Query:
学者姓名:王俊
Refining:
Year
Type
Indexed by
Source
Complex
Former Name
Co-
Language
Clean All
Abstract :
To break through the topological restriction imposed by conventional reflecting/transmitting-only reconfigurable intelligent surface (RIS) in covert communication systems, a simultaneously transmitting and reflecting RIS (STAR-RIS) is adopted in this paper. A transmitter Alice communicates with both users Willie and Bob, where Bob is the covert receiver. Moreover, Willie also plays a warden seeking to detect the covert transmission since it forbids Alice from illegally using the communication resources like energy and bandwidth allocated for them. To obtain the maximum covert rate, we first design the transmission schemes for Alice in the case of sending and not sending covert information and further derive the necessary conditions for Alice to perform covert communication. We also deduce Willie's detection error probability, the minimum value of which obtained as well in terms of an optimal detection threshold. Furthermore, through the design of Alice's transmit power for covert transmission together with transmission and reflection beamforming at STAR-RIS, we achieve the maximum effective covert rate. Our numerical results show the correctness of the proposed theorems and indicate that utilizing STAR-RIS to enhance covert communication is feasible and effective.
Keyword :
Covert communication Covert communication Noise uncertainty Noise uncertainty Reconfigurable intelligent surface Reconfigurable intelligent surface Transmission scheme Transmission scheme
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Hu, Jinsong , Cheng, Beixi , Chen, Youjia et al. Simultaneously transmitting and reflecting (STAR) RIS enhanced covert transmission with noise uncertainty [J]. | SIGNAL PROCESSING , 2025 , 232 . |
MLA | Hu, Jinsong et al. "Simultaneously transmitting and reflecting (STAR) RIS enhanced covert transmission with noise uncertainty" . | SIGNAL PROCESSING 232 (2025) . |
APA | Hu, Jinsong , Cheng, Beixi , Chen, Youjia , Wang, Jun , Shu, Feng , Chen, Zhizhang . Simultaneously transmitting and reflecting (STAR) RIS enhanced covert transmission with noise uncertainty . | SIGNAL PROCESSING , 2025 , 232 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
Cognitive Radio (CR) and Energy Harvesting (EH) techniques have offered insights to mitigate issues related to inefficient spectrum utilization and limited energy storage capacity. In Cognitive Radio Networks, security threats, particularly from eavesdroppers, may result in information leakage. This study focuses on enhancing the Physical Layer Security (PLS) of multi-users with EH by employing cooperative jamming via a Autonomous Aerial Vehicle (AAV) to maximize the secure communication rate. In the AAV-assisted EH-CR system, Secondary Users (SUs) can utilize the licensed spectrum band occupied by a Primary User (PU) if the cooperative jamming power from SUs to the PU remains below a certain threshold. SUs can harvest and use Radio Frequency (RF) energy from the Primary Transmitter (PT). The AAV jammer disrupts the eavesdropper by transmitting jamming signals, thereby minimizing stolen information to optimize long-term secure communication performance. The paper formulates the problem of maximizing the average secure communication rate while considering system constraints and jointly optimizes the AAV trajectory, transmission power, and EH coefficient. As the problem is non-convex, it is reformulated as a Markov Decision Process (MDP). The paper employs the Multi-Agent Proximal Policy Optimization (MAPPO) algorithm to address the problem, introduces counterfactual baselines to tackle the credit assignment problem in centralized learning, and integrates the Long Short-Term Memory (LSTM) network to enhance the learning capability of sequential sample data, thereby improving the training efficiency and effectiveness of the algorithm. Simulation results demonstrate the effectiveness and superiority of the proposed method in maximizing the system's secure communication rate.
Keyword :
autonomous aerial vehicle (AAV) autonomous aerial vehicle (AAV) Autonomous aerial vehicles Autonomous aerial vehicles Cognitive radio (CR) Cognitive radio (CR) Communication system security Communication system security cooperative jamming cooperative jamming energy harvesting (EH) energy harvesting (EH) Interference Interference Jamming Jamming Optimization Optimization physical layer security (PLS) physical layer security (PLS) Radio frequency Radio frequency Relays Relays Resource management Resource management Security Security Trajectory Trajectory
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Wang, Jun , Wang, Rong , Zheng, Zibin et al. Physical Layer Security Enhancement in AAV-Assisted Cooperative Jamming for Cognitive Radio Networks: A MAPPO-LSTM Deep Reinforcement Learning Approach [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2025 , 74 (3) : 4713-4727 . |
MLA | Wang, Jun et al. "Physical Layer Security Enhancement in AAV-Assisted Cooperative Jamming for Cognitive Radio Networks: A MAPPO-LSTM Deep Reinforcement Learning Approach" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 74 . 3 (2025) : 4713-4727 . |
APA | Wang, Jun , Wang, Rong , Zheng, Zibin , Lin, Ruiquan , Wu, Liang , Shu, Feng . Physical Layer Security Enhancement in AAV-Assisted Cooperative Jamming for Cognitive Radio Networks: A MAPPO-LSTM Deep Reinforcement Learning Approach . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2025 , 74 (3) , 4713-4727 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
Cognitive Internet of Vehicles (CIoV) adds the cognitive engine based on traditional Internet of Vehicles (IoV), which can improve spectrum utilization. However, spectrum sensing data falsification (SSDF) attacks pose a threat to CIoV network security. To ensure the full utilization of spectrum resources and protect primary users transmission, this article combines blockchain with CIoV to defend against SSDF attacks in the presence of vehicle users (VUs) entering and leaving the network. Specifically, this article introduces a virtual currency called Sencoins serve as credential for VUs to purchase transmission shares. And this article proposes a reward and punishment mechanism and a hybrid Proof-of-Stake (PoS) and Proof-of-Work (PoW) mining model to thwart the motivation of the VUs to launch SSDF attacks. On this basis, this article investigates the dynamics of SSDF attack strategy choice of VUs, and uses the largest Lyapunov exponent (LLE) to determine the critical value of Sencoins that avoids the system to exhibit chaotic behavior. To describe the uncertainty of the population proportion of VUs that choose different attack strategies due to high-speed movement and the VUs entering and leaving the CIoV network, this article introduces Gaussian white noise into the replication dynamics equation and builds the It & ocirc; stochastic evolutionary game model, and solves it according to the stability judgment theorem of stochastic differential equations and stochastic Taylor expansion. Finally, simulation results verify that the proposed method can quickly and effectively thwart SSDF attacks in the CIoV network. And compared with traditional methods, the proposed method can improve the efficiency of defending against SSDF attacks by 567% and the average throughput by 25%.
Keyword :
Blockchain Blockchain Blockchains Blockchains Cognitive Internet of Vehicles (CIoV) Cognitive Internet of Vehicles (CIoV) Data models Data models Games Games Interference Interference Internet of Vehicles Internet of Vehicles Security Security Sensors Sensors spectrum sensing data falsification (SSDF) attack spectrum sensing data falsification (SSDF) attack stochastic evolutionary game stochastic evolutionary game Stochastic processes Stochastic processes Throughput Throughput Wireless sensor networks Wireless sensor networks
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Li, Fushuai , Lin, Ruiquan , Chen, Wencheng et al. Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game [J]. | IEEE INTERNET OF THINGS JOURNAL , 2025 , 12 (2) : 2233-2250 . |
MLA | Li, Fushuai et al. "Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game" . | IEEE INTERNET OF THINGS JOURNAL 12 . 2 (2025) : 2233-2250 . |
APA | Li, Fushuai , Lin, Ruiquan , Chen, Wencheng , Wang, Jun , Shu, Feng , Chen, Riqing . Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game . | IEEE INTERNET OF THINGS JOURNAL , 2025 , 12 (2) , 2233-2250 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
