Donghong Cai

Donghong Cai
  • PhD
  • Assistant Professor at Jinan University

About

60
Publications
7,104
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
870
Citations
Introduction
Donghong Cai currently works at the School of Information Science and Technology, Southwest Jiaotong University.
Current institution
Jinan University
Current position
  • Assistant Professor
Additional affiliations
July 2020 - October 2020
Jinan University
Position
  • Lecturer
October 2017 - present
Lancaster University
Position
  • visiting PhD
Education
September 2015 - June 2019
Southwest Jiaotong University
Field of study
  • wireless communication

Publications

Publications (60)
Article
Full-text available
We derive a tight lower bound for symbol error rate (SER) performance of the sparse code multiple access (SCMA) uplink operated over Rayleigh fading channels. In particular, based on the working principle of message passing algorithm (MPA) receiver and the special structure of the sparse binary matrix, which is used to control the collisions of SCM...
Article
Full-text available
In this paper, we study the optimum tradeoff between the spectral efficiency (SE) and energy efficiency (EE) for the two-user Gaussian interference channel (GIC). The achievable SE-EE tradeoff region of two-user GIC is obtained by studying the interactions between the two links due to their mutual interference. Each point in the SE-EE tradeoff regi...
Article
Full-text available
In this paper, we investigate the outage performance of hybrid automatic repeat request with chase combining (HARQ-CC) applied to downlink non-orthogonal multiple access (NOMA) systems. A closed-form expression of individual outage probability and the diversity gain are obtained firstly. Based on the developed analytical outage probability, a trade...
Preprint
Radio Frequency Fingerprinting Identification (RFFI) is a lightweight physical layer identity authentication technique. It identifies the radio-frequency device by analyzing the signal feature differences caused by the inevitable minor hardware impairments. However, existing RFFI methods based on closed-set recognition struggle to detect unknown un...
Article
In highly interconnected large-scale event and other Internet of Things (IoT) device-intensive scenarios, traditional terrestrial base stations have difficulty meeting the requirements of IoT devices for network speed and security, and have exacerbated carbon pollution. To this end, a blockchain-enabled UAVs-assisted mobile edge computing system is...
Article
Full-text available
With the wide application of deep learning (DL) across various fields, deep joint source–channel coding (DeepJSCC) schemes have emerged as a new coding approach for image transmission. Compared with traditional separated source and CC (SSCC) schemes, DeepJSCC is more robust to the channel environment. To address the limited sensing capability of in...
Preprint
Full-text available
Anomaly detection of multivariate time series (MTS) is crucial in industrial intelligent systems. To address the challenges of absence of anomaly labels, fast inference time, multi-source and multi-modality in anomaly detection, researchers have primarily investigated unsupervised reconstruction-driven methods. However, the existing reconstruction-...
Article
Hierarchical federated learning (HFL) shows great advantages over conventional two-layer federated learning (FL) in reducing network overhead and interaction latency while still retaining the data privacy of distributed FL clients. However, the communication and energy overhead still pose a bottleneck for HFL performance, especially as the number o...
Article
The multi-antenna non-orthogonal multiple access (NOMA) technique is a promising method to enhance energy and spectrum efficiencies of wireless communication systems through advanced precoding algorithms. However, conventional NOMA schemes encounter high complexity issues due to the successive interference cancellation (SIC) process at the receiver...
Conference Paper
In response to the economic and social development of Tibet Autonomous Region and the demand for information technology construction in the new engineering era, this paper analyzes the communication engineering major at Tibet University, a Five-in-One practical teaching talent training system model is proposed, and a first-class undergraduate profe...
Article
Full-text available
This article investigates the use of unmanned aerial vehicles (UAVs) in assisting hybrid non-orthogonal multiple access (NOMA) systems to enhance spectrum efficiency and communication connectivity. A joint optimization problem is formulated for UAV positioning and user grouping to maximize the sum rate. The formulated problem exhibits non-convexity...
Article
In distributed edge networks employing frequency division duplex, the feedback of channel state information (CSI) from the edge devices to the edge server always consumes a lot of spectrum resources, resulting in a serious communication burden. In this paper, we first propose an end-to-end unfolding neural network framework inspired by the soft thr...
Article
Full-text available
Anomaly detection of multivariate time series (MTS) is crucial in industrial intelligent systems. To address the challenges of absence of anomaly labels, fast inference time, multi-source and multi-modality in anomaly detection, researchers have primarily investigated unsupervised reconstruction-driven methods. However, the existing reconstruction-...
