Featured Articles

    Please wait a minute...
    For Selected: Toggle Thumbnails
    Efficient Spatio-Temporal Predictive Learning for Massive MIMO CSI Prediction
    CHENG Jiaming, CHEN Wei, LI Lun, AI Bo
    ZTE Communications    2025, 23 (1): 3-10.   DOI: 10.12142/ZTECOM.202501002
    Abstract59)   HTML200)    PDF (1023KB)(78)       Save

    Accurate channel state information (CSI) is crucial for 6G wireless communication systems to accommodate the growing demands of mobile broadband services. In massive multiple-input multiple-output (MIMO) systems, traditional CSI feedback approaches face challenges such as performance degradation due to feedback delay and channel aging caused by user mobility. To address these issues, we propose a novel spatio-temporal predictive network (STPNet) that jointly integrates CSI feedback and prediction modules. STPNet employs stacked Inception modules to learn the spatial correlation and temporal evolution of CSI, which captures both the local and the global spatio-temporal features. In addition, the signal-to-noise ratio (SNR) adaptive module is designed to adapt flexibly to diverse feedback channel conditions. Simulation results demonstrate that STPNet outperforms existing channel prediction methods under various channel conditions.

    Table and Figures | Reference | Related Articles | Metrics
    RIS Enabled Simultaneous Transmission and Key Generation with PPO: Exploring Security Boundary of RIS Phase Shift
    FAN Kaiqing, YAO Yuze, GAO Ning, LI Xiao, JIN Shi
    ZTE Communications    2025, 23 (1): 11-17.   DOI: 10.12142/ZTECOM.202501003
    Abstract31)   HTML193)    PDF (622KB)(17)       Save

    Due to the broadcast nature of wireless channels and the development of quantum computers, the confidentiality of wireless communication is seriously threatened. In this paper, we propose an integrated communications and security (ICAS) design to enhance communication security using reconfigurable intelligent surfaces (RIS), in which the physical layer key generation (PLKG) rate and the data transmission rate are jointly considered. Specifically, to deal with the threat of eavesdropping attackers, we focus on studying the simultaneous transmission and key generation (STAG) by configuring the RIS phase shift. Firstly, we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem. Then, in light of the dynamic wireless environments, the optimization problem is modeled as a finite Markov decision process. We put forward a policy gradient-based proximal policy optimization (PPO) algorithm to optimize the continuous phase shift of the RIS, which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG. The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance. By reasonably allocating the weight factors for the data transmission rate and the key generation rate, “one-time pad” communication can be achieved. The proposed method has about 90% performance improvement for “one-time pad” communication compared with the benchmark methods.

    Table and Figures | Reference | Related Articles | Metrics
    Endogenous Security Through AI-Driven Physical-Layer Authentication for Future 6G Networks
    MENG Rui, FAN Dayu, XU Xiaodong, LYU Suyu, TAO Xiaofeng
    ZTE Communications    2025, 23 (1): 18-29.   DOI: 10.12142/ZTECOM.202501004
    Abstract65)   HTML193)    PDF (949KB)(68)       Save

    To ensure the access security of 6G, physical-layer authentication (PLA) leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters. Furthermore, the introduction of artificial intelligence (AI) facilitates the learning of the distribution characteristics of channel fingerprints, effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling. This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network (GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users. Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy. Furthermore, this paper outlines the future development directions of PLA.

    Table and Figures | Reference | Related Articles | Metrics
    Separate Source Channel Coding Is Still What You Need: An LLM-Based Rethinking
    REN Tianqi, LI Rongpeng, ZHAO Mingmin, CHEN Xianfu, LIU Guangyi, YANG Yang, ZHAO Zhifeng, ZHANG Honggang
    ZTE Communications    2025, 23 (1): 30-44.   DOI: 10.12142/ZTECOM.202501005
    Abstract63)   HTML194)    PDF (1269KB)(19)       Save

    Along with the proliferating research interest in semantic communication (SemCom), joint source channel coding (JSCC) has dominated the attention due to the widely assumed existence in efficiently delivering information semantics. Nevertheless, this paper challenges the conventional JSCC paradigm and advocates for adopting separate source channel coding (SSCC) to enjoy a more underlying degree of freedom for optimization. We demonstrate that SSCC, after leveraging the strengths of the Large Language Model (LLM) for source coding and Error Correction Code Transformer (ECCT) complemented for channel coding, offers superior performance over JSCC. Our proposed framework also effectively highlights the compatibility challenges between SemCom approaches and digital communication systems, particularly concerning the resource costs associated with the transmission of high-precision floating point numbers. Through comprehensive evaluations, we establish that assisted by LLM-based compression and ECCT-enhanced error correction, SSCC remains a viable and effective solution for modern communication systems. In other words, separate source channel coding is still what we need.

    Table and Figures | Reference | Related Articles | Metrics
    Exploration of NWDAF Development Architecture for 6G AI-Native Networks
    HE Shiwen, PENG Shilin, DONG Haolei, WANG Liangpeng, AN Zhenyu
    ZTE Communications    2025, 23 (1): 45-52.   DOI: 10.12142/ZTECOM.202501006
    Abstract38)   HTML0)    PDF (938KB)(8)       Save

    Artificial intelligence (AI)-native communication is considered one of the key technologies for the development of 6G mobile communication networks. This paper investigates the architecture for developing the network data analytics function (NWDAF) in 6G AI-native networks. The architecture integrates two key components: data collection and management, and model training and management. It achieves real-time data collection and management, establishing a complete workflow encompassing AI model training, deployment, and intelligent decision-making. The architecture workflow is evaluated through a vertical scaling use case by constructing an AI-native network testbed on Kubernetes. Within this proposed NWDAF, several machine learning (ML) models are trained to make vertical scaling decisions for user plane function (UPF) instances based on data collected from various network functions (NFs). These decisions are executed through the Kubernetes API, which dynamically allocates appropriate resources to UPF instances. The experimental results show that all implemented models demonstrate satisfactory predictive capabilities. Moreover, compared with the threshold-based method in Kubernetes, all models show a significant advantage in response time. This study not only introduces a novel AI-native NWDAF architecture but also demonstrates the potential of AI models to significantly improve network management and resource scaling in 6G networks.

    Table and Figures | Reference | Related Articles | Metrics
    Device Activity Detection and Channel Estimation Using Score-Based Generative Models in Massive MIMO
    TANG Chenyue, LI Zeshen, CHEN Zihan, YANG Howard H.
    ZTE Communications    2025, 23 (1): 53-62.   DOI: 10.12142/ZTECOM.202501007
    Abstract23)   HTML0)    PDF (886KB)(4)       Save

    The growing demand for wireless connectivity has made massive multiple-input multiple-output (MIMO) a cornerstone of modern communication systems. To optimize network performance and resource allocation, an efficient and robust approach is joint device activity detection and channel estimation. In this paper, we present an approach utilizing score-based generative models to address the under-determined nature of channel estimation, which is data-driven and well-suited for the complex and dynamic environment of massive MIMO systems. Our experimental results, based on a comprehensive dataset generated through Monte-Carlo sampling, demonstrate the high precision of our channel estimation approach, with errors reduced to as low as -45 dB, and exceptional accuracy in detecting active devices.

    Table and Figures | Reference | Related Articles | Metrics
    Efficient PSS Detection Algorithm Aided by CNN
    LI Lanlan
    ZTE Communications    2025, 23 (1): 63-70.   DOI: 10.12142/ZTECOM.202501008
    Abstract70)   HTML1)    PDF (678KB)(6)       Save

    In a 5G mobile communication system, cell search is the initial step in establishing downlink synchronization between user equipment (UE) and base stations (BS). Primary synchronization signal (PSS) detection is a crucial part of this process, and enhancing PSS detection speed can reduce communication latency and improve overall quality. This paper proposes a fast PSS detection algorithm based on the correlation characteristics of PSS time-domain superposition signals. Conducting PSS signal correlation within a smaller range can reduce computational complexity and accelerates communication speed. Additionally, frequency offset can impact the accuracy of calculations during the PSS detection process. To address this issue, we propose applying convolutional neural networks (CNN) for frequency offset estimation of synchronization signals. By compensating for the frequency of related signals, the accuracy of PSS detection is improved. Finally, the analysis and simulation results demonstrate the effectiveness of the proposed approach.

    Table and Figures | Reference | Related Articles | Metrics