Jinhui Lu
Nanjing University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jinhui Lu.
IEEE Systems Journal | 2017
Feng Shu; Wei Zhu; Xiangwei Zhou; Jun Li; Jinhui Lu
In this paper, we make an investigation of robust beamforming for secure directional modulation in the multiuser multiple-input and multiple-output systems in the presence of direction angle measurement errors. When statistical knowledge of direction angle measurement errors is unavailable, a novel robust beamforming scheme of combining main-lobe-integration and leakage is proposed to simultaneously transmit multiple different independent parallel confidential message streams to the associated multiple distinct desired users. The proposed scheme includes two steps: designing the beamforming vectors of the useful confidential messages and constructing artificial noise (AN) projection matrix. Here, in its first step, the beamforming vectors for the useful confidential messages of desired user
IEEE Communications Letters | 2017
Feiran You; Jun Li; Jinhui Lu; Feng Shu
k
international conference on wireless communications and signal processing | 2017
Wei Zhu; Feng Shu; Tingting Liu; Xiaobo Zhou; Jinsong Hu; Guangzu Liu; Linqing Gui; Jun Li; Jinhui Lu
are given by minimizing the useful signal power leakage from the main-lobe of desired user
IEEE Systems Journal | 2017
Feng Shu; Shuping Yang; Jinhui Lu; Jun Li
k
IEEE Internet of Things Journal | 2017
Jun Li; Miao Liu; Jinhui Lu; Feng Shu; Yijin Zhang; Siavash Bayat; Dushantha Nalin K. Jayakody
to the sum of main-lobes of the remaining desired directions plus main-lobes of all eavesdropper directions. In its second step, the AN projection matrix is constructed by simultaneously maximizing the AN power leakage to all eavesdropper directions such that all eavesdroppers are disrupted seriously, where AN is viewed by the transmitter as a useful signal for eavesdroppers. Due to independent beamforming vectors for different desired users, a more secure transmission is achieved. Compared with conventional nonrobust methods, the proposed method can provide a significant improvement in bit error rate along the desired directions and secrecy-sum-rate toward multiple desired users without needing the statistical property or distribution of angle measurement errors.
IEEE Access | 2018
Siming Wan; Feng Shu; Jinhui Lu; Guan Gui; Jun Wang; Guiyang Xia; Yijin Zhang; Jun Li; Jiangzhou Wang
In this letter, we propose an auction-based resource trading scheme between a network service provider (NSP) and multiple content providers (CPs). The NSP is in charge of a number of small-cell base stations (SBSs), while each CP provides content downloading services to its affiliated mobile users (MUs). By treating the SBSs as a kind of resources, the NSP leases SBSs to the CPs for caching their popular contents, thereby reducing the downloading latency of the MUs. We first establish the utility functions of the NSP and CPs. Then, we maximize the utilities of both sides by formulating an iterative auction problem, in which the NSP (auctioneer) communicates with the CPs (bidders) in an iterative manner for achieving optimal price and resource allocations. Furthermore, to avoid being cheated from the CPs, we adopt an ascending-bid auction mechanism such that the CPs do not have motivations to cheat the NSP for a lower price. Numerical results show that our proposed scheme can effectively allocate SBSs to the CPs and prevent each CP from cheating the NSP for gaining a higher profit.
international conference on computer communications and networks | 2018
Feiran You; Jun Li; Jinhui Lu; Feng Shu; Tingting Liu; Zhu Han
In the conventional directional modulation (DM) system without relay aiding, when the eavesdropper locates within the main-beam of the desired direction, it can intercept the confidential message from source Alice. In this paper, we propose a strategy to enhance physical-layer security of direction modulation in wireless transmission with the help of multi-relay cooperation. In this scenario, the confidential messages are forwarded to the desired destination receiver, and the artificial noise (AN) is enforced to the eavesdroppers with the aid of multi-relays and direction modulation such that the eavesdropper can not successfully recover the useful information from its received signals. The simulation results show that the proposed method achieves a significantly higher signal-to-interference-plus-noise ratio (SINR) peak at the destination position than at other positions outside the main-beam of the desired position and its secrecy rate performance at undesired position is so poor that the secure transmission is guaranteed.
arXiv: Information Theory | 2018
Feng Shu; Zaoyu Lu; Jinyong Lin; Linlin Sun; Xiaobo Zhou; Tingting Liu; Shuo Zhang; Wenlong Cai; Jinhui Lu; Jin Wang
In a passive multisatellite location system with Earth constraint (EC), the localization problem of time differences of arrival (TDOAs) is formulated as a quadratic optimization (QO) problem with two equality constraints: EC and variable constraint (VC). Which constraint is more important? To evaluate the importance of the two constraints, the original QO problem with both EC and VC is relaxed into two individual QO problems with only one equality constraint EC or VC being kept. A convex combination operation is performed on the two optimal solutions associated with the two relaxed QO problems to form a new weighted solution. Numerical simulation results show that the new weighted coefficient can achieve the Cramer–Rao lower bound with EC as the weighted factor of the solution exploiting only VC tends to zero, and increasing the value of this weighted coefficient will gradually degrade the overall localization performance. Thus, we conclude that the EC plays an extremely important role in improving the performance of TDOA-based localization.
arXiv: Information Theory | 2018
Linqing Gui; Mengxia Yang; Xiaobo Zhou; Feng Shu; Jun Li; Jiangzhou Wang; Jinhui Lu
In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users’ social properties to generate the utility functions of the two-side players, i.e., content providers (CPs) and IUs. Then we model the problem of minimizing the downloading latency as a many-to-many matching problem. For solving these games, we design a many-to-one IU selection (MOIS) matching algorithm and a many-to-many file allocation (MMFA) matching algorithm, respectively. Simulation and analytical results show that the proposed mechanisms are stable, and are capable of offering a better performance than other benchmarks in terms of social welfare and network downloading latency.
arXiv: Information Theory | 2018
Yaolu Qin; Shuping Yang; Xiaobo Zhou; Jinhui Lu; Yijin Zhang; Jiangzhou Wang