scispace - formally typeset
Search or ask a question
Author

Yongpeng Wu

Bio: Yongpeng Wu is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: MIMO & Precoding. The author has an hindex of 35, co-authored 210 publications receiving 4312 citations. Previous affiliations of Yongpeng Wu include Southeast University & Technische Universität München.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Abstract: Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution toward 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.

580 citations

Journal ArticleDOI
TL;DR: In this paper, a UAV-enabled MEC wireless powered system is investigated under both partial and binary computation offloading modes, subject to the energy harvesting causal constraint and the UAV's speed constraint.
Abstract: Mobile-edge computing (MEC) and wireless power transfer are two promising techniques to enhance the computation capability and to prolong the operational time of low-power wireless devices that are ubiquitous in Internet of Things. However, the computation performance and the harvested energy are significantly impacted by the severe propagation loss. In order to address this issue, an unmanned aerial vehicle (UAV)-enabled MEC wireless-powered system is studied in this paper. The computation rate maximization problems in a UAV-enabled MEC wireless powered system are investigated under both partial and binary computation offloading modes, subject to the energy-harvesting causal constraint and the UAV’s speed constraint. These problems are non-convex and challenging to solve. A two-stage algorithm and a three-stage alternative algorithm are, respectively, proposed for solving the formulated problems. The closed-form expressions for the optimal central processing unit frequencies, user offloading time, and user transmit power are derived. The optimal selection scheme on whether users choose to locally compute or offload computation tasks is proposed for the binary computation offloading mode. Simulation results show that our proposed resource allocation schemes outperform other benchmark schemes. The results also demonstrate that the proposed schemes converge fast and have low computational complexity.

496 citations

Posted Content
TL;DR: Simulation results show that the proposed resource allocation schemes outperform other benchmark schemes and converge fast and have low computational complexity.
Abstract: Mobile edge computing (MEC) and wireless power transfer (WPT) are two promising techniques to enhance the computation capability and to prolong the operational time of low-power wireless devices that are ubiquitous in Internet of Things. However, the computation performance and the harvested energy are significantly impacted by the severe propagation loss. In order to address this issue, an unmanned aerial vehicle (UAV)-enabled MEC wireless powered system is studied in this paper. The computation rate maximization problems in a UAV-enabled MEC wireless powered system are investigated under both partial and binary computation offloading modes, subject to the energy harvesting causal constraint and the UAV's speed constraint. These problems are non-convex and challenging to solve. A two-stage algorithm and a three-stage alternative algorithm are respectively proposed for solving the formulated problems. The closed-form expressions for the optimal central processing unit frequencies, user offloading time, and user transmit power are derived. The optimal selection scheme on whether users choose to locally compute or offload computation tasks is proposed for the binary computation offloading mode. Simulation results show that our proposed resource allocation schemes outperforms other benchmark schemes. The results also demonstrate that the proposed schemes converge fast and have low computational complexity.

379 citations

Journal ArticleDOI
TL;DR: This paper considers a time-division duplex system where uplink training is required and an active eavesdropper can attack the training phase to cause pilot contamination at the transmitter, and derives an asymptotic achievable secrecy rate when the number of transmit antennas approaches infinity.
Abstract: In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-user massive multiple-input multiple-output systems with a multi-antenna active eavesdropper. We consider a time-division duplex system where uplink training is required and an active eavesdropper can attack the training phase to cause pilot contamination at the transmitter. This forces the precoder used in the subsequent downlink transmission phase to implicitly beamform toward the eavesdropper, thus increasing its received signal power. Assuming matched filter precoding and artificial noise (AN) generation at the transmitter, we derive an asymptotic achievable secrecy rate when the number of transmit antennas approaches infinity. For the case of a single-antenna active eavesdropper, we obtain a closed-form expression for the optimal power allocation policy for the transmit signal and the AN, and find the minimum transmit power required to ensure reliable secure communication. Furthermore, we show that the transmit antenna correlation diversity of the intended users and the eavesdropper can be exploited in order to improve the secrecy rate. In fact, under certain orthogonality conditions of the channel covariance matrices, the secrecy rate loss introduced by the eavesdropper can be completely mitigated.

