J
Jie Tang
Researcher at South China University of Technology
Publications - 138
Citations - 4974
Jie Tang is an academic researcher from South China University of Technology. The author has contributed to research in topics: MIMO & Optimization problem. The author has an hindex of 30, co-authored 138 publications receiving 3153 citations. Previous affiliations of Jie Tang include University of Manchester & University of Electronic Science and Technology of China.
Papers
More filters
Journal ArticleDOI
UAV-Assisted Emergency Networks in Disasters
TL;DR: A unified framework for a UAV-assisted emergency network is established in disasters by jointly optimized to provide wireless service to ground devices with surviving BSs and multihop UAV relaying to realize information exchange between the disaster areas and outside through optimizing the hovering positions of UAVs.
Journal ArticleDOI
Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment
TL;DR: In this paper, UAV assisted secure transmission for scalable videos in hyper-dense networks via caching is studied and the feasibility conditions of the proposed scheme are derived, and the secrecy performance is analyzed.
Proceedings ArticleDOI
An integer linear programming based optimization for home demand-side management in smart grid
TL;DR: A consumption scheduling mechanism for home area load management in smart grid using integer linear programming (ILP) technique is proposed to minimise the peak hourly load in order to achieve an optimal (balanced) daily load schedule.
Journal ArticleDOI
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things
TL;DR: A secrecy enhancing transmit design to minimize the secrecy outage probability (SOP) and the minimum secrecy rate on transmit designs is provided, subject to a minimum requirement on the secrecy rate.
Journal ArticleDOI
UAV-Relaying-Assisted Secure Transmission With Caching
TL;DR: A novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling and a benchmark scheme in which the minimum average secrecy rate among all users is maximized and no user has the caching ability.