成果列表

For Full List:    Google Scholar - Xiao Tang   

 

 

Selected Publications

 

[B1] Q. Du, H. Song, X. Tang, Z. Zhao, C. Xu, Y. Xiao, and Z. Ma, "Principles of 6G Wireless Networks," The Road towards 6G: Opportunities, Challenges, and Applications: A Comprehensive View of the Enabling Technologies, pp. 27-49: Springer Nature Switzerland Cham, 2023.

 


 

–  2024

[J19] H. Li, X. Tang*, D. Zhai, R. Zhang, B. Li, H. Cao, N. Kumar, and A. Almogren, "Energy-Efficient Deployment and Resource Allocation for O-RAN-Enabled UAV-Assisted Communication," IEEE Transactions on Green Communications and Networking. vol. 8, no. 3, pp. 1128-1140, 2024.

[J18] X. Tang, H. Zhang, R. Zhang, D. Zhou, Y. Zhang, and Z. Han, "Robust trajectory and offloading for energy-efficient UAV edge computing in Industrial Internet of Things," IEEE Transactions on Industrial Informatics, vol. 20, no. 1, pp. 38-49. 2024.

–  2023

[J17] X. Lan, X. Tang*, R. Zhang, W. Lin, and Z. Han, "UAV-assisted computation offloading toward energy-efficient blockchain operations in Internet of Things," IEEE Wireless Communications Letters, vol. 12, no. 8, pp. 1469-1473. 2023.

[J16] X. Tang, H. He, L. Dong, L. Li, Q. Du, and Z. Han, "Robust secrecy via aerial reflection and jamming: Joint optimization of deployment and transmission," IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12562-12576. 2023.

[J15] X. Tang, T. Jiang, J. Liu, B. Li, D. Zhai, F. R. Yu, and Z. Han, "Secure communication with UAV-enabled aerial RIS: Learning trajectory with reflection optimization," IEEE Transactions on Intelligent Vehicles. Early access.

–  2022

[J14] X. Tang, X. Lan, L. Li, Y. Zhang, and Z. Han, "Incentivizing proof-of-stake blockchain for secured data collection in UAV-assisted IoT: a multi-agent reinforcement learning approach," IEEE Journal on Selected Areas in Communications, vol. 40, no. 12, pp. 3470-3484. 2022.

[J13] X. Tang, N. Liu, R. Zhang, and Z. Han, "Deep learning-assisted secure UAV-relaying networks with channel uncertainties," IEEE Transactions on Vehicular Technology, vol. 71, no. 5, pp. 5048-5059. 2022.

[J12] X. Tang, W. Wang, H. He, and R. Zhang, "Energy-efficient data collection for UAV-assisted IoT: joint trajectory and resource optimization," Chinese Journal of Aeronautics, vol. 35, no. 9, pp. 95-105. 2022.

[J11] T. Jiang, L. Niu, X. Tang, X. Tang*, and D. Zhai, "Aerial reconfigurable intelligent surface-assisted secrecy: a learning approach," IEEE communications Letters, vol. 26, no. 1, pp. 18-22. 2022.

–  2021

[J10] X. Tang, X. Lan, D. Zhai, R. Zhang, and Z. Han, "Securing wireless transmissions with RIS-receiver coordination: Passive beamforming and active jamming," IEEE Transactions on Vehicular Technology, vol. 70, no. 6, pp. 6260-6265. 2021.

[J9] X. Tang, D. Wang, R. Zhang, Z. Chu, and Z. Han, "Jamming mitigation via aerial reconfigurable intelligent surface: Passive beamforming and deployment optimization," IEEE Transactions on Vehicular Technology, vol. 70, no. 6, pp. 6232-6237. 2021.

[J8] X. Tang, R. Zhang, W. Wang, L. Cai, and Z. Han, "Robust secrecy competition with aggregate interference constraint in small-cell networks," IEEE Transactions on Wireless Communications, vol. 20, no. 4, pp. 2325-2340. 2021.

[J7] D. Zhai, H. Li, X. Tang*, R. Zhang, Z. Ding, and F. R. Yu, "Height optimization and resource allocation for NOMA enhanced UAV-aided relay networks," IEEE Transactions on Communications, vol. 69, no. 2, pp. 962-975. 2021.

–  2020 ~

[J6] X. Tang, P. Ren, and Z. Han, "Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks," IEEE Journal on Selected Areas in Communications, vol. 36, no. 7, pp. 1564-1578. 2018.

[J5] X. Tang, P. Ren, and Z. Han, "Jamming mitigation via hierarchical security game for IoT communications," IEEE Access, vol. 6, pp. 5766-5779. 2018.

[J4] X. Tang, P. Ren, F. Gao, and Q. Du, "Interference-aware resource competition toward power-efficient ultra-dense networks," IEEE Transactions on Communications, vol. 65, no. 12, pp. 5415-5428. 2017.

