Xudong Wang's research while affiliated with Shanghai Jiao Tong University and other places

Publications (123)

Article
Recently, the development of integrated sensing and communications (ISAC) has attracted great attention. In this paper, the reference signal (RS) in 5G vehicle-to-everything (V2X) communications is leveraged for radar sensing. Particularly, the scattered RS design is adopted under the constraints of communication channel estimation and radar sensin...
Article
It is prevalent for a mobile edge device to conduct local inference using a compact machine learning model, which achieves lower latency and less compromise of data privacy as compared to cloud-based inference. To work in a new environment, the compact model needs to be adapted to the target data from the environment so as to maintain a high infere...
Article
Carrier-free pulse-based waveforms are desired in terahertz (THz) communications since pulse-based systems have simpler transceiver architectures than carrier-based systems. For such a pulse-based THz communication system, there still lacks pulse waveforms that can support high-order modulation and flexible multiple access. In this paper, a pulse-b...
Article
The advancement of nanosatellite techniques has boosted the growth of satellite-originated data and applications. Satellite edge computing (SEC) is envisioned to provide in-orbit processing of the sensed data to save the scarce terrestrial-satellite communication resources and support mission-critical services. While most of the existing SEC studie...
Article
Full-text available
Localizing RFID tagged objects by a mobile robot plays an important role in many Internet-of-Things (IoT) applications. Existing RFID localization systems are infeasible, since they either demand bulky RFID infrastructures or cannot achieve sufficient localization accuracy. In this paper, a portable localization (POLO) system is developed for a mob...
Article
A federated kernel $k$ -means (FedKKM) algorithm is developed in this article to conduct distributed clustering with low memory consumption on user devices. In FedKKM, a federated eigenvector approximation (FEA) algorithm is designed to iteratively determine the low-dimensional approximate vectors of the transformed feature vectors, using only lo...
Article
In a 5G integrated backhaul and access (IAB) network, an IAB-donor and multiple IAB-nodes form a multi-hop wireless backhaul network. When a terminal is connected to an IAB-node, the traffic flows generated by the terminal can be backhauled to the IAB-donor. Due to the mobility of terminals, access links are error-prone and cause difficulty in ensu...
Article
Considering network slicing in a cellular network, one of the most intriguing tasks is slice enforcement over air interfaces across multiple cells. The challenges lie in several aspects. First, resources allocated to different slices must achieve soft isolation at the link level. Second, users’ diverse QoS requirements must be satisfied even when c...
Article
The fifth generation (5G) communication network has been developed rapidly in the past few years, which provides substantial bandwidth capacities and higher quality of service (QoS). 5G technology commercialization includes mobile edge computing and communication technologies. The increasing deployment of mobile edge computing empowered 5G infrastr...
Article
In 5G networks, an integrated access and backhaul network is formed to connect IAB-nodes to the core network via an IAB-donor. To support multi-hop communications in this network, an adaptation-layer forwarding mechanism has been specified in the standard. However, the end-to-end delay achieved by such a mechanism cannot satisfy the requirement of...
Article
In recent years, full-duplex communications in a single frequency channel have become a practical technology. However, existing full-duplex medium access control (MAC) protocols can hardly take full advantages of full-duplex transmission opportunities, because they are not capable of adding one more half-duplex link on an on-going half-duplex link...
Article
During the training process of Federated learning (FL), proper devices are selected to participate in the training process to avoid model unfairness. In a mobile edge network, participant selection must be considered together with three factors: non-iid datasets possessed by devices, tunable local iterations on devices, and radio resource allocatio...
Article
The IEEE 802.11ad based joint communication and radar sensing (JCRS) has attracted great attention for vehicles in recent years. Existing studies mostly assume full-duplex radio for radar receiver based on perfect self-interference cancellation. However, the self-interference may not be fully cancelled in practice. In this paper, imperfect self-int...
Article
Edge computing is promising for connected vehicles. As vehicles move, their resource demands for edge servers vary. Thus, it is necessary to reserve edge servers dynamically to meet variable demands. Existing schemes of edge-server reservation usually rely on statistical information of resource demands to make reservations; they are infeasible for...
Article
Coded caching has become a hot research topic in recent years. However, existing studies rarely consider the delay constrained transmissions over wireless fading channels. For strict delay constrained content delivery over wireless fading channels, power optimization is usually required to achieve energy-efficient transmissions. Moreover, in coded...
Article
High-accuracy localization technology has gained increasing attention in gesture and motion control and many diverse applications. Due to multi-path fading and blockage effects in indoor propagation, 0.1m-level precise localization is still challenging. Promising for 6G wireless communications, the Terahertz (THz) spectrum provides multi-GHz ultra-...
Article
How to achieve efficient multiple access for Terahertz (THz) networks is still an open problem. The key obstacle is the extremely narrow angular coverage by a highly directional THz beam. Thus, a hybrid THzPrism beamforming (HTB) architecture is designed in this paper to greatly enlarge angular coverage by spreading frequency subcarriers to differe...
Article
Full-text available
Voice interaction, as an emerging human-computer interaction method, has gained great popularity, especially on smart devices. However, due to the open nature of voice signals, voice interaction may cause privacy leakage. In this paper, we propose a novel scheme, called SeVI, to protect voice interaction from being deliberately or unintentionally e...
Article
Recently, coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks. To support high efficient coded caching multicast transmissions, the time-varying heterogeneous channel conditions need to be considered. In this paper, a practical and novel multi-source spinal coding (MSSC) scheme is developed f...
Article
Container-based operation system (OS) level virtualization has been adopted by many edge-computing platforms. However, inter-container communications and container management consume significant CPU resources. Given an application with inter-dependent tasks, the number of such operations is closely related to the dependency between scheduled tasks....
Article
Full-text available
Terahertz (THz) communication is envisioned as one of the key technologies to satisfy the high data rate demand of intelligent 6G networks. However, directional transmissions, as well as the peculiarities of the THz band, pose challenges on medium access control (MAC) design. In this paper, a dual- radio-assisted MAC protocol supporting concurrent...
Article
To meet the tremendous demand of Internet of Things (IoT) applications, the 3rd Generation Partnership Project (3GPP) has specified the Narrowband IoT (NB-IoT) standard. However, collisions in the random access (RA) channel of NB-IoT can be severe due to mismatch between frequent random access attempts by a huge number of devices and the limited ra...
Conference Paper
Integrated access and backhaul (IAB) networking is envisioned as a key technology to support more flexible and dense deployment of base stations (BSs). However, existing directed acyclic graph (DAG) based IAB networking highly limits the flexibility and efficiency of link scheduling, due to the fixed parent-to-child relation between two adjacent IA...
Article
User provided network (UPN) allows a user with high channel quality to share the network access for users with poor channel quality. As a result, both the quality of experience and efficiency of network resource can be improved by UPN. However, the success of UPN relies heavily on the willingness of users to participate in sharing, so the design of...
Article
IEEE 802.11ax has adopted orthogonal frequency division multiple access (OFDMA) to support multi-user (MU) transmissions. There exist two uplink MU OFDMA access methods in IEEE 802.11ax. The first one is uplink OFDMA random access (UORA) in which stations randomly select resource units (RUs) to send physical protocol data units (PPDUs), so its acce...
Article
Full-text available
With large available bandwidths, Terahertz (THz) band communication has been envisioned as a key technique to satisfy the increasing demand for ultra-high-speed wireless communications. To overcome severe path loss of THz signals, large antenna array based beamforming, i.e., directional communication, is required for THz communications. Beamforming...
Preprint
Terahertz communications are envisioned as a key technology for 6G, which requires 100+ Gbps data rates, 1-millisecond latency, among other performance metrics. As a fundamental wireless infrastructure, the THz communication can boost abundant promising applications, including next-generation WLAN systems like Tera-WiFi, THz wireless backhaul, as w...
Conference Paper
In this paper, a multi-user concurrent beam training scheme, named AnalogMUSIC, is designed for mmWave systems with a single radio frequency (RF) chain. In AnalogMUSIC, a one-RF chain based multiple signal classification (MUSIC) algorithm is developed for accurate direction estimation, where the training beams are switched in a time-division manner...
Article
Existing physical layer security schemes are inapplicable to legacy devices operating on long coherence-time channels, since they demand changes in the physical layer. To this end, a new physical-layer security scheme is developed to secure legacy clients. In this scheme, secret keys are generated by a client and transmitted to the access point (AP...
Article
In 5G networks, when D2D communications or the quality of a cellular link fails to support data transmission of a terminal, it is indispensable to exploit data transmission opportunities via multi-hop D2D communications. However, to achieve multi-hop D2D communications, two problems need to be solved: 1) A routing and packet forwarding protocol is...
Article
Full-text available
Wireless mesh networking using millimeter-Wave (mmWave) bands provides a promising option for connecting densely deployed small base stations (BSs) to the core network. To fully exploit the potential of both wireless mesh networking and mmWave communications, hybrid beamforming is indispensable to help maintain connections with multiple neighbors,...
Article
Millimeter wave (mmW) and Terahertz band (THz) play important roles for future wireless communications to support ultra-high data rates. However, the high propagation loss and inherent directivity features pose critical challenges on the medium access control (MAC) protocol design to fully exploit their potential benefits, including deafness, contr...
Article
Full duplex communication highly improves spectrum efficiency of a wireless communication link. However, when it is applied to a cellular network, the capacity gain from this technology remains unknown. The reason is that full duplex communication changes the aggregate interference experienced by each communication link in cellular networks. In thi...
Article
Recently device to device (D2D) communication and full duplex communication are both considered as key technologies for 5G networks. In this paper two novel cooperative modes are developed for full duplex D2D communication underlaying cellular networks: the network MU-MIMO based mode (N-mode) and the sequential forwarding mode (S-mode). In the N-mo...
Article
Coded caching has emerged as a promising component of solutions to the exponential growth in network traffic. Previous approaches to network coding are all based on (simple) XOR coding, which is appropriate when links have the same rate. However, in typical wireless networks, different users experience different link rates. Thus, XOR coding is sub-...
Article
We study energy-efficient secure communication using the combined approach of game theory and stochastic geometry in a large-scale wireless network, where legitimate transmitters (Alice nodes) and eavesdroppers (Eve nodes) are randomly distributed in space. We consider the following two scenarios according to the Eve tier's strategy: I) the Eve tie...
Article
Charging electric vehicles (EVs) at home is attractive to EV users. However, when the penetration level of EVs becomes high, a distribution grid suffers from problems such as under-voltage and transformer overloading. EV users also experience a fairness problem, i.e., the limited capacity is unfairly shared among EVs. To solve these problems, a phy...
Article
The emerging market of Internet of things has created great demand for low-cost, low-power wireless technologies. Existing IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPANs). However, current standard does not fully utilise the benefit of the code redundancy. In this study, the authors propose new coding sche...
Article
In this paper, we study energy-efficient transmit power control for multi-tier multi-antenna (MIMO) heterogeneous cellular networks (HetNets), where each tier operates in closed-access policy and base stations (BSs) in each tier are distributed as a stationary Poisson point process (PPP). Each BS serves multiple users at a fixed distance away from...
Article
As full duplex wireless communication evolves into a practical technique, it will be built into communication nodes in many application scenarios. However, it is difficult to do so for legacy communication nodes. Thus, full duplex communication nodes will coexist with half duplex communication nodes in the same application environment. In this pape...
Article
Demand for Internet access from moving vehicles has been rapidly growing. Meanwhile, the overloading issue of cellular networks is escalating due to mobile data explosion. Thus, WiFi networks are considered as a promising technology to offload cellular networks. However, there pose many challenging problems in highly dynamic vehicular environments...
Article
As a promising approach to the rendezvous problem in cognitive radio networks (CRNs), a blind rendezvous paradigm has recently spawned various asynchronous channel-hopping (CH) rendezvous schemes that enable any two neighboring secondary users to meet among multiple channels within a finite time, even with no synchronization. However, the rendezvou...
Article
Full duplex wireless communications have become practical in recent years. However, there exist many communication nodes that only support half duplex communications. Thus, it is important to consider coexistence between full duplex and half duplex communications. In this paper, a wireless LAN with a full duplex AP and half duplex stations is studi...
Article
Full-text available
In a visible light communication (VLC) system, the nonlinear characteristic of the light emitting diode (LED) in transmitter is a limiting factor of system performance. Modern modulation signals with large peak-to-power-ratio (PAPR) suffers uneven distortion. The nonlinear response directly impacts the intensity modulation and direct detection VLC...
Article
The applicability of analog network coding (ANC) to a wireless network is constrained by several limitations: 1) some ANC schemes demand fine-grained frame-level synchronization, which cannot be practically achieved in a wireless network; 2) others support only a specific type of modulation or require equal frame size in concurrent transmissions. I...
Article
Opportunistic scheduling for a wireless network with hybrid links is studied in this paper. Specifically, two link types are considered: a link of the first type always has a much lower transmission rate than a link of the second type. To avoid starvation in the first type of links, two link types must be treated differently in opportunistic schedu...
Article
Compared to half duplex communications, full duplex communications can significantly improve link capacity. However, in a large scale wireless network such as a wireless mesh network, the capacity gain from full duplex communications has not been fully investigated. To this end, a metric of network capacity called transmission capacity is studied i...
Article
Analog network coding (ANC) is effective in improving spectrum efficiency. To coordinate ANC among multiple nodes without relying on complicated scheduling algorithm and network optimization, a new random access MAC protocol, called ANC-ERA, is developed to dynamically form ANC-cooperation groups in an ad hoc network. ANC-ERA includes several key m...
Article
Channel-width adaptation can optimize multiple performance metrics of a wireless communication link, including transmission rate, communication range, resilience to delay spread, and power consumption. Supporting variable channel width has been considered one of the most critical features of a communication radio. How to leverage a channel-width ad...
Article
Self-interference cancellation in the analog domain is critical to achieve full duplex wireless communications. However, the capability of analog self-interference cancellation is not fully explored. To this end, a new approach of analog self-interference cancellation is developed in this paper. More specifically, a balanced RF frond-end circuit is...
Article
Random medium access control (MAC) plays a critical role in OFDMA wireless networks to support services with bursty traffic. However, the existing OFDMA random access protocols suffer from low efficiency due to the constraints in half-duplex communications. In this paper, the capability of full-duplex communications is leveraged to propose novel me...
Article
Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, since the spectrum availability is uniform, broadcasts are delivered via a common channel which can be heard by all users in a network. Howeve...
Article
Maximum power point tracking (MPPT) achieves maximum power output for a photovoltaic (PV) system under various environmental conditions. It significantly improves the energy efficiency of a specific PV system. However, when an increasing number of PV systems are connected to a distribution grid, MPPT poses several risks to the grid: 1) over-voltage...
Article
A multi-antenna access point (AP) can communicate simultaneously with multiple clients, however, this multi-user MIMO (MU-MIMO) capability is underutilized in conventional 802.11 wireless LANs (WLANs). To address this problem, researchers have recently developed a CSMA/CA-based MAC protocol to support concurrent transmissions from different clients...
Article
Full-text available
Information exchange is critical in smart grid for system control and management. Optical fibers are widely used in transmission grid and substations to provide high-capacity and high-reliability communications. However, due to high cost and inflexibility, optical fibers are not suitable for information transmission in distribution grid. Wireless m...
Conference Paper
A multi-antenna access point (AP) can transmit or receive data simultaneously from multiple clients, however, this multi-user MIMO (MU-MIMO) capability is underutilized in conventional 802.11 wireless LANs (WLANs). To address this problem, researchers have recently developed a CSMA/CA-based MAC protocol that supports concurrent transmissions from d...
Conference Paper
Physical layer security is envisaged to provide secure wireless communications. So far there exist schemes that both achieve physical layer security and maintain a reasonable level of link capacity. However, in all these schemes, capacity of a communication link depends on the channel characteristics of both the communication link and the eavesdrop...
Conference Paper
In this paper opportunistic scheduling is studied for a wireless network with hybrid links that have different characteristics and quality of service (QoS) requirements. More specifically, we consider two types of links coexisting in a network: 1) secure links for critical messages demanding physical layer security; 2) regular links for other messa...
Article
Orthogonal frequency division multiple access (OFDMA) is a promising technology owing to its flexibility in subcarrier/subchannel allocation. Since most applications in OFDMA wireless networks generate bursty traffic, it is efficient and flexible to employ a random access mechanism in such networks. A single-radio multi-subchannel carrier sense mul...
Conference Paper
Wireless communications have been widely deployed to collect and disseminate data for industrial applications. However, to date the mostly accepted technologies for information collection and dissemination in power grid are still based on wired communications instead of wireless. To leverage the advantages of wireless communications for smart grid,...
Conference Paper
Artificial noise has been considered as an effective and efficient way to improve the secrecy of wireless communications. However, most existing papers have been focused on the analysis of a single communication link between a transmitter and a legitimate receiver with some eavesdroppers. In this paper, we investigate the impact of artificial noise...
Conference Paper
Physical layer secret key generation exploits the inherent randomness of wireless channels. However, for wireless channels with long coherence time, key generation rate can be extremely low due to lack of randomness in channels. In this paper, a novel key generation scheme is proposed for a general wireless network where channels are static and eac...
Article
Recently, physical layer security based approaches have drawn considerable attentions and are envisaged to provide secure communications in the wireless networks. However, most existing literatures only focus on the physical layer. Thus, how to design an effective transmission scheme which also considers the requirements from the upper layers is st...
Article
Network virtualization of a wireless mesh network (WMN) is an economical way for different subscribers to customize their exclusive access networks through a common network infrastructure. The most critical task of network virtualization is virtual network embedding, which can be divided into two sub-problems: node mapping and link mapping. Althoug...
Article
Two-way relaying is a promising technique to improve network throughput. However, how to apply it to a wireless network remains an unresolved issue. Particularly, challenges lie in the joint design between the physical layer and the routing protocol. Applying an existing routing protocol to a two-way relay network can easily compromise the advantag...
Article
Two-way relaying can significantly improve performance of next generation wireless networks. However, due to its dependence on multi-node cooperation and transmission coordination, applying this technique to a wireless network in an effective and scalable manner poses a challenging problem. To tackle this problem without relying on complicated sche...
Article
Seamless intergateway handoff support is an essential issue to ensure continuous communications in Internet-based wireless mesh networks (WMNs). Due to the existence of multihop wireless links, traditional handoff schemes designed for single-hop wireless access networks can hardly guarantee the low handoff latency requirement in multihop WMNs. Exis...
Article
Full-text available
It is well known that TDD mode wideband CDMA is particularly suited for wireless local area networks (LANs). In this paper a medium access control (MAC) protocol is proposed for wireless multimedia LANs that are based on TDD mode wideband CDMA. In order to minimize interference experienced by a packet and to satisfy bit error rates (BERs) of multim...
Conference Paper
In this paper, we deal with possible data transmission congestion on the sink node in wireless sensor networks (WSNs). We consider a scenario in which all the sensor nodes have a certain amount of storage space and acquire data from the surroundings at heterogeneous speed. Because receiving bandwidth of the sink node is limited, a proper bandwidth...
Article
Full-text available
Communication networks play a critical role i nsmar t grid, as the intelligence of smart grid is built based on information exchange across the power grid. In power transmission segments of smart grid, wired communications are usually adopted to en- sure robustness of the backbone power network. In contrast, for a power distribution grid, wireless...
Article
Relaying can significantly improve spectral efficiency and extend coverage of two-hop wireless communications between two end nodes. To support the relaying transmission between multiple end nodes, technologies like orthogonalize-and-forward (OF) Relaying are proposed, which can also achieve interference-free communications between end nodes. Howev...
Conference Paper
Full-text available
The association policy in current IEEE 802.11 net- works usually considers Received Signal Strength Indication (RSSI) to be the only metric to capture access link quality. However, when a Mesh Client (MC) in IEEE 802.11-based Wireless Mesh Network (WMN) needs to be associated with the most appropriate Mesh Access Point (MAP), the quality of both th...
Conference Paper
Random access is critical to OFDMA wireless networks. However, due to special features of an OFDMA system, how to carry out random access in an efficient manner is still an open issue for OFDMA wireless networks. In this paper, a new random access protocol is proposed for OFDMA wireless networks. It is distinguished by a novel mechanism called conc...
Conference Paper
Lunar surface networks are critical to a manned mission to the Moon, but encounter many challenges including lack of infrastructure, shortage of power, long distance communications, and quality of service (QoS) support. These challenges demand both power efficient and reliable networking protocols. In this paper a power efficient and reliable MAC p...
Chapter
Routing ChallengesDesign PrinciplesTopology Discovery for RoutingPerformance ParametersRouting MetricsCategories of Routing ProtocolsHop-Count Based Routing ProtocolsLink-Level QoS Based Routing ProtocolsEnd-to-End QoS RoutingReliability Aware Routing: Multipath RoutingStability Based RoutingScalable RoutingCross-Layer Multichannel Routing Protocol...
Chapter
Mobility ManagementPower ManagementTopology Control and Management
Chapter
Notations and TermsCapacity of Ad Hoc Networks without MobilityCapacity of Mobile Ad Hoc NetworksCapacity of Ad Hoc Networks with Infrastructure SupportCapacity and Delay Trade offApplicability of Asymptotic Capacity Analysis to WMNs

Citations

... To be more practical, by taking into account the equipment aging and the environmental uncertainties, we elaborate on quantifying the residual hardware impairment (RHI) effects, which result in imperfect SIC (ipSIC) at the RXs. It should be emphasized that both the SCC and ISAC NO-DLT frameworks considered can be used in vehicle-tovehicle and vehicle-to-everything communications [13,14]. In order to evaluate the performance of the SCC and ISAC NO-DLT frameworks, the closed-form and approximate outage probabilities (OPs) of the IoT devices are obtained for communication. ...
... Motivated by the aforementioned advantages, some works have investigated ISAC design in the framework of 5G NR systems [5,6,7,8,9,10]. In [5], the self-ambiguity and cross-ambiguity functions of several synchronization signals and reference sig-nals (RSs) in OFDM waveform were analyzed. In [6], RSs used for channel estimation in OFDM waveform were multiplexed as sensing signal. ...
... physical resource layer (Left, Fig. 1), and address the demanding service requirements. The seamless merging of critical enablers at the core network (Center, Fig. 1), i.e., AI models and hybrid CE-N computing methods, virtualization and containerization, software-as-a-service (SaaS) and serviceoriented architecture (SOA), and network function virtualization (NFV) and software-defined network (SDN)-enabled communications, can facilitate the agile enhancements in NGNs [2]- [4]. ...
... There are less studies on long-term resource reservation for computing task offloading. Based on the aggregated computing demands from all access points, a proactive computing resource reservation approach in MEC is designed to minimize the delay of executing computing tasks [25] and maximizing resource utilization in computing task execution [26], respectively. Yin et al. study edge server placement to minimize the network resource usage based on statistical computing demands [27]. ...
... However, the computational complexity in [22] is high. Reference [23] designed 2D FFT method for short distance sensing and correlation method with Golay sequences in the preamble for long distance sensing. The proposed scheme realizes high accuracy of distance and velocity estimation. ...