Chapter
Full-text available
In this paper, we consider an end-to-end semantic communication system for compressed image wireless transmission. To economize the communication bandwidth, and enhance the communication reliability as well as the intelligence of the receiver, two networks are designed for image transmission and intelligent tasks. In particular, two simple linear l...
Article
Full-text available
Spatial non-stationarity channel estimation for uplink massive MIMO systems can be formulated as a non-uniform block sparse signal recovery problem, in which the hierarchical sparsity of the channel matrix is classified as row sparsity and in-row sparsity. This paper proposes an efficient threshold-enhanced hierarchical estimation (TEHE) algorithm...
Conference Paper
Full-text available
This paper proposes a hierarchical sparse estimation of spatial non-stationarity channel for uplink massive multiple-input multiple-output (MIMO) systems without prior information. Especially, the non-zero rows of non-stationarity channel matrix are estimated according to the in-row correlation in the first layer; while the non-zero elements of the...
Article
Reconfigurable intelligent surface (RIS)-assisted symbiotic radio is a spectrum- and energy-efficient communication paradigm, in which an RIS performs passive beamforming to enhance active transmission, while using the electromagnetic waves from the active transmission for additional information transfer (i.e., passive transmission). In this paper,...
Article
This paper investigates a downlink high-mobility secure communication system with orthogonal time-frequency space (OTFS) modulation. In order to achieve secure transmission, a secure precoding scheme based on a privacy-preserving method is proposed, in which a projection matrix with artificial noise (AN) is introduced to disturb eavesdropper. Speci...
Article
Full-text available
This paper considers an asynchronous grant-free non-orthogonal multiple access (NOMA) systems which can be applied in massive machine-type communications (mMTCs) and underwater IoT acoustic communication scenarios due to its high spectral efficiency and low power consumption characteristics. In particular, the system's asynchronous reception of use...
Article
Full-text available
This paper considers an asynchronous grant-free non-orthogonal multiple access (NOMA) systems which can be applied in massive machine-type communications (mMTCs) and underwater IoT acoustic communication scenarios due to its high spectral efficiency and low power consumption characteristics. In particular, the system’s asynchronous reception of use...
Chapter
In this work, we consider a downlink non-orthogonal multiple access (NOMA) network where multiple single-antenna users are served by multiple multi-antenna base stations (BSs). For practical considerations, we assume that only the imperfect channel state information (CSI) of each user is available at the BSs. Based on this model, the problem of joi...
Article
Full-text available
Recently, unmanned aerial vehicle (UAV) swarm communication has drawn much attention in search and rescue (SAR) missions owing to its wide wireless coverage and increasing autonomy in navigation. In this article, we consider maximizing the downlink wireless coverage of a UAV swarm in an unknown mission area by controlling the quasistationary deploy...
Preprint
Full-text available
div>This paper investigates multiple access schemes for uplink and downlink transmissions in cellular networks with massive Internet of Things (IoT) devices.</div
Preprint
Full-text available
div>This paper investigates multiple access schemes for uplink and downlink transmissions in cellular networks with massive Internet of Things (IoT) devices.</div
Preprint
Full-text available
div>This paper investigates multiple access schemes for uplink and downlink transmissions in cellular networks with massive Internet of Things (IoT) devices.</div
Article
Simultaneous transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have been considered promising auxiliary devices to enhance the performance of the wireless network, where users located at different sides of the surfaces can be simultaneously served by the transmitting or reflecting signals. In this article, an energy effici...
Article
Full-text available
Unmanned Aerial Vehicle (UAV) networks have huge potential for a variety of military and civilian uses, such as intelligent transportation system, smart city, and so on. The 6th Generation (6G) communication technology is expected to provide 3-Dimensional (3D) wireless coverage and greatly improve the performance of UAV networks. The UAV-to-UAV (U2...
Preprint
Simultaneous transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) has been considered as a promising auxiliary device to enhance the performance of the wireless network, where users located at the different sides of the surfaces can be simultaneously served by the transmitting and reflecting signals. In this paper, the energy...
Article
Full-text available
As 5G networks rolling out in many different countries nowadays, the time has come to investigate how to upgrade and expand them towards 6G, where the latter is expected to realize the interconnection of everything as well as the development of a ubiquitous intelligent mobile world for intelligent life. To enable this epic leap in communications, t...
