Welcome

 

Li SUN  Ph.D./Associate Professor/Ph.D. Advisor

 

Deputy Director, Wireless Communications Institute

School of Information and Communications Engineering

Xi’an Jiaotong University (XJTU)

No.28 West Xianning Road, Xi’an 710049, Shaanxi Province, China

Email: lisun@mail.xjtu.edu.cn

 

Education                                                                   

Ø  Sep. 2006 -- Dec. 2011   Ph.D. in Information and Communications Engineering, Xi’an Jiaotong University

Ø  Sep. 2002 -- Jul. 2006     B.S. in Information Engineering, Xi’an Jiaotong University

Working Experience                                                  

Ø  Oct. 2019 -- Oct. 2020    Visiting Professor, University of California, Irvine (work with Prof. A. Lee Swindlehurst, IEEE Fellow)

Ø  Jan. 2016 -- Present       Associate Professor,  Xi’an Jiaotong University

Ø  Jan. 2012 -- Dec. 2015    Assistant Professor,    Xi’an Jiaotong University

Research Interests                                                    

Ø  Wireless Physical Layer Security

Ø  Machine Learning for Communications Systems

Ø  The 5th Generation Cellular Systems (5G)

Ø  Internet-of-Things (IoT)

Ø  Secure Transmission Techniques for Multimedia

Research Grants                                                        

Ø  “Research on Content-Aware Physical-Layer Anti-Eavesdropping Techniques for Wireless Networks”, National Natural Science Foundation of China (Grant No. 61671369), Solo Principle Investigator, 01/2017 -- 12/2020

Ø  “Research on Low-Complexity Cooperative Transmission Technologies towards Security-Guaranteed Relay Networks”, National Natural Science Foundation of China (Grant No. 61201207), Solo Principle Investigator, 01/2013 -- 12/2015

Ø  “Research and Evaluation for 5G Low-Power Massive Access Techniques”, National Science and Technology Major Project of China (Grant No. 2016ZX03001012-004), Sub-Project Solo Principle Investigator, 01/2016 -- 12/2017

Ø  “Research and Evaluation for 3D MIMO Techniques,” National Science and Technology Major Project of China (Grant No. 2013ZX03003007-003), Sub-Project Solo Principle Investigator, 01/2013 -- 12/2014

Ø  “Research of Anti-Eavesdropping Signal Design and Secure Transmission Techniques towards 5G Networks”, Key Research and Development Program of Shaanxi Province (Grant No. 2018KW-019), Solo Principle Investigator, 01/2018 -- 12/2019

Ø  “Customized Networking Transmission Techniques for 5G with Multi-Scenario Multi-Service Features”, Open Research Fund of Zhejiang Lab (Grant No. 2019LC0AB04), Solo Principle Investigator, 01/2020 -- 06/2021

Ø  “Physical-Layer Information Driven Security Provisioning Techniques for 5G Networks”, Open Research Fund of the State Key Laboratory of Integrated Services Networks (Grant No. ISN18-02), Solo Principle Investigator, 01/2017 -- 12/2018

Ø  “Cooperative Transmission Schemes for Wireless Relay Networks based on PHY-Security Theory,” Open Research Fund of National Mobile Communications Research Laboratory (Grant No. 2012D04), Solo Principle Investigator, 09/2012 -- 08/2015

Ø  “Wireless Networking Solutions for Tunnel Engineering”, Collaborative Project with China Railway First Group Co., Ltd, Solo Principle Investigator, 04/2018 -- 12/2018

Ø  “Physical-Layer Security Transmission Techniques for 5G with Multi-Scenario Multi-Service Features”, Fundamental Research Funds for the Central Universities of China, Solo Principle Investigator, 01/2017 -- 12/2019

Ø  “Physical Layer Techniques for Cooperative Communication Systems: Theory, Algorithms, and Performance Evaluation,” Scientific Research Fund for New Faculties of Xi’an Jiaotong University, Solo Principle Investigator, 01/2012 -- 12/2014

Ø  Research on Theory of Physical-Layer Security for Information Transmissions in Wireless Communications”, Key Program of National Natural Science Foundation of China (Grant No. 61431011), Major Participant, 01/2015 -- 12/2019

Ø  Innovation of Transmission Technologies towards 5G Networks”, International Collaboration and Interaction Project of National Natural Science Foundation of China (Grant No. 61461136001), Major Participant, 01/2015 -- 12/2017

Selected Publications                                                 

Google Scholar Citations: 1377, H-index: 20 (as of May 1, 2020)

Ø     Book Chapters

1.       Li Sun and Qinghe Du, “Secure Data Dissemination for Intelligent Transportation Systems,” Chapter 6 of Secure and Trustworthy Transportation Cyber-Physical Systems, Springer, 2017.

Ø     Journal Papers

1.       Li Sun, Dantong Huang, and A. Lee Swindlehurst, “Fountain-coding aided secure transmission with delay and content awareness,” accepted by IEEE Transactions on Vehicular Technology, Apr. 2020.

2.       Qiqi Zhu and Li Sun (Corresponding Author), “Big data driven anomaly detection for cellular networks,” IEEE Access, published online, DOI: 10.1109/ACCESS.2020.2973214, Jan. 2020.

3.       Li Sun and Yuwei Wang, “CTBRNN: a novel deep-learning based signal sequence detector for communications systems,” IEEE Signal Processing Letters, vol. 27, pp. 21-25, Nov. 2019.

4.       Hongbin Xu and Li Sun (Corresponding Author), “Wireless surveillance via proactive eavesdropping and rotated jamming,” IEEE Transactions on Vehicular Technology, vol. 68, no. 11, pp. 10713-10727, Nov. 2019.

5.       Li Sun and Hongbin Xu, “Fountain-coding based secure communications exploiting outage prediction and limited feedback,” IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, Jan. 2019.

6.       Hongbin Xu and Li Sun (Corresponding Author), “Encryption over the air: securing two-way untrusted relaying systems through constellation overlapping,” IEEE Transactions on Wireless Communications, vol. 17, no. 12, pp. 8268-8282, Dec. 2018.

7.       Li Sun and Hongbin Xu, “Unequal secrecy protection for untrusted two-way relaying systems: constellation overlapping and noise aggregation,” IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9681-9695, Oct. 2018.

8.       Li Sun and Qinghe Du, “A review of physical layer security techniques for Internet of Things: challenges and solutions,” Entropy, vol. 20, no. 10, DOI: 10.3390/e20100730, Oct. 2018.

9.       Zhenzhen Gao, Zhijie Huang, and Li Sun, “Secure cooperative communication with nondedicated relays,” IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7811-7815, Aug. 2018.

10.    Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design in power-domain NOMA: Eavesdropping suppression in the two-user relay network with compensation for the relay user,” Mobile Networks and Applications, vol. 23, no. 4, pp. 1068-1079, Aug. 2018.

11.    Qian Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Security-aware waveform and artificial noise design for time-reversal-based transmission,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5486-5490, Jun. 2018.

12.    Li Sun and Qinghe Du, “Physical Layer Security with Its Applications in 5G Networks: A Review,” China Communications, vol. 14, no. 12, pp. 1-14, Dec. 2017.

13.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10732-10747, Dec. 2017.

14.    Qinghe Du, Nan Lu, Li Sun, Xuelin Zhang, and Bo Sun, “Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access,” Journal of Sensors, Volume 2017, DOI: 10.1155/2017/9270907, 2017.

15.    Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Traffic-aware overload control scheme in 5G ultra-dense M2M networks”, Transactions on Emerging Telecommunications Technologies, vol. 28, no. 9, Sep. 2017.

16.    Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun, “Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks,” IEEE Access, vol. 5, pp. 3763-3776, 2017.

17.    Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, Qinghe Du, and Yichen Wang, “Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 825-839, Apr. 2017.

18.    Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” SCIENCE CHINA Information Sciences, vol. 60, no. 4, DOI: 10.1007/s11432-016-9013-0, Apr. 2017.

19.    Zhijie Huang, Zhenzhen Gao, and Li Sun, “Anti-eavesdropping scheme based on quadrature spatial modulation,” IEEE Communications Letters, vol. 21, no. 3, pp. 532-535, Mar. 2017.

20.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Reciprocally-benefited secure transmission for spectrum sensing-based cognitive radio sensor networks,” Sensors, vol. 16, no. 12, DOI: 10.3390/s16121998, Dec. 2016.

21.    Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Active jamming for multi-user information security improvement with the access statuses of users,” (Wiley) Security and Communication Networks, vol. 9, no. 16, pp. 3893-3910, Nov. 2016.

22.    Li Sun, Qinghe Du, Pinyi Ren, and Yichen Wang, “Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016.

23.    Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN based V2I communications in vehicular cyber-physical systems,” International Journal of Distributed Sensor Networks, vol. 12, no. 8, DOI: 10.1177/1550147716662783, Aug. 2016.

24.    Hao Niu, Nanhao Zhu, Li Sun, Athanasios V. Vasilakos, and Kaoru Sezaki, “Security-embedded opportunistic user cooperation with full diversity,” (Springer) Wireless Networks, vol. 22, no. 5, pp. 1513-1522, Jul. 2016.

25.    Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345-5357, May 2016.

26.    Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, and Li Sun, “Dynamic RACH partition for massive access of differentiated M2M services,” Sensors, vol. 16, no. 4, DOI: 10.3390/s16040455, Apr. 2016.

27.    Datong Xu, Pinyi Ren, Li Sun, and Houbing Song, “Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems,” IET Communications, vol. 10, no. 3, pp. 292-299, Mar. 2016.

28.    Li Sun, Pinyi Ren, Qinghe Du, and Yichen Wang, “Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, Feb. 2016.

29.    Yichen Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Optimal power allocation for underlay-based cognitive radio networks with primary user’s statistical delay QoS provisioning,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6896-6910, Dec. 2015.

30.    Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, and Qinghe Du, “Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270-2273, Dec. 2015. (The first author is an undergraduate student under my supervision)

31.    Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147-157, Dec. 2015.

32.    Li Sun and Hongbin Xu, “A scheme to avoid interference via constellation rotation for cooperative device-to-device systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 49, no. 12, pp. 6-11, Dec. 2015.

33.    Datong Xu, Pinyi Ren, and Li Sun, “ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells,” International Journal of Communication Systems, vol. 28, no. 17, pp. 2214-2238, Nov. 2015.

34.    Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, and Li Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033-1043, Oct. 2015.

35.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Downlink and uplink cooperative transmission for primary secrecy based cognitive radio sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, DOI:10.1155/2015/152851, Sep. 2015.

36.    Dawei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Reciprocally benefited spectrum access scheme with joint power and subcarrier allocation in a software-defined network,” IEEE Access, vol. 3, pp. 1248-1259, Aug. 2015.

37.    Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463-466, Mar. 2015. (ranked No.3 in the Top Accessed Articles from March 2015 to August 2015 for the IEEE Communications Letters)

38.    Zhenzhen Gao, Li Sun, Yichen Wang, and Xuewen Liao, “Double differential transmission for amplify-and-forward two-way relay systems,” IEEE Communications Letters, vol. 18, no. 10, pp. 1839-1842, Oct. 2014.

39.    Li Sun, Pinyi Ren, and Qinghe Du, “Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks,” EURASIP Journal on Wireless Communications and Networking, DOI: 10.1186/1687-1499-2014-109, Jul. 2014.

40.    Hao Niu, Masayuki Iwai, Kaoru Sezaki, Li Sun, and Qinghe Du, “Exploiting fountain codes for secure wireless delivery,” IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, May 2014.

41.    Li Sun, Qinghe Du, and Pinyi Ren, “Secrecy-enhanced data dissemination using cooperative relaying in vehicular networks,” International Journal of Distributed Sensor Networks, vol. 2013, DOI: 10.1155/2013/505831, Nov. 2013.

42.    Hao Niu, Li Sun, Masayuki Iwai, and Kaoru Sezaki, “Secrecy-enhanced cooperation scheme with multiuser diversity in wireless relay networks,” IEICE Communications Express, vol. 2, no. 10, pp. 409-414, Oct. 2013.

43.    Li Sun and Fan Li, “Adaptive protocol for cooperative communication systems with a single semi-blind amplify-and-forward relay,” (Springer) Telecommunication Systems, vol. 53, no. 1, pp. 85-90, May 2013.

44.    Li Sun, Taiyi Zhang, Yubo Li, and Hao Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3801-3807, Oct. 2012.

45.    Yubo Li, Qinye Yin, Li Sun, Hongyang Chen, and Huiming Wang, “A channel quality metric in opportunistic selection with outdated CSI over Nakagami-m fading channels,” IEEE Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1427-1432, Mar. 2012.

46.    Li Sun, Taiyi Zhang, and Hao Niu, “Inter-relay interference in two-path digital relaying systems: detrimental or beneficial?” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2468-2473, Aug. 2011.

47.    Runping Yuan, Taiyi Zhang, Jianxiong Huang, and Li Sun, “Opportunistic cooperation and optimal power allocation for wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 56, no. 3, pp. 1898-1904, Aug. 2010.

48.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Spectrally-efficient decode-and-forward scheme based on constellation rotation,” ETRI Journal, vol. 32, no. 4, pp. 607-609, Aug. 2010.

49.    Li Sun, Taiyi Zhang, Hao Niu, and Junsong Wang, “Effect of multiple antennas at the destination on the diversity performance of amplify-and-forward systems with partial relay selection,” IEEE Signal Processing Letters, vol. 17, no. 7, pp. 631-634, Jul. 2010. (ranked No.3 in the Top Accessed Articles in May 2010 for the IEEE Signal Processing Letters)

50.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 535-538, Jun. 2010. (ranked No.3 in the Top Accessed Articles in April 2010 for the IEEE Signal Processing Letters)

51.    Li Sun and Taiyi Zhang, “Semi-distributed user selection scheme in decode-and-forward systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 43, no. 12, pp. 115-119, Dec. 2009.

52.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Cooperative communications with relay selection in wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 513-517, May 2009.

Ø     Conference Papers

1.       Hongbin Xu and Li Sun, “Proactive eavesdropping scheme for wireless surveillance systems: a rotated-jamming aided approach,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, Dec. 2019, pp. 1-6.

2.       Dantong Huang and Li Sun, “Secure communication based on fountain code and channel feedback,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Xi’an, China, Oct. 2019, pp. 1-5.

3.       Jun Li, Qinghe Du, Li Sun, and Pinyi Ren, “Queue-aware joint ACB control and resource allocation for mMTC networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM) Workshop on Communication, Computing, and Networking in Cyber Physical Systems, Abu Dhabi, UAE, Dec. 2018, pp. 1-6.

4.       Li Sun, Hongbin Xu, and Fan Li, “Message-prioritization based unequal secrecy protection for untrusted two-way relaying networks,” in Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018, pp. 1-6.

5.       Hongbin Xu, Li Sun, and Fan Li, “Towards enhanced security for two-way untrusted relaying systems: a constellation overlapping scheme,” in Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018, pp. 1-7.

6.       Nan Lu, Qinghe Du, Li Sun, and Pinyi Ren, “Traffic-driven intrusion detection for massive MTC towards 5G networks,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM’18) Workshop on MobiSec, Honolulu, USA, Apr. 2018, pp. 426-431.

7.       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017, pp. 1-6.

8.       Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017, pp. 1-6.

9.       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Signal conversion: combat eavesdropping for physical layer security improvement,” in Proceedings of the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017, pp. 1-5.

10.    Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Weighted-voronoi-diagram based codebook design against passive eavesdropping for MISO systems,” in Proceedings of the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017, pp. 1-5.

11.    Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission,” in Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, May 2017, pp. 1-6.

12.    Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “ICA-SBDC: a channel estimatio