Search Results - "Du, Qinghe"

Refine Results
  1. 1

    A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions by Sun, Li, Du, Qinghe

    Published in Entropy (Basel, Switzerland) (23-09-2018)
    “…With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of…”
    Get full text
    Journal Article
  2. 2

    Physical layer security with its applications in 5G networks: A review by Sun, Li, Du, Qinghe

    Published in China communications (01-12-2017)
    “…5G network is expected to support massive user connections and exponentially increasing wireless services, which makes network security unprecedentedly…”
    Get full text
    Journal Article
  3. 3

    Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations by Xu, Qian, Ren, Pinyi, Song, Houbing, Du, Qinghe

    Published in IEEE access (2016)
    “…The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and computing capabilities can interact with each other. Among all…”
    Get full text
    Journal Article
  4. 4

    Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation by Sun, Li, Du, Qinghe, Ren, Pinyi, Wang, Yichen

    Published in IEEE transactions on vehicular technology (01-10-2016)
    “…This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other…”
    Get full text
    Journal Article
  5. 5

    Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks by Sun, Li, Ren, Pinyi, Du, Qinghe, Wang, Yichen

    “…Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast…”
    Get full text
    Journal Article
  6. 6

    Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes by Sun, Li, Ren, Pinyi, Du, Qinghe, Wang, Yichen, Gao, Zhenzhen

    Published in IEEE communications letters (01-03-2015)
    “…This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper…”
    Get full text
    Journal Article
  7. 7

    Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams by Du, Qinghe, Zhang, Xi

    “…Due to the time-varying wireless channels, deterministic quality of service (QoS) is usually difficult to guarantee for real-time multi-layer video…”
    Get full text
    Journal Article
  8. 8

    Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition by Wang, Dawei, Ren, Pinyi, Du, Qinghe, Sun, Li, Wang, Yichen

    Published in IEEE transactions on vehicular technology (01-12-2017)
    “…We study the cooperative secure transmissions in (multiple-input signal-output) MISO vehicular relay networks where the infrastructure node with multiple…”
    Get full text
    Journal Article
  9. 9

    CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks by Ren, Pinyi, Wang, Yichen, Du, Qinghe

    “…In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well as secondary nodes usually…”
    Get full text
    Journal Article
  10. 10

    Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks by Tang, Xiao, Ren, Pinyi, Gao, Feifei, Du, Qinghe

    Published in IEEE transactions on communications (01-12-2017)
    “…Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the…”
    Get full text
    Journal Article
  11. 11

    Exploiting Fountain Codes for Secure Wireless Delivery by Hao Niu, Iwai, Masayuki, Sezaki, Kaoru, Li Sun, Qinghe Du

    Published in IEEE communications letters (01-05-2014)
    “…In this letter, a secure delivery scheme that exploits fountain codes is analyzed. For fountain-coded transmission, the receivers have to obtain a sufficient…”
    Get full text
    Journal Article
  12. 12

    Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions by Xu, Qian, Ren, Pinyi, Song, Houbing, Du, Qinghe

    Published in IEEE internet of things journal (01-12-2017)
    “…Cyber-physical system (CPS), regarded as the next generation of engineered system, has the capability to interact with the real physical world. Applications of…”
    Get full text
    Journal Article
  13. 13

    Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning by Wang, Yichen, Ren, Pinyi, Du, Qinghe, Sun, Li

    “…Due to the highly-stochastic nature of wireless channels, how to provide efficient delay quality-of-service (QoS) provisioning for primary users (PU) while…”
    Get full text
    Journal Article
  14. 14

    QoS-Aware Base-Station Selections for Distributed MIMO Links in Broadband Wireless Networks by Du, Qinghe, Zhang, Xi

    “…The distributed multiple-input-multiple-output (MIMO) techniques across multiple cooperative base stations (BS) can significantly enhance the capability of the…”
    Get full text
    Journal Article
  15. 15

    Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI by He, Hongliang, Ren, Pinyi, Du, Qinghe, Lin, Hai

    Published in IEEE transactions on vehicular technology (01-12-2017)
    “…Secure communication with noisy feedback is studied in this correspondence. Unlike the majority of previous research efforts where the eavesdropper's channel…”
    Get full text
    Journal Article
  16. 16

    Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks by Hussain, Bilal, Du, Qinghe, Ren, Pinyi

    Published in China communications (01-04-2018)
    “…With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger…”
    Get full text
    Journal Article
  17. 17

    Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach by Xu, Hongbin, Sun, Li, Ren, Pinyi, Du, Qinghe

    Published in IEEE communications letters (01-12-2015)
    “…This letter studies the secure transmission protocol design for two-way cooperative systems, where two terminal users communicate via an untrusted relay. The…”
    Get full text
    Journal Article
  18. 18

    Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks by Xu, Hongbin, Sun, Li, Ren, Pinyi, Du, Qinghe, Wang, Yichen

    “…This paper studies the privacy-preserving for downlink transmission in multiuser relay networks, where a source communicates with multiple users via a relay…”
    Get full text
    Journal Article
  19. 19

    Mobile Edge Computing-Based Data-Driven Deep Learning Framework for Anomaly Detection by Hussain, Bilal, Du, Qinghe, Zhang, Sihai, Imran, Ali, Imran, Muhammad Ali

    Published in IEEE access (2019)
    “…5G is anticipated to embed an artificial intelligence (AI)-empowerment to adroitly plan, optimize and manage the highly complex network by leveraging data…”
    Get full text
    Journal Article
  20. 20

    Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks by Wenshan Yin, Pinyi Ren, Qinghe Du, Yichen Wang

    “…Periodic spectrum sensing over the entire primary user (PU) band always interrupts the secondary user (SU) data transmission in the sensing interval, which may…”
    Get full text
    Journal Article