scispace - formally typeset
Search or ask a question
Author

Xiaotao Feng

Bio: Xiaotao Feng is an academic researcher from University of California, Davis. The author has contributed to research in topics: Orthogonal frequency-division multiplexing & Spread spectrum. The author has an hindex of 9, co-authored 18 publications receiving 1241 citations. Previous affiliations of Xiaotao Feng include University of California & Peking University.

Papers
More filters
Journal ArticleDOI
TL;DR: This survey provides a technology overview and review of existing literature of visible light communication and sensing and outlines important challenges that need to be addressed in order to design high-speed mobile networks using visible light Communication-VLC.
Abstract: The solid-state lighting is revolutionizing the indoor illumination. Current incandescent and fluorescent lamps are being replaced by the LEDs at a rapid pace. Apart from extremely high energy efficiency, the LEDs have other advantages such as longer lifespan, lower heat generation, and improved color rendering without using harmful chemicals. One additional benefit of LEDs is that they are capable of switching to different light intensity at a very fast rate. This functionality has given rise to a novel communication technology (known as visible light communication—VLC) where LED luminaires can be used for high speed data transfer. This survey provides a technology overview and review of existing literature of visible light communication and sensing. This paper provides a detailed survey of 1) visible light communication system and characteristics of its various components such as transmitter and receiver; 2) physical layer properties of visible light communication channel, modulation methods, and MIMO techniques; 3) medium access techniques; 4) system design and programmable platforms; and 5) visible light sensing and application such as indoor localization, gesture recognition, screen-camera communication, and vehicular networking. We also outline important challenges that need to be addressed in order to design high-speed mobile networks using visible light communication.

1,208 citations

Journal ArticleDOI
TL;DR: This paper designs the functionalities in the control plane to facilitate multidomain tasks, and proposes an interdomain protocol to enable OpenFlow controllers in different SD-EON domains to operate cooperatively for multidOMain routing and spectrum assignment.
Abstract: The combination of elastic optical networks (EONs) and software-defined networking (SDN) leads to SD-EONs, which bring a new opportunity for enhancing programmability and flexibility of optical networks with more freedom for network operators to customize their infrastructure dynamically. In this paper, we investigate how to apply multidomain scenarios to SD-EONs. We design the functionalities in the control plane to facilitate multidomain tasks, and propose an interdomain protocol to enable OpenFlow controllers in different SD-EON domains to operate cooperatively for multidomain routing and spectrum assignment. The proposed system is implemented and experimentally demonstrated in a multinational SD-EON control plane testbed that consists of two geographically distributed domains located in China and USA, respectively. Experimental results indicate that the proposed system performs well for resource allocation across multiple SD-EON domains.

112 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: ColorBars is presented, an LED-to-camera communication system that utilizes Color Shift Keying (CSK) to modulate data using different colors transmitted by the LED, which exploits the increasing popularity of Tri-LEDs (RGB) that can emit a wide range of colors.
Abstract: LED-to-camera communication allows LEDs deployed for illumination purposes to modulate and transmit data which can be received by camera sensors available in mobile devices like smartphones, wearable smart-glasses etc. Such communication has a unique property that a user can visually identify a transmitter (i.e. LED) and specifically receive information from the transmitter. It can support a variety of novel applications such as augmented reality through mobile devices, navigation using smart signs, fine-grained location specific advertisement etc. However, the achievable data rate in current LED-to-camera communication techniques remains very low (a 12 bytes per second) to support any practical application. In this paper, we present ColorBars, an LED-to-camera communication system that utilizes Color Shift Keying (CSK) to modulate data using different colors transmitted by the LED. It exploits the increasing popularity of Tri-LEDs (RGB) that can emit a wide range of colors. We show that commodity cameras can efficiently and accurately demodulate the color symbols. ColorBars ensures flicker-free and reliable communication even in the presence of inter-frame loss and diversity of rolling shutter cameras. We implement ColorBars on embedded platform and evaluate it with Android and iOS smartphones as receivers. Our evaluation shows that ColorBars can achieve a data rate of 5.2 Kbps on Nexus 5 and 2.5 Kbps on iPhone 5S, which is significantly higher than previous approaches. It is also shown that lower CSK modulations (e.g. 4 and 8 CSK) provide extremely low symbol error rates (

85 citations

Proceedings ArticleDOI
17 Dec 2015
TL;DR: This paper proposes the first three-player attacker-defender-insider game to model the strategic interactions among the three parties and describes the subgame perfect equilibria of the game with the defender as the leader and the attacker and the insider as the followers, under two different information trading processes.
Abstract: Advanced persistent threat (APT) is becoming a major threat to cyber security. As APT attacks are often launched by well funded entities that are persistent and stealthy in achieving their goals, they are highly challenging to combat in a cost-effective way. The situation becomes even worse when a sophisticated attacker is further assisted by an insider with privileged access to the inside information. Although stealthy attacks and insider threats have been considered separately in previous works, the coupling of the two is not well understood. As both types of threats are incentive driven, game theory provides a proper tool to understand the fundamental tradeoffs involved. In this paper, we propose the first three-player attacker-defender-insider game to model the strategic interactions among the three parties. Our game extends the two-player FlipIt game model for stealthy takeover by introducing an insider that can trade information to the attacker for a profit. We characterize the subgame perfect equilibria of the game with the defender as the leader and the attacker and the insider as the followers, under two different information trading processes. We make various observations and discuss approaches for achieving more efficient defense in the face of both APT and insider threats.

39 citations

Proceedings ArticleDOI
01 May 2017
TL;DR: This paper considers that the defender adopts a MTD strategy to protect a critical resource across a network of nodes, and proposes a Bayesian Stackelberg game model with the defender as the leader and the attacker as the follower.
Abstract: Incentive-driven advanced attacks have become a major concern to cyber-security. Traditional defense techniques that adopt a passive and static approach by assuming a fixed attack type are insufficient in the face of highly adaptive and stealthy attacks. In particular, a passive defense approach often creates information asymmetry where the attacker knows more about the defender. To this end, moving target defense (MTD) has emerged as a promising way to reverse this information asymmetry. The main idea of MTD is to (continuously) change certain aspects of the system under control to increase the attacker's uncertainty, which in turn increases attack cost/complexity and reduces the chance of a successful exploit in a given amount of time. In this paper, we go one step beyond and show that MTD can be further improved when combined with information disclosure. In particular, we consider that the defender adopts a MTD strategy to protect a critical resource across a network of nodes, and propose a Bayesian Stackelberg game model with the defender as the leader and the attacker as the follower. After fully characterizing the defender's optimal migration strategies, we show that the defender can design a signaling scheme to exploit the uncertainty created by MTD to further affect the attacker's behavior for its own advantage. We obtain conditions under which signaling is useful, and show that strategic information disclosure can be a promising way to further reverse the information asymmetry and achieve more efficient active defense.

35 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This article presents a large-dimensional and autonomous network architecture that integrates space, air, ground, and underwater networks to provide ubiquitous and unlimited wireless connectivity and identifies several promising technologies for the 6G ecosystem.
Abstract: A key enabler for the intelligent information society of 2030, 6G networks are expected to provide performance superior to 5G and satisfy emerging services and applications. In this article, we present our vision of what 6G will be and describe usage scenarios and requirements for multi-terabyte per second (Tb/s) and intelligent 6G networks. We present a large-dimensional and autonomous network architecture that integrates space, air, ground, and underwater networks to provide ubiquitous and unlimited wireless connectivity. We also discuss artificial intelligence (AI) and machine learning [1], [2] for autonomous networks and innovative air-interface design. Finally, we identify several promising technologies for the 6G ecosystem, including terahertz (THz) communications, very-large-scale antenna arrays [i.e., supermassive (SM) multiple-input, multiple-output (MIMO)], large intelligent surfaces (LISs) and holographic beamforming (HBF), orbital angular momentum (OAM) multiplexing, laser and visible-light communications (VLC), blockchain-based spectrum sharing, quantum communications and computing, molecular communications, and the Internet of Nano-Things.

