Loading [MathJax]/extensions/MathMenu.js
Yichen Wang - IEEE Xplore Author Profile

Showing 1-25 of 104 results

Filter Results

Show

Results

Most convolutional neural network (CNN)-based lightweight semantic communication (SemCom) schemes mainly focus on reducing the number of regular convolutional modules to reduce the semantic encoder (SemEnc) complexity. However, this approach has limited ability to reduce the SemEnc complexity and weakens the representational capacity. To solve these issues, this letter proposes a ghost CNN (GCNN)-...Show More
In the upcoming sixth generation (6G) era, dynamic routing relying on link state information update is crucial for global data service in large-scale low-earth orbit (LEO) satellite networks. However, the existing dynamic routing methods use a static link state update scheme where all satellites distribute their link state information with the same fixed period, while the link state of the satelli...Show More
Downlink channel state information (CSI) feedback typically results in an unacceptable overhead in frequencydivision-duplex (FDD) massive multiple-input multiple-output (MIMO) systems. To deal with this challenge, several deep learning (DL) based CSI compression and recovery approaches have been developed, which follow an auto-encoder architecture and aim at minimizing CSI reconstruction error. Di...Show More
The multi-access edge computing (MEC)-enabled low Earth orbit (LEO) satellite network is a promising approach to meet the growing ubiquitous diverse computation demands around the world. In this paper, a joint task offloading and resource allocation strategy is proposed for hybrid MEC-enabled LEO satellite networks, where two types of MEC tasks, namely delay-sensitive edgy-cloud task and data-and ...Show More
Millimeter-wave (mmWave) grant-free (GF) access is a promising approach for massive machine-type communication (mMTC) networks to improve the access efficiency and alleviate the shortage of spectrum resources. Due to the lack of authentication, mmWave GF-mMTC networks are vulnerable to the pilot contamination attack (PCA), which can cause severe performance degradation of the channel estimation (C...Show More
To integrate efficiently the emerging massive machine-type communications (mMTC) into the fifth generation (5G) and beyond 5G (B5G) cellular networks, we design a two-hop data aggregation and forwarding mechanism for the machine-type communications (MTC) to coexist with the traditional human-to-human (H2H) communications. Specifically, by sharing the channel resources originally allocated to H2H u...Show More
Due to the lack of authentication, millimeter-wave (mmWave) grant-free massive machine-type communication (GFmMTC) networks are vulnerable to the pilot contamination attack (PCA), which will cause serious performance degradation of channel estimation (CE) and active user detection (AUD). However, the existing works towards the PCA detection in the mmWave GFmMTC networks perform the CE, AUD, and PC...Show More
Beam Hopping (BH) is a promising approach to support the dynamically varied and non-uniformly distributed ground traffic demands with limited satellite beam resources. However, almost all the existing BH schemes only focus on the overall cell-level traffic demands without considering the transmission demand of each user, which may degrade the system performance. To address this issue, in this pape...Show More
In this paper, we propose an adaptive semantic and bit communication framework for image transmission, where each user is allowed to select either semantic communication (SemCom) or bit communication (BitCom) mode. As no closed-form expression for the peak mean square error (PMSE) that is a key parameter to characterize the difference between original and corresponding recovered images exists, we ...Show More
Physical layer authentication (PLA) is considered as a promising method to resist spoofing attacks, where the stochastic features of wireless channels are used to detect attackers. Most of the existing PLA schemes assume that the prior information of attackers is known by the receiver, which might not be realized in realistic networks. To address this issue, we propose a deep deterministic policy ...Show More
With the rapidly increasing number of satellites, the handover scheme design is critically important for the low Earth orbit (LEO) satellite networks, especially for the mega-constellations that include massive number of LEO satellites. However, the existing handover schemes for LEO satellite networks are designed based on the static propagation conditions, which cannot satisfy the dynamic feature...Show More
The fifth-generation (5G) and beyond networks are expected to accommodate both the original human-to-human (H2H) communication and the emerging massive machine-type communication (mMTC). To enable a harmonious coexistence between the two different types of services, we propose a resource-efficient mMTC/H2H coexistence scheme by jointly considering the random access (RA) and data transmission, wher...Show More
