Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jibo Wei is active.

Publication


Featured researches published by Jibo Wei.


IEEE Transactions on Wireless Communications | 2012

Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI

Minyan Pei; Jibo Wei; Kai-Kit Wong; Xin Wang

This letter investigates masked beamforming schemes for multiuser multiple-input multiple-output (MIMO) downlink systems in the presence of an eavesdropper. With noisy and outdated channel state information (CSI) at the base station (BS), we aim to maximize the transmit power of an artificial noise, which is broadcast to jam any potential eavesdropper, while meeting individual minimum mean square error (MMSE) constraints of the desired user links. To this end, we adopt a Bayesian approach and derive an average MSE uplink-downlink duality with imperfect CSI. Using the duality, a robust beamforming algorithm is proposed. Simulation results show the effectiveness of the proposed scheme.


IEEE Transactions on Wireless Communications | 2011

A General Upper Bound to Evaluate Packet Error Rate over Quasi-Static Fading Channels

Yong Xi; Alister G. Burr; Jibo Wei; David Grace

We propose a new analytical approach to evaluate the average packet error rate (PER) of a conventional packet transmission system over a quasi static fading channel, by presenting an integral inequality lemma. The basic idea of the approach is that, given the PER for the AWGN channel as a function of signal-to-noise ratio (SNR), the average PER over Rayleigh fading channel can be generally upper bounded by a quite simple inequality, i.e.,1 - exp(-wo/γ̅), for both coded and uncoded schemes, where wo, defined by an integral expression, corresponds exactly to the inversion of coding gain; and this bound is tight in the high SNR region or for long packet systems. We further apply the integral inequality to extend our research to more general Nakagami-m fading channel.


IEEE Transactions on Signal Processing | 2014

Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming

Minyan Pei; A. Lee Swindlehurst; Dongtang Ma; Jibo Wei

This paper studies a multi-antenna wiretap channel with a passive eavesdropper and an external helper, where only quantized channel information regarding the legitimate receiver is available at the transmitter and helper due to finite-rate feedback. Given a fixed total bandwidth for the two feedback channels, the receiver must determine how to allocate its feedback bits to the transmitter and helper. Assuming zero-forcing transmission at the helper and random vector quantization of the channels, an analytic expression for the achievable ergodic secrecy rate due to the resulting quantization errors is derived. While direct optimization of the secrecy rate is difficult, an approximate upper bound for the mean loss in secrecy rate is derived and a feedback bit allocation method that minimizes the average upper bound on the secrecy rate loss is studied. A closed-form solution is shown to be possible if the integer constraint on the bit allocation is relaxed. Numerical simulations indicate the significant advantage that can be achieved by adaptively allocating the available feedback bits.


IEEE Signal Processing Letters | 2011

Maximizing the Sum-Rate of Amplify-and-Forward Two-Way Relaying Networks

Wenjing Cheng; Mounir Ghogho; Qinfei Huang; Dongtang Ma; Jibo Wei

This letter addresses the problem of beamforming design for an amplify-and-forward (AF) based two-way relaying network (TWRN) which consists of two terminal nodes and several relay nodes. Considering a two-time-slot relaying scheme, we design the optimal beamforming coefficients to maximize the sum-rate of AF-based TWRN under total relay power constraint (TRPC). Although the optimization problem is neither convex nor concave, we show that the global optimal solution can be obtained by the branch-and-bound algorithm. To address the computational complexity concern, we also propose a low-complexity suboptimal solution which is obtained by optimizing a cost function over one real variable only. Simulation results show that the proposed optimal solution outperforms existing schemes significantly. Moreover, we show that the suboptimal solution only suffers small sum-rate losses compared to the optimal solution.


military communications conference | 2006

Adaptive Multirate Auto Rate Fallback Protocol for IEEE 802.11 WLANS

Yong Xi; Byung-Seo Kim; Jibo Wei; Qingyan Huang

An adaptive multirate auto rate fallback (AMARF) protocol is proposed for IEEE 802.11 WLANs. The key idea is to assign each data rate a unique success threshold, which is a criterion to switch one rate to the next higher rate, and the success thresholds can be changed dynamically in an adaptive manner according to the running conditions, such as packet length and channel parameters. Moreover, the proposed protocol can be implemented without any change to the current IEEE 802.11 standards. Our in-depth simulation shows that AMARE yields significantly higher throughput than other existing schemes including auto rate fallback (ARF) scheme and its variants, in various running conditions


IEEE Transactions on Vehicular Technology | 2016

Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems

Jun Xiong; Longwang Cheng; Dongtang Ma; Jibo Wei

In this paper, we consider a dual-hop amplify-and-forward (AF) multiple-input-multiple-output (MIMO) relay network, where the source, relay, and destination are each equipped with multiple antennas. The relay is untrusted if it is willing to forward the signal to the destination and, at the same time, acts as a potential eavesdropper to interpret the message from the source. Since there exists no direct link between the source and the destination, a positive secrecy rate cannot be obtained. Addressing this issue, we propose a joint destination-aided cooperative jamming and precoding at both the source and the relay scheme: joint source, relay, and destination precoding (JP). We target at maximizing the secrecy rate by jointly designing the source, relay, and destination precoding matrices and propose an alternating iterative optimization algorithm to tackle the nonconvex problem. Then, a comprehensive study on the asymptotic performance is conducted in a high signal-to-noise ratio (SNR) regime. In particular, we present simple closed-form expressions for the two key performance parameters in the asymptotic secrecy rate, i.e., the high-SNR slope and the high-SNR power offset. Finally, numerical results are conducted to demonstrate the validity of the proposed secure scheme and its performance analysis.


IEEE Communications Letters | 2010

Modeling intra-flow contention problem in IEEE 802.11 wireless multi-hop networks

Haitao Zhao; Shan Wang; Yong Xi; Jibo Wei

This letter proposes a new approach to model the intra-flow contention problem in multi-hop networks. The model takes into consideration of neighboring interference, hidden-node collision and multi-rate scenario. It can be easily used to do admission control or to calculate the end-to-end capacity of a given multi-hop route. Simulation results validate its accuracy.


IEEE Transactions on Vehicular Technology | 2016

A Dynamic Graph-Based Scheduling and Interference Coordination Approach in Heterogeneous Cellular Networks

Li Zhou; Xiping Hu; Edith C.-H. Ngai; Haitao Zhao; Shan Wang; Jibo Wei; Victor C. M. Leung

To meet the demand of increasing mobile data traffic and provide better user experience, heterogeneous cellular networks (HCNs) have become a promising solution to improve both the system capacity and coverage. However, due to dense self-deployment of small cells in a limited area, serious interference from nearby base stations may occur, which results in severe performance degradation. To mitigate downlink interference and utilize spectrum resources more efficiently, we present a novel graph-based resource allocation and interference management approach in this paper. First, we divide small cells into cell clusters, considering their neighborhood relationships in the scenario. Then, we develop another graph clustering scheme to group user equipment (UE) in each cell cluster into UE clusters with minimum intracluster interference. Finally, we utilize a proportional fairness scheduling scheme to assign subchannels to each UE cluster and allocate power using water-filling method. To show the efficacy and effectiveness of our proposed approach, we propose a dual-based approach to search for optimal solutions as the baseline for comparisons. Furthermore, we compare the graph-based approach with the state of the art and a distributed approach without interference coordination. The simulation results show that our graph-based approach reaches more than 90% of the optimal performance and achieves a significant improvement in spectral efficiency compared with the state of the art and the distributed approach both under cochannel and orthogonal deployments. Moreover, the proposed graph-based approach has low computation complexity, making it feasible for real-time implementation.


ad hoc networks | 2013

Evaluating the impact of network density, hidden nodes and capture effect for throughput guarantee in multi-hop wireless networks

Haitao Zhao; Emiliano Garcia-Palacios; Shan Wang; Jibo Wei; Dongtang Ma

To optimize the performance of wireless networks, one needs to consider the impact of key factors such as interference from hidden nodes, the capture effect, the network density and network conditions (saturated versus non-saturated). In this research, our goal is to quantify the impact of these factors and to propose effective mechanisms and algorithms for throughput guarantees in multi-hop wireless networks. For this purpose, we have developed a model that takes into account all these key factors, based on which an admission control algorithm and an end-to-end available bandwidth estimation algorithm are proposed. Given the necessary network information and traffic demands as inputs, these algorithms are able to provide predictive control via an iterative approach. Evaluations using analytical comparison with simulations as well as existing research show that the proposed model and algorithms are accurate and effective.


IEEE Access | 2016

Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper

Bin Chen; Chunsheng Zhu; Wei Li; Jibo Wei; Victor C. M. Leung; Laurence T. Yang

Massive multiple-input multiple-output (MIMO) has been extensively studied and considered as a key enabling technology for the fifth generation (5G) wireless communication systems, due to its potential to achieve high energy efficiency and spectral efficiency. As the concept of massive MIMO becomes more popular, it is plausible that the eavesdroppers will also employ massive antennas, which may remarkably enhance their ability to intercept the information. In this paper, motivated by the need to protect against the eavesdroppers equipped with powerful large antenna arrays, which has received scarce attention in the literature, a physical layer security approach called original symbol phase rotated (OSPR) secure transmission scheme is proposed to defend against eavesdroppers armed with unlimited antennas. The basic idea of the proposed OSPR scheme is to randomly rotate the phase of original symbols at the base station (BS) before they are transmitted, so that the massive MIMO eavesdropper will be confused by the intercepted signals, which may not represent the true information symbols. However, the legitimate users are able to infer the correct phase rotations and take proper inverse operations to recover the original symbols. We show that when the BS has a large enough, but finite number of antennas, the proposed OSPR scheme can achieve a considerable security performance in that the eavesdropper is unable to recover most of the original symbols, even with unlimited antennas. The process and the security performance of the proposed OSPR scheme are presented in detail. Simulation results are provided to further corroborate that the proposed OSPR scheme is a potential green secure transmission candidate technique for the future wireless networks.

Collaboration


Dive into the Jibo Wei's collaboration.

Top Co-Authors

Avatar

Haitao Zhao

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Dongtang Ma

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yong Xi

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shan Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Li Zhou

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xin Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Qinfei Huang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Wei Li

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Degang Wang

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge