Search Results - "Feng, Zebing"

Refine Results
  1. 1

    A Survey of Security Issues in Cognitive Radio Networks by Li, Jianwu, Feng, Zebing, Feng, Zhiyong, Zhang, Ping

    Published in China communications (01-03-2015)
    “…In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to…”
    Get full text
    Journal Article
  2. 2

    Biologically Inspired Two-Stage Resource Management for Machine-Type Communications in Cellular Networks by Zebing Feng, Zhiyong Feng, Gulliver, T. Aaron

    “…Cellular technology has the potential to support large numbers of machine-type communications (MTC) devices for a variety of applications in fifth generation…”
    Get full text
    Journal Article
  3. 3

    An Optimal Service Strategy for Grouped Machine-Type Communications in Cellular Networks by Zebing Feng, Zhiyong Feng, Wei Li, Gulliver, T. Aaron

    Published in IEEE communications letters (01-01-2017)
    “…Machine-type communication devices (MTCDs) served as groups are an efficient way to solve device management and resource allocation problems in cellular…”
    Get full text
    Journal Article
  4. 4

    SINR-based scheduling in multi-path multi-hop multi-radio multi-channel mmWave WPANs by Liu, Yunfeng, Feng, Zhiyong, Wei, Zhiqing, Feng, Zebing

    “…Millimeter wave (mmWave) communications is a prospective candidate technology for multi-gigabit rates multimedia applications. To combat the severe propagation…”
    Get full text
    Journal Article
  5. 5

    Discrete location-aware power control for D2D underlaid cellular networks by Wenping Chen, Zebing Feng, Zhiyong Feng, Qixun Zhang, Baoling Liu

    “…Device-to-device (D2D) communication is a promising method to reduce power consumption and improve the throughput of cellular networks. However, densely…”
    Get full text
    Conference Proceeding
  6. 6

    Backoff based resource access for contend machine type communications in LTE networks by Zheng, Tingting, Zhang, Qixun, Feng, Zebing, Feng, Zhiyong

    “…Considering the delay sensitive services in machine type communications (MTC), how to minimize the end-to-end delay is a great challenge to achieve the…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    Identifying the Guard Region for Cognitive Networks under Mutual Interference Constraints by Zebing Feng, Lingwu Yuan, Zhiyong Feng, Qixun Zhang

    “…Spectrum access opportunity is an important research topic in cognitive radio networks, which is both related to the transmission constraints from primary…”
    Get full text
    Conference Proceeding
  8. 8

    A Guard-Band-Aware Channel Allocation Algorithm for Multi-Channel Cognitive Radio Networks by Lingwu Yuan, Zebing Feng, Zhiyong Feng, Qixun Zhang, Baoling Liu

    “…We consider the problem of channel allocation in cognitive radio network (CRN) with the restraints for adjacent-channel interference (ACI) caused by CRN, which…”
    Get full text
    Conference Proceeding
  9. 9

    Security management based on trust determination in cognitive radio networks by Li, Jianwu, Feng, Zebing, Wei, Zhiqing, Feng, Zhiyong, Zhang, Ping

    “…Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and…”
    Get full text
    Journal Article
  10. 10

    Downlink and uplink splitting user association in two-tier heterogeneous cellular networks by Zebing Feng, Zhiyong Feng, Wei Li, Wenping Chen

    Published in 2014 IEEE Global Communications Conference (01-12-2014)
    “…Traditional cellular network standards require users downlink(DL) and uplink(UL) associated to the same BS. However, due to the power gap between BSs and users…”
    Get full text
    Conference Proceeding
  11. 11

    Effective Small Social Community Aware D2D Resource Allocation Underlaying Cellular Networks by Feng, Zebing, Feng, Zhiyong, Gulliver, T. Aaron

    Published in IEEE wireless communications letters (01-12-2017)
    “…Social-aware device-to-device (D2D) resource allocation utilizes social ties in human-formed social networks to allocate spectrum resources between D2D users…”
    Get full text
    Journal Article
  12. 12

    Mutual-interference-aware available spectrum resource distribution in TV white space by Long Zhang, Lingwu Yuan, Zebing Feng, Zhiyong Feng

    “…To utilize TV white space (TVWS), mutual interference should be restrained to guarantee both TV and secondary systems normal operation. Introducing guard bands…”
    Get full text
    Conference Proceeding
  13. 13

    A location-aware discrete region approach for spatial access opportunity analysis in cognitive radio networks by Zebing Feng, Zhiyong Feng, Qixun Zhang

    Published in ICT 2013 (01-05-2013)
    “…Spectrum access is an important research topic in cognitive radio networks, in which secondary users (SUs) manage to utilize the licensed spectrum bands of…”
    Get full text
    Conference Proceeding
  14. 14

    Improved PID algorithms with application to excimer laser temperature control by Mingqing Hu, Xiaoquan Han, Zebing Feng, Yi Zhou, Weihu Zhou, Lujun Bai, Bing Li

    “…The stability of temperature in the chamber of excimer laser has a great effect on working performance of the excimer especially for the energy stability and…”
    Get full text
    Conference Proceeding
  15. 15

    Interference aggregation of cellular mobile communication network in TV white spaces by Lingwu Yuan, Long Zhang, Zebing Feng, Zhiyong Feng, Ping Zhang

    “…White space and spectrum holes in the TV bands bring potential opportunities to relieve the apparent spectrum scarcity. Because cellular networks are now…”
    Get full text
    Conference Proceeding
  16. 16

    Security management based on trust determination in cognitive radio networks: Doc 611 by Li, Jianwu, Feng, Zebing, Wei, Zhiqing, Feng, Zhiyong, Zhang, Ping

    “…Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and…”
    Get full text
    Journal Article
  17. 17

    Performance and Capacity Consistency Analysis of A Wireless UAV-Blockchain System by Feng, Zebing, Jiao, Yang

    “…Blockchain is widely applied in the field of Unmanned Aerial Vehicles (UAVs) for its characteristics of high distribution, secure data exchange and storage…”
    Get full text
    Conference Proceeding
  18. 18

    A Dual-layer Zero Trust Architecture for 5G Industry MEC Applications Access Control by Feng, Zebing, Zhou, Peng, Wang, Qi, Qi, Weiqiang

    “…This paper introduces a dual-layer zero trust architecture (ZTA) to enhance 5G vertical industry multi-access edge computing (MEC) application (APP) access…”
    Get full text
    Conference Proceeding
  19. 19

    Practical Neighbor Discovery in Multi-carrier Ad Hoc Networks with Directional Antennas by Liu, Yunfeng, Feng, Zebing, Feng, Zhiyong

    “…Neighbor discovery is a crucial step to establish links among the nodes in ad hoc network. Most existing researches on neighbor discovery are based on 1-way or…”
    Get full text
    Conference Proceeding
  20. 20

    Research on the Trusted Access Control Technology in 5G Power User Behavior Perception Scenarios by Qi, Wang, Shiyu, Du, Zebing, Feng, Hongmei, Yang, Wei, Huang, Chao, Zhou

    “…In recent years, the demand for smart power grids has increased, and large numbers of smart terminals have been deployed in various production and operation…”
    Get full text
    Conference Proceeding