Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qinye Yin is active.

Publication


Featured researches published by Qinye Yin.


IEEE Transactions on Signal Processing | 2012

Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks

Hui-Ming Wang; Qinye Yin; Xiang-Gen Xia

In this paper, we address the security of a two-way relay network in the presence of an eavesdropper, where each node is only equipped with single antenna. We propose two-phase distributed analog network coding, or distributed beamforming and power allocation to enhance the secrecy sum rate of the data exchange. In the first phase, the two terminals broadcast their information data simultaneously to all the relay nodes. In the second phase, three different security schemes are proposed: optimal beamforming, null-space beamforming, and artificial noise beamforming. In the first scheme, the objective is to achieve the maximum secrecy sum rate of the two terminals. Mathematically, the objective function is difficult to optimize. In the second scheme, we maximize the total information exchanged while we eliminate the information leakage completely, subject to the total transmission power constraint. We show that the problem has a unique and global optimum, which can be solved using bisection method. When the instantaneous channel state information of the eavesdropper is not available, we propose an artificial noise beamforming in the third scheme. We minimize the information transmission power so that the artificial noise power is maximized to eliminate information leakage, under the constraints of quality of service (QoS) required by terminals. It is a second-order convex cone programming (SOCP) problem, thus can be efficiently solved using interior point methods. Numerical results are provided and analyzed to show the properties and efficiency of the proposed designs.


IEEE Signal Processing Letters | 2013

Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI

Hui-Ming Wang; Miao Luo; Xiang-Gen Xia; Qinye Yin

Cooperative beamforming and jamming are two efficient schemes to improve the physical-layer security of a wireless relay system in the presence of passive eavesdroppers. However, in most works these two techniques are adopted separately. In this letter, we propose a joint cooperative beamforming and jamming scheme to enhance the security of a cooperative relay network, where a part of intermediate nodes adopt distributed beamforming while others jam the eavesdropper, simultaneously. Since the instantaneous channel state information (CSI) of the eavesdropper may not be known, we propose a cooperative artificial noise transmission based secrecy strategy, subjected to the individual power constraint of each node. The beamformer weights and power allocation can be obtained by solving a second-order convex cone programming (SOCP) together with a linear programming problem. Simulations show the joint scheme greatly improves the security.


IEEE Transactions on Information Forensics and Security | 2013

Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks

Hui-Ming Wang; Miao Luo; Qinye Yin; Xiang-Gen Xia

In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security of a single-antenna-equipped two-way relay network in the presence of an eavesdropper. The basic idea is that in both cooperative transmission phases, some intermediate nodes help to relay signals to the legitimate destination adopting distributed beamforming, while the remaining nodes jam the eavesdropper, simultaneously, which takes the data transmissions in both phases under protection. Two different schemes are proposed, with and without the instantaneous channel state information of the eavesdropper, respectively, and both are subjected to the more practical individual power constraint of each cooperative node. Under the general channel model, it is shown that both problems can be transformed into a semi-definite programming (SDP) problem with an additional rank-1 constraint. A current state of the art technique for handling such a problem is the semi-definite relaxation (SDR) and randomization techniques. In this paper, however, we propose a penalty function method incorporating the rank-1 constraint into the objective function. Although the so-obtained problem is not convex, we develop an efficient iterative algorithm to solve it. Each iteration is a convex SDP problem, thus it can be efficiently solved using the interior point method. When the channels are reciprocal such as in TDD mode, we show that the problems become second-order convex cone programming ones. Numerical evaluation results are provided and analyzed to show the properties and efficiency of the proposed hybrid security scheme, and also demonstrate that our optimization algorithms outperform the SDR technique.


IEEE Transactions on Signal Processing | 2002

A fast refinement for adaptive Gaussian chirplet decomposition

Qinye Yin; Shie Qian; Aigang Feng

The chirp function is one of the most fundamental functions in nature. Many natural events, for example, most signals encountered in seismology and the signals in radar systems, can be modeled as the superposition of short-lived chirp functions. Hence, the chirp-based signal representation, such as the Gaussian chirplet decomposition, has been an active research area in the field of signal processing. A main challenge of the Gaussian chirplet decomposition is that Gaussian chirplets do not form an orthogonal basis. A promising solution is to employ adaptive type signal decomposition schemes, such as the matching pursuit. The general underlying theory of the matching pursuit method has been well accepted, but the numerical implementation, in terms of computational speed and accuracy, of the adaptive Gaussian chirplet decomposition remains an open research topic. We present a fast refinement algorithm to search for optimal Gaussian chirplets. With a coarse dictionary, the resulting adaptive Gaussian chirplet decomposition is not only fast but is also more accurate than other known adaptive schemes. The effectiveness of the algorithm introduced is demonstrated by numerical simulations.


international conference on computer communications and networks | 2011

MCS Selection for Throughput Improvement in Downlink LTE Systems

Jiancun Fan; Qinye Yin; Geoffrey Ye Li; Bingguang Peng; Xiaolong Zhu

In this paper, we investigate resource block (RB) assignment and modulation-and-coding scheme (MCS) selection to maximize downlink throughput of long-term evolution (LTE) systems, where all RBs assigned to the same user in any given transmission time interval (TTI) must use the same MCS. We develop several effective MCS selection schemes by using the effective packet-level SINR based on exponential effective SINR mapping (EESM), arithmetic mean, geometric mean, and harmonic mean. From both analysis and simulation results, we show that the system throughput of all the proposed schemes are better than that of the scheme in [7]. Furthermore, the MCS selection scheme using harmonic mean based effective packet-level SINR almost reaches the optimal performance and significantly outperforms the other proposed schemes.


IEEE Transactions on Wireless Communications | 2009

Distributed space-frequency codes for cooperative communication systems with multiple carrier frequency offsets

Hui-Ming Wang; Xiang-Gen Xia; Qinye Yin

In cooperative communications, due to the distributed nature, multiple different carrier frequency offsets (CFOs) may occur and make the channel time-varying. It is hard for the receiver to compensate multiple CFOs from multiple relay nodes simultaneously. Thus, the conventional space-time codes to collect cooperative diversity for co-located multi-input multi-output (MIMO) systems may not be applied directly. In this paper, we consider the cooperative transmission with multiple CFOs when the channels from relay nodes to destination node are flat (frequency-non-selective) fading. We approximate a flat fading channel with CFO as a block time-invariant intersymbol-interference (ISI) channel in the frequency domain. We then propose two distributed space-frequency codes (SFC) for such ISI channels in the frequency domain to achieve the cooperative full spatial diversity, where the space-frequency coding concept is different from the one in the literature and also has a different role. One is called frequency-reversal SFC and the other is called frequency-domain linear convolutive SFC. Furthermore, we show that, with only linear receivers, such as zero-forcing (ZF) and minimum mean square error (MMSE) receivers, our codes achieve the full cooperative diversity.


IEEE Transactions on Wireless Communications | 2011

Multi-User Two-Way Relay Networks with Distributed Beamforming

Chen Wang; Hongyang Chen; Qinye Yin; Ang Feng; Andreas F. Molisch

We consider a two-way relay network consisting of multiple pairs of single-antenna users and multiple distributed single-antenna relays. The two communication peers in each pair of users transmit simultaneously to the relays in the first time slot, and the relays rebroadcast the received sum signal weighted by a complex gain, in the second time slot. For multi-user systems, the signal arriving at the users contains not only self interference from the back-propagation of user signals, but also inter-pair interferences from other pairs of users. In this paper, we use zero-forcing (ZF) to cancel the inter-user interference, assuming that channel-state information for all relay-peer connections are known at every relay, but no data exchange occurs between relays. We also derive two closed-form expressions for zero-forcing beamforming weights, corresponding to two different relay power constraints, which can be implemented in a distributed manner. The first approach uses standard ZF to null out every inter-pair interference and the second approach sets the total inter-pair interference to zero. We also derive a closed-form upper bound of the achievable sum-rate and show that both methods achieve the same multiplexing gain when the number of relays N is sufficient for perfect zero-forcing, namely 2K2 + K, where K is the number of user pairs. For the case of insufficient number of relays, we also propose two solutions for beamforming weights, i.e., based on diagonal loading and use of the pseudo-inverse, and compare their advantages and weaknesses.


IEEE Transactions on Wireless Communications | 2011

On the Design of Relay Selection Strategies in Regenerative Cooperative Networks with Outdated CSI

Yubo Li; Qinye Yin; Wei Xu; Hui-Ming Wang

Opportunistic relay selection is considered as an efficient approach to implement cooperative communication in multi-relay cooperative networks owing to its low implementation complexity. However, due to channel fluctuations, the channel state information (CSI) employed in relay selection process may differ from the exact CSI in data forwarding, in other words, the CSI is outdated. Addressing this issue, this paper focuses on the design of relay selection strategies in decode-and-forward (DF) cooperative networks with outdated CSIs being available in relay judgement, as well as their performance analysis. We resort to two main cases, 1) only outdated CSIs are available in relay selection process; 2) both outdated CSIs and statistical channel information are available in selection procedure, and propose three different relay selection schemes. The expressions of outage probability are derived, and asymptotic analysis in high SNR region is also carried out. Simulation results are finally provided, which not only validate our theoretical analysis, but also shed light on the way of designing relay selection strategies in various scenarios.


IEEE Transactions on Wireless Communications | 2010

A Linear Analog Network Coding for Asynchronous Two-Way Relay Networks

Hui-Ming Wang; Xiang-Gen Xia; Qinye Yin

Time asynchronism is a practical issue need to be addressed for a general distributed two-way relay network, where two terminal nodes exchange information through multiple spatial-separated relay nodes. In this letter, we propose an analog network coding (ANC) scheme for a time asynchronous two-way relay network. In the proposed scheme, each relay node linearly transforms the received mixed asynchronous signals in the first time-slot by a Toeplitz matrix, and then broadcasts them back to the terminals in the second time-slot. A sufficient condition is derived for the proposed ANC to achieve full cooperative diversity using only linear receivers at the terminal nodes, such as zero-forcing (ZF), or minimum mean square error (MMSE) receivers, with any delay profiles of the timing errors. The decoding of the proposed ANC scheme is computationally efficient and the symbol rate can approach 1, when the coding block length is sufficiently large compared to the number of relay nodes R and the timing errors.


IEEE Transactions on Wireless Communications | 2012

Joint User Pairing and Resource Allocation for LTE Uplink Transmission

Jiancun Fan; Geoffrey Ye Li; Qinye Yin; Bingguang Peng; Xiaolong Zhu

In this paper, we investigate joint user pairing and resource allocation under the practical constraints in single-carrier frequency-division multiple access (SC-FDMA) LTE uplink systems. We first introduce a joint optimal algorithm based on branch-and-bound search as a benchmark. To reduce complexity, we divide the joint optimization problem into two subproblems: user pairing and resource allocation. For both these subproblems, we develop several low-complexity algorithms by exploiting the properties of the application of the optimization problem itself. It is shown by the simulation results that the proposed algorithms have better throughput and fairness than the conventional algorithms in and in for LTE uplink no matter whether power control is perfect or not.

Collaboration


Dive into the Qinye Yin's collaboration.

Top Co-Authors

Avatar

Wenjie Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Hui-Ming Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Ke Deng

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Weile Zhang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Pengcheng Mu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jiancun Fan

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xiaojun Wu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Le Ding

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Aigang Feng

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge