Tianlong Song

Learn More
Hostile jamming can cause significant performance degradation in wireless communications, but it also provides an unexplored source of additional signal power. In this letter, we propose an energy-harvesting receiver for two-way orthogonal frequency division multiplexing (OFDM) systems under hostile jamming. More specifically, in the downlink, the receiver(More)
This paper considers the primary user emulation attack (PUEA) problem in OFDM-based cognitive radio networks, and proposes a robust and efficient AES-based digital TV (DTV) scheme. In the proposed scheme, the existing reference sequence used to generate the pilot subcarriers in the DTV frames is encrypted using the Advanced Encryption Standard (AES)(More)
This paper considers malicious user detection and energy harvesting in orthogonal frequency division multiplexing-based cognitive radio networks under primary user emulation attack (PUEA). The digital TV (DTV) model adopted is the second generation terrestrial digital television standard (DVB-T2). In this paper, first, we propose an efficient advanced(More)
This paper develops two spectrally efficient orthogonal frequency division multiplexing (OFDM)-based multicarrier transmission schemes: a scheme with message-driven idle subcarriers (MC-MDIS) and another with message-driven strengthened subcarriers (MC-MDSS). The basic idea in MC-MDIS is to carry part of the information, which is named carrier bits, through(More)
This paper considers robust code division multiple access (CDMA) system design and capacity analysis under disguised jamming, where the jammer generates a fake signal using the same spreading code, constellation, and pulse shaping filter as that of the authorized signal. Unlike Gaussian jamming, which is destructive only when jamming is dominant, disguised(More)
Linked Data is an RDF-based transition from the document oriented Web into the Semantic Web, and the amount of data published as linked data steadily. Hence, The RDF graph matching algorithm becomes the technical foundation of many tasks in Semantic Web, such as semantic search, data fusion, ontology matching, data filter and dissemination. An(More)
This paper considers a game between a power-limited authorized user and a power-limited jammer, who operate independently over the same AWGN channel consisting of multiple bands. We explore the possibility for the authorized user or the jammer to randomly utilize part (or all) of the available spectrum and/or apply nonuniform power allocation. It is found(More)