[J3] X. Tang, P. Ren, and Z. Han, "Distributed power optimization for security-aware multi-channel full-duplex communications: a variational inequality framework," IEEE Transactions on Communications, vol. 65, no. 9, pp. 4065-4079. 2017.

[J2] X. Tang, P. Ren, and Z. Han, "Power-efficient secure transmission against full-duplex active eavesdropper: a game-theoretic framework," IEEE Access, vol. 5, pp. 24632-24645. 2017.

[J1] X. Tang, P. Ren, Y. Wang, and Z. Han, "Combating full-duplex active eavesdropper: a hierarchical game perspective," IEEE Transactions on Communications, vol. 65, no. 3, pp. 1379-1395. 2017. (ESI Highly Cited Paper)

 


–  2024

[C17] X. Liu, R. Zhang, D. Zhai, Y. Jiang, X. Tang, B. Li, and H. Cao, "A 3-D Geometrical-Based Stochastic Model for Satellite-to-Ground MIMO Channels," in Proc. International Wireless Communications and Mobile Computing (IWCMC), 2024, pp. 1679-1684. (Best Paper Award)

[C16] X. Lan, X. Tang*, R. Zhang, B. Li, D. Zhai, W. Lin, and Z. Han, "Distributionally Robust Mining for Proof-of-Work Blockchain under Resource Uncertainties," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2024, pp. 1-6.

[C15] H. Zhang, X. Tang*, R. Zhang, T. Dana, N. Ussipov, and Z. Han, "Distributionally Robust Over-the-Air Computation in Presence of Channel Uncertainties," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2024, pp. 1-6.

–  2021

[C14] N. Liu, X. Tang*, D. Xu, D. Wang, D. Zhai, and R. Zhang, "A learning approach towards secure cognitive networks with UAV relaying and active jamming," in Proc. International Conference on Wireless Communications and Signal Processing (WCSP), 2021, pp. 1-6.

[C13] X. Lan, X. Tang*, D. Zhai, D. Wang, and Z. Han, "Blockchain-secured data collection for UAV-assisted IoT: a DDPG approach," in Proc. IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1-6.

–  2020~

[C12] N. Liu, X. Tang*, R. Zhang, D. Wang, and D. Zhai, "A DNN framework for secure transmissions in UAV-relaying networks with a jamming receiver," in Proc. IEEE 20th International Conference on Communication Technology (ICCT), 2020, pp. 703-708.

[C11] X. Tang, P. Ren, and Z. Han, "Energy Efficiency Competition for Visible Light Communication under Illumination Constraint," in Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2018, pp. 932-936.

[C10] X. Tang, P. Ren, and Z. Han, "Securing small cell networks under interference constraint: a quasi-variational inequality approach," in Proc. IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1-6.

[C9] X. Tang, P. Ren, and Z. Han, "Hierarchical power competition for security enhancement in wireless networks," in Proc. IEEE International Conference on Communications (ICC), 2017, pp. 1-6.

[C8] X. Tang, P. Ren, D. Xu, and D. Xu, "Robust secrecy competition in wireless networks," in Proc. IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, pp. 1-5.

[C7] X. Tang, P. Ren, and Z. Han, "Combating full-duplex active eavesdropper: a game-theoretic perspective," in Proc. IEEE International Conference on Communications (ICC), 2016, pp. 1-6.

[C6] X. Tang, P. Ren, and Z. Han, "Iterative power optimization towards secure multi-channel full-duplex communication," in Proc. IEEE Global Communications Conference (GLOBECOM), 2016, pp. 1-6.

[C5] X. Tang, P. Ren, Q. Du, and L. Sun, "Enhancing Wireless Security Against Reactive Jamming Attacks: a Game-Theoretical Framework," in Proc. Wireless Algorithms, Systems, and Applications: 10th International Conference (WASA) 2015, Qufu, China, pp. 487-496.

[C4] X. Tang, P. Ren, Y. Wang, Q. Du, and L. Sun, "Securing wireless transmission against reactive jamming: a Stackelberg game framework," in Proc. IEEE global communications conference (GLOBECOM), 2015, pp. 1-6.

[C3] X. Tang, P. Ren, Y. Wang, Q. Du, and L. Sun, "User association as a stochastic game for enhanced performance in heterogeneous networks," in Proc. IEEE International Conference on Communications (ICC), 2015, pp. 3417-3422.

[C2] X. Tang, P. Ren, Y. Wang, Q. Du, and L. Sun, "Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation," in Proc. IEEE Global Communications Conference, 2014, pp. 2479-2484.

[C1] X. Tang, P. Ren, Y. Wang, Q. Du, and L. Sun, "Efficient power control via non-cooperative target SINR competition in distributed wireless networks," in Proc. IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 2014, pp. 1-5.