Caihong Kai
YOU?
Author Swipe
View article: MIST: Jailbreaking Black-box Large Language Models via Iterative Semantic Tuning
MIST: Jailbreaking Black-box Large Language Models via Iterative Semantic Tuning Open
Despite efforts to align large language models (LLMs) with societal and moral values, these models remain susceptible to jailbreak attacks -- methods designed to elicit harmful responses. Jailbreaking black-box LLMs is considered challengi…
View article: Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks
Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks Open
Task offloading in vehicular networks is hot topic in the development of autonomous driving.In these scenarios, due to the role of vehicles and pedestrians, task characteristics are changing constantly.The classical deep learning algorithm…
View article: Active Reconfigurable Intelligent Surface Aided Surveillance Scheme
Active Reconfigurable Intelligent Surface Aided Surveillance Scheme Open
This letter attempts to design a surveillance scheme by adopting an active reconfigurable intelligent surface (RIS). Different from the conventional passive RIS, the active RIS could not only adjust the phase shift but also amplify the amp…
View article: Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications
Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications Open
This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device- to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and coo…
View article: A Fast Terminal Matching Method for Interference Coordination Based on Wavelet Transform and Graph Theory in Ultra-Dense Multi-Cell Scenarios
A Fast Terminal Matching Method for Interference Coordination Based on Wavelet Transform and Graph Theory in Ultra-Dense Multi-Cell Scenarios Open
The intensive deployment of cells in a wireless communication system may significantly increase the network capacity, but it may cause more complex and severe inter-cell interference. In order to effectively coordinate the interference, te…
View article: A Novel Method for Person Re-Identification: Conditional Translated Network Based on GANs
A Novel Method for Person Re-Identification: Conditional Translated Network Based on GANs Open
The main challenge of person re-identification (re-id) lies in the strikingly discrepancy between different camera views, including illumination, background and human pose. Existing person re-id methods rely mostly on implicit solutions, s…
View article: Network Planning Based on Interference Alignment in Density WLANs
Network Planning Based on Interference Alignment in Density WLANs Open
In high-density scenarios, wireless local area networks (WLANs) encounter serious interference. Interference alignment (IA) is an effective manner to control interference and improve system capacity in the interference channel. However, in…
View article: Energy-Efficient Sensor Grouping for IEEE 802.11ah Networks With Max-Min Fairness Guarantees
Energy-Efficient Sensor Grouping for IEEE 802.11ah Networks With Max-Min Fairness Guarantees Open
For the large scale wireless networks, restricted access window (RAW) mechanism is a promising technique for realizing large-scale sensor access with the limited collision probability. In this paper, we are committed to designing the traff…
View article: AP Selection Scheme Based on Achievable Throughputs in SDN-Enabled WLANs
AP Selection Scheme Based on Achievable Throughputs in SDN-Enabled WLANs Open
To ensure an efficient coverage and allow transparent mobility, it is common to find a number of access points (APs) deployed in the neighborhood of each other in current WLANs. A mobile terminal (MT) often has multiple potential APs that …
View article: A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios
A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios Open
Because of the increment in network scale and test expenditure, simulators gradually become main tools for research on key problems of wireless networking, such as radio resource management (RRM) techniques.However, existing simulators are…
View article: CSMA-Based Utility-Optimal Scheduling in the WLAN With a Full-Duplex Access Point
CSMA-Based Utility-Optimal Scheduling in the WLAN With a Full-Duplex Access Point Open
Full-duplex wireless communication has been recognized as an effective technique to improve the system throughput. This paper designs a CSMA-based utility-optimal scheduling scheme to fully explore the performance improvement brought by AP…
View article: Artificial-Noise-Aided Secure Channel with a Full-duplex Source
Artificial-Noise-Aided Secure Channel with a Full-duplex Source Open
This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidentia…
View article: To Bond or not to Bond: An Optimal Channel Allocation Algorithm For Flexible Dynamic Channel Bonding in WLANs
To Bond or not to Bond: An Optimal Channel Allocation Algorithm For Flexible Dynamic Channel Bonding in WLANs Open
IEEE 802.11 has evolved from 802.11a/b/g/n to 802.11ac to meet rapidly increasing data rate requirements in WLANs. One important technique adopted in 802.11ac is the channel bonding (CB) scheme that combines multiple 20MHz channels for a s…
View article: Orbital Angular Momentum Shift Keying Based Optical Communication System
Orbital Angular Momentum Shift Keying Based Optical Communication System Open
In the free space optical communication, the information can be encoded as the orbital angular momentum (OAM) state of light, which is called OAM shift keying (OAM-SK). This paper has proposed a communication system with OAM-SK, in which a…