Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yiyang Pei is active.

Publication


Featured researches published by Yiyang Pei.


IEEE Journal on Selected Areas in Communications | 2011

Energy-Efficient Design of Sequential Channel Sensing in Cognitive Radio Networks: Optimal Sensing Strategy, Power Allocation, and Sensing Order

Yiyang Pei; Ying-Chang Liang; Kah Chan Teh; Kwok Hung Li

Energy-efficient design has become increasingly important to battery-powered wireless devices. In this paper, we focus on the energy efficiency of a cognitive radio network, in which a secondary user senses the channels licensed to some primary users sequentially before it decides to transmit. Energy is consumed in both the channel sensing and transmission processes. The energy-efficient design calls for a careful design in the sensing-access strategies and the sensing order, with the sensing strategy specifying when to stop sensing and start transmission, the access strategy specifying the power level to be used upon transmission, and the sensing order specifying the sequence of channel sensing. Hence, the objective of this paper is to identify the sensing-access strategies and the sensing order that achieve the maximum energy efficiency. We first investigate the design when the channel sensing order is given and formulate the above design problem as a stochastic sequential decision-making problem. To solve it, we study another parametric formulation of the original problem, which rewards transmission throughput and penalizes energy consumption. Dynamic programming can be applied to identify the optimal strategy for the parametric problem. Then, by exploring the relationship between the two formulations and making use of the monotonicity property of the parametric formulation, we develop an algorithm to find the optimal sensing-access strategies for the original problem. Furthermore, we study the joint design of the channel sensing order and the sensing-access strategies. Lastly, the performance of the proposed designs is evaluated through numerical results.


IEEE Transactions on Wireless Communications | 2013

Resource Allocation for Device-to-Device Communications Overlaying Two-Way Cellular Networks

Yiyang Pei; Ying-Chang Liang

Device-to-device (D2D) communications has been proposed in the literature as an underlay approach to cellular networks to allow direct transmission between two cellular devices with local communication needs. In this paper, we consider a scenario of D2D communications overlaying a cellular network and propose a new spectrum sharing protocol, which allows the D2D users to communicate bi-directionally with each other while assisting the two-way communications between the cellular base station (BS) and the cellular user (CU). We derive the achievable rate region of the sum rate of the D2D transmissions versus that of the cellular transmissions. The Pareto boundary of the region is found by optimizing the transmit power at BS and CU as well as the power splitting factor at the relay D2D node. Since either of the two D2D users can be the relay and there can exist multiple pairs of D2D users, we also consider the relay selection from the potential D2D users. We find through numerical results that the proposed two-way protocol with power control at the BS and CU is effective to improve the sum rate for both the D2D and cellular users. In addition, relay selection can achieve further improvement in the sum rate of the cellular links.


IEEE Transactions on Wireless Communications | 2010

Secure communication over MISO cognitive radio channels

Yiyang Pei; Ying-Chang Liang; Lan Zhang; Kah Chan Teh; Kwok Hung Li

In this paper, we address the physical-layer security issue of a secondary user (SU) in a spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective. Specially, we consider a secure multiple-input single-output (MISO) cognitive radio channel, where a multi-antenna SU transmitter (SU-Tx) sends confidential information to a legitimate SU receiver (SU-Rx) in the presence of an eavesdropper and on the licensed band of a primary user (PU). The secrecy capacity of the channel is characterized, which is a quasiconvex optimization problem of finding the capacity-achieving transmit covariance matrix under the joint transmit power and interference power constraints. Two numerical approaches are proposed to derive the optimal transmit covariance matrix. The first approach recasts the original quasiconvex problem into a single convex semidefinite program (SDP) by exploring its inherent convexity; while the second one explores the relationship between the secure CRN and the conventional CRN and transforms the original problem into a sequence of optimization problems associated with the conventional CRN, which helps to prove that beamforming is the optimal strategy for the secure MISO CR channel. In addition, to reduce the computational complexity, three suboptimal schemes are presented, namely, scaled secret beamforming (SSB), projected secret beamforming (PSB) and projected cognitive beamforming (PCB). Lastly, computer simulation results show that the three suboptimal schemes can approach the secrecy capacity well under certain conditions.


