scispace - formally typeset
Search or ask a question
Institution

Xidian University

EducationXi'an, China
About: Xidian University is a education organization based out in Xi'an, China. It is known for research contribution in the topics: Antenna (radio) & Synthetic aperture radar. The organization has 32099 authors who have published 38961 publications receiving 431820 citations. The organization is also known as: University of Electronic Science and Technology at Xi'an & Xīān Diànzǐ Kējì Dàxué.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a secure data sharing scheme in the blockchain-enabled mobile edge computing system using an asynchronous learning approach is presented, and an adaptive privacy-preserving mechanism according to available system resources and privacy demands of users is presented.
Abstract: Mobile-edge computing (MEC) plays a significant role in enabling diverse service applications by implementing efficient data sharing. However, the unique characteristics of MEC also bring data privacy and security problem, which impedes the development of MEC. Blockchain is viewed as a promising technology to guarantee the security and traceability of data sharing. Nonetheless, how to integrate blockchain into MEC system is quite challenging because of dynamic characteristics of channel conditions and network loads. To this end, we propose a secure data sharing scheme in the blockchain-enabled MEC system using an asynchronous learning approach in this article. First, a blockchain-enabled secure data sharing framework in the MEC system is presented. Then, we present an adaptive privacy-preserving mechanism according to available system resources and privacy demands of users. Next, an optimization problem of secure data sharing is formulated in the blockchain-enabled MEC system with the aim to maximize the system performance with respect to the decreased energy consumption of MEC system and the increased throughput of blockchain system. Especially, an asynchronous learning approach is employed to solve the formulated problem. The numerical results demonstrate the superiority of our proposed secure data sharing scheme when compared with some popular benchmark algorithms in terms of average throughput, average energy consumption, and reward.

142 citations

Journal ArticleDOI
TL;DR: This correspondence presents an efficient optimization method to design a constant modulus probing signal which can synthesize a desired beam pattern while maximally suppressing both the autocorrelation and cross-correlation sidelobes at/between given spacial angles.
Abstract: Probing signal waveforms play a central role in the signal processing performance of a multiple-input multiple-output (MIMO) radar. In practice, for a given desired beam pattern, we need to design a probing signal waveform whose beam pattern closely matches the desired one and whose autocorrelation and cross-correlation sidelobes are kept low. The latter properties are important to mitigate undesirable interference caused by multiple targets or scatterers. In this correspondence, we present an efficient optimization method to design a constant modulus probing signal which can synthesize a desired beam pattern while maximally suppressing both the autocorrelation and cross-correlation sidelobes at/between given spacial angles. We formulate this problem as an unconstrained minimization of a fourth order trigonometric polynomial and propose an efficient quasi-Newton iterative algorithm to solve it. Besides, we provide an analysis of the local minima of the fourth-order trigonometric polynomial and prove that any local minima is a 1/2-approximation of its global optimal solution. Numerical examples show that the proposed approach compares favorably with the existing approach.

142 citations

Journal ArticleDOI
01 May 2010
TL;DR: A geometrically invariant image watermarking based on affine covariant regions (ACRs) that provides a certain degree of robustness and is insensitive to geometric distortions as well as common image processing operations is presented.
Abstract: Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness against rotation, scaling, and translation, but few are resistant to cropping, nonisotropic scaling, random bending attacks (RBAs), and affine transformations. Seo and Yoo present a geometrically invariant image watermarking based on affine covariant regions (ACRs) that provide a certain degree of robustness. To further enhance the robustness, we propose a new image watermarking scheme on the basis of Seo's work, which is insensitive to geometric distortions as well as common image processing operations. Our scheme is mainly composed of three components: 1) feature selection procedure based on graph theoretical clustering algorithm is applied to obtain a set of stable and nonoverlapped ACRs; 2) for each chosen ACR, local normalization, and orientation alignment are performed to generate a geometrically invariant region, which can obviously improve the robustness of the proposed watermarking scheme; and 3) in order to prevent the degradation in image quality caused by the normalization and inverse normalization, indirect inverse normalization is adopted to achieve a good compromise between the imperceptibility and robustness. Experiments are carried out on an image set of 100 images collected from Internet, and the preliminary results demonstrate that the developed method improves the performance over some representative image watermarking approaches in terms of robustness.

142 citations

Journal ArticleDOI
TL;DR: The placement and power allocation (PA) are jointly optimized to improve the performance of the NOMA-UAV network to support massive connectivity.
Abstract: Unmanned aerial vehicles (UAVs) can be used as flying base stations to provide ubiquitous connections for mobile devices in over-crowded areas. On the other hand, non-orthogonal multiple access (NOMA) is a promising technique to support massive connectivity. In this letter, the placement and power allocation (PA) are jointly optimized to improve the performance of the NOMA-UAV network. Since the formulated joint optimization problem is non-convex, the location of the UAV is first optimized, with the total path loss from the UAV to users minimized. Then, the PA for NOMA is optimized using the optimal location of the UAV to maximize the sum rate of the network. Simulation results are presented to show the effectiveness and efficiency of the proposed scheme for NOMA-UAV networks.

142 citations

Journal ArticleDOI
TL;DR: A privacy-preserving approach for learning effective personalized models on distributed user data while guaranteeing the differential privacy of user data is proposed and the experimental results demonstrate that the proposed approach is robust to user heterogeneity and offers a good tradeoff between accuracy and privacy.
Abstract: To provide intelligent and personalized services on smart devices, machine learning techniques have been widely used to learn from data, identify patterns, and make automated decisions. Machine learning processes typically require a large amount of representative data that are often collected through crowdsourcing from end users. However, user data could be sensitive in nature, and training machine learning models on these data may expose sensitive information of users, violating their privacy. Moreover, to meet the increasing demand of personalized services, these learned models should capture their individual characteristics. This article proposes a privacy-preserving approach for learning effective personalized models on distributed user data while guaranteeing the differential privacy of user data. Practical issues in a distributed learning system such as user heterogeneity are considered in the proposed approach. In addition, the convergence property and privacy guarantee of the proposed approach are rigorously analyzed. The experimental results on realistic mobile sensing data demonstrate that the proposed approach is robust to user heterogeneity and offers a good tradeoff between accuracy and privacy.

141 citations


Authors

Showing all 32362 results

NameH-indexPapersCitations
Zhong Lin Wang2452529259003
Jie Zhang1784857221720
Bin Wang126222674364
Huijun Gao12168544399
Hong Wang110163351811
Jian Zhang107306469715
Guozhong Cao10469441625
Lajos Hanzo101204054380
Witold Pedrycz101176658203
Lei Liu98204151163
Qi Tian96103041010
Wei Liu96153842459
MengChu Zhou96112436969
Chunying Chen9450830110
Daniel W. C. Ho8536021429
Network Information
Related Institutions (5)
Beihang University
73.5K papers, 975.6K citations

92% related

Southeast University
79.4K papers, 1.1M citations

91% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

91% related

City University of Hong Kong
60.1K papers, 1.7M citations

90% related

Nanyang Technological University
112.8K papers, 3.2M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023117
2022529
20213,751
20203,816
20194,017
20183,382