Gaofeng Pan

Gaofeng Pan
Verified
Gaofeng verified their affiliation via an institutional email.
Verified
Gaofeng verified their affiliation via an institutional email.
  • PhD
  • Professor at Beijing Institute of Technology

About

307
Publications
66,016
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,982
Citations
Introduction
Gaofeng Pan is with the School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China.
Current institution
Beijing Institute of Technology
Current position
  • Professor

Publications

Publications (307)
Preprint
Full-text available
This work investigates the physical layer security of rate-splitting multiple access (RSMA)-aided integrated communication and sensing (ISAC) systems. The ISAC base station (BS) transmits signals to communicate with users in an eavesdropped scenario and to estimate the parameters of the sensed targets. The research considers different sensing signa...
Article
Full-text available
In this work, we investigate a delay-tolerant covert and secure communication framework relayed by an uncrewed aerial vehicle (UAV). In this framework, a legitimate UAV serves as an aerial relay to facilitate communication when the direct link between the terrestrial transmitter and receiver is blocked. Additionally, the UAV also acts as a friendly...
Preprint
Full-text available
In this paper, we propose a dual-unmanned aerial vehicle (UAV)-enabled secure communication and sensing (SCS) scheme for an air-to-ground integrated sensing and communication (ISAC) system, in which a dual-functional source UAV and jamming UAV collaborate to enhance both the secure communication and target sensing performance. From a perspective of...
Article
In light of the growing necessity for secure satellite communications, harmful interference in channel transmission needs to be considered. By introducing Reconfigurable Intelligent Surfaces (RIS) into the wireless communication system, this paper presents a satellite-to-ground transmission system to mitigate harmful interference caused by unmanned...
Article
Full-text available
This paper tackles the challenge of enabling covert communication in a dual-hop space-air-ground integrated network (SAGIN) comprising a satellite, an aerial decode-and-forward relay, an aerial-friendly jammer, and a terrestrial receiver. The direct satellite-to-receiver link is often compromised by deep fading, necessitating the use of relays to f...
Article
Space-air-ground integration has become paramount in the next generation of wireless communication systems in the era marked by the seamless integration of terrestrial and celestial domains. On the other hand, the age of information (AoI) has recently emerged as a vital metric for evaluating the timeliness and freshness of data in these multi-hop c...
Article
Age of Information (AoI) is a critical metric that can be used to assess the freshness of information in highly dynamic low-earth orbit (LEO) terrestrial-satellite communications. In most existing research on the AoI of wireless transmissions, the packet transmission rate rarely changes. However, over a given period of time and without perfect tran...
Article
In the rapidly evolving landscape of aerial‒terrestrial‒marine integrated transportation, vehicular communication systems are confronted with various challenges, including unpredictable signal fading, the scarcity of spectrum resources, and the complexity of network topologies. This article introduces a novel generative artificial intelligence (GAI...
Article
Due to some transmission delays and channel estimation errors, it is always difficult to acquire perfect channel state information (CSI) in practical communications. Therefore, in this study, taking the practical scenario of imperfect CSI into consideration, a simultaneously transmitting and reflecting-reconfigurable intelligent surface (STAR-RIS)-...
Article
With the increasing demands of the Industrial Internet of Things (IIoT), highly dynamic multi-unmanned aerial vehicle (UAV) networks are becoming indispensable to IIoT due to their flexibility, cost-effectiveness, robust safety measures, and real-time data collection capabilities. Accurate time synchronization is crucial for coordinated missions of...
Article
This paper examines covert communication in underlay cognitive radio networks (CRNs) with energy harvesting (EH), in which considers two scenarios: 1) with perfect channel state information (CSI) of the link from the secondary source (SS) to the primary receiver (PR) at Willie, 2) with statistical CSI of the SS-PR link at Willie. The closed-form ex...
Article
The Non-Terrestrial Network (NTN) is a promising technology to achieve the ubiquitous, low latency, and high data rate next-generation communication system, however, since the broad application of the NTN, the security problem in the NTN is of paramount importance. In this regard, this paper investigates a novel secure communication strategy within...
Article
Full-text available
Ensuring timely information delivery is of paramount importance for mission-critical applications in the Internet of Things (IoT). The age of information (AoI), which measures the time elapsed from data generation to reception, is critical for assessing information freshness in time-sensitive scenarios. This work focuses on the AoI analysis of coop...
