scispace - formally typeset
W

Wei Li

Researcher at National University of Defense Technology

Publications -  10
Citations -  48

Wei Li is an academic researcher from National University of Defense Technology. The author has contributed to research in topics: Time division multiple access & Encryption. The author has an hindex of 3, co-authored 10 publications receiving 46 citations.

Papers
More filters
Proceedings ArticleDOI

An Evolutionary-Dynamic TDMA Slot Assignment Protocol for Ad Hoc Networks

TL;DR: The proposed evolutionary-dynamic TDMA slot assignment protocol allows the transmitter to reserve one or more unscheduled slots from the set of unassigned slots in its neighborhood by coordinating the announcement and confirmation with the neighboring nodes up to two hops away.
Proceedings ArticleDOI

Worst-case robust masked beamforming for secure broadcasting

TL;DR: This paper presents a worst-case robust masked beamforming algorithm that recasts the non-convex optimization problem as two semidefinite program (SDP) based subproblems, which are solvable with interior-point methods.
Patent

Three-dimensional constellation-rotating encryption method based on wireless channel characteristics

TL;DR: In this paper, the authors proposed a three-dimensional constellation-rotating encryption method based on the wireless channel characteristics, where the equivalent channel phase is extracted by means of reciprocity of a channel phase response, and a 3D constellation is encrypted by utilizing the extracted equivalent channel phases, so that an eavesdropper cannot demodulate correct bit information, and therefore a safe communication effect can be achieved.
Proceedings ArticleDOI

Full-duplex relay for enhancing physical layer security in Wireless Sensor Networks: Optimal power allocation for minimizing secrecy outage probability

TL;DR: This paper uses a multi-antenna relay to guarantee physical layer security for Wireless Sensor Networks in the presence of passive eavesdroppers, and proposes two optimal power allocation strategies for power constrained and power unconstrained systems respectively.
Proceedings ArticleDOI

An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks

TL;DR: The proposed evolutionary time spread multiple access protocol is based on protocol threading technique and a novel contention schedule with reservation and carrier sense and can control each node to utilize its assigned slots and its non-assigned slots effectively.