Yuntian Wang
YOU?
Author Swipe
View article: The high order spectral radius of graphs without long cycles or paths
The high order spectral radius of graphs without long cycles or paths Open
In 1959, Erdős and Gallai established two classic theorems, which determine the maximum number of edges in an $n$-vertex graph with no cycles of length at least $k$, and in an $n$-vertex graph with no paths on $k$ vertices, respectively. S…
View article: Spatially Modulated Fiber Speckle for High-Sensitivity Refractive Index Sensing
Spatially Modulated Fiber Speckle for High-Sensitivity Refractive Index Sensing Open
A fiber speckle sensor (FSS) based on a tapered multimode fiber (TMMF) has been developed to measure liquid analyte refractive index (RI) in this work. By the lateral and axial offset of input light into TMMF, several high-order modes are …
View article: Advanced Fiber-Shaped Aqueous Zn Ion Battery Integrated with Strain Sensor
Advanced Fiber-Shaped Aqueous Zn Ion Battery Integrated with Strain Sensor Open
Multifunctional batteries have attracted increasing attention, offering additional functionalities beyond the conventional batteries. Herein, we report a fiber-shaped Zn ion battery that not only acts as a high-performance power supply but…
View article: Secure Multigroup Multicast Communication Systems via Intelligent Reflecting Surface
Secure Multigroup Multicast Communication Systems via Intelligent Reflecting Surface Open
This paper considers a secure multigroup multicast multiple-input single-output (MISO) communication system aided by an intelligent reflecting surface (IRS). Specifically, we aim to minimize the transmit power at the Alice via jointly opti…
View article: Efficient Receive Beamformers for Secure Spatial Modulation against a Malicious Full-duplex Attacker with Eavesdropping Ability
Efficient Receive Beamformers for Secure Spatial Modulation against a Malicious Full-duplex Attacker with Eavesdropping Ability Open
In this paper, we consider a new secure spatial modulation scenario with a full-duplex (FD) malicious attacker Mallory owning eavesdropping capacity, where Mallory works on FD model and transmits a malicious jamming such as artificial nois…
View article: UAV-enabled Secure Communication with Finite Blocklength
UAV-enabled Secure Communication with Finite Blocklength Open
In the finite blocklength scenario, which is suitable for practical applications, a method of maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled secure communication by optimizing the UAV's trajectory and tr…
View article: UAV-Enabled Uplink Non-Orthogonal Multiple Access System: Joint Deployment and Power Control
UAV-Enabled Uplink Non-Orthogonal Multiple Access System: Joint Deployment and Power Control Open
In order to overcome the inherent latency in multi-user unmanned aerial vehicle (UAV) networks with orthogonal multiple access (OMA). In this paper, we investigate the UAV enabled uplink non-orthogonal multiple access (NOMA) network, where…
View article: Energy-efficient Alternating Iterative Secure Structure of Maximizing Secrecy Rate for Directional Modulation Networks
Energy-efficient Alternating Iterative Secure Structure of Maximizing Secrecy Rate for Directional Modulation Networks Open
In a directional modulation (DM) network, the issues of security and privacy have taken on an increasingly important role. Since the power allocation of confidential message and artificial noise will make a constructive effect on the syste…