default search action
Xiao Tang 0001
Person information
- affiliation: Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- affiliation: Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
Other persons with the same name
- Xiao Tang — disambiguation page
- Xiao Tang 0002 — University of South China, School of Mechanical Engineering, Hengyang, China
- Xiao Tang 0003 — Jilin University, Jilin, China
- Xiao Tang 0004 — Dongguan University of Technology, Dongguan, China
- Xiao Tang 0005 — The Chinese University of Hong Kong, Hong Kong, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Nurzhan Ussipov, Sayat Akhtanov, Zeynulla Zhanabaev, Dana Turlykozhayeva, Beibit A. Karibayev, Timur Namazbayev, D. Almen, Almat Akhmetali, Xiao Tang:
Automatic Modulation Classification for MIMO System Based on the Mutual Information Feature Extraction. IEEE Access 12: 68463-68470 (2024) - [j34]Daosen Zhai, Huan Li, Xiao Tang, Ruonan Zhang, Haotong Cao:
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks. Digit. Commun. Networks 10(1): 25-37 (2024) - [j33]Huan Li, Xiao Tang, Daosen Zhai, Ruonan Zhang, Bin Li, Haotong Cao, Neeraj Kumar, Ahmad Almogren:
Energy-Efficient Deployment and Resource Allocation for O-RAN-Enabled UAV-Assisted Communication. IEEE Trans. Green Commun. Netw. 8(3): 1128-1140 (2024) - [j32]Xiao Tang, Hongrui Zhang, Ruonan Zhang, Deyun Zhou, Yan Zhang, Zhu Han:
Robust Trajectory and Offloading for Energy-Efficient UAV Edge Computing in Industrial Internet of Things. IEEE Trans. Ind. Informatics 20(1): 38-49 (2024) - [j31]Xiao Tang, Sicong Liu, Xiaojiang Du, Mohsen Guizani:
Sparsity-Aware Intelligent Massive Random Access Control for Massive MIMO Networks: A Reinforcement Learning Based Approach. IEEE Trans. Wirel. Commun. 23(8): 9730-9744 (2024) - [c36]Bin Li, Renjie Li, Jiakang Yan, Xiao Tang, Ruonan Zhang:
Ultra-low Altitude Channel Measurement in Riverside Environments at 1.4 GHz. VTC Spring 2024: 1-5 - [c35]Haixia Liu, Lixin Li, Xiao Tang, Wensheng Lin, Fucheng Yang, Tong Yin, Zhu Han:
Reconfigurable Intelligent Surface-Aided Physical Layer Authentication with Deep Learning. VTC Spring 2024: 1-6 - [c34]Xunqiang Lan, Xiao Tang, Ruonan Zhang, Bin Li, Daosen Zhai, Wensheng Lin, Zhu Han:
Distributionally Robust Mining for Proof-of-Work Blockchain under Resource Uncertainties. WCNC 2024: 1-6 - [c33]Xinhua Liu, Yi Jiang, Ruonan Zhang, Bin Li, Daosen Zhai, Xiao Tang:
Clutter Loss Prediction Models for Satellite-Ground Communication Based on Neural Networks. WCNC 2024: 1-6 - [c32]Hongrui Zhang, Xiao Tang, Ruonan Zhang, Dana Turlykozhayeva, Nurzhan Ussipov, Zhu Han:
Distributionally Robust Over-the-Air Computation in Presence of Channel Uncertainties. WCNC 2024: 1-6 - [i5]Nurzhan Ussipov, Sayat Akhtanov, Dana Turlykozhayeva, S. Temesheva, Almat Akhmetali, M. Zaidyn, Timur Namazbayev, Aslan Bolysbay, A. Akniyazova, Xiao Tang:
