Yuxin Shi

Yuxin Shi
National University of Defense Technology | NUDT · Department of Electronic Science and Technology

PhD.candidate

About

26
Publications
3,558
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
209
Citations
Introduction
Anti-jamming technique,Wireless Communication,Signal Processing,OFDM,OFDM-IM
Skills and Expertise

Publications

Publications (26)
Article
Full-text available
Recently, symbol level jamming (SLJ) has been proposed and studied as an effective jamming technique. However, the detection performance estimation and efficient detection schemes for SLJ have not been investigated in the literature. This paper proposes a novel active detection scheme for SLJ to enhance the detection capability of the legitimate us...
Article
Focusing on the issue of secret key generation for transportation systems and electronic devices in possible less-dynamic channel conditions, this paper proposes an intelligent reflective surface aided channel phase probing scheme (IRS-CPP) for improving physical layer key generation. Specifically, we consider the model that both legitimate nodes f...
Article
Full-text available
Reinforcement Learning (RL) has been employed to assign transmission parameters to all sub-carriers in a set frequency band for anti-jamming Orthogonal Frequency Division Multiplexing (OFDM) systems. However, prior works often overlooked the influence of wireless environment fading and convergence issues stemming from overly large parameter sets. T...
Article
Full-text available
The effective and accurate recognition of communication jamming is crucial for enhancing the anti-jamming capability of wireless communication systems. At present, a significant portion of jamming data is decentralized, stored in local nodes, and cannot be uploaded directly for network training due to its sensitive nature. To address this challenge...
Article
Full-text available
Due to the threat of various jamming attacks in wireless communications, the efficient and general anti-jamming schemes are required to guarantee communication the quality of wireless networks. To this end, this paper proposes the efficient index modulation based frequency hopping spread spectrum (IM-FHSS) scheme. Unlike the classical IM-FHSS which...
Article
To defend against eavesdropping and spoofing attacks, the physical layer authentication (PLA) techniques utilize the unique attributes of channel or device for identifying attackers. Among these techniques, the PLA schemes based on channel phase responses use the secret key driven channel phase to authenticate the legitimate user, which have a bett...
Preprint
Full-text available
Aiming at the problem of secret key generation in the static wireless communication environment, this paper proposes a scheme applying intelligent reflective surface to channel phase probing (IRS-CPP) in wireless secret key generation. Firstly, both legitimate parties utilize OFDM signals for channel probing to obtain the corresponding channel phas...
Article
Full-text available
Reactive jammer has emerged as a relatively intelligent jamming with low energy cost and high jamming efficiency. Moreover, the jammer can obtain the power-correlated reactive jamming via the cooperation with a malicious user, which imposes a severe threat on the reliability of legitimate users. To solve this issue, this letter proposes an enhanced...
Article
Full-text available
为了提升无线通信系统的抗干扰能力和安全性,设计了一种基于旋转置乱的索引跳频抗干扰加密方法,简称加密的索引跳频(EIM-FHSS)方法。首先,通过无线密钥产生多路正交的跳频图案确定当前时刻的可用频点,并利用活跃频点(调制符号的频点)的位置索引传输比特信息。其次,在信息与索引的映射表上,采用无线密钥对映射表进行置乱加密,以保证索引比特的安全性。最后,对活跃频点上传输的符号使用星座旋转加密,使符号比特也具有安全性。理论分析和仿真结果表明,EIM-FHSS 方法与传统的索引跳频方法相比具有更强的安全性和抗干扰能力
Article
Full-text available
Aiming at the authentication problem in wireless communication, an improved physical layer authentication scheme based on wireless channel phase (PHY-IMACP) is proposed in this paper. In this scheme, legitimate nodes exploit the reciprocity of the channel phase response to conduct information exchange. The secret key information is hidden in the ph...
Article
Full-text available
基于专用集成电路(ASIC)的光数字信号处理(ODSP)设计可以有效提高光传输芯片的传输容量。本文主要解决的问题对ASIC性能和资源进行权衡,实现具体场景下的DSP芯片的算法最优设计。首先我们对整个通信系统进行搭建,进一步讨论不同导频插入、不同插值算法、不同导频调制值以及导频样式对系统性能以及导频开销的影响,以RSNR代价<0.3dB为目标,设计了一套载波恢复算法,使得导频开销最小。此外,我们对系统性能和资源进行分析,利用Q学习算法构造性能和资源的综合代价函数,给出了一套自动优化位宽和实现性设计的方案,仿真结果表明采用Q学习算法可以迭代出可选的传输方案,并且迭代仿真结果也证明了Q学习结果的正确性。(本文源于建模题改写,获得2020研究生数学建模竞赛一等奖,华为专项奖以及数模之星(全国0.06...
Article
Full-text available
Orthogonal frequency division multiplexing with index modulation (OFDM‐IM) harvests significantly better error performance compared with OFDM due to its design of the index bits. However, the structure of conventional OFDM‐IM scheme does not fully focus on the enhancement of the bit error rate (BER) performance. In the proposed subblock design aide...
Article
Reactive symbol-level jammer has attracted attention due to its low energy cost and high jamming efficiency. With the development of software-defined radio (SDR), the implementation of reactive symbol-level jamming has become more practical and efficient. To combat the reactive jammer, this paper proposes an index modulation based frequency hopping...
Article
Full-text available
The identification of malicious jamming pattern is significant for wireless communication system to adopt targeted anti-jamming approaches. Efficient identification of malicious jamming patterns requires sufficient sample data and computing resources for the complex electromagnetic environment. However, with the use of portable communication equipm...
Article
Full-text available
In secret key generation of physical layer security technology, it is challenging to achieve high key capacity and low secret key inconsistency rate. This paper investigates intelligent reflecting surface (IRS) assisted secret key generation, which aims to maximize the secret key capacity by adjusting the placement of the IRS units. Specifically, w...
Article
Full-text available
In recent years, orthogonal frequency division multiplexing with index modulation (OFDM‐IM) has been proposed due to its extra diversity gain. Specially, OFDM with all index modulation (OFDM‐AIM) was proposed, which removed symbol bits and enhanced the diversity order compared to typical OFDM. However, the security issue of OFDM‐AIM has not been gi...
Article
Full-text available
Recently, orthogonal frequency division multiplexing with index modulation (OFDM-IM) has been known by its potential diversity gain. In this letter, genetic algorithm aided OFDM with all index modulation (GA-OFDM-AIM) scheme is proposed, where the legitimate subblock realizations in look-up table are regarded as the chromosomes of genetic algorithm...
Article
Full-text available
Channel coding and security are important in communication system. The 5th generation (5G) mobile communication networks call for higher requirements of new coding technologies and encryption technologies. As an efficient coding method, polar codes have attracted more attentions in recent years. Besides, peak-to-average power ratio (PAPR) is a majo...
Article
Full-text available
Recently, orthogonal frequency division multiplexing (OFDM) with index modulation has been emerged as promising technologies with the improvement of spectral efficiency and energy efficiency, which carries additional index bits through the index domain. In OFDM-IM, some indices of subcarrier activation patterns are discarded to retain a part of ind...
Article
Full-text available
In recent years, OFDM with index modulation (OFDM-IM) has become a potential technique due to its improvement of diversity gain. In typical OFDM-IM schemes, incoming information bits are divided into two parts, symbols bits, and index bits. However, the symbol bits conveyed by each OFDM symbol suffer from low diversity order, which has a negative i...

Network

Cited By