skip to main content


Search for: All records

Creators/Authors contains: "Xu, Jindan"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. In this paper, we consider the physical layer security of an RIS-assisted multiple-antenna communication system with randomly located eavesdroppers. The exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and a closed-form expression for the secrecy outage probability (SOP) is obtained. It is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, and the impact of the transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. We also perform an analytical study demonstrating that the secrecy diversity order depends on the path loss exponent of the RIS-to-ground links. Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations. 
    more » « less
  2. In this paper, we investigate a downlink channel of a large intelligent surface (LIS) communication system. The LIS is equipped with B-bit discrete phase shifts while base station (BS) exploits low-resolution digital-to-analog converters (DACs). Without the knowledge of channel state information (CSI) related to the LIS, we propose a practical phase shift design method, whose computational complexity increases by 2 B independent of the number of reflecting elements N. A tight lower bound for the asymptotic rate of the user is obtained in closed form. As N increases, we observe that the asymptotic rate becomes saturated because both the received signal power and the DAC quantization noise increase. Compared to the optimal continuous phase shift design with perfect CSI, our proposed method asymptotically approaches the ideal benchmark performance for moderate to high values of B. The derived results and observations are verified by simulation results. 
    more » « less