Yulong Zou

Yulong Zou
Nanjing University of Posts and Telecommunications · College of Telecommunications & Information Engineering

About

162
Publications
17,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,209
Citations
Introduction
Skills and Expertise

Publications

Publications (162)
Article
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface (STAR-FC-RIS) empowered integrated sensing and multiuser communications (ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate user...
Preprint
Full-text available
This paper investigates a wireless network consisting of an unmanned aerial vehicle (UAV) base station (BS), a fully-connected reconfigurable intelligent surface (FC-RIS), and multiple users, where the downlink signal can simultaneously be captured by an aerial eavesdropper at a random location. To improve the physical-layer security (PLS) of the c...
Article
In this paper, we investigate an uplink nonorthogonal multiple access (NOMA) short packet (SP) communication system. In order to enhance transmission reliability, we propose a reconfigurable intelligent surface (RIS)-assisted NOMA SP transmission scheme called RIS-NS, in which multi-cluster NOMA devices transmit their messages to an access point (A...
Article
This paper investigates the physical layer security for a distributed antenna system, where a base station (BS) equipped with multiple distributed antennas transmits signals to a legitimate user (U) through an opportunistic antenna. Meanwhile, multiple non-colluding eavesdroppers (Es) attempt to tap the information transmission between the BS and U...
Article
This letter considers an active reconfigurable intelligent surface (ARIS)-aided secure wireless powered communication network (WPCN), where an Internet-of-Things (IoT) device first harvests energy from a hybrid access point (HAP), and then transmits the information to the HAP by utilizing the harvested energy in the presence of multiple eavesdroppe...
Article
We explore a satellite internet of things (SIoT) system, wherein multiple IoT users are allowed to access the SIoT in a grant-free manner. Such a manner may incur the severe co-frequency interference (CFI), and decease the user capacity in terms of the number IoT users successfully accessing the SIoT. To this end, we first design two beam preproces...
Article
A spectrum-sharing satellite-ground integrated network is conceived, consisting of a pair of non-geostationary orbit (NGSO) constellations and multiple terrestrial base stations, which impose the co-frequency interference (CFI) on each other. The CFI may increase upon increasing the number of satellites. To manage the potentially severe interferenc...
Article
This paper investigates a reconfigurable intelligent surface equipped unmanned aerial vehicle (RISeUAV)-enabled wireless powered communication network (WPCN) consisting of a ground hybrid access point (GHAP), a RISeUAV, and a ground wireless device (GWD). Specifically, the passive GWD first harvests energy through the downlink (DL) wireless power t...
Article
This paper focuses on a reconfigurable intelligent surface (RIS) assisted multi-cluster wireless powered communication network (WPCN) in the presence of hardware impairments (HIs). With the aid of an RIS, passive devices (PDs) grouped into multiple clusters first jointly collect the energy radiated by an energy source (ES), and then transmit useful...
Article
In this paper, we consider an active reconfigurable intelligent surface (ARIS)-assisted uplink mobile edge computing (MEC) system. We propose an ARIS assisted non-orthogonal multiple access (NOMA) scheme, denoted by ARIS-NOMA, in which multiple users process their local computing and simultaneously perform task offloading in NOMA manner to a base s...
Article
In this article, we study a hybrid satellite-terrestrial uplink system (HSTUS), where a terrestrial source transmits its messages to a geostationary Earth orbit satellite aided by multiple relays in the presence of co-channel interference (CCI) and an eavesdropper. To enhance the security-reliability tradeoff (SRT) performance of the HSTUS, we prop...
Article
In this paper, we consider an reconfigurable intelligent surface (RIS)-assisted downlink cognitive radio system in the presence of hardware impairments (HWIs) and propose an RIS-assisted robust beamforming design (RIS-Robust) scheme. We aim to maximize the average achievable sum rate (AASR) for cognitive users while ensuring the transmit power budg...
Article
This paper investigates a wireless network consisting of an unmanned aerial vehicle (UAV) base station (BS), a fully-connected reconfigurable intelligent surface (FC-RIS), and multiple users, where the downlink signal can simultaneously be captured by the users as well as an aerial eavesdropper at a random location. To improve the physical-layer se...
Article
In this paper, we investigate the robust and secure transmission for a reconfigurable intelligent surface (RIS) assisted multi-user simultaneous wireless information and power transfer (MU-SWIPT) system in the presence of an eavesdropper (Eve) with hardware impairments (HWIs). An optimization problem is formulated with the goal of maximizing the av...