Article
With the rapid development of cluster systems, such as unmanned aerial vehicle (UAV) networks and satellite constellations, multi-node collaboration has emerged as a critical requirement. Accurate time synchronization, a cornerstone of such collaborative systems, heavily relies on high-precision delay estimation. Traditional multi-carrier delay est...
Article
The Integrated Satellite-Ground Network (ISGN) is regarded as a promising technology for future communication systems, which can provide ubiquitous connectivity for various communication scenes, such as remote areas, maritime, and emergency communications. This paper presents a novel downlink transmission framework for the cell-free multi-input mul...
Article
With the development of the sixth generation wireless communication, the increasingly scarce spectrum resources limit the further increase in data rate and exacerbate the interference problem among different users and applications. To address this issue, rate-splitting multiple access (RSMA) provides a flexible framework that unifies existing ortho...
Article
In this paper, a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is deployed to aid covert communications in a multiple-input single-output (MISO) rate-splitting multiple access (RSMA) system. To maximize the covert communication rate, which is characterized by the shared common rate and private rate of the...
Article
In this paper, we investigate the security of a cognitive satellite-terrestrial network that seamlessly integrates simultaneous wireless information and power transfer (SWIPT). The network comprises a secondary system that employs the sophisticated multiple-input multiple-output (MIMO) SWIPT technology. Within shared spectrum, the secondary network...
Article
Unmanned aerial vehicles (UAVs) have found extensive applications across diverse domains owing to their cost-effectiveness, uncomplicated structure, and adaptable takeoff and landing functionalities. Multi-UAV network systems can be coordinated to improve system performance significantly. Network time synchronization is a crucial prerequisite for e...
Chapter
In this paper, we consider a system, which consists of an aerial platform (S), a legitimate satellite (D), and an eavesdropping satellite (E), as shown in Fig. 3.1. Specifically, D receives data from S and E tries to eavesdrop the information transmitted between S and D simultaneously. As depicted in Fig. 3.1, the beam angle of S is denoted as \(2\...
Chapter
This chapter provides a comprehensive examination of satellite communications, addressing key issues essential to optimizing performance and ensuring secure transmission. It begins with a historical overview of the development of satellite communications and progresses to an in-depth analysis of the challenges associated with modeling satellite lin...
Chapter
In this work, as presented in Fig. 5.1, a low Earth orbit (LEO) mega-constellation communication scenario is considered, which consists of a terrestrial source-destination (S-D) pair, K (\(K > 2\)) LEO satellites, \(1 \le p < q \le K\), a ground relay (G), an aerial relay (A), and a relay satellite (\(\mathrm{{S}}_0\)) with higher orbit compared to...
Chapter
In this work, a cooperative satellite-aerial-terrestrial communication (CSATC) system, which consists of a satellite transmitter (S), an aerial relay (R), and a group of terrestrial receivers (\(\mathrm{{D}}_i\), \(1 \le i \le N\)), is considered, as shown in Fig. 4.1. Specifically, S delivers its information to terrestrial receivers via the help o...
Chapter
In this work, an satellite-terrestrial transmission (STT) system, which consists of a satellite transmitter (S), and a group of terrestrial receivers (\(\mathrm{{D}}_i\), \(1 \le i \le N\)), is considered, as presented in Fig. 2.1. It is assumed that S and all terrestrial receivers are equipped with a single transmit and a single receiving antenna.
Article
Full-text available
Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-to-ground links, UAVs are widely used to enhance the performance of wireless communication systems due to the presence of high-probability line-of-sight (LoS) links. However, the hig...
Article
Full-text available
Wireless relays can effectively extend the transmission range of information. However, if relay technology is utilized unlawfully, it can amplify potential harm. Effectively surveilling illegitimate relay links poses a challenging problem. Unmanned aerial vehicles (UAVs) can proactively surveil wireless relay systems due to their flexible mobility....
Article
Satellite-to-ground communication systems typically operate in environments with high interference levels, complex topologies, and stringent platform constraints. Therefore, intelligent, anti-interference, and low-power systems are required to achieve the desired transmission performance. This paper proposes a system for optimizing high-frequency s...
Preprint
Full-text available
Mobile edge computing (MEC) technology can reduce user latency and energy consumption by offloading computationally intensive tasks to the edge servers. Unmanned aerial vehicles (UAVs) and non-orthogonal multiple access (NOMA) technology enable the MEC networks to provide offloaded computing services for massively accessed terrestrial users conveni...
Article
Wireless communications can be improved by employing free space optical (FSO) channels. Since optical signals can only be transmitted via line-of-sight paths, UAVs are employed to forward data from a base station (BS) to remote users for urgent tasks using multi-hop mixed FSO/RF links. The UAVs employ the decode and forward protocol to relay data....
Article
In this work, the physical-layer security for a maritime relay-assisted hybrid satellite and underwater wireless optical communication system consisting of a satellite source, a maritime relay (R), an underwater destination, and an eavesdropper (E) is investigated. In addition, both R and E are with multiple antennas and randomly located. In real a...
Article
Full-text available
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits critical information to ground users in...
Article
With the rapidly increasing demands for wireless communication networks, unmanned aerial vehicles (UAVs) have been developed. However, the line-of-sight (LoS) links are susceptible to severe deterioration due to complex distribution environments. To tackle this issue, Reconfigurable Intelligent Surface (RIS) technology has been introduced to amelio...
Article
Full-text available
As air-to-ground links tend to exhibit a high probability of being line-of-sight (LoS), unmanned aerial vehicles (UAVs) are widely used to improve the performance of wireless communications. The design of the UAV flight path plays a pivotal role in determining the effectiveness of UAV communication systems. However, the air-to-ground links with a h...
Article
Full-text available
Unmanned aerial vehicles (UAVs) offer wireless access services to terrestrial users without geographical limitations, making them integral to future communication systems. However, the openness of wireless channels and the mobility of UAVs pose significant security challenges to UAV-based communication systems. This work delves into the security of...
Article
Full-text available
Introduction Exit selection is crucial in indoor emergency evacuation. Domestic and foreign scholars have found that exit choice behavior is influenced by three factors: environmental factors, social interactions, and individual internal factors. Previous studies have shown that in addition to a single environmental factor affecting exit decisions,...
Preprint
Full-text available
Wireless relays can effectively extend the transmission range of information. However, if relay technology is utilized unlawfully, it can amplify potential harm. Effectively surveilling illegitimate relay links poses a challenging problem. Unmanned aerial vehicles (UAVs) can proactively surveil wireless relay systems due to their flexible mobility....
Preprint
Full-text available
This work studies the beamforming design in the joint target sensing and proactive eavesdropping (JTSAPE) system. The JTSAPE base station (BS) receives the information transmitted by the illegal transmitter and transmits the waveform for target sensing. The shared waveform also serves as artificial noise to interfere with the illegal receiver, ther...
Preprint
Full-text available
In this work, a delay-tolerant unmanned aerial vehicle (UAV) relayed covert and secure communication framework is investigated. In this framework, a legitimate UAV serves as an aerial relay to realize communication when the direct link between the terrestrial transmitter and receiver is blocked and also acts as a friendly jammer to suppress the mal...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-to-ground links, UAVs are widely used to enhance the performance of wireless communication systems due to the presence of high-probability line-of-sight (LoS) links. However, the hig...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) have been attracting significant attention because there is a high probability of line-of-sight links being obtained between them and terrestrial nodes in high-rise urban areas. In this work, we investigate cognitive radio networks (CRNs) by jointly designing three-dimensional (3D) trajectory, the transmit power of t...
Article
As inter-satellite communication (ISC) networks continue to evolve and play a critical role in space missions, ensuring the security and integrity of these networks has become a paramount concern. The unique characteristics of ISCs, such as the predictable movement of satellites and the use of high-frequency bands, push the limits of commonly used...
Article
Millimeter-wave (mmWave) communication is one of the effective technologies for the next generation of wireless communications due to the enormous amount of available spectrum resources. Rate splitting multiple access (RSMA) is a powerful multiple access, interference management, and multiuser strategy for designing future wireless networks. In thi...
Chapter
This section considers a dual-hop cooperative satellite-UAV communication system including a satellite (S) and a group of cluster headers (CHs), respectively, with a group of uniformly distributed UAVs. Specifically, the CHs serve as aerial decode-and-forward (DF) relays to forward the information transmitted by the S to the UAVs. Moreover, free-sp...
Chapter
By observing the fact that moving in a straight line is a common flying behavior of UAVs in normal applications, e.g., power line inspections and air patrols along with highway/streets/borders, in this section we investigate the secrecy outage performance of a UAV system with linear trajectory, where a UAV (S) flies in a straight line and transmits...
Chapter
UAVs have become increasingly prevalent in various industries and applications, ranging from military and surveillance operations to commercial and humanitarian uses. Efficient and reliable communication is critical to UAV operations, enabling control, data transmission, and situational awareness.
Chapter
This section investigates the secrecy performance of a UAV-aided NOMA network in the context of underlay CR. Specifically, a multi-antenna secondary source (S) transmits a mixed signal incorporated with NOMA to two multi-antenna secondary destinations (\(D_{i}\)) via a UAV-enabled DF relay in the presence of an eavesdropper (E). In addition, both a...
Chapter
Unmanned Aerial Vehicles (UAVs), also known as drones, have experienced a remarkable surge in popularity across diverse sectors, including military, civilian, and commercial domains. Their expansive array of applications promises transformative benefits, but to harness this potential, UAVs rely critically on reliable, efficient communication system...
Chapter
In this section, we investigate the secrecy performance of a UAV-to-UAV system, where a UAV acts as the source (S) transmitting information to a legitimate UAV receiver while a group of UAVs trying to eavesdrop on the information delivery between S and legitimate UAV receiver. The locations of the legitimate UAV receiver and the eavesdropping UAVs...
Article
无线通信技术是现今蓬勃发展的数据时代不可或缺的重要信息传输手段之一, 而无线数据的安全性更是构建数据时代的磐石. 在某些特殊应用场景中, 发送方不但要保障信息内容的安全, 甚至要做到无线信号传输的行为不被侦收发现. 面对严峻的无线电侦收威胁, 传统的隐蔽通信手段是基于某一个或两个维域进行能量弥散以降低被侦测概率, 如基于扩频的码分多址接入技术将能量弥散到频域, 短时猝发技术将能量弥散在时域的多个离散时段, 短时猝发与跳频结合的技术将能量弥散在时、频两域. 本文首先回归无线传输过程中信号能量弥散的物理本质, 将隐蔽通信模型从能量在单维域弥散扩展至时-频-空的多维域能量弥散. 即利用此模型并借助无线电传播理论以及数字信号处理方法等工具对无线信号能量在时-频-空三个维域的能量弥散进行建模, 设计了...
Conference Paper
Full-text available
This study investigates the secrecy performance of a rate-splitting multiple-access system inspired by cognitive radio principles, where the primary user takes on the role of a potential eavesdropper seeking to intercept the secondary user's message. The on-off scheme is utilized to guarantee the transmission of the primary user. We provide closed-...
Article
Both the space-air-ground integrated networks (SAGIN) and the integrated sensing and communication (ISAC) are promising technologies in future communication systems. This paper investigates the mobile user (MU) tracking and robust beamforming design by the unmanned aerial vehicle (UAV) in an SAGIN-ISAC system. Two schemes for acquiring the location...
Article
Full-text available
Unmanned aerial vehicles (UAVs) have been attracting significant attention because there is a high probability of line-of-sight links being obtained between them and terrestrial nodes in high-rise urban areas. In this work, we investigate cognitive radio networks (CRNs) by jointly designing three-dimensional (3D) trajectory, the transmit power of t...
Article
In this paper, we investigated a multi-antenna covert communication in underlay cognitive radio networks (UCRNs), by considering both cases that Willie has the perfect and statistical channel state information (CSI) of the link from the secondary transmitter (ST) to the primary receiver (PR), respectively. Specifically, the optimal antenna of the s...
Article
Millimeter wave (mmWave) communication is crucial for drones, leading to more being equipped with directional antennas. Consequently, the technology for fast detection of directional antenna neighbors is a major challenge in mmWave Flying Ad-Hoc Networks (FANETs). This paper proposes a fully directional Neighbor Discovery (ND) method called Directi...
Article
Mobile edge computing (MEC) technology can reduce user latency and energy consumption by offloading computationally intensive tasks to the edge servers. Unmanned aerial vehicles (UAVs) and non-orthogonal multiple access (NOMA) technology enable the MEC networks to provide offloaded computing services for massively accessed terrestrial users conveni...
Article
The lack of Internet access significantly impacts the passenger experience on commercial airlines, necessitating reliable, high- throughput communication support. One promising solution is leveraging the satellite constellation in low Earth orbit (LEO). This paper studies the design of an Internet satellite constellation in LEO for continuous commu...
Article
In the coming sixth-generation era, space-air–ground-sea integrated (SAGSI) communication networks will be rapidly developed, with broader coverage, connectivity, security, and so on. The various communication requirements call for a decoding algorithm with lower complexity and higher coding gain for the channel code. Inspired by this point and bas...
