Search Results - "Pinyi Ren"
-
1
Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective
Published in IEEE transactions on communications (01-03-2017)“…Security is an issue of paramount importance, yet is it a significant challenge for wireless communications, which becomes more intricate when facing a full…”
Get full text
Journal Article -
2
Cooperative Secure Communication in Two-Hop Buffer-Aided Networks
Published in IEEE transactions on communications (01-03-2018)“…We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided network assisted by an energy harvesting relay. In the first scheme,…”
Get full text
Journal Article -
3
Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations
Published in IEEE access (2016)“…The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and computing capabilities can interact with each other. Among all…”
Get full text
Journal Article -
4
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation
Published in IEEE transactions on vehicular technology (01-10-2016)“…This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other…”
Get full text
Journal Article -
5
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks
Published in IEEE transactions on industrial informatics (01-02-2016)“…Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast…”
Get full text
Journal Article -
6
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
Published in IEEE communications letters (01-03-2015)“…This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper…”
Get full text
Journal Article -
7
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition
Published in IEEE transactions on vehicular technology (01-12-2017)“…We study the cooperative secure transmissions in (multiple-input signal-output) MISO vehicular relay networks where the infrastructure node with multiple…”
Get full text
Journal Article -
8
CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks
Published in IEEE journal on selected areas in communications (01-02-2014)“…In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well as secondary nodes usually…”
Get full text
Journal Article -
9
A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning
Published in IEEE transactions on wireless communications (01-03-2014)“…In order to achieve better statistical Quality-of-Service (QoS) provisioning for cognitive radio networks (CRN), in this paper, we develop a hybrid…”
Get full text
Journal Article -
10
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems
Published in IEEE transactions on information forensics and security (01-07-2018)“…A pilot spoofer can paralyze the channel estimation in multi-user orthogonal frequency-division multiplexing (OFDM) systems by using the same publicly known…”
Get full text
Journal Article -
11
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
Published in IEEE transactions on information forensics and security (01-02-2019)“…In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic,…”
Get full text
Journal Article -
12
Achieving Full Secrecy Rate With Energy-Efficient Transmission Control
Published in IEEE transactions on communications (01-12-2017)“…Due to the dynamic arrival of data packets and time-varying channel states, secure transmission opportunities will be wasted when there is no confidential…”
Get full text
Journal Article -
13
Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks
Published in IEEE transactions on communications (01-12-2017)“…Ultra-dense networks are envisioned as essential to embrace the skyrocketed traffic for the next-generation wireless networks. In this paper, we consider the…”
Get full text
Journal Article -
14
Collaborative D2D communication in relay networks with energy harvesting
Published in China communications (01-09-2022)“…Although the collaborative transmission of cellular network and device-to-device (D2D) pairs can improve spectrum utilization, it also results in the matual…”
Get full text
Journal Article -
15
Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework
Published in IEEE transactions on communications (01-09-2017)“…In this paper, we consider the physical layer security issue for the multi-channel full-duplex (FD) communications in the presence of eavesdroppers. There…”
Get full text
Journal Article -
16
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions
Published in IEEE internet of things journal (01-12-2017)“…Cyber-physical system (CPS), regarded as the next generation of engineered system, has the capability to interact with the real physical world. Applications of…”
Get full text
Journal Article -
17
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning
Published in IEEE transactions on wireless communications (01-12-2015)“…Due to the highly-stochastic nature of wireless channels, how to provide efficient delay quality-of-service (QoS) provisioning for primary users (PU) while…”
Get full text
Journal Article -
18
Jamming Mitigation via Hierarchical Security Game for IoT Communications
Published in IEEE access (01-01-2018)“…In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate…”
Get full text
Journal Article -
19
Joint Network Coding and ARQ Design Toward Secure Wireless Communications
Published in IEEE transactions on communications (01-05-2019)“…The broadcast nature of wireless communications makes transmission susceptible to eavesdropping. Recently, physical-layer security has been extensively studied…”
Get full text
Journal Article -
20
Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI
Published in IEEE transactions on vehicular technology (01-12-2017)“…Secure communication with noisy feedback is studied in this correspondence. Unlike the majority of previous research efforts where the eavesdropper's channel…”
Get full text
Journal Article