1,332 citations

Journal ArticleDOI
TL;DR: In this paper, the authors provide a full-stack, system-level perspective on 6G scenarios and requirements, and select 6G technologies that can satisfy them either by improving the 5G design or by introducing completely new communication paradigms.
Abstract: Reliable data connectivity is vital for the ever increasingly intelligent, automated, and ubiquitous digital world. Mobile networks are the data highways and, in a fully connected, intelligent digital world, will need to connect everything, including people to vehicles, sensors, data, cloud resources, and even robotic agents. Fifth generation (5G) wireless networks, which are currently being deployed, offer significant advances beyond LTE, but may be unable to meet the full connectivity demands of the future digital society. Therefore, this article discusses technologies that will evolve wireless networks toward a sixth generation (6G) and which we consider as enablers for several potential 6G use cases. We provide a fullstack, system-level perspective on 6G scenarios and requirements, and select 6G technologies that can satisfy them either by improving the 5G design or by introducing completely new communication paradigms.

863 citations

Journal ArticleDOI
TL;DR: This work reviews the recent status of methodologies and techniques related to the construction of digital twins mostly from a modeling perspective to provide a detailed coverage of the current challenges and enabling technologies along with recommendations and reflections for various stakeholders.
Abstract: Digital twin can be defined as a virtual representation of a physical asset enabled through data and simulators for real-time prediction, optimization, monitoring, controlling, and improved decision making. Recent advances in computational pipelines, multiphysics solvers, artificial intelligence, big data cybernetics, data processing and management tools bring the promise of digital twins and their impact on society closer to reality. Digital twinning is now an important and emerging trend in many applications. Also referred to as a computational megamodel, device shadow, mirrored system, avatar or a synchronized virtual prototype, there can be no doubt that a digital twin plays a transformative role not only in how we design and operate cyber-physical intelligent systems, but also in how we advance the modularity of multi-disciplinary systems to tackle fundamental barriers not addressed by the current, evolutionary modeling practices. In this work, we review the recent status of methodologies and techniques related to the construction of digital twins mostly from a modeling perspective. Our aim is to provide a detailed coverage of the current challenges and enabling technologies along with recommendations and reflections for various stakeholders.

660 citations

Journal ArticleDOI
TL;DR: The analysis shows that augmenting off-board information to sensory information has potential to design low-cost localization systems with high accuracy and robustness, however, their performance depends on penetration rate of nearby connected vehicles or infrastructure and the quality of network service.
Abstract: For an autonomous vehicle to operate safely and effectively, an accurate and robust localization system is essential. While there are a variety of vehicle localization techniques in literature, there is a lack of effort in comparing these techniques and identifying their potentials and limitations for autonomous vehicle applications. Hence, this paper evaluates the state-of-the-art vehicle localization techniques and investigates their applicability on autonomous vehicles. The analysis starts with discussing the techniques which merely use the information obtained from on-board vehicle sensors. It is shown that although some techniques can achieve the accuracy required for autonomous driving but suffer from the high cost of the sensors and also sensor performance limitations in different driving scenarios (e.g., cornering and intersections) and different environmental conditions (e.g., darkness and snow). This paper continues the analysis with considering the techniques which benefit from off-board information obtained from V2X communication channels, in addition to vehicle sensory information. The analysis shows that augmenting off-board information to sensory information has potential to design low-cost localization systems with high accuracy and robustness, however, their performance depends on penetration rate of nearby connected vehicles or infrastructure and the quality of network service.

570 citations

Book ChapterDOI
01 Jan 2004
TL;DR: This chapter contains sections titled: Introduction Overview of Multicarrier CDMA Systems Channel Model Performance of MC-CDMA System Performance of Overlapping MulticARrier DS-CDma Systems Performance of MultICarrier DS/MC systems Performance of AMC systems performance of SFH/MC DS/CDMA systems.
Abstract: This chapter contains sections titled: Introduction Overview of Multicarrier CDMA Systems Channel Model Performance of MC-CDMA System Performance of Overlapping Multicarrier DS-CDMA Systems Performance of Multicarrier DS-CDMA-I Systems Performance of AMC DS-CDMA Systems Performance of SFH/MC DS-CDMA Systems Chapter Summary and Conclusion ]]>

511 citations