IEEE Transactions on Wireless Communications | 2009

How much time is needed for wideband spectrum sensing

Yiyang Pei; Ying-Chang Liang; Kah Chan Teh; Kwok Hung Li

In this paper, we consider a wideband cognitive radio network (CRN) which can simultaneously sense multiple narrowband channels and thus aggregate the perceived available channels for transmission. We study the problem of designing the optimal spectrum sensing time and power allocation schemes so as to maximize the average achievable throughput of the CRN subject to the constraints of probability of detection and the total transmit power. The optimal sensing time and power allocation strategies are developed under two different total power constraints, namely, instantaneous power constraint and average power constraint. Finally, numerical results show that, under both cases, for a CRN with three 6 MHz channels, if the frame duration is 100 ms and the target probability of detection is 90% for the worst case signal-to-noise ratio of primary users being -12 dB, -15 dB and -20 dB, respectively, the optimal sensing time is around 6 ms and it is almost insensitive to the total transmit power.


IEEE Transactions on Signal Processing | 2011

Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information

Yiyang Pei; Ying-Chang Liang; Kah Chan Teh; Kwok Hung Li

In this paper, we address the issue of optimal transmitter design to achieve physical layer security for a multiple-input single-output (MISO) cognitive radio network (CRN), in which a secondary user transmitter (SU-Tx) sends confidential information to a SU receiver (SU-Rx) on the same frequency band with a primary user (PU) in the presence of an eavesdropper receiver (ED-Rx). It is assumed that all the channel state information (CSI) of the secondary, primary and eavesdropper channels is not perfectly known at the SU-Tx. The optimal transmitter design, under the restriction of Gaussian signaling without preprocessing of information, involves a nonconvex semiinfinite optimization problem which maximizes the rate of the secondary link while avoiding harmful interference to the PU and keeping the eavesdropper totally ignorant of the messages sent regardless of the uncertainties in the CSI. We propose two approaches to solve this challenging optimization problem. The first one relates the original problem to a sequence of semiinfinite capacity-achieving transmitter design problems in an auxiliary CRN without any eavesdropper, which can then be solved through transformations and using convex semidefinite programs (SDPs). The second approach explores the hidden convexity of the problem and hence transforms it into a single SDP, which significantly reduces the computational complexity. Furthermore, a few heuristic beamforming solutions for the ease of implementation are also introduced. Finally, simulation results are presented to evaluate the performance of the proposed optimal and suboptimal solutions.


global communications conference | 2011

Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks

Edward Chu Yeow Peh; Ying-Chang Liang; Yong Liang Guan; Yiyang Pei

When secondary users (SUs) in a cognitive radio network (CRN) are battery-powered wireless devices, energy resources become very precious. Therefore, it is important that their energies are used efficiently. In this paper, we define the energy efficiency as the ratio of the average throughput of the CRN over the average energy used by the CRN. In cooperative spectrum sensing, the fusion rule threshold, detectors thresholds at the SUs, length of the sensing time, and the number of cooperating SUs will affect both the average throughput and the average energy consumed by the CRN. Therefore, in this paper, we optimize and evaluate these parameters with the aim of maximizing the energy efficiency of the CRN.


personal, indoor and mobile radio communications | 2009

Sensing-throughput tradeoff for cognitive radio networks: A multiple-channel scenario

Yiyang Pei; Ying-Chang Liang; Kah Chan Teh; Kwok Hung Li

In this paper, we study the sensing-throughput tradeoff problem for a multiple-channel cognitive radio (CR) network. In particular, using the sensing-throughput tradeoff metric, we investigate the design of the optimal spectrum sensing time and power allocation schemes so as to maximize the aggregate ergodic throughput of the cognitive radio network to guarantee the quality of service (QoS) of the primary users (PUs) without exceeding the power limit of the secondary transmitter. The optimal sensing time and power allocation strategies are developed under the average power constraint. Finally, numerical results show that, for a CR network with 3 channels, whose signal-to-noise ratio of PUs are −12dB, −15dB and −20dB, respectively, there is an optimal sensing time, and the optimal sensing time is almost insensitive to the total transmit power.


global communications conference | 2009

Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels

Lan Zhang; Ying-Chang Liang; Yiyang Pei; Rui Zhang

This paper studies the robust beamforming design problem for a multiple-input single-output (MISO) secrecy channel with a single-antenna eavesdropper. Due to the illegal nature, the eavesdropper may try to hide itself from being caught; thus, it could be difficult for the secrecy transmitter (S-Tx) to obtain accurate channel state information (CSI) of the eavesdropping link between S-Tx and the eavesdropper. Assuming that the CSI of the eavesdropping link belongs to a known uncertain set, this paper designs the optimal transmit strategy for the secrecy user to maximize the transmit rate under the condition that the eavesdropper cannot decode the secrecy message for all possible channel realizations of the eavesdropping link. This robust design problem is non-convex and cannot be solved by existing algorithms in the literature. By exploiting the relationship between the secrecy MISO channel and the cognitive radio (CR) MISO channel, this problem is transformed into a robust CR beamforming design problem, which can be solved efficiently by the interior point method. Numerical examples are provided to illustrate the effectiveness of the proposed algorithm.


global communications conference | 2012

How many RF chains are optimal for large-scale MIMO systems when circuit power is considered?

Yiyang Pei; The-Hanh Pham; Ying-Chang Liang

Multiple antennas at the transmitter and the receiver can increase the channel capacity significantly. However, this is at the expense of linearly increasing circuit power consumption due to the use of multiple radio frequency (RF) chains to support the antennas, which is quite significant for large-scale MIMO systems but is largely ignored in the literature. Hence, in this paper, we assess the performance of a point-to-point large-scale MIMO channel considering the overall power consumption on both the transmitter and the receiver, and study the optimal RF chain configurations to maximize the transmission rate under such a total power constraint. Both configurations with and without the channel state information (CSI) of the channel matrix are considered. While the former requires the design of optimal selection of RF chains, the latter only needs to determine the optimal number of RF chains. We find through numerical results that the gain of configuration with CSI over that without CSI diminishes as the dimension of the channel gets large. We also provide guidelines for selecting the optimal number RF chains for configuration without CSI. In particular, for MISO case, we find that it is near-optimal to choose half of the maximum number of transmit RF chains, the circuits of which are affordable to be powered on by the total power budget.


wireless communications and networking conference | 2013

Resource allocation for device-to-device communication overlaying two-way cellular networks

Yiyang Pei; Ying-Chang Liang

Device-to-device (D2D) communications has been proposed in the literature as an underlay approach to cellular networks to allow direct transmission between two cellular devices with local communication needs. In this paper, we consider a scenario of D2D communications overlaying a cellular network and propose a new spectrum sharing protocol, which allows the D2D users to communicate bi-directionally with each other while assisting the two-way communications between the cellular base station (BS) and the cellular user (CU). We derive the achievable rate region of the sum rate of the D2D transmissions versus that of the cellular transmissions. The Pareto boundary of the region is found by optimizing the transmit power at BS and CU as well as the power splitting factor at the relay D2D node. Since either of the two D2D users can be the relay and there can exist multiple pairs of D2D users, we also consider the relay selection from the potential D2D users. We find through numerical results that the proposed two-way protocol with power control at the BS and CU is effective to improve the sum rate for both the D2D and cellular users. In addition, relay selection can achieve further improvement in the sum rate of the cellular links.

Collaboration


Dive into the Yiyang Pei's collaboration.

Top Co-Authors

Avatar

Ying-Chang Liang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Kah Chan Teh

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Kwok Hung Li

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Lan Zhang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Rui Zhang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Gang Yang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

The-Hanh Pham

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiandong Xie

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jun Fang

University of Electronic Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge