1 |
Signal conversion: Combat eavesdropping for physical layer security improvement
|
会议论文 |
Datong Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
2 |
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
|
期刊论文 |
Li Sun;Pinyi Ren;Qinghe Du;Yichen Wang |
3 |
Security-Aware Routing for Artificial-Noise-Aided Multi-Hop Secondary Communications
|
会议论文 |
Qian Xu;Pinyi Ren;Hongliang He;Dongyang Xu |
4 |
无线通信系统中利用星座转换提高用户信息安全性的方法
|
专利 |
任品毅;徐大同;杜清河;孙黎;王熠晨 |
5 |
Reliability and accessibility of low-latency V2I channel training protocol using cover-free coding: Win-win or tradeoff?
|
期刊论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
6 |
多播环境中基于混合译码的喷泉码的编码设计方法
|
专利 |
任品毅;柴乐;杜清河 |
7 |
一种物联网中基于信道反馈的喷泉编码抗窃听传输方法
|
专利 |
余川;孙黎 |
8 |
Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission
|
会议论文 |
Datong Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
9 |
Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems
|
期刊论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey;Yichen Wang |
10 |
Physical layer security improvement by constellation selection and artificial interference
|
会议论文 |
Datong Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
11 |
Stable throughput region and admission control for device-to-device cellular coexisting networks
|
期刊论文 |
Hao Lu;Yichen Wang;Yan Chen;K. J. Ray Liu |
12 |
Optimal independence-checking coding for secure uplink training in large-scale MISO-OFDM systems
|
会议论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
13 |
Secure transmission for mixed FSO-RF relay networks with physical-layer key encryption and wiretap coding
|
期刊论文 |
Dawei Wang;Pinyi Ren;Julian Cheng;Qinghe Du;Yichen Wang;Li Sun |
14 |
An artificial noise-based security scheme for interference alignment-based wireless networks
|
会议论文 |
Chen Tian;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
15 |
一种基于分层二维特征编码的安全多用户导频鉴权方法
|
专利 |
任品毅;徐东阳 |
16 |
Unequal secrecy protection for untrusted two-way relaying systems: constellation overlapping and noise aggregation
|
期刊论文 |
Li Sun;Hongbin Xu |
17 |
Secondary encrypted secure transmission in cognitive radio networks
|
会议论文 |
Dawei Wang;Pinyi Ren;Qian Xu;Qinghe Du |
18 |
Towards win-win: Weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback
|
期刊论文 |
Dongyang Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
19 |
mMTC网络中基于空口流量的入侵检测
|
期刊论文 |
卢楠;杜清河;任品毅 |
20 |
多发单收窃听信道中人工噪声辅助的鲁棒波束成形设计
|
期刊论文 |
徐静;许思文;孙黎 |
21 |
Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels
|
会议论文 |
Dong Liang;Pinyi Ren;Li Sun;Qinghe Du;Yichen Wang |
22 |
Primary secure communication with the cooperation of energy harvesting secondary system
|
会议论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
23 |
Secure communication using noisy feedback
|
会议论文 |
Hongliang He;Pinyi Ren;Li Sun;Qinghe Du;Yichen Wang |
24 |
Secrecy energy efficiency of massive MIMO AF relaying system with low-resolution ADCs
|
会议论文 |
Qian Xu;Pinyi Ren |
25 |
Iterative power optimization towards secure multi-channel full-duplex communication
|
会议论文 |
Xiao Tang;Pinyi Ren;Zhu Han |
26 |
中继OFDM网络中基于中继策略选择及资源分配安全传输方法
|
专利 |
任品毅;周先文;杜清河 |
27 |
Heterogeneous statistical-delay QoS and security provisioning for D2D underlay cellular networks
|
会议论文 |
Wenwen Xu;Yichen Wang |
28 |
Toward secure Internet of Things via hybrid forwarding and opportunistic relaying
|
会议论文 |
Caihong Han;Li Sun;Pinyi Ren;Yichen Wang |
29 |
Fountain-coding aided symmetrical encryption for secure wireless transmission
|
会议论文 |
Chao Lyu;Pinyi Ren;Qinghe Du;Li Sun |
30 |
利用喷泉码实现对称加密保障无线数据安全传输的方法
|
专利 |
任品毅;吕超;孙黎;杜清河 |
31 |
Combating full-duplex active eavesdropper: A hierarchical game perspective
|
期刊论文 |
Xiao Tang;Pinyi Ren;Yichen Wang;Zhu Han |
32 |
Full-duplex or half-duplex? Hybrid relay selection for physical layer secrecy
|
会议论文 |
Hongliang He;Pinyi Ren;Qinghe Du;Li Sun |
33 |
Anti-eavesdropping scheme based on quadrature spatial modulation
|
期刊论文 |
Zhijie Huang;Zhenzhen Gao;Li Sun |
34 |
Power allocation for cognitive radio networks with statistical QoS provisioning of primary users
|
会议论文 |
Yichen Wang;Pinyi Ren;Qinghe Du;Li Sun |
35 |
Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint
|
会议论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
36 |
Proactive eavesdropping scheme for wireless surveillance systems: A rotated-jamming aided approach
|
会议论文 |
Hongbin Xu;Li Sun |
37 |
User association as a stochastic game for enhanced performance in heterogeneous networks
|
会议论文 |
Xiao Tang;Pinyi Ren;Yichen Wang;Qinghe Du;Li Sun |
38 |
Secure MISO Beamforming Optimization with Randomly Distributed Eavesdroppers and Interferers
|
会议论文 |
Chenguang Zhu;Jing Xu;Jiang Xue |
39 |
Adaptive distributed beamforming and jamming in DF relay networks for physical layer secrecy
|
会议论文 |
Chenmin Gu;Chao Zhang |
40 |
Message-prioritization based unequal secrecy protection for untrusted two-way relaying networks
|
会议论文 |
Li Sun;Hongbin Xu;Fan Li |
41 |
移动互联网接入关键技术研究及产业化
|
奖励 |
禹忠;孙波;王忠民;杜清河;吴昊;卢忱;叶佳;谢芳 |
42 |
不可信中继系统中基于非联合人工噪声的信息安全传输方法
|
专利 |
杜清河;卢楠;孙黎;任品毅 |
43 |
Joint artificial noise and repetition coding for secure wireless communications in TDD systems
|
期刊论文 |
Hongliang He;Pinyi Ren |
44 |
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks
|
期刊论文 |
Bilal Hussain;Qinghe Du;Pinyi Ren |
45 |
A power allocation scheme for physical layer security based on large-scale fading
|
会议论文 |
Ye Fan;Xuewen Liao;Zhenzhen Gao |
46 |
Enhancing Physical-Layer Security via Big-Data Aided Hybrid Relay Selection
|
期刊论文 |
Hongliang He;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
47 |
ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems
|
会议论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey;Hongliang He;Qian Xu |
48 |
窃听用户随机分布场景中基于物理层安全的中继传输方法
|
专利 |
任品毅;许茜;杜清河;孙黎;王熠晨 |
49 |
Downlink and uplink cooperative transmission for primary secrecy based cognitive radio sensor networks
|
期刊论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
50 |
Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks
|
期刊论文 |
Xiao Tang;Pinyi Ren;Zhu Han |
51 |
Combat hybrid eavesdropping in power-domain NOMA: Joint design of timing channel and symbol transformation
|
期刊论文 |
Datong Xu;Pinyi Ren;Hai Lin |
52 |
协作通信系统中基于混合转发和机会中继的安全增强策略
|
专利 |
孙黎;韩彩虹;杜清河;任品毅;王熠晨 |
53 |
Hierarchical 2-D feature coding for secure pilot authentication in multi-user multi-antenna OFDM systems: A reliability bound contraction perspective
|
期刊论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
54 |
Outage constrained secrecy rate maximization for relay networks against unknown eavesdroppers
|
会议论文 |
Qian Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
55 |
Cyclic-shifting based sequential cooperative spectrum sensing strategy for multi-channel cognitive radio networks
|
会议论文 |
Pinyi Ren;Yichen Wang;Bei Qi;Qinghe Du;Li Sun |
56 |
认知无线网络中面向授权用户安全传输的功率分配方法
|
专利 |
任品毅;王大伟;杜清河;孙黎;王熠晨 |
57 |
一种基于随机BPSK序列辅助的自适应抗导频欺骗攻击信道估计方法
|
专利 |
任品毅;白凤仪;杜清河 |
58 |
面向物理层安全的自适应联合波束和干扰成型的传输方法
|
专利 |
张超;顾成敏 |
59 |
一种双向中继系统中基于星座重叠的空口加密方法
|
专利 |
徐洪斌;孙黎;任品毅;杜清河 |
60 |
Cooperative relaying and jamming for primary secure communication in cognitive two-way networks
|
会议论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
61 |
On achievable secrecy rate by noise aggregation over wireless fading channels
|
会议论文 |
Qian Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
62 |
Statistical security model and power adaptation over wireless fading channels
|
会议论文 |
Qinghe Du;Li Sun;Pinyi Ren;Yichen Wang |
63 |
Cooperative secure transmission for two-hop relay networks with limited feedback
|
会议论文 |
Dawei Wang;Pinyi Ren;Julian Cheng;Qinghe Du;Li Sun;Yichen Wang |
64 |
Optimal Grassmann manifold eavesdropping: A huge security disaster for M-1-2 wiretap channels
|
会议论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
65 |
两跳有缓存网络中基于能量收割的安全传输方法
|
专利 |
任品毅;王大伟;王熠晨;杜清河;孙黎 |
66 |
新一代移动互联网多媒体及安全接入系统
|
奖励 |
卢忱;马子江;禹忠;纪中伟;吕永;王忠民;许辉;李曦;支周;张力;任品毅;孙波;杜清河;高峰;张宏伟 |
67 |
Secure OFDM Transmission in Wireless Networks with Untrusted Relays
|
会议论文 |
Qiuli Dong;Guobing Li |
68 |
OFDM系统中基于独立分量分析的抗导频欺骗攻击信道估计和识别方法
|
专利 |
任品毅;徐东阳;王熠晨;杜清河;孙黎 |
69 |
一种基于协作通信的高安全能量效率的信息传输方法
|
专利 |
任品毅;周先文;杜清河 |
70 |
Channel-aware secure communication via hybrid wiretap encoding and secret key generation
|
会议论文 |
Qian Xu;Pinyi Ren;Qinghe Du;Dawei Wang |
71 |
一种基于喷泉编码的保障多媒体多播安全传输方法
|
专利 |
杜清河;李婉瑜;孙黎;任品毅;王熠晨 |
72 |
Distributed power optimization for security-aware multi-channel full-duplex communications: A variational inequality framework
|
期刊论文 |
Xiao Tang;Pinyi Ren;Zhu Han |
73 |
Power comsumption-oriented resource allocation strategy for ultra-reliable low-latency communication
|
会议论文 |
Yuncong Xie;Pinyi Ren;Yichen Wang;Jiuchao Li |
74 |
一种基于星座重叠和噪声聚合的非对称隐私保护方法
|
专利 |
孙黎;徐洪斌;杜清河;任品毅 |
75 |
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
|
期刊论文 |
Qian Xu;Pinyi Ren;Houbing Song;Qinghe Du |
76 |
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
|
期刊论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
77 |
ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack
|
会议论文 |
Dongyang Xu;Pinyi Ren;Yichen Wang;Qinghe Du;Li Sun |
78 |
Securing wireless transmission against reactive jamming: a stackelberg game framework
|
会议论文 |
Xiao Tang;Pinyi Ren;Yichen Wang;Qinghe Du;Li Sun |
79 |
无线通信网络联合信号反馈与人工噪声物理层安全通信方法
|
专利 |
任品毅;贺宏亮;孙黎;王熠晨;杜清河 |
80 |
Probabilistic robust secure beamforming in MISO channels with imperfect LCSI and statistical ECSI
|
期刊论文 |
Jing Xu;Siwen Xu;Chongbin Xu |
81 |
Independence-checking coding for OFDM channel training authentication: Protocol design, security, stability, and tradeoff analysis
|
期刊论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
82 |
Achievable secure degrees of freedom of K-user MISO broadcast channel with imperfect CSIT
|
期刊论文 |
Ye Fan;Xuewen Liao;Zhenzhen Gao;Victor C. M. Leung |
83 |
Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks
|
期刊论文 |
Hongbin Xu;Li Sun;Pinyi Ren;Qinghe Du;Yichen Wang |
84 |
Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks
|
期刊论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Yichen Wang;Li Sun |
85 |
Secure distributed detection under energy constraint in IoT-oriented sensor networks
|
期刊论文 |
Guomei Zhang;Hao Sun |
86 |
Physical layer security with its applications in 5G networks: A review
|
期刊论文 |
Li Sun;Qinghe Du |
87 |
MISO系统中对抗被动窃听的基于加权Voronoi图的码本设计方法
|
专利 |
任品毅;徐东阳;杜清河;孙黎;王熠晨 |
88 |
无线网络中基于多径衰落频率选择特性的安全传输方法
|
专利 |
杜清河;穆卡塔尔·侯赛因;李军;孙黎;任品毅 |
89 |
Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach
|
期刊论文 |
Hongbin Xu;Li Sun;Pinyi Ren;Qinghe Du |
90 |
Cooperative secure communication in two-hop buffer-aided networks
|
期刊论文 |
Dawei Wang;Pinyi Ren;Julian Cheng |
91 |
基于非可信认知用户协作干扰的安全传输方法
|
专利 |
任品毅;王大伟;王熠晨;杜清河;孙黎 |
92 |
A hybrid channel estimation strategy against pilot spoofing attack in MISO system
|
会议论文 |
Fengyi Bai;Pinyi Ren;Qinghe Du;Li Sun |
93 |
下行全双工中继网络中基于人工噪声和波束成形的安全传输方法
|
专利 |
任品毅;李强;徐东阳;贺洪亮 |
94 |
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions
|
期刊论文 |
Qian Xu;Pinyi Ren;Houbing Song;Qinghe Du |
95 |
Antenna tilt assignment for three-dimensional beamforming in multiuser systems
|
会议论文 |
Yiyan Zhang;Pinyi Ren;Li Sun;Qinghe Du;Yichen Wang |
96 |
Physical layer security based on interference alignment in K-user MIMO Y wiretap channels
|
期刊论文 |
Ye Fan;Xuewen Liao;Athanasios V. Vasilakos |
97 |
L1/2-regularization based antenna selection for RF-chain limited massive MIMO systems
|
会议论文 |
Shichao Qin;Guobing Li;Gangming Lv;Guomei Zhang |
98 |
QoS and security aware power allocation scheme for wiretap cognitive radio network
|
会议论文 |
Yichen Wang;Tao Wang;Xiao Tang;Pinyi Ren |
99 |
Security protection over wireless fading channels by exploiting frequency selectivity
|
会议论文 |
Mukhtar Hussain;Qinghe Du;Li Sun;Pinyi Ren |
100 |
Two-path successive relaying and jamming for securing the primary system
|
会议论文 |
Dawei Wang;Pinyi Ren;Yichen Wang;Li Sun;Qinghe Du |
101 |
Weighted-Voronoi-diagram based codebook design against passive eavesdropping for MISO systems
|
会议论文 |
Dongyang Xu;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
102 |
Security-aware waveform and artificial noise design for time-reversal-based transmission
|
期刊论文 |
Qian Xu;Pinyi Ren;Qinghe Du;Li Sun |
103 |
Traffic-driven intrusion detection for massive MTC towards 5G networks
|
会议论文 |
Nan Lu;Qinghe Du;Li Sun;Pinyi Ren |
104 |
一种在双向中继网络中多对用户间的安全通信方法
|
专利 |
李国兵;张艺珍;吕刚明;张国梅 |
105 |
Secure ARQ protocol for wireless communications: performance analysis and packet coding design
|
期刊论文 |
Hongliang He;Pinyi Ren |
106 |
Towards enhanced security for two-way untrusted relaying systems: a constellation overlapping scheme
|
会议论文 |
Hongbin Xu;Li Sun;Fan Li |
107 |
Reciprocally-benefited secure transmission for spectrum sensing-based cognitive radio sensor networks
|
期刊论文 |
Dawei Wang;Pinyi Ren;Qinghe Du;Li Sun |
108 |
一种基于独立性校验编码的OFDM信道训练鉴权方法
|
专利 |
任品毅;徐东阳;王熠晨 |
109 |
一种基于误码扩散和噪声聚合的流媒体安全传输方法
|
专利 |
任品毅;秦鹏翔;杜清河;孙黎 |
110 |
基于中断概率约束的MISO窃听信道下二维鲁棒波束成形方法
|
专利 |
徐静;刘智英;孙黎;任品毅 |
111 |
两种基于中断概率约束的MISO窃听信道鲁棒波束成形方法
|
专利 |
徐静;许思文;孙黎;任品毅 |
112 |
一种基于实干扰对齐的MIMOY窃听网络中的安全传输方法
|
专利 |
廖学文;樊晔;高贞贞 |
113 |
Secure communications in cooperative D2D networks by jointing Wyner’s code and network coding
|
期刊论文 |
Hongliang He;Pinyi Ren |
114 |
Distributed cooperative two-cell zero-forcing precoding with local channel correlation
|
期刊论文 |
Jing Xu;Pinyi Ren;Chongbin Xu;Yizhai Zhang |
115 |
Achieving full secrecy rate with energy-efficient transmission control
|
期刊论文 |
Dawei Wang;Pinyi Ren;Julian Cheng;Yichen Wang |
116 |
Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation
|
期刊论文 |
Li Sun;Qinghe Du;Pinyi Ren;Yichen Wang |
117 |
Joint feedback and artificial noise design for secure communications over fading channels without eavesdropper's CSI
|
期刊论文 |
Hongliang He;Pinyi Ren;Qinghe Du;Hai Lin |
118 |
Information security enhancement with actual access statuses of users in the multi-user system
|
会议论文 |
Datong Xu;Pinyi Ren;Qinghe Du;Li Sun |
119 |
High-rate cooperative beamforming for physical-layer security in wireless cyber-physical systems
|
会议论文 |
Yizhen Zhang;Guobing Li;Qinghe Du;Gangming Lv;Guomei Zhang |
120 |
Secure communications in CIoT networks with a wireless energy harvesting untrusted relay
|
期刊论文 |
Hequn Hu;Zhenzhen Gao;Xuewen Liao;Victor C. M. Leung |
121 |
A new dynamic transmission-mode selection scheme for AMC/HARQ-based wireless Networks
|
期刊论文 |
Xiaohui Ma;Guobing Li;Guomei Zhang |
122 |
Security enhancement for video transmission via noise aggregation in immersive systems
|
期刊论文 |
Mukhtar Hussain;Qinghe Du;Li Sun;Pinyi Ren |
123 |
基于软件无线电平台的喷泉码无线安全传输系统
|
会议论文 |
吕超;任品毅;杜清河;孙黎 |
124 |
Securing image transmissions via fountain coding and adaptive resource allocation
|
会议论文 |
Caihong Han;Li Sun;Qinghe Du |
125 |
一种OFDM放大转发中继系统中的物理层安全传输方法
|
专利 |
高贞贞;程度活 |
126 |
一种基于喷泉码的安全传输离散功率控制方法
|
专利 |
杜清河;熊新雷;孙黎 |
127 |
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system
|
会议论文 |
Dawei Wang;Pinyi Ren;Yichen Wang;Qinghe Du;Li Sun |
128 |
Secure secondary communications with curious primary users in cognitive underlay networks
|
会议论文 |
Qian Xu;Pinyi Ren;Qinghe Du;Li Sun |
129 |
Channel correlation based zero-forcing beamforming in two-user MISO broadcast channel
|
期刊论文 |
Jing Xu;Pinyi Ren |
130 |
Joint network coding and ARQ design towards secure wireless communications
|
期刊论文 |
Hongliang He;Pinyi Ren;Xiao Tang |
131 |
Enhancing wireless security against reactive jamming attacks: a game-theoretical framework
|
会议论文 |
Xiao Tang;Pinyi Ren;Qinghe Du;Li Sun |
132 |
Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework
|
期刊论文 |
Xiao Tang;Pinyi Ren;Zhu Han |
133 |
Security enhanced via dynamic fountain code design for wireless delivery
|
会议论文 |
Wanyu Li;Qinghe Du;Li Sun;Pinyi Ren;Yichen Wang |
134 |
Secure and energy efficient transmission in multiuser uplink wireless networks
|
会议论文 |
Hongliang He;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
135 |
一种基于喷泉编码的保障无线数据安全传输方法
|
专利 |
杜清河;李婉瑜;孙黎;任品毅;王熠晨 |
136 |
一种抵抗窃听节点窃取信息的物理层安全传输方法
|
专利 |
高贞贞;黄智捷;孙黎;任品毅 |
137 |
Joint secure beamforming and user selection for multi-user MISO systems with confidential messages
|
会议论文 |
Dongyang Xu;Pinyi Ren;Qinghe Du;Li Sun |
138 |
Robust secrecy competition in wireless networks
|
会议论文 |
Xiao Tang;Pinyi Ren;Datong Xu;Dongyang Xu |
139 |
一种无线缓存网络下基于喷泉码的多播安全传输方法
|
专利 |
杜清河;许莹;孙黎;柴乐;任品毅 |
140 |
Encryption over the air: securing two-way untrusted relaying systems through constellation overlapping
|
期刊论文 |
Hongbin Xu;Li Sun |
141 |
Jamming or forwarding? Full-duplex relaying for physical layer security
|
会议论文 |
Hongliang He;Pinyi Ren;Qinghe Du;Li Sun;Yichen Wang |
142 |
Hierarchical power competition for security enhancement in wireless networks
|
会议论文 |
Xiao Tang;Pinyi Ren;Zhu Han |
143 |
一种多用户中继网络下行链路协作物理层隐私保护方法
|
专利 |
孙黎;徐洪斌;任品毅;杜清河 |
144 |
Cooperative physical-layer approach for downlink privacy preserving in multiuser relay networks
|
会议论文 |
Hongbin Xu;Li Sun;Pinyi Ren;Qinghe Du;Yichen Wang;Zhenzhen Gao |
145 |
PHY-layer cover-free coding for wireless pilot authentication in IoV communications: Protocol design and ultra-security proof
|
期刊论文 |
Dongyang Xu;Pinyi Ren;James A. Ritcey |
146 |
Active jamming for multi-user information security improvement with the access statuses of users
|
期刊论文 |
Datong Xu;Pinyi Ren;Qinghe Du;Li Sun |
147 |
On the secure degrees of freedom for two-user MIMO interference channel with a cooperative jammer
|
期刊论文 |
Ye Fan;Xiaodong Wang;Xuewen Liao |
148 |
Power and rate adaptation for fountain-code-aided security enhancement over wireless fading channels
|
会议论文 |
Xinlei Xiong;Qinghe Du;Li Sun;Pinyi Ren;Zhenzhen Gao |
149 |
Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems
|
期刊论文 |
Dongyang Xu;Pinyi Ren;Qinghe Du;Li Sun |
150 |
基于Key协助的安全传输方法
|
专利 |
任品毅;王大伟;王熠晨;孙黎;杜清河 |
151 |
协作式D2D系统中基于信号对齐的干扰避免和安全传输方法
|
专利 |
孙黎;杜清河;任品毅;王熠晨 |
152 |
Wireless surveillance via proactive eavesdropping and rotated jamming
|
期刊论文 |
Hongbin Xu;Li Sun |
153 |
Enhancing physical layer security through the use of supra threshold stochastic resonance and jamming
|
会议论文 |
Chen Tian;Pinyi Ren |
154 |
A review of physical layer security techniques for Internet of Things: challenges and solutions
|
期刊论文 |
Li Sun;Qinghe Du |
155 |
Security enhancement for wireless multimedia communications by fountain code
|
期刊论文 |
Qinghe Du;Li Sun;Houbing Song;Pinyi Ren |
156 |
Fountain-coding based secure communications exploiting outage prediction and limited feedback
|
期刊论文 |
Li Sun;Hongbin Xu |