Search Results - "Lee, JeMin"
-
1
Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks
Published in IEEE transactions on wireless communications (01-12-2011)“…A new interference management strategy is proposed to enhance the overall capacity of cellular networks (CNs) and device-to-device (D2D) systems. We consider M…”
Get full text
Journal Article -
2
Hybrid Full-/Half-Duplex System Analysis in Heterogeneous Wireless Networks
Published in IEEE transactions on wireless communications (01-05-2015)“…Full-duplex (FD) radio has been introduced for bidirectional communications on the same temporal and spectral resources so as to maximize spectral efficiency…”
Get full text
Journal Article -
3
Outage Probability of Cognitive Relay Networks with Interference Constraints
Published in IEEE transactions on wireless communications (01-02-2011)“…This paper evaluates the outage probability of cognitive relay networks with cooperation between secondary users based on the underlay approach, while adhering…”
Get full text
Journal Article -
4
Base Station Coordination Scheme for Multi-Tier Ultra-Dense Networks
Published in IEEE transactions on wireless communications (01-11-2021)“…In this paper, we consider a relative received link power (RRLP)-based coordinated multi-point (CoMP) joint transmission (JT) in the multi-tier ultra-dense…”
Get full text
Journal Article -
5
Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks
Published in IEEE transactions on wireless communications (01-02-2011)“…A new interference management scheme is proposed to improve the reliability of a device-to-device (D2D) communication in the uplink (UL) period without…”
Get full text
Journal Article -
6
Sensing Performance of Energy Detector With Correlated Multiple Antennas
Published in IEEE signal processing letters (01-08-2009)“…This paper describes the derivation of detection and false-alarm probabilities for energy detectors in cognitive radio networks when a sensing node of the…”
Get full text
Journal Article -
7
Heterogeneous Cellular Network With Energy Harvesting-Based D2D Communication
Published in IEEE transactions on wireless communications (01-02-2016)“…The concept of mobile user equipment (UE) relay (UER) has been introduced to support device-to-device (D2D) communications for enhancing communication…”
Get full text
Journal Article -
8
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Published in IEEE sensors journal (15-01-2017)“…Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These…”
Get full text
Journal Article -
9
Heterogeneous Cellular Networks With LoS and NLoS Transmissions-The Role of Massive MIMO and Small Cells
Published in IEEE transactions on wireless communications (01-12-2017)“…We develop a framework for downlink heterogeneous cellular networks with line-of-sight (LoS) and non-LoS transmissions. Using stochastic geometry, we derive…”
Get full text
Journal Article -
10
Physical-Layer Secret Key Generation With Colluding Untrusted Relays
Published in IEEE transactions on wireless communications (01-02-2016)“…In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped…”
Get full text
Journal Article -
11
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
Published in IEEE transactions on information forensics and security (01-05-2016)“…Recently, based on the homomorphic signatures, the authentication schemes, such as homomorphic subspace signature (HSS) and key predistribution-based tag…”
Get full text
Journal Article -
12
Capacity of Reactive DF Scheme in Cognitive Relay Networks
Published in IEEE transactions on wireless communications (01-10-2011)“…This paper evaluates the capacity of the reactive decode-and-forward (R-DF) scheme, which considers the reduced relay candidates based on the signal-to-noise…”
Get full text
Journal Article -
13
Jamming-Aided Secure Communication in Massive MIMO Rician Channels
Published in IEEE transactions on wireless communications (01-12-2015)“…In this paper, we investigate the artificial noise-aided jamming design for a transmitter equipped with large antenna array in Rician fading channels. We…”
Get full text
Journal Article -
14
tomato (Solanum lycopersicum) APETALA2/ERF gene, SlAP2a, is a negative regulator of fruit ripening
Published in The Plant journal : for cell and molecular biology (01-12-2010)“…The transition of fleshy fruit maturation to ripening is regulated by exogenous and endogenous signals that coordinate the transition of the fruit to a final…”
Get full text
Journal Article -
15
Detecting Illegal Online Gambling (IOG) Services in the Mobile Environment
Published in Security and communication networks (23-02-2022)“…Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken by government authorities have had little effect in halting these…”
Get full text
Journal Article -
16
Secure and efficient communications with fine-grained access control in underwater wireless sensor networks
Published in ICT express (01-08-2024)“…As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and…”
Get full text
Journal Article -
17
Capacity enhancement of secondary links through spatial diversity in spectrum sharing
Published in IEEE transactions on wireless communications (01-02-2010)“…Previous investigations on capacity of secondary users in spectrum-sharing environments have determined the capacity of a secondary link based on the…”
Get full text
Journal Article -
18
Impact of Elevated Base Stations on the Ultra-Dense Networks
Published in IEEE communications letters (01-06-2018)“…In this letter, we examine the impact of the elevated base stations (BSs) on the performance of ultra-dense networks (UDNs). To this end, we first model the…”
Get full text
Journal Article -
19
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology
Published in IEEE transactions on information forensics and security (01-01-2019)“…In this paper, we propose a secret group-key generation scheme in physical layer, where an arbitrary number of multi-antenna LNs (LN) exist in mesh topology…”
Get full text
Journal Article -
20
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation
Published in IEEE transactions on information forensics and security (01-03-2017)“…In this paper, the role of unidirectional limited rate transmitter cooperation is studied for the two-user symmetric Z interference channel (Z-IC) with secrecy…”
Get full text
Journal Article