Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaowen Gong is active.

Publication


Featured researches published by Xiaowen Gong.


IEEE ACM Transactions on Networking | 2015

Exploiting social ties for cooperative D2D communications: a mobile social networking case

Xu Chen; Brian Proulx; Xiaowen Gong; Junshan Zhang

Thanks to the convergence of pervasive mobile communications and fast-growing online social networking, mobile social networking is penetrating into our everyday life. Aiming to develop a systematic understanding of mobile social networks, in this paper we exploit social ties in human social networks to enhance cooperative device-to-device (D2D) communications. Specifically, as handheld devices are carried by human beings, we leverage two key social phenomena, namely social trust and social reciprocity, to promote efficient cooperation among devices. With this insight, we develop a coalitional game-theoretic framework to devise social-tie-based cooperation strategies for D2D communications. We also develop a network-assisted relay selection mechanism to implement the coalitional game solution, and show that the mechanism is immune to group deviations, individually rational, truthful, and computationally efficient. We evaluate the performance of the mechanism by using real social data traces. Simulation results corroborate that the proposed mechanism can achieve significant performance gain over the case without D2D cooperation.


IEEE Transactions on Signal Processing | 2011

Optimal Bandwidth and Power Allocation for Sum Ergodic Capacity Under Fading Channels in Cognitive Radio Networks

Xiaowen Gong; Sergiy A. Vorobyov; Chintha Tellambura

This paper studies optimal bandwidth and power allocation in a cognitive radio network where multiple secondary users (SUs) share the licensed spectrum of a primary user (PU) under fading channels using the frequency division multiple access scheme. The sum ergodic capacity of all the SUs is taken as the performance metric of the network. Besides the peak/average transmit power constraints at the SUs and the peak/average interference power constraint imposed by the PU, total bandwidth constraint of the licensed spectrum is also taken into account. Optimal bandwidth allocation is derived in closed-form for any given power allocation. The structures of optimal power allocations are also derived under all possible combinations of the aforementioned power constraints. These structures indicate the possible numbers of users that transmit at nonzero power but below their corresponding peak powers, and show that other users do not transmit or transmit at their corresponding peak powers. Based on these structures, efficient algorithms are developed for finding the optimal power allocations.


mobile ad hoc networking and computing | 2013

Social trust and social reciprocity based cooperative D2D communications

Xu Chen; Brian Proulx; Xiaowen Gong; Junshan Zhang

Thanks to the convergence of pervasive mobile communications and fast-growing online social networking, mobile social networking is penetrating into our everyday life. Aiming to develop a systematic understanding of the interplay between social structure and mobile communications, in this paper we exploit social ties in human social networks to enhance cooperative device-to-device communications. Specifically, as hand-held devices are carried by human beings, we leverage two key social phenomena, namely social trust and social reciprocity, to promote efficient cooperation among devices. With this insight, we develop a coalitional game theoretic framework to devise social-tie based cooperation strategies for device-to-device communications. We also develop a network assisted relay selection mechanism to implement the coalitional game solution, and show that the mechanism is immune to group deviations, individually rational, and truthful. We evaluate the performance of the mechanism by using real social data traces. Numerical results show that the proposed mechanism can achieve up-to 122% performance gain over the case without D2D cooperation.


global communications conference | 2008

A Cooperative Relay Scheme for Secondary Communication in Cognitive Radio Networks

Xiaowen Gong; Wei Yuan; Wei Liu; Wenqing Cheng; Shu Wang

In cognitive radio networks, secondary users (SUs) opportunistically exploit the spectrum unutilized by primary users (PUs). In this paper, we study the secondary communication where secondary transmitters and receivers have different available spectrum. Considering the spectrum diversity and the space distance between different PUs, we introduce cognitive relay node into the secondary communication and propose a novel Cooperative Relay Scheme (CRS) to increase the SINR at secondary receivers. A novel Opportunistic Sharing Scheme (OSS) is also proposed for the secondary transmitters to share the spectrum of relay nodes. We model it with a non-cooperative game, and study the performance of competition of SUs. The Nash equilibrium and Pareto efficiency of this game is presented. Simulations show that CRS can increase SINR at secondary receivers under proper configurations.


IEEE Transactions on Signal Processing | 2011

Joint Bandwidth and Power Allocation With Admission Control in Wireless Multi-User Networks With and Without Relaying

Xiaowen Gong; Sergiy A. Vorobyov; Chintha Tellambura

Equal allocation of bandwidth and/or power may not be efficient for wireless multi-user networks with limited bandwidth and power resources. Optimal joint bandwidth and power allocation strategies for wireless multi-user networks with and without relaying are proposed in this paper for (1) the maximization of the sum capacity of all users; (2) the maximization of the worst user capacity; and (3) the minimization of the total power consumption of all users. It is shown that the proposed allocation problems are convex and, therefore, can be solved efficiently. Moreover, joint bandwidth and power allocation for admission control is considered. A suboptimal greedy search algorithm is developed to solve the admission control problem efficiently. Instructive analysis of the greedy search shows that it can achieve good performance, and the condition under which the greedy search is optimal is derived. The formal and in-depth analysis of the greedy search algorithm presented in this paper can serve as a benchmark for analyzing similar algorithms in other applications. The performance improvements offered by the proposed optimal joint bandwidth and power allocation are demonstrated by simulations. The advantages of the suboptimal greedy search algorithm for admission control are also shown in numerical results.