MEGA: Maximum-Entropy Genetic Algorithm for Router Nodes Placement in Wireless Mesh Networks. CoRR abs/2406.08870 (2024) - 2023
- [j30]Xiao Tang, Hongliang He, Limeng Dong, Lixin Li, Qinghe Du, Zhu Han:
Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission. IEEE Internet Things J. 10(14): 12562-12576 (2023) - [j29]Congle Ge, Daosen Zhai, Yi Jiang, Ruonan Zhang, Xiaobo Yang, Bin Li, Xiao Tang:
Pathloss and Airframe Shadowing Loss of Air-to-Ground UAV Channel in the Airport Area at UHF- and L-Band. IEEE Trans. Veh. Technol. 72(6): 8094-8098 (2023) - [j28]Xunqiang Lan, Xiao Tang, Ruonan Zhang, Wensheng Lin, Zhu Han:
UAV-Assisted Computation Offloading Toward Energy-Efficient Blockchain Operations in Internet of Things. IEEE Wirel. Commun. Lett. 12(8): 1469-1473 (2023) - [i4]Xiao Tang, Hongliang He, Limeng Dong, Lixin Li, Qinghe Du, Zhu Han:
Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission. CoRR abs/2302.14764 (2023) - [i3]Xiao Tang, Sicong Liu, Xiaojiang Du, Mohsen Guizani:
Sparsity-Aware Intelligent Massive Random Access Control in Open RAN: A Reinforcement Learning Based Approach. CoRR abs/2303.02657 (2023) - [i2]Xiao Tang, Sicong Liu:
Power and Interference Control for VLC-Based UDN: A Reinforcement Learning Approach. CoRR abs/2303.05448 (2023) - 2022
- [j27]Tianqi Jiang, Lirong Niu, Xu Tang, Xiao Tang, Daosen Zhai:
Aerial Reconfigurable Intelligent Surface-Assisted Secrecy: A Learning Approach. IEEE Commun. Lett. 26(1): 18-22 (2022) - [j26]Xiao Tang, Xunqiang Lan, Lixin Li, Yan Zhang, Zhu Han:
Incentivizing Proof-of-Stake Blockchain for Secured Data Collection in UAV-Assisted IoT: A Multi-Agent Reinforcement Learning Approach. IEEE J. Sel. Areas Commun. 40(12): 3470-3484 (2022) - [j25]Yue Yu, Dawei Chen, Xiao Tang, Tiecheng Song, Choong Seon Hong, Zhu Han:
Incentive Framework for Cross-Device Federated Learning and Analytics With Multiple Tasks Based on a Multi-Leader-Follower Game. IEEE Trans. Netw. Sci. Eng. 9(5): 3749-3761 (2022) - [j24]Xiao Tang, Na Liu, Ruonan Zhang, Zhu Han:
Deep Learning-Assisted Secure UAV-Relaying Networks With Channel Uncertainties. IEEE Trans. Veh. Technol. 71(5): 5048-5059 (2022) - [j23]Daosen Zhai, Qiqi Shi, Ruonan Zhang, Xiao Tang, Haotong Cao:
Coverage Maximization for Heterogeneous Aerial Networks. IEEE Wirel. Commun. Lett. 11(1): 91-95 (2022) - [j22]Huan Li, Daosen Zhai, Ruonan Zhang, Chen Wang, Xiao Tang:
Joint ABS Deployment and TBS Antenna Downtilt Optimization for Coverage Maximization. IEEE Wirel. Commun. Lett. 11(7): 1329-1333 (2022) - [c31]Xiao Tang, Sicong Liu:
Power and Interference Control for VLC-Based UDN: A Reinforcement Learning Approach. UbiComp/ISWC Adjunct 2022: 432-437 - [i1]Xiao Tang, Xunqiang Lan, Lixin Li, Yan Zhang, Zhu Han:
Incentivizing Proof-of-Stake Blockchain for Secured Data Collection in UAV-Assisted IoT: A Multi-Agent Reinforcement Learning Approach. CoRR abs/2207.02705 (2022) - 2021
- [j21]Li Sun, Yuwei Wang, A. Lee Swindlehurst, Xiao Tang:
Generative-Adversarial-Network Enabled Signal Detection for Communication Systems With Unknown Channel Models. IEEE J. Sel. Areas Commun. 39(1): 47-60 (2021) - [j20]Yixin He, Daosen Zhai, Fanghui Huang, Dawei Wang, Xiao Tang, Ruonan Zhang:
Joint Task Offloading, Resource Allocation, and Security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs. Remote. Sens. 13(8): 1547 (2021) - [j19]Dawei Wang, Yang Zhao, Yixin He, Xiao Tang, Lixin Li, Ruonan Zhang, Daosen Zhai:
Passive Beamforming and Trajectory Optimization for Reconfigurable Intelligent Surface-Assisted UAV Secure Communication. Remote. Sens. 13(21): 4286 (2021) - [j18]Daosen Zhai, Huan Li, Xiao Tang, Ruonan Zhang, Zhiguo Ding, Fei Richard Yu:
Height Optimization and Resource Allocation for NOMA Enhanced UAV-Aided Relay Networks. IEEE Trans. Commun. 69(2): 962-975 (2021) - [j17]Yue Yu, Chunxia Su, Xiao Tang, BaekGyu Kim, Tiecheng Song, Zhu Han:
Hierarchical Game for Networked Electric Vehicle Public Charging Under Time-Based Billing Model. IEEE Trans. Intell. Transp. Syst. 22(1): 518-530 (2021) - [j16]Xiao Tang, Dawei Wang, Ruonan Zhang, Zheng Chu, Zhu Han:
Jamming Mitigation via Aerial Reconfigurable Intelligent Surface: Passive Beamforming and Deployment Optimization. IEEE Trans. Veh. Technol. 70(6): 6232-6237 (2021) - [j15]Xiao Tang, Xunqiang Lan, Daosen Zhai, Ruonan Zhang, Zhu Han:
Securing Wireless Transmissions With RIS-Receiver Coordination: Passive Beamforming and Active Jamming. IEEE Trans. Veh. Technol. 70(6): 6260-6265 (2021) - [j14]Lixin Li, Qianqian Cheng, Xiao Tang, Tong Bai, Wei Chen, Zhiguo Ding, Zhu Han:
Resource Allocation for NOMA-MEC Systems in Ultra-Dense Networks: A Learning Aided Mean-Field Game Approach. IEEE Trans. Wirel. Commun. 20(3): 1487-1500 (2021) - [j13]Xiao Tang, Ruonan Zhang, Wei Wang, Lin Cai, Zhu Han:
Robust Secrecy Competition With Aggregate Interference Constraint in Small-Cell Networks. IEEE Trans. Wirel. Commun. 20(4): 2325-2340 (2021) - [c30]Xunqiang Lan, Xiao Tang, Daosen Zhai, Dawei Wang, Zhu Han:
Blockchain-Secured Data Collection for UAV-Assisted IoT: A DDPG Approach. GLOBECOM 2021: 1-6 - [c29]Daosen Zhai, Huan Li, Xiao Tang, Dawei Wang, Haotong Cao, Peiying Zhang:
Secure Load Balancing for UAV-Assisted Wireless Networks. GLOBECOM 2021: 1-6 - [c28]Tianmi He, Dawei Wang, Fuhui Zhou, Wei Liang, Xiao Tang, Daosen Zhai:
Delay-aware Offloading for Cooperative NOMA-based Near-and-far MEC Networks. ICCC 2021: 978-983 - [c27]Yixin He, Dawei Wang, Fanghui Huang, Xiao Tang, Ruonan Zhang:
Relay Deployment and Network Optimization for NOMA-Enabled Double-Layer Airborne Access Vehicular Ad Hoc Networks. ICCC 2021: 1155-1160 - [c26]Na Liu, Xiao Tang, Dongyang Xu, Dawei Wang, Daosen Zhai, Ruonan Zhang:
A Learning Approach Towards Secure Cognitive Networks with UAV Relaying and Active Jamming. WCSP 2021: 1-6 - [c25]Dawei Wang, Yang Zhao, Xiao Tang, Daosen Zhai, Zihao Wei, Haotong Cao, Wei Liang:
Secure Link Selection for Relay Networks with Buffer. WOWMOM 2021: 354-358 - 2020
- [j12]Hongliang He, Xiao Tang, Dawei Wang:
Achieving Positive Secrecy Rate in Wireless Multiple Access Wiretap Channels. IEEE Trans. Veh. Technol. 69(8): 9121-9125 (2020) - [c24]Na Liu, Xiao Tang, Ruonan Zhang, Dawei Wang, Daosen Zhai:
A DNN Framework for Secure Transmissions in UAV-Relaying Networks with a Jamming Receiver. ICCT 2020: 703-708 - [c23]Yifu Zhang, Wenxun Zhao, Dawei Wang, Daosen Zhai, Xiao Tang:
Correlation Based Secondary Users Selection for Cooperative Spectrum Sensing Network. IoTaaS 2020: 68-79 - [c22]Yue Yu, Xiao Tang, Yiyong Zha, Yunfei Zhang, Tiecheng Song, Zhu Han:
An EPEC Analysis among Mobile Edge Caching, Content Delivery Network and Data Center. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j11]Saeed Ahmadian, Xiao Tang, Heidar A. Malki, Zhu Han:
Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints. IEEE Access 7: 27376-27388 (2019) - [j10]Yixin He, Xiao Tang, Ruonan Zhang, Xiaojiang Du, Deyun Zhou, Mohsen Guizani:
A Course-Aware Opportunistic Routing Protocol for FANETs. IEEE Access 7: 144303-144312 (2019) - [j9]Hongliang He, Pinyi Ren, Xiao Tang:
Joint Network Coding and ARQ Design Toward Secure Wireless Communications. IEEE Trans. Commun. 67(5): 3351-3362 (2019) - [j8]Yue Yu, Xiao Tang, Jun Wu, BaekGyu Kim, Tiecheng Song, Zhu Han:
Multi-Leader-Follower Game for MEC-Assisted Fusion-Based Vehicle On-Road Analysis. IEEE Trans. Veh. Technol. 68(11): 11200-11212 (2019) - [j7]Yichen Wang, Xiao Tang, Tao Wang:
A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach. IEEE Trans. Wirel. Commun. 18(3): 1548-1565 (2019) - [c21]Ke Zhang, Bin Li, Xiao Tang, Dawei Wang, Linyuan Wei:
Path Loss Measurement and Modeling for Industrial Environment. HPSR 2019: 1-5 - [c20]Yue Yu, Jun Wu, Xiao Tang, Tiecheng Song, BaekGyu Kim, Zhu Han:
Distributed Downloading Strategy for Multi-Source Data Fusion in Edge-Enabled Vehicular Network : (Invited Paper). ICCC 2019: 1-6 - [c19]Jingfang Liu, Lixin Li, Fucheng Yang, Xiaomin Liu, Xu Li, Xiao Tang, Zhu Han:
Minimization of Offloading Delay for Two-Tier UAV with Mobile Edge Computing. IWCMC 2019: 1534-1538 - [c18]Yue Yu, Tiecheng Song, Chunxia Su, Xiao Tang, Zhu Han:
Hierarchical Game for Electric Vehicle Public Charging Market. SmartGridComm 2019: 1-6 - [c17]Rui Song, Xiao Tang, Dawei Wang, Daosen Zhai, Woping Xu, Bin Li:
Joint Wireless Power and Information Transfer for Primary Secure Transmission. WCSP 2019: 1-5 - [c16]Yang Wang, Ruonan Zhang, Bin Li, Xiao Tang, Dawei Wang:
Angular Spread Analysis and Modeling of UAV Air-to-Ground Channels at 3.5 GHz. WCSP 2019: 1-5 - [c15]Ke Zhang, Ruonan Zhang, Jiang Wu, Yi Jiang, Xiao Tang:
Measurement and Modeling of Path Loss and Channel Capacity Analysis for 5G UMa Scenario. WCSP 2019: 1-5 - [c14]Zhenfeng Zhang, Daosen Zhai, Ruonan Zhang, Xiao Tang, Yutong Wang:
A Convolutional Neural Network based Resource Management Algorithm for NOMA enhanced D2D and Cellular Hybrid Networks. WCSP 2019: 1-6 - 2018
- [j6]Xiao Tang, Pinyi Ren, Zhu Han:
Jamming Mitigation via Hierarchical Security Game for IoT Communications. IEEE Access 6: 5766-5779 (2018) - [j5]Xiao Tang, Pinyi Ren, Zhu Han:
Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks. IEEE J. Sel. Areas Commun. 36(7): 1564-1578 (2018) - [c13]Xiao Tang, Pinyi Ren, Zhu Han:
Energy Efficiency Competition for Visible Light Communication under Illumination Constraint. APSIPA 2018: 932-936 - [c12]Xiao Tang, Pinyi Ren, Zhu Han:
Securing Small Cell Networks Under Interference Constraint: A Quasi-Variational Inequality Approach. GLOBECOM 2018: 1-6 - [c11]Yichen Wang, Tao Wang, Xiao Tang, Pinyi Ren:
QoS and Security Aware Power Allocation Scheme for Wiretap Cognitive Radio Networks. VTC Fall 2018: 1-6 - 2017
- [j4]Xiao Tang, Pinyi Ren, Zhu Han:
Power-Efficient Secure Transmission Against Full-Duplex Active Eavesdropper: A Game-Theoretic Framework. IEEE Access 5: 24632-24645 (2017) - [j3]Xiao Tang, Pinyi Ren, Yichen Wang, Zhu Han:
Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective. IEEE Trans. Commun. 65(3): 1379-1395 (2017) - [j2]Xiao Tang, Pinyi Ren, Zhu Han:
Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework. IEEE Trans. Commun. 65(9): 4065-4079 (2017) - [j1]Xiao Tang, Pinyi Ren, Feifei Gao, Qinghe Du:
Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks. IEEE Trans. Commun. 65(12): 5415-5428 (2017) - [c10]Huaqing Zhang, Xiao Tang, Reginald Banez, Pinyi Ren, Lingyang Song, Zhu Han:
An EPEC Analysis for Power Allocation in LTE-V Networks. GLOBECOM 2017: 1-6 - [c9]Xiao Tang, Pinyi Ren, Zhu Han:
Hierarchical power competition for security enhancement in wireless networks. ICC 2017: 1-6 - [c8]Xiao Tang, Pinyi Ren, Datong Xu, Dongyang Xu:
Robust secrecy competition in wireless networks. PIMRC 2017: 1-5 - 2016
- [c7]Xiao Tang, Pinyi Ren, Zhu Han:
Iterative Power Optimization Towards Secure Multi-Channel Full-Duplex Communication. GLOBECOM 2016: 1-6 - [c6]Xiao Tang, Pinyi Ren, Zhu Han:
Combating full-duplex active eavesdropper: A game-theoretic perspective. ICC 2016: 1-6 - 2015
- [c5]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework. GLOBECOM 2015: 1-6 - [c4]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
User association as a stochastic game for enhanced performance in heterogeneous networks. ICC 2015: 3417-3422 - [c3]Xiao Tang, Pinyi Ren, Qinghe Du, Li Sun:
Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. WASA 2015: 487-496 - 2014
- [c2]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation. GLOBECOM 2014: 2479-2484 - [c1]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks. VTC Fall 2014: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint