Search Results - "Pinyi Ren"

Refine Results
  1. 1

    Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective by Tang, Xiao, Ren, Pinyi, Wang, Yichen, Han, Zhu

    Published in IEEE transactions on communications (01-03-2017)
    “…Security is an issue of paramount importance, yet is it a significant challenge for wireless communications, which becomes more intricate when facing a full…”
    Get full text
    Journal Article
  2. 2

    Cooperative Secure Communication in Two-Hop Buffer-Aided Networks by Wang, Dawei, Ren, Pinyi, Cheng, Julian

    Published in IEEE transactions on communications (01-03-2018)
    “…We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided network assisted by an energy harvesting relay. In the first scheme,…”
    Get full text
    Journal Article
  3. 3

    Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations by Xu, Qian, Ren, Pinyi, Song, Houbing, Du, Qinghe

    Published in IEEE access (2016)
    “…The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and computing capabilities can interact with each other. Among all…”
    Get full text
    Journal Article
  4. 4

    Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation by Sun, Li, Du, Qinghe, Ren, Pinyi, Wang, Yichen

    Published in IEEE transactions on vehicular technology (01-10-2016)
    “…This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other…”
    Get full text
    Journal Article
  5. 5

    Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks by Sun, Li, Ren, Pinyi, Du, Qinghe, Wang, Yichen

    “…Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast…”
    Get full text
    Journal Article
  6. 6

    Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes by Sun, Li, Ren, Pinyi, Du, Qinghe, Wang, Yichen, Gao, Zhenzhen

    Published in IEEE communications letters (01-03-2015)
    “…This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper…”
    Get full text
    Journal Article
  7. 7

    Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition by Wang, Dawei, Ren, Pinyi, Du, Qinghe, Sun, Li, Wang, Yichen

    Published in IEEE transactions on vehicular technology (01-12-2017)
    “…We study the cooperative secure transmissions in (multiple-input signal-output) MISO vehicular relay networks where the infrastructure node with multiple…”
    Get full text
    Journal Article
  8. 8

    CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks by Ren, Pinyi, Wang, Yichen, Du, Qinghe

    “…In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well as secondary nodes usually…”
    Get full text
    Journal Article
  9. 9

    A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning by Wang, Yichen, Ren, Pinyi, Gao, Feifei, Su, Zhou

    “…In order to achieve better statistical Quality-of-Service (QoS) provisioning for cognitive radio networks (CRN), in this paper, we develop a hybrid…”
    Get full text
    Journal Article
  10. 10

    Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems by Dongyang Xu, Pinyi Ren, Ritcey, James A., Yichen Wang

    “…A pilot spoofer can paralyze the channel estimation in multi-user orthogonal frequency-division multiplexing (OFDM) systems by using the same publicly known…”
    Get full text
    Journal Article
  11. 11

    Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis by Dongyang Xu, Pinyi Ren, Ritcey, James A.

    “…In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic,…”
    Get full text
    Journal Article
  12. 12

    Achieving Full Secrecy Rate With Energy-Efficient Transmission Control by Wang, Dawei, Ren, Pinyi, Cheng, Julian, Wang, Yichen

    Published in IEEE transactions on communications (01-12-2017)
    “…Due to the dynamic arrival of data packets and time-varying channel states, secure transmission opportunities will be wasted when there is no confidential…”
    Get full text
    Journal Article
  13. 13

    Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks by Tang, Xiao, Ren, Pinyi, Gao, Feifei, Du, Qinghe

    Published in IEEE transactions on communications (01-12-2017)
    “…Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the…”
    Get full text
    Journal Article
  14. 14

    Collaborative D2D communication in relay networks with energy harvesting by Li, Qiang, Ren, Pinyi

    Published in China communications (01-09-2022)
    “…Although the collaborative transmission of cellular network and device-to-device (D2D) pairs can improve spectrum utilization, it also results in the matual…”
    Get full text
    Journal Article
  15. 15

    Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework by Tang, Xiao, Ren, Pinyi, Han, Zhu

    Published in IEEE transactions on communications (01-09-2017)
    “…In this paper, we consider the physical layer security issue for the multi-channel full-duplex (FD) communications in the presence of eavesdroppers. There…”
    Get full text
    Journal Article
  16. 16

    Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions by Xu, Qian, Ren, Pinyi, Song, Houbing, Du, Qinghe

    Published in IEEE internet of things journal (01-12-2017)
    “…Cyber-physical system (CPS), regarded as the next generation of engineered system, has the capability to interact with the real physical world. Applications of…”
    Get full text
    Journal Article
  17. 17

    Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning by Wang, Yichen, Ren, Pinyi, Du, Qinghe, Sun, Li

    “…Due to the highly-stochastic nature of wireless channels, how to provide efficient delay quality-of-service (QoS) provisioning for primary users (PU) while…”
    Get full text
    Journal Article
  18. 18

    Jamming Mitigation via Hierarchical Security Game for IoT Communications by Tang, Xiao, Ren, Pinyi, Han, Zhu

    Published in IEEE access (01-01-2018)
    “…In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate…”
    Get full text
    Journal Article
  19. 19

    Joint Network Coding and ARQ Design Toward Secure Wireless Communications by He, Hongliang, Ren, Pinyi, Tang, Xiao

    Published in IEEE transactions on communications (01-05-2019)
    “…The broadcast nature of wireless communications makes transmission susceptible to eavesdropping. Recently, physical-layer security has been extensively studied…”
    Get full text
    Journal Article
  20. 20

    Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI by He, Hongliang, Ren, Pinyi, Du, Qinghe, Lin, Hai

    Published in IEEE transactions on vehicular technology (01-12-2017)
    “…Secure communication with noisy feedback is studied in this correspondence. Unlike the majority of previous research efforts where the eavesdropper's channel…”
    Get full text
    Journal Article