Pin-Han Ho’s research while affiliated with University of Waterloo and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (18)


Toward EEG-Based Objective Assessment of Emotion Intensity
  • Conference Paper

July 2024

Pin-Han Ho

·

Yong-Sheng Chen

·



Extremely Large-Scale Array System: Cooperative NFC or FFC?

May 2024

·

16 Reads

·

1 Citation

IEEE Wireless Communications Letters

Even that near-field communication (NFC) significantly improves the performance due to the unique spherical-wave channel model in electromagnetic propagation, its future application in communications is still with boundedness, which suffers from the constrained communication distance. In this letter, we investigate a cooperative relaying NFC and far-field communication (FFC) coexisting system with extremely large-scale array (XL-array), where one far user is out of Rayleigh distance from base station (BS), as well as the scenarios from BS to the near relay/user and from the near relay/user to far user are NFCs. Specifically, the closed-form and asymptotic expressions for achievable capacity are respectively derived. In addition, simulation and numerical results confirm the correctness and superiority of our proposed schemes, which show that the capacity improvement from NFC effectively compensates the performance loss from the half-duplex principle, even providing a better profit compared with FFC.


Secure Beamforming for Unmanned Aerial Vehicles Equipped Reconfigurable Intelligent Surfaces

March 2024

·

11 Reads

·

3 Citations

IEEE Internet of Things Magazine

Reconfigurable Intelligent Surface (RIS) attracts significant interest due to its passive nature and low power consumption. RIS equipped with unmanned aerial vehicles (UAVs) is utilized to further improve the performance of a wireless network. However, the secrecy of UAV-RIS faces challenges under imperfect channel state information (CSI), especially when UAV-RIS is paired with beamforming under various propagation channels. In this article, we outline possible security requirements in UAV-RIS beamforming use cases while considering real-world situations. Then, we present a deep deterministic policy gradient (DDPG)-based beamforming approach for secure UAV-RIS beamforming to enhance the performance of communication channels. The proposed solution for secure beamforming for UAV-RIS connectivity offers appreciable performance improvements over conventional methods. Finally, we determine several intriguing future research directions and challenges.


Guest Editorial: Introduction to Heterogeneous Robotic Systems in 5G and Beyond Networks

April 2023

·

7 Reads

IEEE Wireless Communications

Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' application requirements for wireless networks based on robot transformation and upgrading, robot interconnection, and remote interactive applications in production. However, there exists many challenging 5G communication issues, such as different communication protocols in the system varies with different robots and no dis-ruptive changes to the physical layer.


Equilibrium Allocation Approaches of Quantum Key Resources With Security Levels in QKD-Enabled Optical Data Center Networks

December 2022

·

15 Reads

·

8 Citations

IEEE Internet of Things Journal

In this paper, the network performance of equilibrium allocation of quantum key resources was investigated in quantum key distribution (QKD) enabled optical data center networks. To effectively use quantum key resources, we propose three novel efficient load balancing routing, wavelength, and time-slot assignment (LB-RWTA) approaches, including LB-RWTA with flexible security level (LB-RWTA-FSL), LB-RWTA with specific security level (LB-RWTA-SSL), and LB-RWTA without security level (LB-RWTA-NSL). Particularly, the proposed LB-RWTAFSL approach is uniquely featured by adaptive security level classification (ASLC) and load balancing (LB), aiming to demarcate the security level and reduce the overall network congestion. We introduce an existing routing, wavelength, and time-slot assignment (E-RWTA) approach without security level, called E-RWTA, for comparison. Simulation results show the effectiveness of our proposed approaches in terms of much higher quantum key resource efficiency and thus much higher network security performance than the state-of-the-art quantum key resource allocation approaches compared with the E-RWTA approach in QKD-enabled optical data center networks.


Editorial Introduction to Responsible Artificial Intelligence for Autonomous Driving

December 2022

·

5 Reads

·

2 Citations

IEEE Transactions on Intelligent Transportation Systems

Artificial Intelligence is in transition as the fast convergence of digital technologies and data science holds the promise to liberate consumer data and provide a faster and more cost-effective way of improving human initiatives. Particularly, artificial intelligence (AI) is heavily influencing autonomous vehicles nowadays. The data driven-based AI autonomous vehicles have the potential to reshape the expectations of human’s actions, the way that companies’ stakeholders collaborate, and revamp business models in the various industries.




Virtual Optical Network Mapping Approaches in Space-Division-Multiplexing Elastic Optical Data Center Networks

June 2022

·

34 Reads

·

12 Citations

Journal of Lightwave Technology

This paper addresses the problems of mapping virtual optical networks (VONs) onto space-division-multiplexing elastic optical data center networks (SDM-EODCNs). We first propose the concepts of link importance degree (LID) and node importance degree (NID) and put forward the calculation formula to optimize the VONs mapping, by which VON mapping approaches are developed. For comparison, we introduce a random (RAN) VON mapping approach that can provide benchmark performance. Simulation results show that the proposed LID VON mapping approach can yield solutions closest to the optimal ones obtained via an ILP model. On the other hand, compared to the NID and RAN VON mapping approaches, the LID VON mapping approach not only effectively improves the network profit by reducing the total network cost, but also solidly increases the number of VONs mapping.


Citations (10)


... Similarly, to facilitate the implementation of advanced encryption and authentication mechanisms, mmWave communication can be used, which enables UAVs to leverage higher bandwidths and shorter wavelengths [118]. Also, by strategically deploying RIS in the communication environment, UAVs can create secure communication zones and enhance signal privacy by blocking eavesdroppers' access to sensitive information [119]. The passive nature of RIS elements reduces the risk of detection and interception, strengthening the overall security posture of UAV communication networks. ...

Reference:

Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review
Secure Beamforming for Unmanned Aerial Vehicles Equipped Reconfigurable Intelligent Surfaces
  • Citing Article
  • March 2024

IEEE Internet of Things Magazine

... Unfortunately, underwater images face a variety of quality degradation due to light attenuation in underwater propagation [1,2]. These issues limit some applications of underwater archaeology, underwater ocean development, and underwater biology research [3][4][5]. As a result, enhancing the quality of underwater images in a successful manner positively impacts the execution of high-level underwater tasks. ...

Editorial Introduction to Responsible Artificial Intelligence for Autonomous Driving
  • Citing Article
  • December 2022

IEEE Transactions on Intelligent Transportation Systems

... The growing demand for increased communication capacity has become an inevitable challenge, particularly with the advancement of technologies such as cloud computing [4] and big data [5]. Traditionally, parallel data are distinguished by wavelength during data processing and transmission, using a technology known as wavelength division multiplexing (WDM) [6,7]. ...

Energy-Efficient Resource Sharing Offloading Schemes for Collaborative Edge-Cloud Computing in Optical-Wireless Networks
  • Citing Conference Paper
  • July 2022

... Weike Ma and Bowen Chen investigated the performance of balancing the allocation of quantum key resources in optical data center networks using Quantum Key Distribution (QKD). In order to effectively utilize quantum key resources, they proposed three efficient load balancing routing, wavelength, and time-slot allocation (LB-RWTA) methods, which have high efficacy in quantum key resource allocation and network performance management [25]. Xiaosong Yu and Yuhang Liu et al. studied the key routing in different typical network topologies under partially trusted relay scenarios and proposed a secret key distribution (SKP)-based collaborative routing algorithm for finding the optimal key relay routing path. ...

Equilibrium Allocation Approaches of Quantum Key Resources With Security Levels in QKD-Enabled Optical Data Center Networks
  • Citing Article
  • December 2022

IEEE Internet of Things Journal

... Note that our aim is to provide a principled performance comparison of different network architectures rather than an optimal solution. Hence, we select the auxiliary-graph-based approach, because it has been proven to be a good heuristic for the routing problem for optical networks with grooming, regeneration, and different line rates [25,26,27,28,29,30]. The difference between the proposed CAG-ND algorithm and the previous auxiliary-graph-based algorithms (as, e.g., [27,28]) is twofold. ...

Virtual Optical Network Mapping Approaches in Space-Division-Multiplexing Elastic Optical Data Center Networks
  • Citing Article
  • June 2022

Journal of Lightwave Technology

... In earlier literature, traditional PLA methods are commonly formulated as a statistical hypothesis test, in which the de-tection threshold is established to identify whether the signal is legal or not [11]. Since it is challenging to distinguish multi-users by establishing multi-thresholds, researchers have recently formulated the CSI-based multiuser PLA problem as a multi-classification problem and solved it via Machine Learning (ML) techniques [12], especially Deep Learning (DL) models [4], [13]- [15]. Liao et al. [13] introduce a DLbased PLA scheme to distinguish multiple legal users from attackers for mobile edge computing (MEC) systems, and adopt three gradient descent algorithms to reduce computation overheads. ...

On Physical-Layer Authentication via Online Transfer Learning
  • Citing Article
  • Full-text available
  • June 2021

IEEE Internet of Things Journal

... First, it can be difficult and expensive to ensure that IoT devices are compatible with and integrated into existing building systems. Planning is essential for smooth functioning and data interoperability after retrofitting older buildings with sensors, actuators, and communication networks [3]. Furthermore, the security and confidentiality of information are of utmost importance. ...

Guest Editorial: Special Issue on Internet of Things for Industrial Security for Smart Cities
  • Citing Article
  • April 2021

IEEE Internet of Things Journal

... In another study authors provided physical layer authentication using convolutional neural networks [244]. The Triple-Pool CNN (TP-CNN) has been proposed in [245] that uses Convolutional Neural Network. The Two-Stream CNN was designed in [246]. ...

On Physical-Layer Authentication via Triple Pool Convolutional Neural Network
  • Citing Conference Paper
  • December 2020

... In the traditional logistics and transportation system, from procurement and transportation to warehousing and sorting to the final performance statistics before production, all show the disadvantages of complicated operation, low intelligence level, time-consuming, and laborious. The manual logistics system from transportation to storage is simple and costs a lot, which is not conducive to the improvement of production efficiency and will eventually lead to the passive and difficult operation of the company, which may eventually lead to the risk of bankruptcy (Abdallah et al. 2020;Maiti et al. 2019). IoT is introduced to build a logistics system, from intelligent transportation to intelligent storage, to optimize the logistics and transportation process, forming an efficient and unified production rhythm and promoting the transformation of production efficiency. ...

Blockchain-Enabled Industrial Internet of Things: Advances, Applications, and Challenges
  • Citing Article
  • June 2020

IEEE Internet of Things Magazine

... Cụ thể, hầu hết các nghiên cứu gần đây về mạng chuyển tiếp đa chặng dạng cụm như [6]- [7], [28]- [30] đều chưa xét đến việc áp dụng NOMA để cải thiện tốc độ dữ liệu. Mặt khác, hầu hết các nghiên cứu gần đây về NOMA trong mạng chuyển tiếp chủ yếu tập trung vào mô hình chuyển tiếp hai chặng [21], [31]- [34]. Khác với các công trình trước đây, bài báo này xét trường hợp nút nguồn cách xa các nút đích, và việc truyền dữ liệu phải thông qua nhiều chặng. ...

A Deep Study on Layered Multi-Relay Non-Orthogonal Amplify-Forward Networks
  • Citing Article
  • October 2019

IEEE Transactions on Wireless Communications