179 results on '"Ren, Pinyi"'
Search Results
2. Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User
3. Interference-constrained routing over P2P-share enabled multi-hop D2D networks
4. Channel Correlation Based Zero-Forcing Beamforming in Two-User MISO Broadcast Channel
5. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback
6. Enhancing physical-layer security via big-data-aided hybrid relay selection
7. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks
8. Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
9. An efficient cooperative ARQ protocol for wireless relay networks
10. Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers.
11. Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks
12. Performance enhancement for differential energy signal detection of ambient backscatter communications.
13. Performance of energy detector in the presence of noise uncertainty in cognitive radio networks
14. Joint packet scheduling and resource allocation with quality fairness for wireless VoD system
15. A survey on dynamic spectrum access protocols for distributed cognitive wireless networks
16. Optimal Resource Allocation for Spectrum Sensing Based Cognitive Radio Networks with Statistical QoS Guarantees
17. A directional MAC protocol with long-range communication ability in ad hoc networks
18. Low complexity construction for quasi-cyclic low-density parity-check codes by Progressive-Block Growth
19. Rectangle blocking matrices based unitary multistage Wiener reduced-rank joint detection algorithm for multiple input multiple output systems
20. A dynamic spectrum access network based on cognitive radio
21. Intelligent Radio Frequency Identification for URLLC in Industrial IoT Networks.
22. Transmit antenna selection in V-BLAST system
23. Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC.
24. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective.
25. Advanced Technologies in Wireless Internet and Communications Networks (Editorial for WICON 2011 Special Issue)
26. Channel-Aware Key Generation Under Wireless Fading Environment.
27. Joint Network Coding and ARQ Design Toward Secure Wireless Communications.
28. Reliability and Accessibility of Low-Latency V2I Channel Training Protocol Using Cover-Free Coding: Win–Win or Tradeoff ?
29. Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective.
30. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis.
31. Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design.
32. Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks.
33. Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission.
34. Combat Hybrid Eavesdropping in Power-Domain NOMA: Joint Design of Timing Channel and Symbol Transformation.
35. Cooperative Secure Communication in Two-Hop Buffer-Aided Networks.
36. Achieving Full Secrecy Rate With Energy-Efficient Transmission Control.
37. Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks.
38. Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI.
39. Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.
40. Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework.
41. Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers
42. A hybrid channel estimation strategy against pilot spoofing attack in MISO system.
43. Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks.
44. Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy.
45. Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks.
46. Security protection over wireless fading channels by exploiting frequency selectivity.
47. Credit-aware power control for device-to-device underlaying cellular networks.
48. Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.
49. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective.
50. Active jamming for multi-user information security improvement with the access statuses of users.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.