supported by National Nature Science Founding of China(62101372);Open Fund of IPOC(BUPT,IPOC2022A07);State Key Laboratory of Advanced Optical Communication Systems and Networks(2023GZKF11);Leading Youth Talents of Innovation and Entrepreneurship of Gusu(ZXL2023162).
Time Division Multiplexing-Passive Optical Networks(TDM-PONs)play a vital role in Fiberto-the-Home(FTTH)deployments.To improve the service quality of home networks,FTTH is expanding to the Fiber-to-the-Room(FTTR)scena...
supported by the National Key Research and Development Program of China(2020YFE0200600);the National Natural Science Foundation of China(U22B2026)。
The conventional dynamic heterogeneous redundancy(DHR)architecture suffers from the security threats caused by the stability differences and similar vulnerabilities among the executors.To overcome these challenges,we ...
There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown f...
Redundancy control can effectively enhance the stability and robustness of a system.Based on the conventional redundancy control switchover and majority arbitration strategy,this paper introduces the concept of hetero...
supported by the Key Technology Research Project of Jiangxi Province(20213AAE01007);National Natural Science Foundation of China(61871047,61901047);the Proof-of-concept project of Zhongguancun Open Laboratory under Grant(202103001)。
When there is an increasing interest in visible light communication(VLC), outdoor vehicle VLC has emerged as a promising candidate technology for future intelligent transportation systems. However, in VLC based vehicu...
supported in part by the National Science Foundation Project of China(No.61931001);the Scientific and Technological Innovation Foundation of Foshan,USTB(No.BK20AF003).
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of ...
funded by Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center,the National Key R&D Program of China(2018YFE0205503);the National Natural Science Foundation of China(61902036,62032003,61922017);Fundamental Research Funds for the Central Universities。
5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-ba...
supported in part by the National Key Research and Development Program under grant number 2020YFB1806800;the Beijing Natural Science Foundation under grant number L212003;the National Natural Science Foundation of China(NSFC)under grant numbers 62171010 and 61827901.
As the fifth-generation(5G)mobile communication network may not meet the requirements of emerging technologies and applications,including ubiquitous coverage,industrial internet of things(IIoT),ubiquitous artificial i...
funded by Tsinghua University-China Mobile Communications Group Co., Ltd. Joint Institute。
The Service-based Architecture(SBA) is one of the key innovations of 5G architecture that leverage modularized, self-contained and independent services to provide flexible and cloud-native 5G network. In this paper, S...
supported by National Science and Technology Major Project granted No.2016ZX01012101
With the introduction of software defined hardware by DARPA Electronics Resurgence Initiative,software definition will be the basic attribute of information system.Benefiting from boundary certainty and algorithm aggr...