Search

Your search keyword '"Ren, Pinyi"' showing total 350 results

Search Constraints

Start Over You searched for: Author "Ren, Pinyi" Remove constraint Author: "Ren, Pinyi" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
Sorry, I don't understand your search. ×
350 results on '"Ren, Pinyi"'

Search Results

1. Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC

2. Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI

3. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective

4. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective

5. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis

6. Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective

7. Optimal Independence-Checking Coding For Secure Uplink Training in Large-Scale MISO-OFDM Systems

8. Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels

9. Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems

10. Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

11. Double-Threshold-Based Massive Random Access Protocol for Heterogeneous MTC Networks

12. Optimal Thresholds for Differential Energy Detection of Ambient Backscatter Communication

15. A Flexible Iterative Log-MPA Detector for Uplink SCMA Systems

16. Ant Colony Optimization Based Delay-Sensitive Routing Protocol in Vehicular Ad Hoc Networks

17. Learning-to-Rank Based Strategy for Caching in Wireless Small Cell Networks

18. Development of 3D Exhibition System for IoT-Oriented Simulation Platform

19. Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design

21. Secure Algorithm via Hybrid Relaying Scheme and Resource Allocation for OFDM Networks

22. Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission

23. System-Level Simulation Platform for Device-to-Device Communications in 5G Networks

24. DFLNet: Deep Federated Learning Network With Privacy Preserving for Vehicular LoRa Nodes Fingerprinting

33. Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages

34. Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System

35. Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework

36. Estimation Based Adaptive ACB Scheme for M2M Communications

Catalog

Books, media, physical & digital resources