加入收藏夹
联系我们
关于本站
个人主页
西电导航
西安电子科技大学
    当前位置:首页>>学术讲座
Two birds with one stone: towards secure and interference-free cooperative networks via constellation rotation
时间:2017-12-14 17:00    点击:   所属单位:通信工程学院
讲座名称 Two birds with one stone: towards secure and interference-free cooperative networks via constellation rotation
讲座时间 2017-12-17 16:20:00
讲座地点 北校区新科技楼1012会议室
讲座人 孙黎
讲座人介绍 Li Sun  is currently an Associate Professor and Ph.D. Advisor. His research interests include wireless physical-layer security, cooperative relaying networks, and M2M/D2D communications. He has published over 110 technical papers in international journals and conferences. Currently he is serving as the Editor of KSII Transactions on Internet and and Information Systems, the Leading Guest Editor of the Wireless Communications and Mobile Computing journal...... He has served or is serving as a Technical Program Committee member for several major IEEE conferences, including  GLOBECOM, ICC, WCNC, VTC, PIMRC, etc. He received the IEEE Communications Letters Exemplary Reviewers Award from IEEE Communications Society in 2013 and 2016. He won the Third Prize for the Outstanding Scientific Paper Award of Shaanxi Province of China in 2016, and the Best Paper Award of China Communications in 2017. He is a member of  IEEE and IEEE Communications Society.
讲座内容 To address both the security and reliability issues, a constellation-rotation based approach was proposed for cooperative networks. By rotating the signal constellations and exploiting the intrinsic orthogonality between the real and imaginary components of the complex signal, the interference-free transmissions can be realized for terminal users, and the secrecy of these users can be guaranteed as well. In this talk, we will first introduce the basic idea of constellation rotation, and then apply this technique to two typical scenarios, i.e.,  two-way untrusted relaying systems and cooperative device-to device systems. For both scenarios, the detailed schemes design together with simulation results will be presented. Finally, we would like to compare the proposed approach with the existing physical-layer security techniques and point out some future research directions.
转载请注明出处:西安电子科技大学学术信息网
如果您有学术信息或学术动态,欢迎投稿。我们将在第一时间确认并收录,投稿邮箱: meeting@xidian.edu.cn
Copyright © 2011-2017 西安电子科技大学 
开发维护:电子工程学院网络信息中心  管理员:meeting@xidian.edu.cn 站长统计: