0000000000148457

AUTHOR

Nan Zhao

Molecular systematics and phytochemistry of Rehmannia (Scrophulariaceae)

Abstract The relationships between the six known species of Rehmannia were investigated. With regard to the content of iridoid glucosides, caffeoyl phenylethanoid glycosides (CPGs) and ionone glucosides, no conclusions could be drawn. Phylogenetic analysis of DNA sequence data (ITS region, trnL-F region and rps 16 intron) reveal a well-resolved topology in which Rehmannia glutinosa and Rehmannia solanifolia and Rehmannia piasezkii and Rehmannia elata are well-supported species pairs. Rehmannia chingii is sister to the rest of the genus, which is congruent with its distribution distant to the other species of the genus.

research product

UAV-Aided Secure Short-Packet Data Collection and Transmission

Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing t…

research product

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

research product

IEEE Access Special Section Editorial : Cloud and Big Data-Based Next-Generation Cognitive Radio Networks

In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the resource allocation and interference ma…

research product

Wireless Caching Aided 5G Networks

research product

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …

research product

Topoisomerase 1 inhibition suppresses inflammatory genes and protects from death by inflammation

Unwinding DNA and unleasing inflammation Fighting infections often comes with collateral damage, which sometimes can be deadly. For instance, in septic shock, the overwhelming release of inflammatory mediators drives multi-organ failure. Rialdi et al. now report a potential new therapeutic target for controlling excessive inflammation: the DNA unwinding enzyme topoisomerase I (Top1) (see the Perspective by Pope and Medzhitov). Upon infection, Top1 specifically localizes to the promoters of pathogen-induced genes and promotes their transcription by helping to recruit RNA polymerase II. Pharmacological inhibition of Top1 in a therapeutic setting increased survival in several mouse models of s…

research product

UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens

In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…

research product