Yueming Cai
YOU?
Author Swipe
View article: TelePlanNet: An AI-Driven Framework for Efficient Telecom Network Planning
TelePlanNet: An AI-Driven Framework for Efficient Telecom Network Planning Open
The selection of base station sites is a critical challenge in 5G network planning, which requires efficient optimization of coverage, cost, user satisfaction, and practical constraints. Traditional manual methods, reliant on human experti…
View article: Energy Transfer Enabled Radical Deoxygenative C(sp<sup>3</sup>)‐N Construction
Energy Transfer Enabled Radical Deoxygenative C(sp<sup>3</sup>)‐N Construction Open
The formation of C(sp 3 )‐N bonds constitutes a pivotal transformation in functional molecule synthesis, with conventional methods predominantly relying on polar substitution paradigms. To address the inherent limitations of existing appro…
View article: Endogenous Protein‐Modified Gold Nanorods as Immune‐Inert Biomodulators for Tumor‐Specific Imaging and Therapy
Endogenous Protein‐Modified Gold Nanorods as Immune‐Inert Biomodulators for Tumor‐Specific Imaging and Therapy Open
Engineered modifications of nanomaterials inspired by nature hold great promise for disease‐specific imaging and therapies. However, conventional polyethylene glycol modification is limited by immune system rejection. The manipulation of g…
View article: Terahertz Integrated Sensing and Communication-Empowered UAVs in 6G: A Transceiver Design Perspective
Terahertz Integrated Sensing and Communication-Empowered UAVs in 6G: A Transceiver Design Perspective Open
Due to their high maneuverability, flexible deployment, and low cost, unmanned aerial vehicles (UAVs) are expected to play a pivotal role in not only communication, but also sensing. Especially by exploiting the ultra-wide bandwidth of ter…
View article: Channel Estimation for Movable-Antenna MIMO Systems via Tensor Decomposition
Channel Estimation for Movable-Antenna MIMO Systems via Tensor Decomposition Open
In this letter, we investigate the channel estimation problem for MIMO wireless communication systems with movable antennas (MAs) at both the transmitter (Tx) and receiver (Rx). To achieve high channel estimation accuracy with low pilot tr…
View article: Channel Estimation for Movable-Antenna MIMO Systems Via Tensor Decomposition
Channel Estimation for Movable-Antenna MIMO Systems Via Tensor Decomposition Open
In this letter, we investigate the channel estimation problem for MIMO wireless communication systems with movable antennas (MAs) at both the transmitter (Tx) and receiver (Rx). To achieve high channel estimation accuracy with low pilot tr…
View article: Resource allocation and passive beamforming for IRS‐assisted short packet systems
Resource allocation and passive beamforming for IRS‐assisted short packet systems Open
This paper investigates an intelligent reflecting surface (IRS) assisted downlink short packet transmission system, where an access point sends short packets to multiple devices with the help of an IRS. Specifically, a performance comparis…
View article: Multi-Type Missing Imputation of Time-Series Power Equipment Monitoring Data Based on Moving Average Filter–Asymmetric Denoising Autoencoder
Multi-Type Missing Imputation of Time-Series Power Equipment Monitoring Data Based on Moving Average Filter–Asymmetric Denoising Autoencoder Open
Supervisory control and data acquisition (SCADA) systems are widely utilized in power equipment for condition monitoring. For the collected data, there generally exists a problem—missing data of different types and patterns. This leads to …
View article: Resource Allocation and Passive Beamforming for IRS-assisted URLLC Systems
Resource Allocation and Passive Beamforming for IRS-assisted URLLC Systems Open
In this correspondence, we investigate an intelligent reflective surface (IRS) assisted downlink ultra-reliable and low-latency communication (URLLC) system, where an access point (AP) sends short packets to multiple devices with the help …
View article: Joint Scheduling and Power Optimization for Complex Status Updates in Multiantenna UAV‐Assisted Multiaccess Edge Computing
Joint Scheduling and Power Optimization for Complex Status Updates in Multiantenna UAV‐Assisted Multiaccess Edge Computing Open
The status information of complex status update applications (e.g., real‐time environmental monitoring in disaster areas) can only be obtained after data processing. Therefore, the impact of data processing on age of information (AoI) cann…
View article: Proactive spectrum monitoring with spectrum monitoring data transmission in dynamic spectrum sharing network: Joint design of precoding and antenna selection
Proactive spectrum monitoring with spectrum monitoring data transmission in dynamic spectrum sharing network: Joint design of precoding and antenna selection Open
A proactive spectrum monitoring and spectrum monitoring data (SMD) transmission coexistence system is investigated in dynamic spectrum sharing network, where a spectrum monitor (SM) aims to monitor the spectrum information from the electro…
View article: Multi-channel DMA Based Design of Voltage Monitoring Using Synchronous Frequency Trace-Sampling Technique
Multi-channel DMA Based Design of Voltage Monitoring Using Synchronous Frequency Trace-Sampling Technique Open
In order to eliminate the influence of frequency change on real-time voltage acquisition, a low-cost solution of voltage monitoring was proposed using the multi-channel DMA synchronous frequency trace-sampling technique. In-chip resources …
View article: Covert Communications with Constrained Age of Information
Covert Communications with Constrained Age of Information Open
In this letter, we consider the requirement of information freshness in covert communications for the first time. With artificial noise (AN) generated from a full-duplex (FD) receiver, we formulate a covertness maximization problem under t…
View article: Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing
Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing Open
With rapid growth of content demands, device-to-device (D2D) content sharing is exploited to effectively improve the service quality of users.Considering the limited storage space and various content demands of users, caching schemes are s…
View article: Robust and Secure Beamforming for Intelligent Reflecting Surface Aided mmWave MISO Systems
Robust and Secure Beamforming for Intelligent Reflecting Surface Aided mmWave MISO Systems Open
In this letter, we investigate the robust and secure beamforming (RSBF) in an intelligent reflecting surface (IRS) aided millimeter wave (mmWave) multiple input single output (MISO) system, where multiple single antenna eavesdroppers (Eves…
View article: Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers
Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers Open
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (…
View article: Secure Transmission Method of Spectrum Watermark for Fine-Grained Spectrum Management
Secure Transmission Method of Spectrum Watermark for Fine-Grained Spectrum Management Open
Fine-grained spectrum management is promising in addressing the contradiction between the access requirements for massive radio systems and the shortage of spectrum resources. It is difficult to identify the radio system and securely trans…
View article: Fairness-Aware Offloading and Trajectory Optimization for Multi-UAV Enabled Multi-Access Edge Computing
Fairness-Aware Offloading and Trajectory Optimization for Multi-UAV Enabled Multi-Access Edge Computing Open
Multiple unmanned aerial vehicles (UAVs) can compensate for the performance deficiencies of a single UAV in multi-access edge computing (MEC) systems, thus providing improved offloading services to user equipments (UEs). In multi-UAV enabl…
View article: Secure Transmission for Buffer-Aided Relay Networks in the Internet of Things
Secure Transmission for Buffer-Aided Relay Networks in the Internet of Things Open
This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and p…
View article: Comparison of CS-Based Channel Estimation for Millimeter Wave Massive MIMO Systems
Comparison of CS-Based Channel Estimation for Millimeter Wave Massive MIMO Systems Open
Compressed sensing (CS) has great potential in channel estimation for millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems. To solve such a CS-based channel estimation problem, three categories of algorithms, name…
View article: On the Performance of Random Cognitive mmWave Sensor Networks
On the Performance of Random Cognitive mmWave Sensor Networks Open
This paper investigates the secrecy performance of a cognitive millimeter wave (mmWave) wiretap sensor network, where the secondary transmitter (SU-Tx) intends to communicate with a secondary sensor node under the interference temperature …
View article: Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks
Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks Open
In this paper, we investigate opportunistic secure multiuser scheduling in energy harvesting untrusted relay networks, where an energy-constrained amplify-and-forward (AF) relay harvests energy from the received radio frequency signal via …
View article: Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages Open
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamformin…
View article: Analyzing Power Beacon Assisted Transmission with Imperfect CSI in Wireless Powered Sensor Networks
Analyzing Power Beacon Assisted Transmission with Imperfect CSI in Wireless Powered Sensor Networks Open
This paper proposes the maximal ratio transmission (MRT) and maximal ratio combining (MRC) protocols for the power beacon (PB) assisted wireless powered sensor networks and analyzes the impact of the imperfect channel state information (CS…
View article: Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements
Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements Open
The basis of generating secret key from the common wireless channel at two communication parties is reciprocity. However, due to non-simultaneous measurements and unavoidable estimation error, bias always exists and key disagreement occurs…
View article: Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication Open
This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping o…
View article: Secrecy Outage Performance for DF Buffer-Aided Relaying Networks With a Multi-Antenna Destination
Secrecy Outage Performance for DF Buffer-Aided Relaying Networks With a Multi-Antenna Destination Open
In this paper, we investigate the secrecy outage performance of decode-and-forward (DF) buffer-aided relaying networks with a multi-antenna destination in the presence of an eavesdropper. In order to take full advantage of the benefits pro…
View article: Secure On-Off Transmission in mmWave Systems With Randomly Distributed Eavesdroppers
Secure On-Off Transmission in mmWave Systems With Randomly Distributed Eavesdroppers Open
To meet ever-increasing mobile data traffic demands for next-generation wireless communication systems, the plentiful spectrum resources in millimeter wave (mmWave) band have been exploited to improve the system capacity. This paper invest…
View article: Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems Open
Proactive eavesdropping is an effective method for government to monitor suspicious users who are deemed to misuse communication systems for illegal activities. In this paper, considering that a legitimate full-duplex (FD) eavesdropper tri…