by multiple Unmanned Aerial Vehicles (UAVs) are often limited by computing resources, making it challenging to meet the demands for efficient video processing. To solve this challenge, this paper presents a multi-UAV-assisted Device-to-Device (D2D) mobile edge computing system for the maximization of task offloading profits in video stream transmissi...Show More
In this paper, we propose a multi-unmanned aerial vehicle (UAV)-assisted integrated sensing, communication, and computation network. Specifically, the treble-functional UAVs are capable of offering communication and edge computing services to mobile users (MUs) in proximity, alongside their target sensing capabilities by using multi-input multi-output arrays. For the purpose of enhance the computa...Show More
Mutual interference has been a critical issue in multiple unmanned aerial vehicles (multi-UAV) networks. As an advanced technology, digital twin (DT) maps physical entities into virtual domain, enables real-time monitoring and dynamic updates, thereby enhancing the adaptability and performance of multi-UAV networks. In this letter, we investigate joint spectrum allocation and power control for a m...Show More
In this paper, we consider deploying multiple Unmanned Aerial Vehicles (UAVs) to enhance the computation service of Mobile Edge Computing (MEC) through collaborative computation among UAVs. In particular, the tasks of different types and service requirements in MEC network are offloaded from one UAV to another. To pursue the goal of low-carbon edge computing, we study the problem of minimizing sys...Show More
Forthcoming 6G networks have two predominant features of wide coverage and sufficient computation capability. To support the promising applications, Integrated Sensing, Communication, and Computation (ISCC) has been considered as a vital enabler by completing the computation of raw data to achieve accurate environmental sensing. To help the ISCC networks better support the comprehensive services o...Show More
Radar-based gesture recognition combined machine learning methods can achieve excellent performance and has been utilized in a wide variety of applications. However, large-scale radar signal processing suffers from the risk of privacy leakage and the problem of limited computing resources. In this article, we propose a federated learning (FL) framework based on the spiking neural network (SNN) to ...Show More
In this article, we study a hybrid satellite-terrestrial uplink system (HSTUS), where a terrestrial source transmits its messages to a geostationary Earth orbit satellite aided by multiple relays in the presence of co-channel interference (CCI) and an eavesdropper. To enhance the security-reliability tradeoff (SRT) performance of the HSTUS, we propose two relay selection schemes by considering the...Show More
In this article, we analyze the security and reliability tradeoff (SRT) performance of a unmanned aerial vehicle (UAV) relays assisted cognitive network consisting of a cognitive source (S), multiple cognitive UAV relays (Rs), a cognitive destination (D) in the face of an eavesdropper (E). We consider a practical scenario where mutual interference exists between the primary users and cognitive use...Show More
The deployment of mobile edge computing services in LEO satellite networks achieves seamless coverage of computing services. However, the time-varying wireless channel conditions between satellite–terrestrial channels and the random arrival characteristics of ground users’ (GUs) tasks bring new challenges for managing the LEO satellite’s communication and computing resources. Facing these challeng...Show More
For multiple unmanned-aerial-vehicles (UAVs)-assisted mobile-edge computing (MEC) networks, we study the problem of combined computation and communication for user equipments deployed with multitype tasks. Specifically, we consider that the MEC network encompasses both communication and computation uncertainties, where the partial channel state information and the inaccurate estimation of task com...Show More
Reconfigurable intelligent surface (RIS) is a promising technology for wireless communication systems. In order to design the beam from RIS to users, the users’ positions are usually adopted to calculate the angle of departure (AoD) and angle of arrival (AoA) information. The users’ positions from GPS or other localization system may not be accurate, thus degrades the performance of RIS-aided comm...Show More
Implementing integrated sensing and communication (ISAC) technique to construct perceptive mobile network (PMN) in existing communication networks has become a research hotspot. In this paper, we investigate the issue of cooperative ISAC (Co-ISAC) of multiple base stations (BSs). To avoid the impact of inter-cell interference (ICI) on CoISAC in joint transmission, the orthogonal frequency division...Show More
In this article, we investigate the physical layer security for a wireless communication system consisting of a base station (BS) and a user (U) in the face of an eavesdropper (E). A friendly jammer is opportunistically selected from multiple jammers to create intentional interference upon E. However, the legitimate user U is not aware of the information transmitted by the jammer and thus cannot r...Show More
In this paper, we study a digital twin (DT)-empowered integrated sensing, communication, and computation network. Specifically, the users perform radar sensing and computation offloading on the same spectrum, while unmanned aerial vehicles (UAVs) are deployed to provide edge computing service. We first formulate a multi-objective optimization problem to minimize the beampattern performance of mult...Show More
We investigate physical-layer security for a multiuser underlay cognitive system with hardware impairments (HIs) and channel estimation errors (CEEs), which comprises multiple cognitive users (CUs), a cognitive base station (CBS), and an eavesdropper (E). Considering the quality-of-service of primary transmissions, the cognitive transmit power is limited by interference threshold at the primary re...Show More
Recently, image crowdsourcing, a new trading mode, has been proposed to bridge the gap between the excess photos generated by intelligent devices and the great demand for images. However, traditional crowdsourcing methods often rely on centralized platforms, which risk data leakage and a single point of failure (SPOF). Moreover, due to the subjectivity of image quality assessment and the complexit...Show More
In the article, we investigate the coordination process of sensing and computation offloading in a reconfigurable intelligent surface (RIS)-aided base station (BS)-centric symbiotic radio (SR) systems. Specifically, the Internet-of-Things (IoT) devices first sense data from environment and then tackle the data locally or offload the data to BS for remote computing, while RISs are leveraged to enha...Show More