scispace - formally typeset
Search or ask a question
Author

Jie Tang

Bio: Jie Tang is an academic researcher from South China University of Technology. The author has contributed to research in topics: MIMO & Optimization problem. The author has an hindex of 30, co-authored 138 publications receiving 3153 citations. Previous affiliations of Jie Tang include University of Manchester & University of Electronic Science and Technology of China.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: A unified framework for a UAV-assisted emergency network is established in disasters by jointly optimized to provide wireless service to ground devices with surviving BSs and multihop UAV relaying to realize information exchange between the disaster areas and outside through optimizing the hovering positions of UAVs.
Abstract: Reliable and flexible emergency communication is a key challenge for search and rescue in the event of disasters, especially for the case when base stations are no longer functioning. Unmanned aerial vehicle (UAV)-assisted networking is emerging as a promising method to establish emergency networks. In this article, a unified framework for a UAV-assisted emergency network is established in disasters. First, the trajectory and scheduling of UAVs are jointly optimized to provide wireless service to ground devices with surviving BSs. Then the transceiver design of UAV and establishment of multihop ground device-to-device communication are studied to extend the wireless coverage of UAV. In addition, multihop UAV relaying is added to realize information exchange between the disaster areas and outside through optimizing the hovering positions of UAVs. Simulation results are presented to show the effectiveness of these three schemes. Finally, open research issues and challenges are discussed.

447 citations

Journal ArticleDOI
TL;DR: In this paper, UAV assisted secure transmission for scalable videos in hyper-dense networks via caching is studied and the feasibility conditions of the proposed scheme are derived, and the secrecy performance is analyzed.
Abstract: Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via wireless backhaul to improve coverage and increase rate. However, the capacity of backhaul is limited. In this paper, UAV assisted secure transmission for scalable videos in hyper-dense networks via caching is studied. In the proposed scheme, UAVs can act as SBSs to provide videos to mobile users in some small cells. To reduce the pressure of wireless backhaul, UAVs and SBSs are both equipped with caches to store videos at off-peak time. To facilitate UAVs, a single antenna is equipped at each UAV and thus, only the precoding matrices of SBSs should be cooperatively designed to manage interference by exploiting the principle of interference alignment. On the other hand, the SBSs replaced by UAVs will be idle. Thus, in order to guarantee secure transmission, the idle SBSs can be further exploited to generate jamming signal to disrupt eavesdropping. The jamming signal is zero-forced at the legitimate users through the precoding of the idle SBSs, without affecting the legitimate transmission. The feasibility conditions of the proposed scheme are derived, and the secrecy performance is analyzed. Finally, simulation results are presented to verify the effectiveness of the proposed scheme.

288 citations

Proceedings ArticleDOI
16 Jan 2012
TL;DR: A consumption scheduling mechanism for home area load management in smart grid using integer linear programming (ILP) technique is proposed to minimise the peak hourly load in order to achieve an optimal (balanced) daily load schedule.
Abstract: We propose a consumption scheduling mechanism for home area load management in smart grid using integer linear programming (ILP) technique. The aim of the proposed scheduling is to minimise the peak hourly load in order to achieve an optimal (balanced) daily load schedule. The proposed mechanism is able to schedule both the optimal power and the optimal operation time for power-shiftable appliances and time-shiftable appliances respectively according to the power consumption patterns of all the individual appliances. Simulation results based on home and neighbourhood area scenarios have been presented to demonstrate the effectiveness of the proposed technique.

282 citations

Journal ArticleDOI
TL;DR: A secrecy enhancing transmit design to minimize the secrecy outage probability (SOP) and the minimum secrecy rate on transmit designs is provided, subject to a minimum requirement on the secrecy rate.
Abstract: Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous connectivity, via massive deployment of physical objects, such as sensors, controllers, and actuators. However, concerns on the IoT security are raised due to the wireless broadcasting nature and the energy constraint of the physical objects. In this paper, we study secure downlink transmission from a controller to an actuator, with the help of a cooperative jammer to fight against multiple passive and noncolluding eavesdroppers. In addition to artificial noise aided secrecy beamforming for secure transmission, cooperative jamming (CJ) is explored to further enhance physical layer security. In particular, we provide a secrecy enhancing transmit design to minimize the secrecy outage probability (SOP), subject to a minimum requirement on the secrecy rate. Based on a strict mathematical analysis, we further characterize the impacts of the main channel quality and the minimum secrecy rate on transmit designs. Numerical results confirm that our design can enhance both security (in terms of SOP) and power efficiency as compared with the approach without CJ.

202 citations

Journal ArticleDOI
TL;DR: A novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling and a benchmark scheme in which the minimum average secrecy rate among all users is maximized and no user has the caching ability.
Abstract: Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which can achieve significant throughput gain owing to its mobility and line-of-sight (LoS) channel with ground nodes. However, such LoS channels make UAV transmission easy to eavesdrop. In this paper, we propose a novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling. For every two users that have cached the required file for the other, the UAV broadcasts the files together to these two users, and the eavesdropping can be disrupted. For the users without caching, we maximize their minimum average secrecy rate by jointly optimizing the trajectory and scheduling, with the secrecy rate of the caching users satisfied. The corresponding optimization problem is difficult to solve due to its non-convexity, and we propose an iterative algorithm via successive convex optimization to solve it approximately. Furthermore, we also consider a benchmark scheme in which we maximize the minimum average secrecy rate among all users by jointly optimizing the UAV trajectory and time scheduling when no user has the caching ability. Simulation results are provided to show the effectiveness and efficiency of our proposed scheme.