This paper considers the problem of covert communication threatened by jamming attacks. The transmitter (T) randomly selects a portion of the available channels to transmit uplink signals. The receiver (R) uses maximal-ratio combining to receive the uplink signals. Warden (W) detects the uplink signals in each channel by solving ternary hypothesis testing and jams the channel according to the dete...Show More
To satisfy the highly heterogeneous requirements of Internet of Things applications for the sixth-generation (6G) networks, the machine-type communication (MTC) aims to support multiple types of services having diverse traffic demands, which will cause significant challenges in the grant-free based channel estimation (CE) and multi-user detection (MUD) scheme design for massive MTC (mMTC) networks...Show More
In this paper, we consider the signal detection problem for practical communication systems where the transmission suffers from non-idealities effects such as I/Q imbalance, non-Gaussian noise, and amplifier nonlinearity. In this context, traditional model-based receiver algorithms are not applicable because the exact model for the end- to-end channel is unavailable. To deal with this challenge, a...Show More
Security is a critical issue for multi-beam low earth orbit satellite constellations (MLLSCs). To secure the downlink transmission while considering the varying beam resources and limited on-board resource of the system, we propose a dynamic beam assignment-based secure beamforming scheme for the MLLSC. Specifically, we formulate an optimization problem to minimize the total transmit power of the ...Show More
Low earth orbit (LEO) satellite based multi-access edge computing is an efficient approach to meet the ever-increasing computation demands in extensive coverage. More-over, two kinds of tasks, namely edgy-cloud task and cloudy-edge task, are developed for distinct edge computing applications. In this paper, a joint task offloading and computation resource allocation strategy is proposed for the hy...Show More
With the rapid increasing number of the deployed satellites, the handover strategy becomes more challenging for large-scale low-earth orbit (LEO) constellations. In this paper, a distributed satellite handover scheme for large-scale LEO constellations is proposed, which not only takes the handover delay, handover failure, quality-of-service (QoS) requirements of users, and inter-satellite traffic ...Show More
Existing studies on pilot contamination attacks often assume that the enemy has not made any strategic corrections to the detection plan. In this paper, we assume that the intelligent malicious user can obtain legitimate users’ pilot sequence and power in a timely and accurate manner. Based on the acquired pilot information, the attacker adjusts the pilot contamination attack strategy during the r...Show More
The diverse time-varying transmission demands cause significant challenges in the grant-free based multi-user detection (MUD) scheme design for massive machine-type communications (mMTC) networks. In this paper, we develop a multistate Markov model to characterize the diverse time-varying traffic demands, where the temporal correlation of the user activity and the data length diversity are conside...Show More
In order to meet the new challenges put forward by the emerging Fifth-Generation (5G) wireless systems, the coexistence of ultra-reliable and low-latency communication (URLLC) and enhanced Mobile Broadband (eMBB) is of vital importance. Specifically speaking, URLLC is aimed at mission-critical applications whose latency and reliability requirements are extremely stringent, while eMBB's target is t...Show More
Massive machine-type communications (mMTC) is one of the three generic services for the fifth-generation (5G) wireless communications system. To utilize fully the high rate transmission feature of the 5G system to support massive MTC devices (MTCDs), we propose a group-based random access and data transmission scheme, where the data packets of MTCDs are first aggregated by the MTC gateways (MTCGs)...Show More
As device-to-device (D2D) caching technology allows a number of devices to cache some particular contents, requesters can obtain these contents directly from these neighbor devices rather than the base station (BS) and thus the burden can be efficiently reduced. However, the required time consumptions for caching contents, which may significantly affect the network delay performance, are ignored i...Show More
To accommodate massive machine-type communication (mMTC) in the networks originally designed for human-to-human (H2H) communication, we investigate the resource allocation for the mMTC/H2H coexisting network where the conventional random access (RA) and data transmission procedures are tailored for mMTC. The resource allocation strategy jointly consider the resource allocation of physical random a...Show More
Machine-type communications (MTC) technology, which enables direct communications among devices, plays an important role in realizing Internet-of-Things. However, a large number of MTC devices can cause severe collisions. As a result, the network throughput is decreased and the access delay is increased. To address this issue, a throughput-oriented non-orthogonal random access (NORA) scheme is pro...Show More