Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Datong Xu is active.

Publication


Featured researches published by Datong Xu.


Mobile Networks and Applications | 2018

Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User

Datong Xu; Pinyi Ren; Qinghe Du; Li Sun; Yichen Wang

Non-orthogonal multiple access (NOMA) is becoming important in 5G, therefore, it is widely researched. Note that the users served in NOMA are often paired to prevent excessive interference. However, if the channel condition of direct downlink from the service node to one user is serious, the node may require the other user with better channel condition to relay this user’s signals, especially when the pure relay is difficult to deploy. This relay transmission is helpful for NOMA communication, but two problems should be considered: (i) how to persuade the relay user (i.e., the user with better channel condition) to expend extra resources for relay; (ii) how to suppress eavesdropping in the relay transmission, especially for the signals of indirect communication user (i.e., the user with worse channel condition). To solve these problems, we propose a novel signal-level scheme. In this scheme, on one hand, the node increases the spectral efficiency of relay user, and does the wireless power transfer to make the relay user supplement his/her energy by energy harvesting. On the other hand, a signal transformation method is designed to deal with each signal of indirect communication user. This transformation hides privacy information of indirect communication user, but does not disrupt the relay transmission. Utilizing the proposed scheme, the above problems are effectively solved by the compensation for the relay user and the signal protection for the indirect communication user.


vehicular technology conference | 2017

Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement

Datong Xu; Pinyi Ren; Qinghe Du; Li Sun; Yichen Wang

Eavesdropping in wireless communication environment should be suppressed. However, most existing schemes ordinarily focus on secrecy rate enhancement, which may not be achieved with the non-Gaussian signals. Therefore, we consider this security problem from the actual signal point of view. On the basis of this premise, a novel scheme is proposed. In our scheme, each original signal in one constellation is converted as a transmitted signal in another constellation, and the principle of this variation can be safely told to the user without being learned by others. With this conversion, the eavesdropper is difficult to restore the original signals. Performance analysis and simulation results illustrate that the proposed scheme is efficient for physical layer security improvement.


wireless algorithms systems and applications | 2015

Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System

Datong Xu; Pinyi Ren; Qinghe Du; Li Sun

In the new generation wireless communication systems, when multiple users are served, information security among them should be considered to protect each user’s privacy. In this case, physical layer security techniques can be adopted for this mutual confidence problem. Unlike other traditional physical layer security methods, the proposed scheme improves secrecy rate with the information of users’ access statuses (i.e., being served or idle), and it is denoted as SRT-AS. In the SRT-AS, appropriate parameters expressing users’ actual access statuses are introduced, and an adaptive transmitter and receiver design strategy is used to increase security. It can be found that no iterative process is included in the SRT-AS, moreover, performance analysis and simulation results illustrate that the SRT-AS is feasible for the multi-user system.


Iet Communications | 2016

Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems

Datong Xu; Pinyi Ren; Li Sun; Houbing Song


vehicular technology conference | 2012

A Two-Step Precoding Scheme for Multi-User Joint Transmission in Coordinated Multi-Point System

Datong Xu; Pinyi Ren


Security and Communication Networks | 2016

Active jamming for multi-user information security improvement with the access statuses of users

Datong Xu; Pinyi Ren; Qinghe Du; Li Sun


personal, indoor and mobile radio communications | 2012

Inter-user interference suppression precoding based on SLNR for multi-user joint transmission in coordinated multi-point system

Datong Xu; Pinyi Ren


IEEE Transactions on Vehicular Technology | 2018

Combat Hybrid Eavesdropping in Power-Domain NOMA: Joint Design of Timing Channel and Symbol Transformation

Datong Xu; Pinyi Ren; Hai Lin


wireless communications and networking conference | 2017

Physical Layer Security Improvement by Constellation Selection and Artificial Interference

Datong Xu; Pinyi Ren; Qinghe Du; Li Sun; Yichen Wang


personal, indoor and mobile radio communications | 2017

Robust secrecy competition in wireless networks

Xiao Tang; Pinyi Ren; Datong Xu; Dongyang Xu

Collaboration


Dive into the Datong Xu's collaboration.

Top Co-Authors

Avatar

Pinyi Ren

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Li Sun

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Qinghe Du

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Yichen Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Dongyang Xu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xiao Tang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Hai Lin

Osaka Prefecture University

View shared research outputs
Researchain Logo
Decentralizing Knowledge