187 citations


Cited by
More filters
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI
TL;DR: This paper overviews the current research efforts on smart radio environments, the enabling technologies to realize them in practice, the need of new communication-theoretic models for their analysis and design, and the long-term and open research issues to be solved towards their massive deployment.
Abstract: Future wireless networks are expected to constitute a distributed intelligent wireless communications, sensing, and computing platform, which will have the challenging requirement of interconnecting the physical and digital worlds in a seamless and sustainable manner. Currently, two main factors prevent wireless network operators from building such networks: (1) the lack of control of the wireless environment, whose impact on the radio waves cannot be customized, and (2) the current operation of wireless radios, which consume a lot of power because new signals are generated whenever data has to be transmitted. In this paper, we challenge the usual “more data needs more power and emission of radio waves” status quo, and motivate that future wireless networks necessitate a smart radio environment: a transformative wireless concept, where the environmental objects are coated with artificial thin films of electromagnetic and reconfigurable material (that are referred to as reconfigurable intelligent meta-surfaces), which are capable of sensing the environment and of applying customized transformations to the radio waves. Smart radio environments have the potential to provide future wireless networks with uninterrupted wireless connectivity, and with the capability of transmitting data without generating new signals but recycling existing radio waves. We will discuss, in particular, two major types of reconfigurable intelligent meta-surfaces applied to wireless networks. The first type of meta-surfaces will be embedded into, e.g., walls, and will be directly controlled by the wireless network operators via a software controller in order to shape the radio waves for, e.g., improving the network coverage. The second type of meta-surfaces will be embedded into objects, e.g., smart t-shirts with sensors for health monitoring, and will backscatter the radio waves generated by cellular base stations in order to report their sensed data to mobile phones. These functionalities will enable wireless network operators to offer new services without the emission of additional radio waves, but by recycling those already existing for other purposes. This paper overviews the current research efforts on smart radio environments, the enabling technologies to realize them in practice, the need of new communication-theoretic models for their analysis and design, and the long-term and open research issues to be solved towards their massive deployment. In a nutshell, this paper is focused on discussing how the availability of reconfigurable intelligent meta-surfaces will allow wireless network operators to redesign common and well-known network communication paradigms.

1,504 citations

Journal ArticleDOI
TL;DR: In this article, a comprehensive tutorial on the potential benefits and applications of UAVs in wireless communications is presented, and the important challenges and the fundamental tradeoffs in UAV-enabled wireless networks are thoroughly investigated.
Abstract: The use of flying platforms such as unmanned aerial vehicles (UAVs), popularly known as drones, is rapidly growing. In particular, with their inherent attributes such as mobility, flexibility, and adaptive altitude, UAVs admit several key potential applications in wireless systems. On the one hand, UAVs can be used as aerial base stations to enhance coverage, capacity, reliability, and energy efficiency of wireless networks. On the other hand, UAVs can operate as flying mobile terminals within a cellular network. Such cellular-connected UAVs can enable several applications ranging from real-time video streaming to item delivery. In this paper, a comprehensive tutorial on the potential benefits and applications of UAVs in wireless communications is presented. Moreover, the important challenges and the fundamental tradeoffs in UAV-enabled wireless networks are thoroughly investigated. In particular, the key UAV challenges such as 3D deployment, performance analysis, channel modeling, and energy efficiency are explored along with representative results. Then, open problems and potential research directions pertaining to UAV communications are introduced. Finally, various analytical frameworks and mathematical tools, such as optimization theory, machine learning, stochastic geometry, transport theory, and game theory are described. The use of such tools for addressing unique UAV problems is also presented. In a nutshell, this tutorial provides key guidelines on how to analyze, optimize, and design UAV-based wireless communication systems.

1,395 citations

Posted Content
TL;DR: This tutorial provides key guidelines on how to analyze, optimize, and design UAV-based wireless communication systems on the basis of 3D deployment, performance analysis, channel modeling, and energy efficiency.
Abstract: The use of flying platforms such as unmanned aerial vehicles (UAVs), popularly known as drones, is rapidly growing. In particular, with their inherent attributes such as mobility, flexibility, and adaptive altitude, UAVs admit several key potential applications in wireless systems. On the one hand, UAVs can be used as aerial base stations to enhance coverage, capacity, reliability, and energy efficiency of wireless networks. On the other hand, UAVs can operate as flying mobile terminals within a cellular network. Such cellular-connected UAVs can enable several applications ranging from real-time video streaming to item delivery. In this paper, a comprehensive tutorial on the potential benefits and applications of UAVs in wireless communications is presented. Moreover, the important challenges and the fundamental tradeoffs in UAV-enabled wireless networks are thoroughly investigated. In particular, the key UAV challenges such as three-dimensional deployment, performance analysis, channel modeling, and energy efficiency are explored along with representative results. Then, open problems and potential research directions pertaining to UAV communications are introduced. Finally, various analytical frameworks and mathematical tools such as optimization theory, machine learning, stochastic geometry, transport theory, and game theory are described. The use of such tools for addressing unique UAV problems is also presented. In a nutshell, this tutorial provides key guidelines on how to analyze, optimize, and design UAV-based wireless communication systems.

1,071 citations

Journal ArticleDOI
TL;DR: The current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in5G IoT are reviewed.

992 citations