Preprint
Full-text available
As 5G networks rolling out in many different countries nowadays, the time has come to investigate how to upgrade and expand them towards 6G, where the latter is expected to realize the interconnection of everything as well as the development of a ubiquitous intelligent mobile world for intelligent life. To enable this epic leap in communications, t...
Article
Full-text available
This paper investigates multiple access schemes for uplink and downlink transmissions in cellular networks with massive Internet of Things (IoT) devices. Recall that single-carrier frequency division multiple access and orthogonal frequency division multiple access, which are orthogonal multiple access (OMA) schemes, have been conventionally adopte...
Article
Full-text available
This paper proposes some low com�plexity algorithms for active user detection (AUD), channel estimation (CE) and multi-us�er detection (MUD) in uplink non-orthogonal multiple access (NOMA) systems, including single-carrier and multi-carrier cases. In par�ticular, we first propose a novel algorithm to estimate the active users and the channels f...
Article
This paper proposes some low complexity algorithms for active user detection (AUD), channel estimation (CE) and multi-user detection (MUD) in uplink non-orthogonal multiple access (NOMA) systems, including single-carrier and multi-carrier cases. In particular, we first propose a novel algorithm to estimate the active users and the channels for sing...
Article
In this paper, we investigate the offline packets scheduling of a downlink system with two heterogeneous latency-constrained users. Specifically, user 1 is a latency-tolerant user which has one packet with long latency requirement, while user 2 is latency-sensitive user which has multiple packets with short latency requirements. To precisely charac...
Article
Full-text available
This letter considers a joint user activity, channel and data estimation problem in an uplink grant-free massive MIMO systems with low-precision analog-to-digital converters (ADCs). This joint estimation is firstly formalized as a non-overlapping group sparse problem, in which the components of compound channel follow independent conditional distri...
Preprint
In this work, we consider a downlink NOMA network with multiple single-antenna users and multi-antenna UAVs. In particular, the users are spatially located in several clusters by following the Poisson Cluster Process and each cluster is served by a hovering UAV with NOMA. For practical considerations, we assume that only imperfect CSI of each user...
Article
Full-text available
In this paper, we aim to design an adaptive power allocation scheme to minimize the average transmit power of a hybrid automatic repeat request with chase combining (HARQ-CC) enabled non-orthogonal multiple access (NOMA) system under strict outage constraints of users. Specifically, we assume that the base station only knows the statistical channel...
Article
Full-text available
This letter considers the problem of a joint estimation for channel fading and user activity in an uplink grant-free massive MIMO system equipped with low-precision analog-to-digital converters (ADCs). Different from existing works, the joint estimation is formalized as a non-overlapping group problem, where the components of compound channel invol...
Preprint
Full-text available
In this paper, we aim to design an adaptive power allocation scheme to minimize the average transmit power of a hybrid automatic repeat request with chase combining (HARQ-CC) enabled non-orthogonal multiple access (NOMA) system under strict outage constraints of users. Specifically, we assume the base station only knows the statistical channel stat...
Article
This paper investigates the performance of nonorthogonal multiple access (NOMA) systems over time-correlated Rayleigh fading channels, where the users have heterogeneous quality of service requirements, e.g., a latency-critical user with a low target rate and a delay-tolerant user with a large target rate. In order to meet the different requirement...
Conference Paper
Full-text available
In this paper, we aim to design a power allocation strategy to minimize the average consumed power of a hybrid automatic repeat request with chase combining (HARQ-CC) enabled system under a strict outage constraint for each user. In particular, the non-orthogonal multiple access (NOMA) is incorporated to further improve the system spectrum efficien...
Conference Paper
Full-text available
This paper investigates the outage performance of downlink non-orthogonal multiple access (NOMA) system over time-correlated Rayleigh fading channels, where the users have heterogeneous quality of service requirements, e.g., a latency-critical user with a low target rate and a delay-tolerant user with a large target rate. In order to meet the diffe...
Article
In this paper, a novel codebook design method for sparse code multiple access (SCMA) is proposed and an analytical framework to evaluate the bit error rate (BER) performance is developed. In particular, to meet the codebook design criteria based on the pairwise error probability (PEP), a novel codebook with large minimum Euclidean distance employin...

Network

Cited By