Article
This letter studies the secrecy performance for a dual-hop non-orthogonal multiple access (NOMA)-aided unmanned aerial vehicle (UAV) network in the face of a rgb0,0,0passive untrusted far user (UFU). A new artificial noise (AN) scheme is proposed, where AN generated in the first hop can be used to encrypt confidential signals by XOR operation in th...
Article
In this letter, we study a dual-function radar-communication unmanned aerial vehicle (DFRC-UAV)-enabled integrated sensing and communications (ISAC) system, and propose a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted DFRC-UAV-enabled ISAC scheme called SRaDUI, where a DFRC-UAV simultaneously sense...
Article
This paper investigates an unmanned aerial vehicle (UAV) relay network in the urban Internet of Things (IoT) environment designed to facilitate communications for ground terminals (GTs) by transmitting their data to a remote base station (BS) using the decode and forward (DF) protocol, where the orthogonal frequency division multiple access (OFDMA)...
Article
In this article, we investigate the physical layer security for a wireless communication system consisting of a base station (BS) and a user (U) in the face of an eavesdropper (E). A friendly jammer is opportunistically selected from multiple jammers to create intentional interference upon E. However, the legitimate user U is not aware of the infor...
Article
In this paper, we consider a reconfigurable intelligent surface (RIS)-assisted wireless communications system with multi-user scheduling, where a pilot-embedded data transmission is carried out from a selected user to an access point (AP) with the aid of an RIS. Specifically, by taking into account a transmit energy constraint, we propose a joint p...
Article
This paper integrates an intelligent reflecting surface (IRS) into a wireless powered Internet-of-Things (IoT) network, where IoT devices need to harvest energy from an energy station (ES) before transmitting their monitoring data to an access point. An IRS is invoked to improve energy and spectral efficiency by changing propagation environment. Co...
Article
We investigate physical-layer security for a multiuser underlay cognitive system with hardware impairments (HIs) and channel estimation errors (CEEs), which comprises multiple cognitive users (CUs), a cognitive base station (CBS), and an eavesdropper (E). Considering the quality-of-service of primary transmissions, the cognitive transmit power is l...
Article
In this paper, we study the secure communication problem of a wireless multiuser network consisting of a base station (BS), multiple users, and an energy harvesting (EH) node in the face of an eavesdropper. We focus on the question that which role the EH node plays, as a friendly jammer or as a cooperative decode-and-forward (DF) relay. Accordingly...
Article
In this paper, the secrecy energy efficiency (SEE) optimization problem is studied in multi-user multi-eavesdropper cell-free massive multiple-input multiple-output (CF-mMIMO) networks, where a large number of distributed access points (APs) equipped with multiple antennas connect to a central processing unit via backhaul links to communicate with...
Article
In this letter, we investigate the physical-layer security of an active reconfigurable intelligent surface (ARIS)-assisted uplink single-input multi-output non-orthogonal multiple access (SIMO-NOMA) system, where multiple users transmit their information to a base station (BS) with the help of an ARIS in the presence of multiple eavesdroppers (Eves...
Article
Intelligent reflecting surface (IRS)-assisted communication systems rely heavily on the precise estimation of channel state information (CSI) for their effective operation. However, obtaining the accurate CSI is challenging due to the substantial pilot overhead required in such systems. In this paper, we propose a spatial attention-based method to...
Article
This paper integrates a reconfigurable intelligent surface (RIS) and an unmanned aerial vehicle (UAV) into a wireless powered communication network. With the assistance of the RIS, multiple passive Internet of Things devices (IoTDs) gather energies from the signals of an energy station (ES) to power them to communicate with the UAV in time division...
Article
This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transm...
Article
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source. In order to mitigate the adverse effects of limited feedback and eavesdropper attack on secrecy transmission, we propose the quantized secrecy precoding (QSP) oriented adaptive tran...
Preprint
Full-text available
The physical layer security (PLS) is investigated for reconfigurable intelligent surface (RIS) assisted wireless networks, where a source transmits its confidential information to a legitimate destination with the aid of a single small RIS in the presence of a malicious eavesdropper. A new joint RIS location and passive beamforming (J-LPB) optimiza...
Article
Full-text available
The physical layer security (PLS) is investigated for reconfigurable intelligent surface (RIS) assisted wireless networks, where a source transmits its confidential information to a legitimate destination with the aid of a single small RIS in the presence of a malicious eavesdropper. A new joint RIS location and passive beamforming (J-LPB) optimiza...
Article
In this paper, we investigate the physical layer security for a cognitive multiuser network which is composed of multiple cognitive sources, a cognitive destination and an eavesdropper under the joint impact of hardware impairments (HIs) and channel estimation errors (CEEs). We consider a practical scenario where mutual interference exists between...
Article
In this paper, we study the physical-layer security of a hybrid satellite-terrestrial network composed of a satellite, multiple terrestrial decode-and-forward (DF) relays and users in the presence of a terrestrial eavesdropper who attempts to tap legitimate information from both satellite and relays. We consider two different scenarios: I) the chan...
Article
In this paper, we investigate the placement of an unmanned aerial vehicle (UAV) base station (BS) which serves multiple ground users (GUs). By taking into account both the uplink and downlink transmissions, we aim to optimize the 3D location of the UAV for maximizing the minimum average sum rate. The 3D location optimization problem is divided into...
Article
Full-text available
Abstract In this paper, the secrecy performance in a MIMO cognitive radio (CR) relay network with energy harvesting (EH) and transmit antenna selection/maximal ratio combining (TAS/MRC) is invstigated, where the DF relaying protocol and multiple colluding passive eavesdroppers are considered. To improve the security of wireless transmission, two an...
Article
This paper investigates an intelligent reflecting surface (IRS) aided secure wireless powered communication network (WPCN), where a transmitter first harvests energy from a power station (PS), and then uses the collected energy to transmit information to multiple internet of things (IoT) devices in the form of multicast in the presence of multiple...
Article
This paper investigates the secrecy performance of a spectrum sharing network, where ${N}$ legitimate source-destination pairs orderly access the shared spectrum for communication, while an eavesdropper (E) attempts to tap the legitimate information transmission. To improve the physical layer security, we propose two jamming strategies that can i...
Article
In this paper, we analyze the secrecy outage probability of a relay aided multiuser network which consists of a cluster head (CH), a decode-and-forward (DF) relay, and multiple users in the presence of an eavesdropper and co-channel interference (CCI). Firstly, we propose two relay aided multiuser scheduling (RMS) schemes to improve the secrecy out...
Article
We investigate a satellites-based spectrum sensing system in the presence of low signal-to-noise ratio (SNR) conditions. Such a low SNR is also called SNR wall in the energy detection (ED) method. To eliminate the SNR-wall effect, we propose a combined convolutional neural network and long short-term memory (C-CNN-LSTM) aided spectrum-sensing schem...
Article
In this paper, we examine the physical layer security of a reconfigurable intelligent surface (RIS)-aided wireless network consisting of multiple users, a RIS, and a multi-antenna base station (BS) in the presence of an eavesdropper, where a particular user is selected to send messages in the uplink. To secure the RIS-aided multiuser communications...
Article
Full-text available
This paper investigates an intelligent reflecting surface (IRS) aided wireless powered communication network (WPCN) with a focus on multicast transmissions in a game-theoretic way, where a transmitter first harvests energy from a power station (PS) and then transmits the information to multiple Internet of Things (IoT) devices in a multicast form....
Article
This article explores cooperative communications for drone swarms which become an essential part of space-air-ground integrated networks (SAGINs), since drones (also called unmanned aerial vehicles) have the advantage of fast and flexible deployment. However, the rapid spread of drone applications leads to a dramatic increase in the spectrum and en...
Article
In this paper, we investigate the security and reliability trade-off (SRT) for a wireless sensor network (WSN) which consists of one cluster head (CH), multiple users, and one eavesdropper (E), where the eavesdropper attempts to tap the confidential transmission between multiple users and CH. We first present two multiuser scheduling schemes, namel...
Article
This paper investigates the secrecy energy efficiency (SEE) for a two-tier heterogeneous cellular network having a macro cell and multiple small cells, where the macro cell consists of a macro base station (MBS), a macro user and an eavesdropper and meanwhile each small cell comprises of a small base station (SBS), a small user and an eavesdropper....
Article
In this paper, we study a spectrum-sharing satellite system, consisting of a pair of geosynchronous earth orbit (GEO) and low earth orbit (LEO) constellation, where the LEO satellites perform wireless transmissions relying on the shared spectrum of the GEO. In order to characterize spectrum-utilization law of the GEO and guide the access of the LEO...
Article
Full-text available
Simultaneous wireless information and power transfer (SWIPT) is a promising solution for future wireless networks as it provides convenient and perpetual energy supplies to wireless users. This study proposes three new transceiver design schemes in two‐way relay networks with SWIPT. Firstly, a transmit power minimisation solution is proposed with a...
Article
This paper investigates the reliability, goodput and energy efficiency (EE) performance of a energy harvesting (EH) based full-duplex (FD) cooperative internet-of-things (IoT) network for short-packet communications. We derive approximate closed-form expressions for the block error rate (BLER) and outage probability considering hybrid power-time sp...
Article
We study the physical-layer security of multiple source-destination (SD) pairs communicating within a wireless network in the face of an eavesdropper attacking the SD pairs. In order to protect the wireless transmission against eavesdropping, we propose a cooperation framework relying on two stages. Specifically, an SD pair is selected to access th...
Article
This paper investigates the physical layer security for a cooperative cognitive radio (CCR) system with energy-harvesting (EH) techniques, which is made up of a cognitive source (CS), multiple cognitive relays (CRs) and a cognitive destination (CD) as well as multiple eavesdroppers (Es) who may overhear the confidential information. Both CS and CRs...
Article
Full-text available
In this paper, we consider an orthogonal frequency division multiplexing (OFDM) based heterogeneous cellular network consisting of a macro cell and a small cell, where a macro-cell base station (MBS) and a small-cell base station (SBS) communicate with respective macro-cell user (MU) and small-cell user (SU) with the existence of a common eavesdrop...
Article
Full-text available
In this paper, we investigate an energy cost minimization problem for a smart home in the absence of a building thermal dynamics model with the consideration of a comfortable temperature range. Due to the existence of model uncertainty, parameter uncertainty (e.g., renewable generation output, non-shiftable power demand, outdoor temperature, and el...
Article
In this paper, we consider an energy-harvesting (EH) relay system consisting of a source, a destination, and multiple EH decode-and-forward (DF) relays that can harvest the energy from their received radio signals. A power-splitting ratio is employed at an EH DF relay to characterize a trade-off between the energy used for decoding the source signa...
Article
Full-text available
A new joint best relay and jammer selection (JBRJS) scheme is conceived for enhancing the physical layer security (PLS) of cooperative networks relying on multiple energy harvesting (EH) aided intermediate nodes, which accumulate energy based on the power splitting (PS) protocol. Specifically, we select the best intermediate node as the relay, whil...
Article
Full-text available
In this study, the authors investigate the security and reliability trade‐off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co‐channel interference. To enhance the SRT performance of the network, the authors p...
Article
In this paper, we consider a multi-relay cooperative communication network that consists of a source node transmitting to its destination with the help of multiple decode-and-forward (DF) relays. Specifically, the DF relays that succeed in decoding the source signal are allowed to re-transmit their decoded results simultaneously to the destination...
Preprint
In this paper, we investigate an energy cost minimization problem for a smart home in the absence of a building thermal dynamics model with the consideration of a comfortable temperature range. Due to the existence of model uncertainty, parameter uncertainty (e.g., renewable generation output, non-shiftable power demand, outdoor temperature, and el...
Article
In this paper, we investigate physical-layer security for a heterogeneous cellular network consisting of a macro cell and a small cell in the presence of a common eavesdropper that intends to tap both the macro cell and small cell. The orthogonal spectrum sharing (OSS) and non-orthogonal spectrum sharing (NOSS) are considered for the heterogeneous...
Article
This paper investigates the physical-layer security of wireless transmissions with the aid of multiple decode-and-forward one-way relays in the presence of both eavesdropping attacks and channel estimation errors. To protect wireless transmission with channel estimation error, two opportunistic relaying schemes are conceived to upgrade the physical...
Article
This paper investigates the problem of energy efficiency maximization (EEM) for the small cells that coexist with a macro cell in an underlay heterogeneous cellular network, where a macro base station and a number of small base stations transmit signals to a macro user and small users through their shared spectrum. We propose a joint power and band...
Preprint
Unmanned aerial vehicle (UAV) networks have grown rapidly in recent years and become attractive for various emergence communications scenarios. In this paper, we consider a UAV acting as a relay node to assist wireless transmissions from a base station (BS) to a ground user (GUs). A closed-form expression of outage probability for the BS-GUs transm...
Article
In this paper, we investigate the physical layer security (PLS) of cooperative wireless-powered networks where a source transmits confidential information to a destination with the aid of wireless-powered intermediate nodes equipped with multiple antennas in the presence of a passive eavesdropper. We consider two generalized joint relay and jammer...
Article
Full-text available
The hardware impairments of transceiver nodes that generate signal distortions degrade the reliability performance of communication systems. This paper investigates the impact of hardware imperfections on the outage performance of hybrid satellite-terrestrial relay systems (HSTRS), where a geosynchronous earth orbit (GEO) satellite transmits its da...
Article
Full-text available
We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals tran...
Preprint
Full-text available
We study the physical-layer security of a spectrum-sharing heterogeneous wireless network in the face of an eavesdropper, which is composed of multiple source-destination (SD) pairs, where an eavesdropper intends to wiretap the signal transmitted by the SD pairs. In order to protect the wireless transmission against eavesdropping, we propose a hete...
Preprint
In this paper, we investigate physical-layer security for a heterogeneous cellular network consisting of a macro cell and a small cell in the presence of a passive eavesdropper that intends to tap both the macro-cell and small-cell transmissions. Both the orthogonal spectrum sharing (OSS) and non-orthogonal spectrum sharing (NOSS) are considered fo...
Article
In this paper, we study a multiuser uplink network consisting of one base station (BS), multiple users and one eavesdropper (E), where the users are intended to transmit their confidential messages to BS, while the eavesdropper attempts to tap their transmissions. To improve the transmission secrecy, we propose two friendly jammer selection aided m...
Preprint
In this paper, we consider an energy-harvesting (EH) relay system consisting of a source, a destination, and multiple EH decode-and-forward (DF) relays that can harvest the energy from their received radio signals. A power-splitting ratio is employed at an EH DF relay to characterize a trade-off between an energy used for decoding the source signal...
Article
Full-text available
In [1] , the calculation of (8) was erroneous. To be specific, as shown in (8) of [1] , the average transmit power of a specially-designed signal ${x_{m} = - {{\sqrt {P_{S}} {h_{Sm}}h_{Am}^{*}{x_{S}}}}/{{{{\left |{ {{h_{Am}}} }\right |}^{2}}}}}$ was obtained as \begin{equation*}{P_{m} = \frac {{\sigma _{Sm}^{2}}}{{\sigma _{Am}^{2}}}}P_{S},\end...
Article
In this paper, we analyze the secrecy outage probability and computation overhead of a multi-user multieavesdropper wireless system which is composed of one cluster head (CH) transmitting to multiple users, while multiple eavesdroppers attempt to tap the transmission from CH to multiple users in the presence of co-channel interference (CCI). To ach...
Article
Full-text available
In this paper, we investigate physical-layer security for a spectrum-sharing heterogeneous cellular network comprised of a macro cell and a small cell, where a passive eavesdropper is assumed to tap the transmissions of both the macro cell and small cell. In the macro cell, a macro base station (MBS) equipped with multiple distributed antennas send...
Article
Full-text available
In this paper, a hybrid satellite-terrestrial relay network (HSTRN) interconnecting a satellite and multiple terrestrial nodes is considered, where communication is achieved by the satellite transmitting information to a destination through multiple relays at the appearance of an eavesdropper attempting to intercept the transmissions from both the...
Preprint
In this paper, we investigate physical-layer security for a spectrum-sharing heterogeneous cellular network comprised of a macro cell and a small cell, where a passive eavesdropper is assumed to tap the transmissions of both the macro cell and small cell. In the macro cell, a macro base station (MBS) equipped with multiple distributed antennas send...
Article
In this paper, we investigate the power allocation of primary base station (PBS) and cognitive base station (CBS) across different orthogonal frequency division multiplexing (OFDM) subcarriers for energy-efficient secure downlink communication in OFDM-based cognitive radio networks (CRNs) with the existence of an eavesdropper having multiple antenn...
Article
To intelligently schedule heating, ventilation, and air conditioning (HVAC) systems for reducing energy cost of commercial buildings, indoor temperature and indoor air quality (IAQ) should be jointly considered. Otherwise, the health and productivity of occupants may be affected. In this paper, we investigate the problem of minimizing the sum of en...
Article
Full-text available
Educational buildings consume about 2% of the total energy in a country, which leads to energy cost concerns for building operators. To reduce the building energy cost, an effective way is to intelligently schedule heating, ventilation, and air conditioning (HVAC) systems, which account for above 40 percent of the total energy consumption in educat...
Conference Paper
Full-text available
The millimeter-wave (mmWave) technology is one possible solution to addressing the explosive requirements for mobile data access on high-speed railways (HSRs). However, utilizing the mmWave technology on HSRs will result in large Doppler shift, which should be estimated and compensated. Traditional Doppler shift estimators including the cyclic pref...
Article
The millimeter-wave (mmWave) technology is one possible solution to addressing the explosive requirements for mobile data access on high-speed railways (HSRs). However, utilizing the mmWave technology on HSRs will result in large Doppler shift, which should be estimated and compensated. Traditional Doppler shift estimators including the cyclic pref...