Rapid identification of peanut seed quality is crucial for public health. In this study, we present a terahertz wave imaging system using a convolutional neural network (CNN) machine learning approach. Terahertz waves are capable of penetrating the seed shell to identify the quality of peanuts without causing any damage to the seeds. The specificity of seed quality on terahertz wave images is investigated, and the image characteristics of five different qualities are summarized. Terahertz wave images are digitized and used for training and testing of convolutional neural networks, resulting in a high model accuracy of 98.7% in quality identification. The trained THz-CNNs system can accurately identify standard, mildewed, defective, dried and germinated seeds, with an average detection time of 2.2 s. This process does not require any sample preparation steps such as concentration or culture. Our method swiftly and accurately assesses shelled seed quality non-destructively. © 2024 The Authors
Keyword :
Aflatoxin Aflatoxin Machine learning Machine learning Peanut Peanut Quality identification Quality identification Terahertz imaging technology Terahertz imaging technology
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Jiang, W. , Wang, J. , Lin, R. et al. Machine learning-based non-destructive terahertz detection of seed quality in peanut [J]. | Food Chemistry: X , 2024 , 23 . |
MLA | Jiang, W. et al. "Machine learning-based non-destructive terahertz detection of seed quality in peanut" . | Food Chemistry: X 23 (2024) . |
APA | Jiang, W. , Wang, J. , Lin, R. , Chen, R. , Chen, W. , Xie, X. et al. Machine learning-based non-destructive terahertz detection of seed quality in peanut . | Food Chemistry: X , 2024 , 23 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
The high-speed movement of Vehicle Users (VUs) in Cognitive Internet of Vehicles (CIoV) causes rapid changes in users location and path loss. In the case of imperfect control channels, the influence of high-speed movement increases the probability of error in sending local spectrum sensing decisions by VUs. On the other hand, Malicious Vehicle Users (MVUs) can launch Spectrum Sensing Data Falsification (SSDF) attacks to deteriorate the spectrum sensing decisions, mislead the final spectrum sensing decisions of Collaborative Spectrum Sensing (CSS), and bring serious security problems to the system. In addition, the high-speed movement can increases the concealment of the MVUs. In this paper, we study the scenario of VUs moving at high speeds, and data transmission in an imperfect control channel, and propose a blockchain-based method to defend against massive SSDF attacks in CIoV networks to prevennt independent and cooperative attacks from MVUs. The proposed method combines blockchain with spectrum sensing and spectrum access, abandons the decision-making mechanism of the Fusion Center (FC) in the traditional CSS, adopts distributed decision-making, and uses Prospect Theory (PT) modeling in the decision-making process, effectively improves the correct rate of final spectrum sensing decision in the case of multiple attacks. The local spectrum sensing decisions of VUs are packaged into blocks and uploaded after the final decision to achieve more accurate and secure spectrum sensing, and then identify MVUs by the reputation value. In addition, a smart contract that changes the mining difficulty of VUs based on their reputation values is proposed. It makes the mining difficulty of MVUs more difficult and effectively limits MVUs' access to the spectrum band. The final simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods.
Keyword :
blockchain blockchain Blockchains Blockchains Cognitive Internet of Vehicles (CIoV) Cognitive Internet of Vehicles (CIoV) Data communication Data communication Decision making Decision making History History Internet of Vehicles Internet of Vehicles prospect theory (PT) prospect theory (PT) Sensors Sensors smart contract smart contract Smart contracts Smart contracts spectrum sensing data falsification (SSDF) attack spectrum sensing data falsification (SSDF) attack
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Lin, Ruiquan , Li, Fushuai , Wang, Jun et al. A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) : 6954-6967 . |
MLA | Lin, Ruiquan et al. "A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 73 . 5 (2024) : 6954-6967 . |
APA | Lin, Ruiquan , Li, Fushuai , Wang, Jun , Hu, Jinsong , Zhang, Zaichen , Wu, Liang . A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) , 6954-6967 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
