Huazi Zhang
Zhejiang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Huazi Zhang.
IEEE Communications Magazine | 2015
Xiaoming Chen; Zhaoyang Zhang; Hsiao-Hwa Chen; Huazi Zhang
This article reviews an emerging wireless information and power transfer (WIPT) technique with an emphasis on its performance enhancement employing multi-antenna techniques. Compared to traditional wireless information transmission, WIPT faces numerous challenges. First, it is more susceptible to channel fading and path loss, resulting in a much shorter power transfer distance. Second, it gives rise to the issue of how to balance spectral efficiency for information transmission and energy efficiency for power transfer in order to obtain an optimal tradeoff. Third, there exists a security issue for information transmission in order to improve power transfer efficiency. In this context, multi-antenna techniques, e.g. energy beamforming, are introduced to solve these problems by exploiting spatial degree of freedom. This article provides a tutorial on various aspects of multi-antenna based WIPT techniques, with a focus on tackling the challenges by parameter optimization and protocol design. In particular, we investigate the WIPT tradeoffs based on two typical multi-antenna techniques: the limited feedback multi-antenna technique for short-distance transfer; and the large-scale multiple-input multiple-output (LS-MIMO, also known as massive MIMO) technique for long-distance transfer. Finally, simulation results validate the effectiveness of the proposed schemes.
IEEE Transactions on Wireless Communications | 2015
Xiaoming Chen; Lei Lei; Huazi Zhang; Chau Yuen
In this paper, we consider a large scale multiple input multiple output (LS-MIMO) relaying system, where an information source sends the message to its intended destination aided by an LS-MIMO relay, while a passive eavesdropper tries to intercept the information forwarded by the relay. The advantage of a large scale antenna array is exploited to improve spectral efficiency and enhance wireless security. In particular, the challenging issue incurred by short-distance interception is well addressed. Under very practical assumptions, i.e., no eavesdropper channel state information (CSI) and imperfect legitimate CSI at the relay, this paper gives a thorough secrecy performance analysis and comparison of two classic relaying techniques, i.e., amplify-and-forward (AF) and decode-and-forward (DF). Furthermore, asymptotical analysis is carried out to provide clear insights on the secrecy performance for such an LS-MIMO relaying system. We show that under large transmit powers, AF is a better choice than DF from the perspectives of both secrecy performance and implementation complexity, and prove that there exits an optimal transmit power at medium regime that maximizes the secrecy outage capacity.
IEEE Transactions on Wireless Communications | 2015
Rui Yin; Guanding Yu; Huazi Zhang; Zhaoyang Zhang; Geoffrey Ye Li
A pricing-based joint spectrum and power allocation framework is proposed for decentralized interference coordination among device-to-device (D2D) communications and cellular users (CUs), with the quality-of-service guarantee. The interlayer interference from D2D pairs to CUs is controlled by the base station through setting a price for each D2D channel usage. The intralayer interference among D2D pairs is mitigated distributively using a game-theoretic approach, where the D2D pairs compete for the spectrum until a Nash equilibrium is achieved. The effectiveness of the proposed strategy, including a practical scheme with limited signaling overhead, is demonstrated through comparing with a centralized scheme.
global communications conference | 2011
Huazi Zhang; Zhaoyang Zhang; Huaiyu Dai; Rui Yin; Xiaoming Chen
A novel Distributed Spectrum-Aware Clustering (DSAC) scheme is proposed in the context of Cognitive Radio Sensor Networks (CRSN). DSAC aims at forming energy efficient clusters in a self-organized fashion while restricting interference to Primary User (PU) systems. The spectrum-aware clustered structure is presented where the communications consist of intra- cluster aggregation and inter-cluster relaying. In order to save communication power, the optimal number of clusters is derived and the idea of groupwise constrained clustering is introduced to minimize intra-cluster distance under spectrum-aware constraint. In terms of practical implementation, DSAC demonstrates preferable scalability and stability because of its low complexity and quick convergence under dynamic PU activity. Finally, simulation results are given to validate the proposed scheme.
international conference on communications | 2011
Huazi Zhang; Zhaoyang Zhang; Xiaoming Chen; Rui Yin
A novel concept of Joint Source and Channel Sensing (JSCS) is introduced in the context of Cognitive Radio Sensor Networks(CRSN). Every sensor node has two basic tasks: application-oriented source sensing and ambient-oriented channel sensing. The former is to collect the application-specific source information and deliver it to the access point within some limit of distortion, while the latter is to find the vacant channels and provide spectrum access opportunities for the sensed source information. With in-depth exploration, we find that these two tasks are actually interrelated when taking into account the energy constraints. The main focus of this paper is to minimize the total power consumed by these two tasks while bounding the distortion of the application-specific source information. Firstly, we present a specific slotted sensing and transmission scheme, and establish the multi-task power consumption model. Secondly, we jointly analyze the interplay between these two sensing tasks, and then propose a proper sensing and power allocation scheme to minimize the total power consumption. Finally, simulation results are given to validate the proposed scheme.
international conference on communications | 2014
Xiaoming Chen; Lei Lei; Huazi Zhang; Chau Yuen
In this paper, we study the problem of physical layer security in a large-scale multiple-input multiple-output (LS-MIMO) relaying system. The advantage of LS-MIMO relaying systems is exploited to enhance both wireless security and spectral efficiency. In particular, the challenging issue incurred by short interception distance is well addressed. Under very practical assumptions, i.e., no eavesdroppers channel state information (CSI) and imperfect legitimate channel CSI, this paper gives a thorough investigation of the impact of imperfect CSI in two classic relaying systems, i.e., amplify-and-forward (AF) and decode-and-forward (DF) systems, and obtain explicit expressions of secrecy outage capacities for both cases. Finally, our theoretical claims are validated by the numerical results.
IEEE Transactions on Wireless Communications | 2013
Huazi Zhang; Zhaoyang Zhang; Huaiyu Dai
In this paper, we analyze the effect of mobility on information spreading in geometric networks through natural random walks. Specifically, our focus is on epidemic propagation via mobile gossip, a variation from its static counterpart. Our contributions are twofold. Firstly, we propose a new performance metric, mobile conductance, which allows us to separate the details of mobility models from the study of mobile spreading time. Secondly, we utilize geometrical properties to explore this metric for several popular mobility models, and offer insights on the corresponding results. Large scale network simulation is conducted to verify our analysis.
conference on computer communications workshops | 2011
Huazi Zhang; Zhaoyang Zhang; Yuen Chau
A novel distributed compressed wideband sensing scheme for Cognitive Radio Sensor Networks (CRSN) is proposed in this paper. Taking advantage of the distributive nature of CRSN, the proposed scheme deploys only one single narrowband sampler with ultra-low sampling rate at each nodes to accomplish the wideband spectrum sensing. First, the practical structure of the compressed sampler at each node is described in detail. Second, we show how the Fusion Center (FC) exploits the sampled signals with their spectrum randomly-aliased to detect the global wideband spectrum activity. Finally, the proposed scheme is validated through extensive simulations, which shows that it is particularly suitable for CRSN.
IEEE Journal on Selected Areas in Communications | 2013
Huazi Zhang; Zhaoyang Zhang; Huaiyu Dai
Opportunistically sharing the white spaces, or the temporarily unoccupied spectrum licensed to the primary user (PU), is a practical way to improve the spectrum utilization. In this paper, we consider the fundamental problem of rate regions achievable for multiple secondary users (SUs) which send their information to a common receiver over such a white space channel. In particular, the PU activities are treated as on/off side information, which can be obtained causally or non-causally by the SUs. The system is then modeled as a multi-switch channel and its achievable rate regions are characterized in some scenarios. Explicit forms of outer and inner bounds of the rate regions are derived by assuming additional side information, and they are shown to be tight in some special cases. An optimal rate and power allocation scheme that maximizes the sum rate is also proposed. The numerical results reveal the impacts of side information, channel correlation and PU activity on the achievable rates, and also verify the effectiveness of our rate and power allocation scheme. Our work may shed some light on the fundamental limit and design tradeoffs in practical cognitive radio systems.
IEEE Transactions on Vehicular Technology | 2016
Xiaoming Chen; Jian Chen; Huazi Zhang; Yu Zhang; Chau Yuen
In this paper, secure communication aided by a multiantenna cooperative jammer is investigated. Under very practical but adverse assumptions, i.e., no instantaneous jammer-eavesdropper channel state information (CSI) and imperfect instantaneous jammer-receiver CSI, the residual interference from the jammer to the legitimate receiver appears, even with spatial beamforming. Then, this paper analyzes the impact of imperfect CSI on the function of cooperative jamming and derives closed-form expressions of multiple secrecy performance metrics, including ergodic secrecy rate, secrecy outage capacity, and interception probability. Interestingly, it is found that two antennas at the jammer is always optimal. Furthermore, some insights are obtained through asymptotic analysis, e.g., the secrecy performance is saturated as the source transmit power increases, the ergodic secrecy rate is a linear function of CSI feedback bits in the region of high transmit power at the source/jammer, and interception probability is independent of transmit power at the source and is a decreasing function of transmit power at the jammer. Finally, theoretical claims are validated by simulation results.