Search

Your search keyword '"Ren, Pinyi"' showing total 179 results

Search Constraints

Start Over You searched for: Author "Ren, Pinyi" Remove constraint Author: "Ren, Pinyi" Language english Remove constraint Language: english
179 results on '"Ren, Pinyi"'

Search Results

10. Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers.

21. Intelligent Radio Frequency Identification for URLLC in Industrial IoT Networks.

23. Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC.

24. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective.

26. Channel-Aware Key Generation Under Wireless Fading Environment.

27. Joint Network Coding and ARQ Design Toward Secure Wireless Communications.

28. Reliability and Accessibility of Low-Latency V2I Channel Training Protocol Using Cover-Free Coding: Win–Win or Tradeoff ?

29. Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective.

30. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis.

31. Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design.

32. Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks.

33. Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission.

34. Combat Hybrid Eavesdropping in Power-Domain NOMA: Joint Design of Timing Channel and Symbol Transformation.

35. Cooperative Secure Communication in Two-Hop Buffer-Aided Networks.

36. Achieving Full Secrecy Rate With Energy-Efficient Transmission Control.

37. Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks.

38. Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI.

39. Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.

40. Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework.

41. Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers

48. Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.

49. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective.

50. Active jamming for multi-user information security improvement with the access statuses of users.

Catalog

Books, media, physical & digital resources