Cognitive Industrial Internet of Things (CIIoT) permits Secondary Users (SUs) to use the spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence of the PUs, the selfish SUs could mislead the normal SUs to leave the spectrum bands by initiating a Primary User Emulation Attack (PUEA). In addition, the application of Energy Harvesting (EH) technology can exacerbate the threat of security. Because the energy cost of initiating a PUEA is offset to some extent by EH technology which can proactively replenish the energy of the selfish nodes. Thus, EH technology can increase the motivation of the selfish SUs to initiate a PUEA. To address the higher motivation of the selfish SUs attacking in CIIoT scenario where the EH technology is applied, in this paper, an EH-PUEA system model is first established to study the security countermeasures in this severe scenario of PUEA problems. Next, a new reward and punishment defense management mechanism is proposed, and then the dynamics of the selfish SUs and the normal SUs in a CIIoT network are studied based on Evolutionary Game Theory (EGT), and the punishment parameter is adjusted according to the dynamics of the selfish SUs to reduce the proportion of the selfish SUs’ group choosing an attack strategy, so as to increase the throughput achieved by the normal SUs’ group. Finally, the simulation results show that the proposed mechanism is superior to the conventional mechanism in terms of throughput achieved by the normal SUs’ group in CIIoT scenario with EH technology applied. IEEE
Keyword :
Cognitive Industrial Internet of Things (CIIoT) Cognitive Industrial Internet of Things (CIIoT) Energy harvesting Energy harvesting energy harvesting (EH) energy harvesting (EH) evolutionary game theory (EGT) evolutionary game theory (EGT) Games Games Game theory Game theory Industrial Internet of Things Industrial Internet of Things Jamming Jamming primary user emulation attack (PUEA) primary user emulation attack (PUEA) Security Security Throughput Throughput
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Wang, J. , Pei, H. , Wang, R. et al. Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things [J]. | IEEE Transactions on Network and Service Management , 2024 , 21 (4) : 1-1 . |
MLA | Wang, J. et al. "Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things" . | IEEE Transactions on Network and Service Management 21 . 4 (2024) : 1-1 . |
APA | Wang, J. , Pei, H. , Wang, R. , Lin, R. , Fang, Z. , Shu, F. . Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things . | IEEE Transactions on Network and Service Management , 2024 , 21 (4) , 1-1 . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
In the Energy-Harvesting (EH) Cognitive Internet of Things (EH-CIoT) network, due to the broadcast nature of wireless communication, the EH-CIoT network is susceptible to jamming attacks, which leads to a serious decrease in throughput. Therefore, this paper investigates an anti-jamming resource-allocation method, aiming to maximize the Long-Term Throughput (LTT) of the EH-CIoT network. Specifically, the resource-allocation problem is modeled as a Markov Decision Process (MDP) without prior knowledge. On this basis, this paper carefully designs a two-dimensional reward function that includes throughput and energy rewards. On the one hand, the Agent Base Station (ABS) intuitively evaluates the effectiveness of its actions through throughput rewards to maximize the LTT. On the other hand, considering the EH characteristics and battery capacity limitations, this paper proposes energy rewards to guide the ABS to reasonably allocate channels for Secondary Users (SUs) with insufficient power to harvest more energy for transmission, which can indirectly improve the LTT. In the case where the activity states of Primary Users (PUs), channel information and the jamming strategies of the jammer are not available in advance, this paper proposes a Linearly Weighted Deep Deterministic Policy Gradient (LWDDPG) algorithm to maximize the LTT. The LWDDPG is extended from DDPG to adapt to the design of the two-dimensional reward function, which enables the ABS to reasonably allocate transmission channels, continuous power and work modes to the SUs, and to let the SUs not only transmit on unjammed channels, but also harvest more RF energy to supplement the battery power. Finally, the simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods under multiple jamming attacks. © 2024 by the authors.
Keyword :
anti-jamming method anti-jamming method EH-CIoT network EH-CIoT network linearly weighted deep deterministic policy gradient linearly weighted deep deterministic policy gradient resource allocation resource allocation
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Li, F. , Bao, J. , Wang, J. et al. Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm [J]. | Sensors , 2024 , 24 (16) . |
MLA | Li, F. et al. "Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm" . | Sensors 24 . 16 (2024) . |
APA | Li, F. , Bao, J. , Wang, J. , Liu, D. , Chen, W. , Lin, R. . Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm . | Sensors , 2024 , 24 (16) . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
This research proposes an innovative intelligent detection methodology tailored for the high-speed train catenary system, leveraging FPGA-accelerated MobileNetV2. Exploiting the exceptional computational capabilities of the MobileNetV2 convolutional neural network, the methodology incorporates Quantization Aware Training (QAT) to judiciously compress the comprehensive network parameters to one-fourth of the original configuration, ensuring judicious and efficient intelligent detection for the high-speed train catenary system. Notably, the entirety of network weights is strategically allocated to the on-chip resources of the FPGA, effectively circumventing constraints inherent to off-chip storage bandwidth. This strategic allocation addresses power consumption challenges linked to accessing off-chip storage resources, culminating in a substantial augmentation of the real-time operational efficiency of the network.The proposed system, an intricately tuned and energy-efficient Lightweight Convolutional Neural Network (MobileNetV2) recognition system, is meticulously implemented on the Xilinx Virtex-7 VC707 development board. Operating seamlessly at a clock frequency of 200Hz, the system attains an impressive throughput of 170.06 GOP/s with a mere power consumption of 6.13W. The resultant energy efficiency ratio excels at 27.74 GOP/s/W, significantly outpacing the CPU by a factor of 92 and the GPU by a factor of 25. These findings underscore substantial performance advantages when juxtaposed with alternative implementations. © 2024 ACM.
Keyword :
Convolution Convolution Convolutional neural networks Convolutional neural networks Deep learning Deep learning Electric current collection Electric current collection Electric power utilization Electric power utilization Energy efficiency Energy efficiency Field programmable gate arrays (FPGA) Field programmable gate arrays (FPGA) Learning systems Learning systems Pantographs Pantographs Railroad cars Railroad cars Railroads Railroads
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Wang, Rong , Chen, Shenglan , Wang, Jun et al. Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph System Status Based on Deep learning [C] . 2024 . |
MLA | Wang, Rong et al. "Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph System Status Based on Deep learning" . (2024) . |
APA | Wang, Rong , Chen, Shenglan , Wang, Jun , Chen, Wenchen , Pei, Hai . Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph System Status Based on Deep learning . (2024) . |
Export to | NoteExpress RIS BibTex |
Version :
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Liao, Jianbin , Yu, Hongliang , Jiang, Weibin et al. Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023) [J]. | PLOS ONE , 2024 , 19 (12) . |
MLA | Liao, Jianbin et al. "Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023)" . | PLOS ONE 19 . 12 (2024) . |
APA | Liao, Jianbin , Yu, Hongliang , Jiang, Weibin , Lin, Ruiquan , Wang, Jun . Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023) . | PLOS ONE , 2024 , 19 (12) . |
Export to | NoteExpress RIS BibTex |
Version :
Abstract :
With the rapid development of high-speed railway technology, ensuring its operational safety has become an important issue. In particular, real-time monitoring of the high-speed railway pantograph network system is of great significance for preventing failures and reducing accidents. This research aims to improve the intelligent detection performance of high-speed railway pantograph network status through the improved YOLO algorithm. Research methods include the use of deep learning technology and image processing technology, focusing on improving the YOLO algorithm to enhance its detection accuracy in complex environments, especially its ability to identify small targets and its adaptability to dynamic environments. It is expected that through these improvements, more accurate and efficient status monitoring of high-speed railway pantographs will be achieved, thereby improving the safe operation level of high-speed railways. © 2024 IEEE.
Keyword :
Deep learning Deep learning Electric current collection Electric current collection Engineering education Engineering education Image enhancement Image enhancement Learning algorithms Learning algorithms Pantographs Pantographs Railroad accidents Railroad accidents Railroad cars Railroad cars Railroads Railroads
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Wang, Rong , Chen, Shenglan , Wang, Jun et al. Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph Network Status Based on Improved YOLO Algorithm [C] . 2024 : 353-357 . |
MLA | Wang, Rong et al. "Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph Network Status Based on Improved YOLO Algorithm" . (2024) : 353-357 . |
APA | Wang, Rong , Chen, Shenglan , Wang, Jun , Chen, Wenchen , Pei, Hai . Research on Key Technologies for Intelligent Detection of High-Speed Railway Pantograph Network Status Based on Improved YOLO Algorithm . (2024) : 353-357 . |
Export to | NoteExpress RIS BibTex |
Version :
Export
Results: |
Selected to |
Format: |