Search Results - "Du, Qinghe"
-
1
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
Published in Entropy (Basel, Switzerland) (23-09-2018)“…With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of…”
Get full text
Journal Article -
2
Physical layer security with its applications in 5G networks: A review
Published in China communications (01-12-2017)“…5G network is expected to support massive user connections and exponentially increasing wireless services, which makes network security unprecedentedly…”
Get full text
Journal Article -
3
Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations
Published in IEEE access (2016)“…The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and computing capabilities can interact with each other. Among all…”
Get full text
Journal Article -
4
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation
Published in IEEE transactions on vehicular technology (01-10-2016)“…This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other…”
Get full text
Journal Article -
5
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks
Published in IEEE transactions on industrial informatics (01-02-2016)“…Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast…”
Get full text
Journal Article -
6
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
Published in IEEE communications letters (01-03-2015)“…This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper…”
Get full text
Journal Article -
7
Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams
Published in IEEE journal on selected areas in communications (01-04-2010)“…Due to the time-varying wireless channels, deterministic quality of service (QoS) is usually difficult to guarantee for real-time multi-layer video…”
Get full text
Journal Article -
8
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition
Published in IEEE transactions on vehicular technology (01-12-2017)“…We study the cooperative secure transmissions in (multiple-input signal-output) MISO vehicular relay networks where the infrastructure node with multiple…”
Get full text
Journal Article -
9
CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks
Published in IEEE journal on selected areas in communications (01-02-2014)“…In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well as secondary nodes usually…”
Get full text
Journal Article -
10
Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks
Published in IEEE transactions on communications (01-12-2017)“…Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the…”
Get full text
Journal Article -
11
Exploiting Fountain Codes for Secure Wireless Delivery
Published in IEEE communications letters (01-05-2014)“…In this letter, a secure delivery scheme that exploits fountain codes is analyzed. For fountain-coded transmission, the receivers have to obtain a sufficient…”
Get full text
Journal Article -
12
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions
Published in IEEE internet of things journal (01-12-2017)“…Cyber-physical system (CPS), regarded as the next generation of engineered system, has the capability to interact with the real physical world. Applications of…”
Get full text
Journal Article -
13
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning
Published in IEEE transactions on wireless communications (01-12-2015)“…Due to the highly-stochastic nature of wireless channels, how to provide efficient delay quality-of-service (QoS) provisioning for primary users (PU) while…”
Get full text
Journal Article -
14
QoS-Aware Base-Station Selections for Distributed MIMO Links in Broadband Wireless Networks
Published in IEEE journal on selected areas in communications (01-06-2011)“…The distributed multiple-input-multiple-output (MIMO) techniques across multiple cooperative base stations (BS) can significantly enhance the capability of the…”
Get full text
Journal Article -
15
Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI
Published in IEEE transactions on vehicular technology (01-12-2017)“…Secure communication with noisy feedback is studied in this correspondence. Unlike the majority of previous research efforts where the eavesdropper's channel…”
Get full text
Journal Article -
16
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks
Published in China communications (01-04-2018)“…With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger…”
Get full text
Journal Article -
17
Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach
Published in IEEE communications letters (01-12-2015)“…This letter studies the secure transmission protocol design for two-way cooperative systems, where two terminal users communicate via an untrusted relay. The…”
Get full text
Journal Article -
18
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks
Published in IEEE transactions on information forensics and security (01-04-2017)“…This paper studies the privacy-preserving for downlink transmission in multiuser relay networks, where a source communicates with multiple users via a relay…”
Get full text
Journal Article -
19
Mobile Edge Computing-Based Data-Driven Deep Learning Framework for Anomaly Detection
Published in IEEE access (2019)“…5G is anticipated to embed an artificial intelligence (AI)-empowerment to adroitly plan, optimize and manage the highly complex network by leveraging data…”
Get full text
Journal Article -
20
Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks
Published in IEEE transactions on wireless communications (01-06-2012)“…Periodic spectrum sensing over the entire primary user (PU) band always interrupts the secondary user (SU) data transmission in the sensing interval, which may…”
Get full text
Journal Article