Xudong Wang's research while affiliated with Shanghai Jiao Tong University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (123)
Recently, the development of integrated sensing and communications (ISAC) has attracted great attention. In this paper, the reference signal (RS) in 5G vehicle-to-everything (V2X) communications is leveraged for radar sensing. Particularly, the scattered RS design is adopted under the constraints of communication channel estimation and radar sensin...
It is prevalent for a mobile edge device to conduct local inference using a compact machine learning model, which achieves lower latency and less compromise of data privacy as compared to cloud-based inference. To work in a new environment, the compact model needs to be adapted to the target data from the environment so as to maintain a high infere...
Carrier-free pulse-based waveforms are desired in terahertz (THz) communications since pulse-based systems have simpler transceiver architectures than carrier-based systems. For such a pulse-based THz communication system, there still lacks pulse waveforms that can support high-order modulation and flexible multiple access. In this paper, a pulse-b...
The advancement of nanosatellite techniques has boosted the growth of satellite-originated data and applications. Satellite edge computing (SEC) is envisioned to provide in-orbit processing of the sensed data to save the scarce terrestrial-satellite communication resources and support mission-critical services. While most of the existing SEC studie...
Localizing RFID tagged objects by a mobile robot plays an important role in many Internet-of-Things (IoT) applications. Existing RFID localization systems are infeasible, since they either demand bulky RFID infrastructures or cannot achieve sufficient localization accuracy. In this paper, a portable localization (POLO) system is developed for a mob...
A federated kernel
$k$
-means (FedKKM) algorithm is developed in this article to conduct distributed clustering with low memory consumption on user devices. In FedKKM, a federated eigenvector approximation (FEA) algorithm is designed to iteratively determine the low-dimensional approximate vectors of the transformed feature vectors, using only lo...
In a 5G integrated backhaul and access (IAB) network, an IAB-donor and multiple IAB-nodes form a multi-hop wireless backhaul network. When a terminal is connected to an IAB-node, the traffic flows generated by the terminal can be backhauled to the IAB-donor. Due to the mobility of terminals, access links are error-prone and cause difficulty in ensu...
Considering network slicing in a cellular network, one of the most intriguing tasks is slice enforcement over air interfaces across multiple cells. The challenges lie in several aspects. First, resources allocated to different slices must achieve soft isolation at the link level. Second, users’ diverse QoS requirements must be satisfied even when c...
The fifth generation (5G) communication network has been developed rapidly in the past few years, which provides substantial bandwidth capacities and higher quality of service (QoS). 5G technology commercialization includes mobile edge computing and communication technologies. The increasing deployment of mobile edge computing empowered 5G infrastr...
In 5G networks, an integrated access and backhaul network is formed to connect IAB-nodes to the core network via an IAB-donor. To support multi-hop communications in this network, an adaptation-layer forwarding mechanism has been specified in the standard. However, the end-to-end delay achieved by such a mechanism cannot satisfy the requirement of...
In recent years, full-duplex communications in a single frequency channel have become a practical technology. However, existing full-duplex medium access control (MAC) protocols can hardly take full advantages of full-duplex transmission opportunities, because they are not capable of adding one more half-duplex link on an on-going half-duplex link...
During the training process of Federated learning (FL), proper devices are selected to participate in the training process to avoid model unfairness. In a mobile edge network, participant selection must be considered together with three factors: non-iid datasets possessed by devices, tunable local iterations on devices, and radio resource allocatio...
The IEEE 802.11ad based joint communication and radar sensing (JCRS) has attracted great attention for vehicles in recent years. Existing studies mostly assume full-duplex radio for radar receiver based on perfect self-interference cancellation. However, the self-interference may not be fully cancelled in practice. In this paper, imperfect self-int...
Edge computing is promising for connected vehicles. As vehicles move, their resource demands for edge servers vary. Thus, it is necessary to reserve edge servers dynamically to meet variable demands. Existing schemes of edge-server reservation usually rely on statistical information of resource demands to make reservations; they are infeasible for...
Coded caching has become a hot research topic in recent years. However, existing studies rarely consider the delay constrained transmissions over wireless fading channels. For strict delay constrained content delivery over wireless fading channels, power optimization is usually required to achieve energy-efficient transmissions. Moreover, in coded...
High-accuracy localization technology has gained increasing attention in gesture and motion control and many diverse applications. Due to multi-path fading and blockage effects in indoor propagation, 0.1m-level precise localization is still challenging. Promising for 6G wireless communications, the Terahertz (THz) spectrum provides multi-GHz ultra-...
How to achieve efficient multiple access for Terahertz (THz) networks is still an open problem. The key obstacle is the extremely narrow angular coverage by a highly directional THz beam. Thus, a hybrid THzPrism beamforming (HTB) architecture is designed in this paper to greatly enlarge angular coverage by spreading frequency subcarriers to differe...
Voice interaction, as an emerging human-computer interaction method, has gained great popularity, especially on smart devices. However, due to the open nature of voice signals, voice interaction may cause privacy leakage. In this paper, we propose a novel scheme, called SeVI, to protect voice interaction from being deliberately or unintentionally e...
Recently, coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks. To support high efficient coded caching multicast transmissions, the time-varying heterogeneous channel conditions need to be considered. In this paper, a practical and novel multi-source spinal coding (MSSC) scheme is developed f...
Container-based operation system (OS) level virtualization has been adopted by many edge-computing platforms. However, inter-container communications and container management consume significant CPU resources. Given an application with inter-dependent tasks, the number of such operations is closely related to the dependency between scheduled tasks....
Terahertz (THz) communication is envisioned as one of the key technologies to satisfy the high data rate demand of intelligent 6G networks. However, directional transmissions, as well as the peculiarities of the THz band, pose challenges on medium access control (MAC) design. In this paper, a dual- radio-assisted MAC protocol supporting concurrent...
To meet the tremendous demand of Internet of Things (IoT) applications, the 3rd Generation Partnership Project (3GPP) has specified the Narrowband IoT (NB-IoT) standard. However, collisions in the random access (RA) channel of NB-IoT can be severe due to mismatch between frequent random access attempts by a huge number of devices and the limited ra...
Integrated access and backhaul (IAB) networking is envisioned as a key technology to support more flexible and dense deployment of base stations (BSs). However, existing directed acyclic graph (DAG) based IAB networking highly limits the flexibility and efficiency of link scheduling, due to the fixed parent-to-child relation between two adjacent IA...
User provided network (UPN) allows a user with high channel quality to share the network access for users with poor channel quality. As a result, both the quality of experience and efficiency of network resource can be improved by UPN. However, the success of UPN relies heavily on the willingness of users to participate in sharing, so the design of...
IEEE 802.11ax has adopted orthogonal frequency division multiple access (OFDMA) to support multi-user (MU) transmissions. There exist two uplink MU OFDMA access methods in IEEE 802.11ax. The first one is uplink OFDMA random access (UORA) in which stations randomly select resource units (RUs) to send physical protocol data units (PPDUs), so its acce...
With large available bandwidths, Terahertz (THz) band communication has been envisioned as a key technique to satisfy the increasing demand for ultra-high-speed wireless communications. To overcome severe path loss of THz signals, large antenna array based beamforming, i.e., directional communication, is required for THz communications. Beamforming...
Terahertz communications are envisioned as a key technology for 6G, which requires 100+ Gbps data rates, 1-millisecond latency, among other performance metrics. As a fundamental wireless infrastructure, the THz communication can boost abundant promising applications, including next-generation WLAN systems like Tera-WiFi, THz wireless backhaul, as w...
In this paper, a multi-user concurrent beam training
scheme, named AnalogMUSIC, is designed for mmWave systems
with a single radio frequency (RF) chain. In AnalogMUSIC, a
one-RF chain based multiple signal classification (MUSIC) algorithm
is developed for accurate direction estimation, where the
training beams are switched in a time-division manner...
Existing physical layer security schemes are inapplicable to legacy devices operating on long coherence-time channels, since they demand changes in the physical layer. To this end, a new physical-layer security scheme is developed to secure legacy clients. In this scheme, secret keys are generated by a client and transmitted to the access point (AP...
In 5G networks, when D2D communications or the quality of a cellular link fails to support data transmission of a terminal, it is indispensable to exploit data transmission opportunities via multi-hop D2D communications. However, to achieve multi-hop D2D communications, two problems need to be solved: 1) A routing and packet forwarding protocol is...
Wireless mesh networking using millimeter-Wave (mmWave) bands provides a promising option for connecting densely deployed small base stations (BSs) to the core network. To fully exploit the potential of both wireless mesh networking and mmWave communications, hybrid beamforming is indispensable to help maintain connections with multiple neighbors,...
Millimeter wave (mmW) and Terahertz band (THz) play important roles for future wireless communications to support ultra-high data rates. However, the high propagation loss and inherent directivity features pose critical challenges on the medium access control (MAC) protocol design to fully exploit their potential benefits, including deafness, contr...
Full duplex communication highly improves spectrum efficiency of a wireless communication link. However, when it is applied to a cellular network, the capacity gain from this technology remains unknown. The reason is that full duplex communication changes the aggregate interference experienced by each communication link in cellular networks. In thi...
Recently device to device (D2D) communication and full duplex communication are both considered as key technologies for 5G networks. In this paper two novel cooperative modes are developed for full duplex D2D communication underlaying cellular networks: the network MU-MIMO based mode (N-mode) and the sequential forwarding mode (S-mode). In the N-mo...
Coded caching has emerged as a promising component of solutions to the exponential growth in network traffic. Previous approaches to network coding are all based on (simple) XOR coding, which is appropriate when links have the same rate. However, in typical wireless networks, different users experience different link rates. Thus, XOR coding is sub-...
We study energy-efficient secure communication using the combined approach of game theory and stochastic geometry in a large-scale wireless network, where legitimate transmitters (Alice nodes) and eavesdroppers (Eve nodes) are randomly distributed in space. We consider the following two scenarios according to the Eve tier's strategy: I) the Eve tie...
Charging electric vehicles (EVs) at home is attractive to EV users. However, when the penetration level of EVs becomes high, a distribution grid suffers from problems such as under-voltage and transformer overloading. EV users also experience a fairness problem, i.e., the limited capacity is unfairly shared among EVs. To solve these problems, a phy...
The emerging market of Internet of things has created great demand for low-cost, low-power wireless technologies. Existing IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPANs). However, current standard does not fully utilise the benefit of the code redundancy. In this study, the authors propose new coding sche...
In this paper, we study energy-efficient transmit power control for multi-tier multi-antenna (MIMO) heterogeneous cellular networks (HetNets), where each tier operates in closed-access policy and base stations (BSs) in each tier are distributed as a stationary Poisson point process (PPP). Each BS serves multiple users at a fixed distance away from...
As full duplex wireless communication evolves into a practical technique, it will be built into communication nodes in many application scenarios. However, it is difficult to do so for legacy communication nodes. Thus, full duplex communication nodes will coexist with half duplex communication nodes in the same application environment. In this pape...
Demand for Internet access from moving vehicles has been rapidly growing. Meanwhile, the overloading issue of cellular networks is escalating due to mobile data explosion. Thus, WiFi networks are considered as a promising technology to offload cellular networks. However, there pose many challenging problems in highly dynamic vehicular environments...
As a promising approach to the rendezvous problem in cognitive radio networks (CRNs), a blind rendezvous paradigm has recently spawned various asynchronous channel-hopping (CH) rendezvous schemes that enable any two neighboring secondary users to meet among multiple channels within a finite time, even with no synchronization. However, the rendezvou...
Full duplex wireless communications have become practical in recent years. However, there exist many communication nodes that only support half duplex communications. Thus, it is important to consider coexistence between full duplex and half duplex communications. In this paper, a wireless LAN with a full duplex AP and half duplex stations is studi...
In a visible light communication (VLC) system, the nonlinear characteristic of the light emitting diode (LED) in transmitter is a limiting factor of system performance. Modern modulation signals with large peak-to-power-ratio (PAPR) suffers uneven distortion. The nonlinear response directly impacts the intensity modulation and direct detection VLC...
The applicability of analog network coding (ANC) to a wireless network is constrained by several limitations: 1) some ANC schemes demand fine-grained frame-level synchronization, which cannot be practically achieved in a wireless network; 2) others support only a specific type of modulation or require equal frame size in concurrent transmissions. I...
Opportunistic scheduling for a wireless network with hybrid links is studied in this paper. Specifically, two link types are considered: a link of the first type always has a much lower transmission rate than a link of the second type. To avoid starvation in the first type of links, two link types must be treated differently in opportunistic schedu...
Compared to half duplex communications, full duplex communications can significantly improve link capacity. However, in a large scale wireless network such as a wireless mesh network, the capacity gain from full duplex communications has not been fully investigated. To this end, a metric of network capacity called transmission capacity is studied i...
Analog network coding (ANC) is effective in improving spectrum efficiency. To coordinate ANC among multiple nodes without relying on complicated scheduling algorithm and network optimization, a new random access MAC protocol, called ANC-ERA, is developed to dynamically form ANC-cooperation groups in an ad hoc network. ANC-ERA includes several key m...
Channel-width adaptation can optimize multiple performance metrics of a wireless communication link, including transmission rate, communication range, resilience to delay spread, and power consumption. Supporting variable channel width has been considered one of the most critical features of a communication radio. How to leverage a channel-width ad...
Self-interference cancellation in the analog domain is critical to achieve full duplex wireless communications. However, the capability of analog self-interference cancellation is not fully explored. To this end, a new approach of analog self-interference cancellation is developed in this paper. More specifically, a balanced RF frond-end circuit is...
Random medium access control (MAC) plays a critical role in OFDMA wireless networks to support services with bursty traffic. However, the existing OFDMA random access protocols suffer from low efficiency due to the constraints in half-duplex communications. In this paper, the capability of full-duplex communications is leveraged to propose novel me...
Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, since the spectrum availability is uniform, broadcasts are delivered via a common channel which can be heard by all users in a network. Howeve...
Maximum power point tracking (MPPT) achieves maximum power output for a photovoltaic (PV) system under various environmental conditions. It significantly improves the energy efficiency of a specific PV system. However, when an increasing number of PV systems are connected to a distribution grid, MPPT poses several risks to the grid: 1) over-voltage...
A multi-antenna access point (AP) can communicate simultaneously with multiple clients, however, this multi-user MIMO (MU-MIMO) capability is underutilized in conventional 802.11 wireless LANs (WLANs). To address this problem, researchers have recently developed a CSMA/CA-based MAC protocol to support concurrent transmissions from different clients...
Information exchange is critical in smart grid for system control and management. Optical fibers are widely used in transmission grid and substations to provide high-capacity and high-reliability communications. However, due to high cost and inflexibility, optical fibers are not suitable for information transmission in distribution grid. Wireless m...
A multi-antenna access point (AP) can transmit or receive data simultaneously from multiple clients, however, this multi-user MIMO (MU-MIMO) capability is underutilized in conventional 802.11 wireless LANs (WLANs). To address this problem, researchers have recently developed a CSMA/CA-based MAC protocol that supports concurrent transmissions from d...
Physical layer security is envisaged to provide secure wireless communications. So far there exist schemes that both achieve physical layer security and maintain a reasonable level of link capacity. However, in all these schemes, capacity of a communication link depends on the channel characteristics of both the communication link and the eavesdrop...
In this paper opportunistic scheduling is studied for a wireless network with hybrid links that have different characteristics and quality of service (QoS) requirements. More specifically, we consider two types of links coexisting in a network: 1) secure links for critical messages demanding physical layer security; 2) regular links for other messa...
Orthogonal frequency division multiple access (OFDMA) is a promising technology owing to its flexibility in subcarrier/subchannel allocation. Since most applications in OFDMA wireless networks generate bursty traffic, it is efficient and flexible to employ a random access mechanism in such networks. A single-radio multi-subchannel carrier sense mul...
Wireless communications have been widely deployed to collect and disseminate data for industrial applications. However, to date the mostly accepted technologies for information collection and dissemination in power grid are still based on wired communications instead of wireless. To leverage the advantages of wireless communications for smart grid,...
Artificial noise has been considered as an effective and efficient way to improve the secrecy of wireless communications. However, most existing papers have been focused on the analysis of a single communication link between a transmitter and a legitimate receiver with some eavesdroppers. In this paper, we investigate the impact of artificial noise...
Physical layer secret key generation exploits the inherent randomness of wireless channels. However, for wireless channels with long coherence time, key generation rate can be extremely low due to lack of randomness in channels. In this paper, a novel key generation scheme is proposed for a general wireless network where channels are static and eac...
Recently, physical layer security based approaches have drawn considerable
attentions and are envisaged to provide secure communications in the wireless
networks. However, most existing literatures only focus on the physical layer.
Thus, how to design an effective transmission scheme which also considers the
requirements from the upper layers is st...
Network virtualization of a wireless mesh network (WMN) is an economical way for different subscribers to customize their exclusive access networks through a common network infrastructure. The most critical task of network virtualization is virtual network embedding, which can be divided into two sub-problems: node mapping and link mapping. Althoug...
Two-way relaying is a promising technique to improve network throughput.
However, how to apply it to a wireless network remains an unresolved issue.
Particularly, challenges lie in the joint design between the physical layer and
the routing protocol. Applying an existing routing protocol to a two-way relay
network can easily compromise the advantag...
Two-way relaying can significantly improve performance of next generation
wireless networks. However, due to its dependence on multi-node cooperation and
transmission coordination, applying this technique to a wireless network in an
effective and scalable manner poses a challenging problem. To tackle this
problem without relying on complicated sche...
Seamless intergateway handoff support is an essential issue to ensure continuous communications in Internet-based wireless mesh networks (WMNs). Due to the existence of multihop wireless links, traditional handoff schemes designed for single-hop wireless access networks can hardly guarantee the low handoff latency requirement in multihop WMNs. Exis...
It is well known that TDD mode wideband CDMA is particularly suited for wireless local area networks (LANs). In this paper a medium access control (MAC) protocol is proposed for wireless multimedia LANs that are based on TDD mode wideband CDMA. In order to minimize interference experienced by a packet and to satisfy bit error rates (BERs) of multim...
In this paper, we deal with possible data transmission congestion on the sink node in wireless sensor networks (WSNs). We consider a scenario in which all the sensor nodes have a certain amount of storage space and acquire data from the surroundings at heterogeneous speed. Because receiving bandwidth of the sink node is limited, a proper bandwidth...
Communication networks play a critical role i nsmar t grid, as the intelligence of smart grid is built based on information exchange across the power grid. In power transmission segments of smart grid, wired communications are usually adopted to en- sure robustness of the backbone power network. In contrast, for a power distribution grid, wireless...
Relaying can significantly improve spectral efficiency and extend coverage of two-hop wireless communications between two end nodes. To support the relaying transmission between multiple end nodes, technologies like orthogonalize-and-forward (OF) Relaying are proposed, which can also achieve interference-free communications between end nodes. Howev...
The association policy in current IEEE 802.11 net- works usually considers Received Signal Strength Indication (RSSI) to be the only metric to capture access link quality. However, when a Mesh Client (MC) in IEEE 802.11-based Wireless Mesh Network (WMN) needs to be associated with the most appropriate Mesh Access Point (MAP), the quality of both th...
Random access is critical to OFDMA wireless networks. However, due to special features of an OFDMA system, how to carry out random access in an efficient manner is still an open issue for OFDMA wireless networks. In this paper, a new random access protocol is proposed for OFDMA wireless networks. It is distinguished by a novel mechanism called conc...
Lunar surface networks are critical to a manned mission to the Moon, but encounter many challenges including lack of infrastructure, shortage of power, long distance communications, and quality of service (QoS) support. These challenges demand both power efficient and reliable networking protocols. In this paper a power efficient and reliable MAC p...
Routing ChallengesDesign PrinciplesTopology Discovery for RoutingPerformance ParametersRouting MetricsCategories of Routing ProtocolsHop-Count Based Routing ProtocolsLink-Level QoS Based Routing ProtocolsEnd-to-End QoS RoutingReliability Aware Routing: Multipath RoutingStability Based RoutingScalable RoutingCross-Layer Multichannel Routing Protocol...
Mobility ManagementPower ManagementTopology Control and Management
Notations and TermsCapacity of Ad Hoc Networks without MobilityCapacity of Mobile Ad Hoc NetworksCapacity of Ad Hoc Networks with Infrastructure SupportCapacity and Delay Trade offApplicability of Asymptotic Capacity Analysis to WMNs
Citations
... To be more practical, by taking into account the equipment aging and the environmental uncertainties, we elaborate on quantifying the residual hardware impairment (RHI) effects, which result in imperfect SIC (ipSIC) at the RXs. It should be emphasized that both the SCC and ISAC NO-DLT frameworks considered can be used in vehicle-tovehicle and vehicle-to-everything communications [13,14]. In order to evaluate the performance of the SCC and ISAC NO-DLT frameworks, the closed-form and approximate outage probabilities (OPs) of the IoT devices are obtained for communication. ...
... Motivated by the aforementioned advantages, some works have investigated ISAC design in the framework of 5G NR systems [5,6,7,8,9,10]. In [5], the self-ambiguity and cross-ambiguity functions of several synchronization signals and reference sig-nals (RSs) in OFDM waveform were analyzed. In [6], RSs used for channel estimation in OFDM waveform were multiplexed as sensing signal. ...
... physical resource layer (Left, Fig. 1), and address the demanding service requirements. The seamless merging of critical enablers at the core network (Center, Fig. 1), i.e., AI models and hybrid CE-N computing methods, virtualization and containerization, software-as-a-service (SaaS) and serviceoriented architecture (SOA), and network function virtualization (NFV) and software-defined network (SDN)-enabled communications, can facilitate the agile enhancements in NGNs [2]- [4]. ...
... There are less studies on long-term resource reservation for computing task offloading. Based on the aggregated computing demands from all access points, a proactive computing resource reservation approach in MEC is designed to minimize the delay of executing computing tasks [25] and maximizing resource utilization in computing task execution [26], respectively. Yin et al. study edge server placement to minimize the network resource usage based on statistical computing demands [27]. ...
... However, the computational complexity in [22] is high. Reference [23] designed 2D FFT method for short distance sensing and correlation method with Golay sequences in the preamble for long distance sensing. The proposed scheme realizes high accuracy of distance and velocity estimation. ...