Article
This work addresses the challenge of achieving covert communication in cooperative wireless systems, which consist of a source, a decode-and-forward relay, and a destination. The direct link between the source and the destination is often impaired by deep fading, necessitating the use of a relay to forward signals. The relay also attempts to transm...
Article
Full-text available
Underwater exploration, inspection, and surveillance have become more popular thanks to recent advancements in underwater wireless communication technologies, of which underwater wireless optical communication (UWOC) boasts increased bandwidth, reduced latency, and heightened security. Normally, once underwater sensors collect the data, it is trans...
Article
Aiming at the high-performance requirements of Internet of Things (IoT) scenarios, a cognitive radio-inspired nonorthogonal multiple access (CR-NOMA) scheme in short packet communication is investigated. Primary and secondary users share the same nonorthogonal communication resource block to achieve high spectral efficiency. A priority selection co...
Article
Full-text available
In this letter, we investigate an active reconfigurable intelligent surface (RIS) and non-orthogonal multiple access (NOMA)-aided covert communication system with hardware impairments, where a base station conducts NOMA downlink transmissions to a covert user and a public user. More specifically, we derive the analytic expressions for the outage pr...
Article
With the development of the sixth-generation wireless communication technology, the difficulty of covert communication in the satellite communications system (SCS) is further increased. In this paper, a satellite covert communication system based on reconfigurable intelligent surface (RIS) is studied, which consists of a satellite, a terrestrial re...
Article
Full-text available
Low Earth orbit (LEO) Mega-constellations have emerged as a transformative approach to realize enhanced system capacity and improved coverage to satisfy the ever-increasing global demand for data services. Subsequently, the high density of satellites in a confined orbital region poses challenges, including potential interference among neighboring s...
Article
This letter investigates the secure delivery performance of the rate-splitting multiple access scheme in land mobile satellite (LMS) systems, considering that the private messages intended by a terminal can be eavesdropped by any others from the broadcast signals. Specifically, the considered system has an N -antenna satellite and numerous single...
Article
Underwater acoustic (UWA) channels present diverse sparsity, which is challenging for UWA communications and underwater networked applications. Conventional methods fail to adapt to the uncertain sparsity due to inflexible adjustment rules or improper assumptions. This paper investigates the estimation of channels with uncertain sparsity and model-...
Article
In this work, a reconfigurable intelligent surface (RIS)-based multi-input multi-output (MIMO) covert communication system is considered and studied for Internet-of-Things (IoT) networks, while the joint optimization of precoder and RIS reflection phase is carried out to improve the covert communication performance. To solve this problem, we first...
Article
With the development of satellite communication technology, the application of satellites in the Internet of Vehicles (IoV) system can effectively solve the limitations and deficiencies of ground communication networks. In this paper, we investigate the security outage performance of a satellite-vehicle communication system consisting of a satellit...
Article
The new space race is intensifying as thousands of satellites are poised for deployment into outer space each year. Companies are deploying low-earth orbit satellites at an unprecedented rate to create mega-constellations. As a result, establishing safe, efficient, and rapid inter-satellite communications has become a major challenge, essential for...
Article
Energy harvesting (EH) is an effective approach that can not only extend the service life for those energy-constraint devices, but also reduce the carbon footprint for wireless communication. Unlike the commonly used single EH scheme adopted in existing works, in this considered free space optical-radio frequency (FSO-RF) system, a dual EH mode is...
Article
To address the high-performance requirements of Internet of Things (IoT) application scenarios, we design a non-orthogonal multiple access (NOMA) assisted cognitive short packet communication system in this paper, in which the primary user is a mobile node and the secondary network shares the spectrum of primary network for transmission subject to...
Article
In this study, we investigate a non-orthogonal multiple access (NOMA)-assisted dual-hop underwater wireless optical communication-radio frequency (UWOC-RF) network. Specifically, an optical source forwards a NOMA signal to a marine relay, which first deploys either the heterodyne detection or intensity modulation direct detection to process the rec...
Article
Though geostationary Earth orbit (GEO) satellites can provide seamless service for the terrestrial terminals across the globe, the transmission quality may not always be promised due to the associated long-distance path loss and the deep shadow fading arising from the obstacles around the terrestrial terminals. With a high probability of line-of-si...

Network

Cited By