Wireless communication systems that incorporate digital twin(DT)alongside artificial intelligence(AI)are expected to transform 6G networks by providing advanced features for predictive modeling and decision making.The...
supported in part by the National Key R&D Program of China(No.2022YFB2902202);in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034);in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144);in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160);in part by the Southeast University Startup Fund(No.4009012301)。
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...
supported in part by the national natural science foundation of China (NSFC) under Grant61871193;in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001;in part by the Guangzhou Key Field R&D Program under Grant 202206030005
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...
supported in part by the National Natural Science Foundation of China(NSFC)under grant numbers U22A2007 and 62171010;the Beijing Natural Science Foundation under grant number L212003.
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s...
supported in part by the National Natural Science Foundation of China (No. 61803149 and No. 61977021);in part by the Technology Innovation Special Program of Hubei Province (No. 2020AEA008);in part by the Hubei Province Project of Key Research Institute of Humanities and Social Sciences at Universities (Research Center of Information Management for Performance Evaluation)
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ...
This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301;in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104;in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...
supported by National Social Science Fund Youth Project“Research on the Group Behavior of‘Post-95’College Students Based on Complex Networks”of China(Project Number:17CKS047)。
The application of information and communications technology(ICT)in the education industry is becoming more and more extensive,and online education realized through ICT is developing in full swing.The influence of ICT...
the National Key Research and Development Program of China(2020YFB18057002018YFB1801500&2018YFB2201700);the Natural National Science Foundation of China under Grant 61771424;the Natural Science Foundation of Zhejiang Province under Grant LZ18F010001 and Zhejiang Lab(no.2020LC0AD01).
To accommodate the ever-increasing wireless capacity,the terahertz(THz)orbital angular momentum(OAM)beam that combines THz radiation and OAM technologies has attracted much attention recently,with contributing efforts...
supported in part by National Natural Science Foundation of China under Grants No.61601514, 61401510, 61379006;Project funded by China Postdoctoral Science Foundation: 2016M592990
In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-m...