Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fang Xiaojie is active.

Publication


Featured researches published by Fang Xiaojie.


China Communications | 2016

MP-WFRFT and constellation scrambling based physical layer security system

Fang Xiaojie; Sha Xuejun; Li Yue

In this paper, a multiple parameters weighted fractional Fourier transform (MP-WFRFT) and constellation scrambling (CS) method based physical layer (PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MP-WFRFT, implemented as the constellation beguiling (CB) method, is applied to change the signals identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signals characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers classification or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.


IEEE Communications Letters | 2015

Secret Communication Using Parallel Combinatory Spreading WFRFT

Fang Xiaojie; Sha Xuejun; Li Yong

In this letter, a parallel-combinatory-spreading-based weighted fractional Fourier transform (PCS-WFRFT) system aiming to guarantee physical layer (PHY) security is proposed. In this system, the transmission data are first divided into two groups. Based on the first group of data, a set of pseudonoise sequences is generated and then used to spread and encrypt the second group of data. In general, the proposed system is spread and dynamically encrypted by the message information itself, whereby both high bandwidth efficiency and high security performance are obtained. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate.


international conference on communications | 2017

A mobile relay selection strategy in cooperative spectrum sharing framework

Deng Xiao; Wu Xuanli; Meng Chuiyang; Han Shuai; Fang Xiaojie

In spectrum sharing networks with relay cooperation, primary users can benefit from the assistance of secondary users while secondary users accessing the primary bandwidth to transmit their signals. Reasonable relay selection strategy can improve the performances of both primary and secondary users in terms of higher transmission data rate and lower outage probability, and at the same time, frequent relay switching can be avoided. In this paper, we propose a relay selection strategy considering both relay mobility and the required transmission data rate of primary user. The metrics of relay selection combine the relay activation duration and the transmission data rate of the secondary users through the mobility prediction of relay nodes. Simulation results show that the proposed strategy can select the best relay with lower primary outage probability and longer relay activation duration compared with existing schemes, and the transmission data rate of secondary user can also be improved so that the total number of transmit information bits can be increased.In spectrum sharing networks with relay cooperation, primary users can benefit from the assistance of secondary users while secondary users accessing the primary bandwidth to transmit their signals. Reasonable relay selection strategy can improve the performances of both primary and secondary users in terms of higher transmission data rate and lower outage probability, and at the same time, frequent relay switching can be avoided. In this paper, we propose a relay selection strategy considering both relay mobility and the required transmission data rate of primary user. The metrics of relay selection combine the relay activation duration and the transmission data rate of the secondary users through the mobility prediction of relay nodes. Simulation results show that the proposed strategy can select the best relay with lower primary outage probability and longer relay activation duration compared with existing schemes, and the transmission data rate of secondary user can also be improved so that the total number of transmit information bits can be increased.


Archive | 2014

Scheduling control method of IP (Internet protocol) broadband network-based coal mine underground scheduling system adopting coal mine multifunctional terminal

Sha Xuejun; Fang Xiaojie; Qiu Xin; Wu Xuanli; Li Zhuoming; Bai Xu


Archive | 2015

Server and self-service travel system adopting same

Sha Xuejun; Fu Zhanyu; Song Xiaocheng; Wu Xuanli; Fang Xiaojie; Wu Wei; Li Zhuoming


Archive | 2014

Four-weighted fractional Fourier transform-based narrowband interference suppression method

Sha Xuejun; Li Yong; Mei Lin; Wu Xuanli; Fang Xiaojie; Qiu Xin; Wu Wei


Archive | 2014

Weighted score Fourier transformation domain signal transmission method based on multi-sequence combined spread spectrum

Sha Xuejun; Fang Xiaojie; Wu Xuanli; Ma Cong


Archive | 2013

Weighted score Fourier transform-based variable parameter spread spectrum sequence low-detection probability signal emitting and receiving method

Sha Xuejun; Fang Xiaojie; Wu Wei; Bai Xu; Wu Xuanli; Li Zhuoming


Archive | 2013

Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform

Sha Xuejun; Li Tao; Mei Lin; Xiong Lina; Fang Xiaojie; Wu Wei; Bai Xu


Archive | 2015

Limited duration fire hazard monitoring device and method based on short message service of Beidou satellite positioning system

Sha Xuejun; Fang Xiaojie; Ma Cong; Bai Xu; Mei Lin; Ye Liang

Collaboration


Dive into the Fang Xiaojie's collaboration.

Top Co-Authors

Avatar

Sha Xuejun

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Wu Xuanli

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mei Lin

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Wu Wei

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bai Xu

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Yong

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Zhuoming

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Yue

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Qiu Xin

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Deng Xiao

Harbin Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge