no code implementations • 6 Feb 2024 • Siguo Bi, Xin Yuan, Shuyan Hu, Kai Li, Wei Ni, Ekram Hossain, Xin Wang
The advent of communication technologies marks a transformative phase in critical infrastructure construction, where the meticulous analysis of failures becomes paramount in achieving the fundamental objectives of continuity, security, and availability.
no code implementations • 6 Dec 2023 • Siguo Bi, Kai Li, Shuyan Hu, Wei Ni, Cong Wang, Xin Wang
Detecting spoofing attacks on the positions of unmanned aerial vehicles (UAVs) within a swarm is challenging.
no code implementations • 25 Nov 2023 • Shuyan Hu, Xin Yuan, Wei Ni, Xin Wang, Ekram Hossain, H. Vincent Poor
Federated learning (FL) can suffer from a communication bottleneck when deployed in mobile networks, limiting participating clients and deterring FL convergence.
no code implementations • 10 Feb 2023 • Shuyan Hu, Xin Yuan, Wei Ni, Xin Wang, Abbas Jamalipour
This paper presents a new deep reinforcement learning (DRL)-based approach to the trajectory planning and jamming rejection of an unmanned aerial vehicle (UAV) for the Internet-of-Things (IoT) applications.
no code implementations • 27 Jul 2022 • Shuyan Hu, Xin Yuan, Wei Ni, Xin Wang
Being a key technology for beyond fifth-generation wireless systems, joint communication and radar sensing (JCAS) utilizes the reflections of communication signals to detect foreign objects and deliver situational awareness.
no code implementations • 22 Dec 2020 • Shuyan Hu, Wei Ni, Xin Wang, Abbas Jamalipour, Dean Ta
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate monitoring UAVs (or monitors) can be crucial to public safety and security.