Search Results - "Feng, Zebing"
-
1
A Survey of Security Issues in Cognitive Radio Networks
Published in China communications (01-03-2015)“…In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to…”
Get full text
Journal Article -
2
Biologically Inspired Two-Stage Resource Management for Machine-Type Communications in Cellular Networks
Published in IEEE transactions on wireless communications (01-09-2017)“…Cellular technology has the potential to support large numbers of machine-type communications (MTC) devices for a variety of applications in fifth generation…”
Get full text
Journal Article -
3
An Optimal Service Strategy for Grouped Machine-Type Communications in Cellular Networks
Published in IEEE communications letters (01-01-2017)“…Machine-type communication devices (MTCDs) served as groups are an efficient way to solve device management and resource allocation problems in cellular…”
Get full text
Journal Article -
4
SINR-based scheduling in multi-path multi-hop multi-radio multi-channel mmWave WPANs
Published in EURASIP journal on wireless communications and networking (20-03-2018)“…Millimeter wave (mmWave) communications is a prospective candidate technology for multi-gigabit rates multimedia applications. To combat the severe propagation…”
Get full text
Journal Article -
5
Discrete location-aware power control for D2D underlaid cellular networks
Published in 2016 IEEE Wireless Communications and Networking Conference (01-04-2016)“…Device-to-device (D2D) communication is a promising method to reduce power consumption and improve the throughput of cellular networks. However, densely…”
Get full text
Conference Proceeding -
6
Backoff based resource access for contend machine type communications in LTE networks
Published in 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2015)“…Considering the delay sensitive services in machine type communications (MTC), how to minimize the end-to-end delay is a great challenge to achieve the…”
Get full text
Conference Proceeding Journal Article -
7
Identifying the Guard Region for Cognitive Networks under Mutual Interference Constraints
Published in 2013 IEEE 78th Vehicular Technology Conference (VTC Fall) (01-09-2013)“…Spectrum access opportunity is an important research topic in cognitive radio networks, which is both related to the transmission constraints from primary…”
Get full text
Conference Proceeding -
8
A Guard-Band-Aware Channel Allocation Algorithm for Multi-Channel Cognitive Radio Networks
Published in 2013 IEEE 78th Vehicular Technology Conference (VTC Fall) (01-09-2013)“…We consider the problem of channel allocation in cognitive radio network (CRN) with the restraints for adjacent-channel interference (ACI) caused by CRN, which…”
Get full text
Conference Proceeding -
9
Security management based on trust determination in cognitive radio networks
Published in EURASIP journal on advances in signal processing (07-04-2014)“…Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and…”
Get full text
Journal Article -
10
Downlink and uplink splitting user association in two-tier heterogeneous cellular networks
Published in 2014 IEEE Global Communications Conference (01-12-2014)“…Traditional cellular network standards require users downlink(DL) and uplink(UL) associated to the same BS. However, due to the power gap between BSs and users…”
Get full text
Conference Proceeding -
11
Effective Small Social Community Aware D2D Resource Allocation Underlaying Cellular Networks
Published in IEEE wireless communications letters (01-12-2017)“…Social-aware device-to-device (D2D) resource allocation utilizes social ties in human-formed social networks to allocate spectrum resources between D2D users…”
Get full text
Journal Article -
12
Mutual-interference-aware available spectrum resource distribution in TV white space
Published in 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (01-09-2013)“…To utilize TV white space (TVWS), mutual interference should be restrained to guarantee both TV and secondary systems normal operation. Introducing guard bands…”
Get full text
Conference Proceeding -
13
A location-aware discrete region approach for spatial access opportunity analysis in cognitive radio networks
Published in ICT 2013 (01-05-2013)“…Spectrum access is an important research topic in cognitive radio networks, in which secondary users (SUs) manage to utilize the licensed spectrum bands of…”
Get full text
Conference Proceeding -
14
Improved PID algorithms with application to excimer laser temperature control
Published in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014) (01-11-2014)“…The stability of temperature in the chamber of excimer laser has a great effect on working performance of the excimer especially for the energy stability and…”
Get full text
Conference Proceeding -
15
Interference aggregation of cellular mobile communication network in TV white spaces
Published in 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (01-09-2013)“…White space and spectrum holes in the TV bands bring potential opportunities to relieve the apparent spectrum scarcity. Because cellular networks are now…”
Get full text
Conference Proceeding -
16
Security management based on trust determination in cognitive radio networks: Doc 611
Published in EURASIP journal on advances in signal processing (01-04-2014)“…Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and…”
Get full text
Journal Article -
17
Performance and Capacity Consistency Analysis of A Wireless UAV-Blockchain System
Published in 2020 IEEE 3rd International Conference on Electronic Information and Communication Technology (ICEICT) (13-11-2020)“…Blockchain is widely applied in the field of Unmanned Aerial Vehicles (UAVs) for its characteristics of high distribution, secure data exchange and storage…”
Get full text
Conference Proceeding -
18
A Dual-layer Zero Trust Architecture for 5G Industry MEC Applications Access Control
Published in 2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT) (21-08-2022)“…This paper introduces a dual-layer zero trust architecture (ZTA) to enhance 5G vertical industry multi-access edge computing (MEC) application (APP) access…”
Get full text
Conference Proceeding -
19
Practical Neighbor Discovery in Multi-carrier Ad Hoc Networks with Directional Antennas
Published in 2018 IEEE/CIC International Conference on Communications in China (ICCC Workshops) (01-08-2018)“…Neighbor discovery is a crucial step to establish links among the nodes in ad hoc network. Most existing researches on neighbor discovery are based on 1-way or…”
Get full text
Conference Proceeding -
20
Research on the Trusted Access Control Technology in 5G Power User Behavior Perception Scenarios
Published in 2021 6th International Conference on Power and Renewable Energy (ICPRE) (17-09-2021)“…In recent years, the demand for smart power grids has increased, and large numbers of smart terminals have been deployed in various production and operation…”
Get full text
Conference Proceeding