Search

Your search keyword '"Ding, Xu"' showing total 115 results

Search Constraints

Start Over You searched for: Author "Ding, Xu" Remove constraint Author: "Ding, Xu" Topic computer science Remove constraint Topic: computer science
115 results on '"Ding, Xu"'

Search Results

1. Wireless Information Surveillance Over Multiple Time Slots

2. Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks

3. Sum-Rate Maximization of Wireless Powered Primary Users for Cooperative CRNs: NOMA or TDMA at Cognitive Users?

4. Secrecy Outage Performance Analysis of Cooperative NOMA Networks With SWIPT

5. Proactive Eavesdropping Over OFDM-Based Bidirectional Suspicious Communication Channels

6. Spectrum Sharing Incentive for Legitimate Wireless Information Surveillance

7. Legitimate Surveillance of Suspicious Multichannel DF Relay Networks With Monitor Mode Selection

8. On the Outage Performance of JT-CoMP-CNOMA Networks With SWIPT

9. Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor

10. Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks

11. Auction-Based Resource Allocation for Mobile Edge Computing Networks

12. Jamming-Assisted Legitimate Surveillance of Suspicious Interference Networks With Successive Interference Cancellation

13. Optimizing Wireless Sensor Networks Based on Collaborative Beamforming

14. Secure Transmission for SWIPT IoT Systems With Full-Duplex IoT Devices

15. Prefrontal fNIRS-based clinical data analysis of brain functions in individuals abusing different types of drugs

17. Application of bi-modal signal in the classification and recognition of drug addiction degree based on machine learning

19. A Prediction Method for Animal-Derived Drug Resistance Trend Using a Grey-BP Neural Network Combination Model

22. Energy-Saving Computation Offloading by Joint Data Compression and Resource Allocation for Mobile-Edge Computing

23. Resource allocation in OFDM-based wireless powered communication networks with SWIPT

24. Outage Minimized Resource Allocation for Multiuser OFDM Systems With SWIPT

25. Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks

26. Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers

27. Deep-learning-based anomaly detection for lace defect inspection employing videos in production line

28. Secure Communication with a Proactive Eavesdropper Under Perfect CSI and CDI

29. Dynamic Modeling of Quayside Container Crane and Its Vibration Characteristic Analysis under Hoisting Condition

30. Health Monitoring and Dynamic Analysis of Quayside Container Crane

31. Application of 'Artificial Intelligence and Big Data' in Sports Rehabilitation for Chinese Judicial Administrative Drug Addicts

32. Secure Transmission in Multicarrier Power-Splitting Wireless Powered Communication Networks with Full-duplex Receivers

33. A Three-Stage Stackelberg Game for Secure Communication with a Wireless Powered Jammer

34. Secure Communication with a Wireless Powered Full-Duplex Eavesdropper

35. A Stackelberg Game for Cooperative Cognitive Wireless Powered Communication Networks with Multiple Primary Users

36. Resource Allocation for Outage Probability Minimization in Cognitive Wireless Powered Communication Networks

37. Optimization of wireless information and power transfer in multiuser OFDM systems

38. Proactive Eavesdropping through a Third-Party Jammer

39. Resource Allocation for Cognitive Radio With Primary User Secrecy Outage Constraint

40. Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels

41. Joint computation offloading and resource allocation for NOMA-based multi-access mobile edge computing systems

42. Improving physical‐layer security for primary users in cognitive radio networks

43. Cooperative Resource Allocation in Cognitive Radio Networks With Wireless Powered Primary Users

44. Joint Power Control and Time Allocation for Wireless Powered Underlay Cognitive Radio Networks

45. An Efficient Resource Allocation Algorithm for Underlay Cognitive Radio Multichannel Multicast Networks

46. Joint User and Power Allocation in Underlay Cognitive Radio Networks with Multiple Primary Users' Security Constraints

47. Optimal Power Allocation for CC-HARQ-based Cognitive Radio with Statistical CSI in Nakagami Slow Fading Channels

48. Secure Communication with a SWIPT-based Energy Harvesting Eavesdropper

49. Price-Based Resource Allocation in Cooperative Cognitive Wireless Powered Communication Networks

50. Secure Transmission in Multicarrier Time-Switching Wireless Powered Communication Networks with Full-duplex Receivers

Catalog

Books, media, physical & digital resources