IEEE Transactions on Wireless Communications | 2014

Curve-Based Deployment for Barrier Coverage in Wireless Sensor Networks

Shibo He; Xiaowen Gong; Junshan Zhang; Jiming Chen; Youxian Sun

This paper studies deterministic sensor deployment for barrier coverage in wireless sensor networks. Most of existing works focused on line-based deployment, ignoring a wide spectrum of potential curve-based solutions. We, for the first time, extensively study the sensor deployment under a general setting. We first present a condition under which the line-based deployment is suboptimal, revealing the advantage of curve-based deployment. By constructing a contracting mapping, we identify the characteristics for a deployment curve to be optimal. Based on the optimal deployment curve, we design sensor deployment algorithms by introducing a new notion of distance-continuous. Our findings show that i) when the deployment curve is distance-continuous, the proposed algorithm is optimal in terms of the vulnerability corresponding to the deployment, and ii) when the deployment curve is not distance-continuous, the approximation ratio of the vulnerability corresponding to the deployment by the proposed algorithm to the optimal one is upper bounded by min (π, ||ÃB̃||/||ÃG̃B̃|| 2n+√2-1/2n ), where ||ÃB̃|| and ||ÃG̃B̃|| are some constants, and n is the number of sensors. We generalize the study to the heterogeneous sensing model, and show that the proposed algorithm can provide close-to-optimal performance. Extensive numerical results corroborate our analysis.


international conference on computer communications | 2014

A Social Group Utility Maximization Framework with Applications in Database Assisted Spectrum Access

Xu Chen; Xiaowen Gong; Lei Yang; Junshan Zhang

In this paper, we develop a social group utility maximization (SGUM) framework for cooperative networking that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing its individual utility or the overall network utility, each user aims to maximize its social group utility that hinges heavily on its social ties with other users. We show that this framework provides rich modeling flexibility and spans the continuum space between non-cooperative game and network utility maximization (NUM) - two traditionally disjoint paradigms for network optimization. Based on this framework, we study an important application in database assisted spectrum access. We formulate the distributed spectrum access problem among white-space users with social ties as a SGUM game. We show that the game is a potential game and always admits a social-aware Nash equilibrium. We also design a distributed spectrum access algorithm that can achieve the social-aware Nash equilibrium of the game and quantify its performance gap. We evaluate the performance of the SGUM solution using real social data traces. Numerical results demonstrate that the performance gap between the SGUM solution and the NUM (social welfare optimal) solution is at most 15%.


IEEE Journal on Selected Areas in Communications | 2012

Opportunistic Cooperative Networking: To Relay or Not To Relay?

Xiaowen Gong; Thejaswi P. S. Chandrashekhar; Junshan Zhang; H.V. Poor

This paper considers opportunistic cooperative networking (OCN) in wireless ad hoc networks, with a focus on characterizing the desired tradeoff between the probing cost for establishing cooperative relaying and hence higher throughput via opportunistic cooperative networking. Specifically, opportunistic cooperative networking is treated as an optimal stopping problem with two-levels of incomplete information. Cases with or without dedicated relays are considered, and the existence of the optimal strategies for both cases are established. Then, it is shown that for the case with dedicated relays, the optimal strategy exhibits a threshold structure, in which it is optimal to probe the dedicated relay when the signal-to-noise ratio (SNR) of the source-relay link exceeds some threshold. For the case without dedicated relays, under more restrictive conditions, the optimal strategy is also threshold-based, in the sense that it is optimal to probe potential relays when the SNR of the source-destination link lies between two thresholds. Furthermore, these strategies can be implemented in a distributed manner.


IEEE ACM Transactions on Networking | 2016

Optimal placement for barrier coverage in bistatic radar sensor networks

Xiaowen Gong; Junshan Zhang; Douglas Cochran; Kai Xing

By taking advantage of active sensing using radio waves, radar sensors can offer several advantages over passive sensors. Although much attention has been given to multistatic and multiple-input-multiple-output (MIMO) radar concepts, little has been paid to understanding radar networks (i.e., multiple individual radars working in concert). In this context, we study the coverage problem of a bistatic radar (BR) sensor network, which is very challenging due to the Cassini oval sensing region of a BR and the coupling of sensing regions across different BRs. In particular, we consider the problem of deploying a network of BRs in a region to maximize the worst-case intrusion detectability, which amounts to minimizing the vulnerability of a barrier. We show that it is optimal to place BRs on the shortest barrier if it is the shortest line segment that connects the left and right boundary of the region. Based on this, we study the optimal placement of BRs on a line segment to minimize its vulnerability, which is a nonconvex optimization problem. By exploiting certain specific structural properties pertaining to the problem (particularly an important structure of detectability), we characterize the optimal placement order and the optimal placement spacing of the BR nodes, both of which present elegant balanced structures. Our findings provide valuable insights into the placement of BRs for barrier coverage. To our best knowledge, this is the first work to explore the barrier coverage of a network of BRs.


global communications conference | 2011

Secure wireless communications via cooperative relaying and jamming

Ling Tang; Xiaowen Gong; Jianhui Wu; Junshan Zhang

We consider secure wireless communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdroppers channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate.

Collaboration


Dive into the Xiaowen Gong's collaboration.

Top Co-Authors

Avatar

Junshan Zhang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Lei Yang

University of Nevada

View shared research outputs
Top Co-Authors

Avatar

Xu Chen

University of Göttingen

View shared research outputs
Top Co-Authors

Avatar

Mengyuan Zhang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Xu Chen

University of Göttingen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kai Xing

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Dong Hoon Shin

Arizona State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge