Yuzhen Huang

Yuzhen Huang
NIIDT · AIRC

About

134
Publications
8,322
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,565
Citations

Publications

Publications (134)
Article
The massive multi-input multi-output (mMIMO) systems are vulnerable to both pilot contamination and pilot spoofing attack (PSA), which jeopardize the uplink channel estimation and cause information leakage in the downlink transmissions. Motivated by the canonical large-scale fading precoding (LSFP) [1], a secure LSFP is proposed to eliminate the im...
Article
Intelligent reflective surfaces (IRSs) as low energy consumption and easy to attach devices have been widely applied in the field of anti-jamming recently. In particular, the combination of IRS and unmanned aerial vehicle (UAV), as IRS-UAV, further expands the scope of IRS services. In this article, the joint IRS selection and beamforming optimizat...
Article
Full-text available
As a revolutionary technology, reconfigurable intelligent surface (RIS) is favored by numerous industrialists and engineers, which can intelligently adjust the wireless communication environment. In our paper, the outage behaviors of RIS-assisted non-terrestrial networks with cognitive radio and non-orthogonal multiple access (NOMA) are analyzed. P...
Article
Full-text available
Satellite-aerial-ground integrated networks (SAGINs) have emerged as a promising infrastructure for next-generation wireless networks. Considering the fading effects of obstacles over longer transmission distances, in this paper, we equip reconfigurable intelligent surfaces (RIS) on the unmanned aerial vehicle (UAV) to reflect the uplink signals fr...
Article
Full-text available
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D communication model assisted by covert communication, an...
Article
Full-text available
Integrated satellite unmanned aerial vehicle relay networks (ISUAVRN-s) are the famous topic these years. This paper investigates the average secrecy capacity (ASC) for reconfigurable intelligent surface (RIS)-enabled ISUAVRNs. Especially, an eve is considered to steal the legitimate information for the considered secrecy systems. Besides, we get t...
Article
In this work, we propose a novel energy-efficient covert wireless communication scheme through probabilistic jamming, where a jammer probabilistically transmits artificial noise (AN) with variable power against a warden’s detection. For the proposed scheme, the closed-form expressions for the warden’s detection error probability, the transmission o...
Article
Full-text available
Recently, non-orthogonal multiple access (NOMA)-enabled cognitive satellite-unmanned aerial vehicle (UAV)-terrestrial networks have attracted extensive attention for the advantages of enhancing spectrum efficiency and coping with the exponential growth of access users. In this paper, we propose a joint subchannel assignment and power allocation alg...
Article
In this paper, physical layer security techniques are investigated for cooperative multi-input multi-output (C-MIMO), which operates as an underlaid cognitive radio system that coexists with a primary user (PU). The underlaid secrecy paradigm is enabled by improving the secrecy rate towards the C-MIMO receiver and reducing the interference towards...
Article
Full-text available
Cognitive radio and non-orthogonal multiple access are promising to improve the spectrum efficiency for the satellite-high altitude platform (HAP)-terrestrial networks. To achieve the optimal system performance and guarantee the quality of service, we formulate a constrained mixed integer nonlinear programming problem to maximize the sum rate of se...
Article
Full-text available
Satellite communication has become a popular study topic owing to its inherent advantages of high capacity, large coverage, and no terrain restrictions. Also, it can be combined with terrestrial communication to overcome the shortcomings of current wireless communication, such as limited coverage and high destructibility. In recent years, the integ...
Article
To support large-scale connectivity of massive machine-type communication (mMTC) devices in Industrial Internet of Things (IIoT) scenario, a grant-free (GF) transmission aided nonorthogonal multiple access (NOMA) system is considered in this article, where the devices with diverse behavior characteristics coexist. In order to reflect the diversity...
Article
In this letter, we investigate a covert communication system with a wireless-powered jammer, where the jammer firstly harvests energy from a receiver and then generates artificial noise (AN) to confuse the detection at a warden on the communication activity. To evaluate the communication covertness and quality, we analytically derive the sum of err...
Article
In this letter, we propose a deep learning-based method for the direction of arrival (DOA) estimation in the low signal-to-noise ratio (SNR) scenario. Specifically, the DOA estimation is modeled as a multi-label classification task, and a novel dual class token Vision Transformer (DCT-ViT) is designed to fit it. Different from the classical ViT arc...
Article
Full-text available
With the increasing shortage of satellite spectrum resources, non-orthogonal multiple access (NOMA) scheme is applied to satellite communication (SatCom) networks, which is regarded as one of the key technologies to improve spectrum efficiency. In this paper, we investigate the joint impact of non-ideal limitations, i.e., channel estimation errors,...
Article
In this paper, we consider the secure multi-user downlink communication scheme against eavesdroppers in Integrated Sensing and Communication (ISAC) systems, where the ISAC base station (BS) transmits ISAC waveform to serve communication users and sense targets, and artificial noise (AN) is employed to guarantee the transmission secrecy. In particul...
Article
Full-text available
Satellite communication has become a popular study topic owing to its inherent advantages of high capacity, large coverage, and no terrain restrictions. Hence, it can be combined with terrestrial communication to overcome the shortcomings of current wireless communication, such as limited coverage and high destructibility. Over recent years, the in...
Article
In this paper, we investigate the possibility and condition of exploiting wireless-powered signals as a cover for conducting covert communications in unmanned aerial vehicle (UAV) networks. Specifically, we aim to design the hovering altitude of a UAV and its prior transmission probability to strike a balance between energy replenishment and covert...
Article
Full-text available
Integrated satellite-high altitude platform-terrestrial networks (IS-HAP-TNs) and non-orthogonal multiple access (NOMA) scheme are considered to be the key components of next generation networks, which can satisfy the demands of high-quality transmission, wide coverage and large-scale connections. In this letter, we analyze the performance of NOMA-...
Article
This paper investigates the anti-jamming communication scenario where an intelligent reflecting surface (IRS) is mounted on the unmanned aerial vehicle (UAV) to resist the malicious jamming attacks. Different from existing works, we consider the dynamic deployment of IRS-UAV in the environment of the mobile user and unknown jammer. Therefore, a joi...
Article
In this letter, we explore the feature of coprime linear array (CLA) motion for enhanced array aperture and higher degree of freedom (DOF) by implementing synthetic aperture processing. Since the traditional fixed CLA cannot achieve two-dimensional (2-D) DOA estimation, we propose a novel approach to construct the virtual coprime planar array (VCPA...
Article
With the improvement of quality of service requirement and the increase of energy expenditure, integrating caching and energy harvesting (EH) to device-to-device (D2D) communication is a prospective but challenging research. In this paper, we focus on investigating the network performance with stochastic geometry for cache-and EH-enabled D2D cellul...
Article
Full-text available
In this paper, we consider covert communications for bistatic backscatter systems, where a tag transmits information passively to a reader by reflecting incident carrier signals with artificial noise (AN) generated from a dedicated carrier emitter (CE) under the supervision of a warden. By exploiting the channel uncertainty introduced by CE, we ana...
Article
Full-text available
As one of the key technologies in 5th generation mobile networks, device-to-device (D2D) communication technology can significantly improve spectrum utilization, throughput and energy efficiency as well as reduce congestion in the networks. However, due to the spectrum sharing between D2D users (DUs) and cellular users (CUs), it may also cause seri...
Article
The integration of mobile-edge computing (MEC) and energy harvesting (EH) can potentially improve the network performances and prolong the battery life of the device. In this article, we study the resource management problem in the device-to-device (D2D)-aided wireless powered MEC networks where one device can forward or execute computation data fo...
Article
This paper studies a two-user cooperative non-orthogonal multiple access network with a novel cooperation scheme, where the source communicates with the near user directly or through the help of $K$ relays, while the communication to the far user relies on the help of the near user or the $K$ relays. For cases with decode-and-forward (DF) relay...
Article
In this letter, we explore the problem of DOA estimation using neural networks for two closely spaced sources. Since the traditional high-resolution techniques based on classical algorithms cannot achieve high-accuracy DOA estimation in the presence of two closely spaced sources, especially at low signal-to-noise ratios (SNR), we propose a novel DO...
Article
In this paper, we investigate the relay selection problem for two-way simultaneous wireless information and power transfer (SWIPT) enabled cognitive radio networks. The system we consider includes a pair of primary users and multiple secondary user transceivers, where the secondary transmitters are energy-constrained and employ the decode-and-forwa...
Article
Satellite communication (SatCom) has attracted much attention due to its inherent characteristics. Security issues have gained severe concerns in SatCom since it is susceptible to be illegally eavesdropped by malicious ground stations within large-scale wireless coverage. In this paper, we investigate the physical layer security of a multiuser SatC...
Article
Full-text available
In this paper, we propose an optimization problem of joint spectrum resource matching, power allocation and transmission time duration in energy harvesting (EH) aided device-to-device (D2D) communications underlying cellular network. Particularly, to increase the spectral efficiency (SE), multiple D2D links are permitted to multiplex the same resou...
Article
In this article, we focus on investigating the two-dimensional direction of arrival (2-D DOA) estimation for the unfolded coprime L-shaped array (UCLsA). Due to 2-D spectral peak searching, the computational complexity of the existing 2-D DOA estimation methods based on the multiple signal classification (MUSIC) algorithm is too high. Motivated by...
Article
Full-text available
In this paper, we investigate the impact of hardware impairments (HIs) on the performance of non-orthogonal multiple access (NOMA) based integrated satellite-terrestrial relay networks (ISTRNs). Particularly, we obtain the novel closed-form expression for the outage probability (OP) of the considered NOMA-based ISTRNs with HIs. Furthermore, to get...
Article
Full-text available
This paper investigates the physical layer security (PLS) for the transmission of confidential information over satellite communication systems under unified framework. The generalized shadowed-Rician (SR) fading is utilized to model the satellite channel and multiple legitimate users are served to cooperatively receive the broadcast signal with a...
Article
Full-text available
In this paper, we design a new collaboration interference (CI) transmission scheme for overlay cognitive full-duplex wireless wiretap networks, where a full-duplex secondary user utilizes the licensed spectrum to transmit the secondary information and uses the secondary signal as a special noise to help and protect the secure transmission of primar...
Article
Full-text available
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for enhancing the secrecy performance. Moreover, we adopt a practical maximal ratio transmission (MRT) sche...
Article
Full-text available
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). We consider the scenario when the FAE intrudes the D2D underlaying cellular networks, it can passively wiretap confidential messages in D2D communications and actively jam all legitimate links. A hierarch...
Article
In this paper, we investigate the secrecy performance of cognitive multi-input multi-output multiuser (MIMO-MU) wiretap networks over space-and-time correlated fading channels. Specifically, we propose a joint transmit antenna selection (TAS) and multiuser scheduling scheme to improve the security of the considered system. To thoroughly analyze the...
Article
In this paper, we consider an uplink satellite multi-terrestrial relay network, which employs a single antenna user to communicate with a satellite via multiple decode-and-forward (DF) terrestrial relays. Due to the spectrum sharing policy, terrestrial relays are interfered by co-channel interference (CCI). For inevitable radio frequency (RF) front...
Article
Full-text available
In this paper, we provide a comprehensive performance analysis of simultaneous wireless information and power transfer (SWIPT) for cognitive relay networks with different relay schemes. In the considered system, the energy-constrained secondary transmitter harvests the energy from the primary signal and then employs the harvested energy to forwards...
Article
Full-text available
In this paper, we investigate the energy-efficient secure uplink transmission for the wireless powered Internet of Things (IoT), where one energy-constrained source and multiple energy-constrained relays harvest energy from multiple power beacons (PBs) in the presence of a passive eavesdropper. To perform energy-efficient secure communications, we...
Article
This letter aims to maximize the achievable throughput of a multi-antenna-relay-assisted wireless powered communication network (WPCN), where each transmission block starts with the wireless energy transfer (WET) from the energy-rich relay to the source in phase 1, follows the wireless information transmission (WIT) from the source to the relay and...
Article
Full-text available
This paper investigates the joint impact of channel estimation errors (CEEs) and hardware impairments (HIs) on the performance of a cognitive satellite-terrestrial relay network (CSTRN), where the terrestrial and satellite links are considered following Rayleigh fading and shadowed Rician (SR) fading distributions, respectively. Besides, the terres...
Article
Full-text available
In this paper, we investigate the impacts of joint relay selection and user scheduling scheme on the physical layer security for hybrid satellite terrestrial relay systems, where multiple terrestrial relays, multiple terrestrial users and multiple illegitimate eavesdroppers are considered in the network. To strengthen the system security against wi...
Article
In this paper, we investigate the security and efficiency of data transmission for overlay cognitive radio networks, which consist of a pair of primary users, multiple pairs of energy limited secondary users and multiple eavesdroppers. Specifically, to achieve a better tradeoff between the security of primary transmission and the efficiency of seco...
Conference Paper
This paper investigates the joint effects of hardware impairments (HIs) and imperfect channel state information (CSI) on the cognitive satellite-terrestrial relay networks (CSTRN) with multiple primary users (PUs). The satellite links are assumed to follow the Shadowed-Rician (SR) fading, while the terrestrial links follow the Rayleigh fading. Spec...
Article
Full-text available
In this paper, we investigate the secrecy performance of energy-constrained wireless powered networks with considering the passive eavesdropping scenario, where the simultaneous wireless information and power transfer based full-duplex selfjamming (SWIPT-FDSJ) scheme is developed. The maximal ratio transmission (MRT) protocol is applied at the mult...
Article
Full-text available
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward (RaF) cognitive relay multichannel wiretap networks over correlated fading channels, in which the eavesdropper can wiretap the information from source and relays simultaneously. Specifically, in order to enhance the secrecy performance, we introduce two cooperat...
Article
Full-text available
In this paper, we present a comprehensive secrecy performance analysis of wireless powered communication networks with multiple eavesdroppers, where an energy-limited information source with multiple antennas harvests the radio frequency (RF) energy from a dedicated power beacon (PB) before transmission. To exploit the benefits of multiple antennas...
Article
In this paper, we investigate the physical layer security design in multiuser multiple-input single-output downlink with simultaneous wireless information and power transfer. Specifically, by considering that legitimate receivers use power splitting to extract information and harvest energy simultaneously, we investigate the robust weighted sum sec...
Article
Full-text available
This paper investigates the effects of practical hardware impairments (HIs) on a cognitive hybrid satellite-terrestrial networks (CHSTN) with multiple primary users (PUs). The widely-employed Shadowed-Rician fading distribution is adopted to model the satellite-terrestrial channel. CHSTN can provide comprehensive wireless coverage as well as enhanc...
Article
Full-text available
In this paper, we investigate the worst-case robust secure precoding design for simultaneous wireless information and power transfer in multiple-input-multiple-output wiretap system, which consists of one transmitter, one information receiver, and one energy receiver. By treating the ER as potential eavesdropper, we aim to maximize the worst-case s...
Article
Full-text available
In this paper, we investigate the performance of three transmit antenna selection (TAS) schemes for an energy harvesting decode-and-forward (DF) relay cooperative network. In the network, the energy-limited relay first harvests the energy from the received signal with the power-splitting scheme, and then utilizes the harvested energy to forward the...
Article
Full-text available
In this paper, we design a novel architecture of distributed satellite cluster network (DSCN). In order to achieve a good trade-off between the energy consumption and the total capacity, we detailedly investigate the joint downlink power and time-slot allocation problem taking into account limitation of resource, collaborative coverage of multi-sat...
Article
Full-text available
In this paper, we investigate the secrecy performance of dual-hop decode-and-forward cognitive relay networks taking into account the channel correlation between the main and wiretapping channels. For the enhancement of the secrecy performance, a generalized relay selection scheme is utilized, where the $k$ th strongest relay node is selected bas...
Article
In this letter, we investigate the energy efficiency optimization for simultaneous wireless information and power transfer (SWIPT) in multiple-input-multiple-output (MIMO) wiretapping system which consists of one transmitter, multiple desired receivers (DRs), and multiple eavesdroppers (Eves). Specifically, considering non-linear energy harvesting...
Article
Full-text available
Space information networks are proposed to broaden the observation area and realize continuous information acquisition using satellites and high-altitude platform stations. Space information networks are able to enhance detection and transmission capabilities compared to the current single Earth observation satellite. The satellite–terrestrial netw...
Article
Full-text available
This paper investigates the secrecy performance of amplify-and-forward (AF)-relaying cooperative cognitive radio networks (CCRNs) over Rayleigh-fading channels. Specifically, we consider practical passive eavesdropping scenarios, where the channel state information of the eavesdropper’s link is not available at the secondary transmitter. In order t...
Article
Full-text available
In this paper, we investigate the impact of hardware impairments on the outage performance and the instantaneous capacity of dual-hop decode-and-forward (DF) satellite relay networks in the presence of co-channel interference. Specifically, the exact closed-form expression for the outage probability and the analytical expression for the instantaneo...
Article
In this paper, we propose a novel physical layer strategy to improve the secrecy performance of multiuser multiple-input single-output networks. In this strategy, orthogonal space-time block code (OSTBC) is employed at an $A_{\rm A}$ -antenna base station (BS) and artificial noise (AN) is employed at an $A_{\rm J}$ -antenna cooperative relay to enh...
Article
In this letter, we investigate the outage constrained robust secure design in multiple-input multiple-output (MIMO) simultaneous wireless information and power transfer (SWIPT) system, where the energy receivers (ERs) may eavesdrop the confidential information send to the desired receivers (DRs). Specifically, we proposed a joint design of the prec...
Article
In this letter, we propose a novel decoupled method for two-dimensional direction of arrival (2-D DOA) estimation in L-shaped array. Specifically, in the proposed method, the Jacobi- Anger expansion is utilized to decouple the elevation angle from the azimuth angle, which means that the reconstructed manifold of the L-shaped array is the product of...
Article
Full-text available
In this paper, we investigate the secure transmission of wireless relaying systems with multi-destinations and an eavesdropper (Eve) in Nakagami-m fading channels. To protect the confidential message from leaking to the Eve, an intentional interference is sent from a selected destination. We propose two jammer selection schemes under two typical co...
Article
Full-text available
In this letter, the effect of hardware impairments on the two-way satellite-terrestrial hybrid relay networks is analyzed. The terrestrial relay is considered as a two-way relay, which can transmit signals to both the satellite source and the mobile source simultaneously. Specially, the closed-form expression, the asymptotic expression at high sign...
Article
Full-text available
In wireless sensor networks, sensor nodes are deployed to collect data and deliver the sensed information to a base station in a wireless manner. Due to the broadcast nature of wireless sensor communications, relay-sensor-based secure transmission remains a challenging issue. This article proposes a joint cooperative beamforming and jamming scheme...
Article
Full-text available
In this paper, we investigate the physical layer security for amplify-and-forward (AF) relay networks with simultaneous wireless information and power transfer (SWIPT). Specifically, by considering the dual-functional desired receiver (DR) which is capable of decoding information and harvesting energy (EH), and assuming that only imperfect eavesdro...
Article
This paper investigates the secrecy outage performance of buffer-aided multirelay multiple-input multiple-output cooperative systems in the presence of a passive eavesdropper. Due to the unavailability of the channel state information of eavesdropper's channel, a buffer-aided joint transmit antenna and relay selection scheme based on the main chann...
Article
Full-text available
In this paper, we investigate the effect of hardware impairments on the performance of dual-hop amplify-andforward (AF)/ decode-and-forward (DF) multiple relaying networks using switch-and-examine combining with post-selection (SECps) scheduling scheme in shadowed-Rician channel. Moreover, we consider a more general network, where the hard impairme...