272 citations

Journal ArticleDOI
TL;DR: An adaptive access scheme is proposed, which adapts the access latency to guarantee reliable massive access for practical systems with unknown channel sparsity level and the state evolution of the proposed GMMV-AMP algorithm is derived to predict its performance.
Abstract: This paper considers massive access in massive multiple-input multiple-output (MIMO) systems and proposes an adaptive active user detection and channel estimation scheme based on compressive sensing. By exploiting the sporadic traffic of massive connected user equipments and the virtual angular domain sparsity of massive MIMO channels, the proposed scheme can support massive access with dramatically reduced access latency. Specifically, we design non-orthogonal pseudo-random pilots for uplink broadband massive access, and formulate the active user detection and channel estimation as a generalized multiple measurement vector compressive sensing problem. Furthermore, by leveraging the structured sparsity of the uplink channel matrix, we propose an efficient generalized multiple measurement vector approximate message passing (GMMV-AMP) algorithm to realize joint active user detection and channel estimation based on a spatial domain or an angular domain channel model. To jointly exploit the channel sparsity present in both the spatial and the angular domains for enhanced performance, a Turbo-GMMV-AMP algorithm is developed for detecting the active users and estimating their channels in an alternating manner. Finally, an adaptive access scheme is proposed, which adapts the access latency to guarantee reliable massive access for practical systems with unknown channel sparsity level. Additionally, the state evolution of the proposed GMMV-AMP algorithm is derived to predict its performance. Simulation results demonstrate the superiority of the proposed active user detection and channel estimation schemes compared to several baseline schemes.

262 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI

2,415 citations

Journal ArticleDOI
TL;DR: This paper provides a tutorial overview of IRS-aided wireless communications, and elaborate its reflection and channel models, hardware architecture and practical constraints, as well as various appealing applications in wireless networks.
Abstract: Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that the new IRS-aided hybrid wireless network comprising both active and passive components will be highly promising to achieve a sustainable capacity growth cost-effectively in the future. Despite its great potential, IRS faces new challenges to be efficiently integrated into wireless networks, such as reflection optimization, channel estimation, and deployment from communication design perspectives. In this paper, we provide a tutorial overview of IRS-aided wireless communications to address the above issues, and elaborate its reflection and channel models, hardware architecture and practical constraints, as well as various appealing applications in wireless networks. Moreover, we highlight important directions worthy of further investigation in future work.

1,325 citations

Journal ArticleDOI
TL;DR: Reconfigurable intelligent surfaces (RISs) can be realized in different ways, which include (i) large arrays of inexpensive antennas that are usually spaced half of the wavelength apart; and (ii) metamaterial-based planar or conformal large surfaces whose scattering elements have sizes and inter-distances much smaller than the wavelength.
Abstract: Reconfigurable intelligent surfaces (RISs) are an emerging transmission technology for application to wireless communications. RISs can be realized in different ways, which include (i) large arrays of inexpensive antennas that are usually spaced half of the wavelength apart; and (ii) metamaterial-based planar or conformal large surfaces whose scattering elements have sizes and inter-distances much smaller than the wavelength. Compared with other transmission technologies, e.g., phased arrays, multi-antenna transmitters, and relays, RISs require the largest number of scattering elements, but each of them needs to be backed by the fewest and least costly components. Also, no power amplifiers are usually needed. For these reasons, RISs constitute a promising software-defined architecture that can be realized at reduced cost, size, weight, and power (C-SWaP design), and are regarded as an enabling technology for realizing the emerging concept of smart radio environments (SREs). In this paper, we (i) introduce the emerging research field of RIS-empowered SREs; (ii) overview the most suitable applications of RISs in wireless networks; (iii) present an electromagnetic-based communication-theoretic framework for analyzing and optimizing metamaterial-based RISs; (iv) provide a comprehensive overview of the current state of research; and (v) discuss the most important research issues to tackle. Owing to the interdisciplinary essence of RIS-empowered SREs, finally, we put forth the need of reconciling and reuniting C. E. Shannon’s mathematical theory of communication with G. Green’s and J. C. Maxwell’s mathematical theories of electromagnetism for appropriately modeling, analyzing, optimizing, and deploying future wireless networks empowered by RISs.

1,158 citations