default search action
Pinyi Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j97]Tiantian Zhang, Dongyang Xu, Pinyi Ren, Keping Yu, Mohsen Guizani:
DFLNet: Deep Federated Learning Network With Privacy Preserving for Vehicular LoRa Nodes Fingerprinting. IEEE Trans. Veh. Technol. 73(2): 2901-2905 (2024) - 2023
- [j96]Yuncong Xie, Tiantian Zhang, Pinyi Ren:
Secrecy Outage Analysis of Pilot-Assisted URLLC Systems With Randomly Distributed Eavesdroppers. IEEE Commun. Lett. 27(4): 1095-1099 (2023) - [j95]Yuncong Xie, Pinyi Ren, Dongyang Xu:
Security-Oriented Pilot and Data Transmission for URLLC in Mission-Critical IoT Scenarios. IEEE Internet Things J. 10(15): 13697-13715 (2023) - [j94]Tiantian Zhang, Pinyi Ren, Dongyang Xu, Zhanyi Ren:
RIS Subarray Optimization With Reinforcement Learning for Green Symbiotic Communications in Internet of Things. IEEE Internet Things J. 10(22): 19454-19465 (2023) - [c179]Tiantian Zhang, Dongyang Xu, Pinyi Ren:
DFFNet: Deep Federated Radio Fingerprinting Based on Fractional Wavelet Scattering Network. IWCMC 2023: 1346-1351 - [c178]Sihui Shang, Dongyang Xu, Pinyi Ren, Keping Yu, Mohsen Guizani:
Energy-Efficient Beam Training For RIS Assisted UAV Communications in Emergency Rescue Scenarios. VTC2023-Spring 2023: 1-5 - [c177]Yuan Zhang, Dongyang Xu, Pinyi Ren, James A. Ritcey, Keping Yu, Joel J. P. C. Rodrigues:
Covariation and Constant Modulus Decomposition Based Interference Resistant Access System in Smart Grid. VTC2023-Spring 2023: 1-5 - [c176]Yuan Zhang, Dongyang Xu, Pinyi Ren, James A. Ritcey, Keping Yu, Joel J. P. C. Rodrigues:
Estimation of PN Sequence for Spread Spectrum Pilot Signals in Grant-Free Access System. VTC2023-Spring 2023: 1-5 - [c175]Jing Ma, Pinyi Ren, Tiantian Zhang, Zhanyi Ren, Dongyang Xu:
Deep Radio Frequency Fingerprinting Based on Wavelet Scattering Network. WCNC 2023: 1-6 - [c174]Zhanyi Ren, Pinyi Ren, Dongyang Xu, Tiantian Zhang:
Noise-Tolerant Radio Frequency Fingerprinting With Data Augmentation and Contrastive Learning. WCNC 2023: 1-6 - 2022
- [j93]Yuan Liu, Pinyi Ren, Qinghe Du, Dongyang Xu:
Performance enhancement for differential energy signal detection of ambient backscatter communications. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j92]Tiantian Zhang, Pinyi Ren, Dongyang Xu, Zhanyi Ren:
Intelligent Radio Frequency Identification for URLLC in Industrial IoT Networks. Symmetry 14(4): 801 (2022) - [j91]Yuncong Xie, Pinyi Ren:
Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers. IEEE Trans. Veh. Technol. 71(11): 11921-11935 (2022) - [c173]Dongyang Xu, Pinyi Ren, Lei Lu:
Semi-Random Coding With Quantum Amplitude Amplification for Secure Access Authentication in Future 5G Communications. BigCom 2022: 120-127 - [c172]Sihui Shang, Pinyi Ren, Dongyang Xu:
Secrecy Throughput Analysis for Passive Reconfigurable Intelligent Surface Aided Communication System. BigCom 2022: 144-149 - [c171]Yuanyuan Tan, Pinyi Ren, Dongyang Xu:
Doppler Zero-Insert Extension for OTFS Modulation with Fractional Doppler. BigCom 2022: 422-427 - [c170]Tiantian Zhang, Pinyi Ren, Dongyang Xu, Zhanyi Ren:
DFSNet: Deep Fractional Scattering Network for LoRa Fingerprinting. GLOBECOM 2022: 4897-4902 - [c169]Jing Wang, Pinyi Ren, Dongyang Xu, Lei Lu:
A Novel Signal Detection Method Based on Multivariate Test Statistics for Ambient Backscatter Communications. ICCC 2022: 713-718 - [c168]Liwei Huang, Pinyi Ren, Dongyang Xu:
Cross-locking Enabled Multi-route Fountain Coding for Secure Transmission. VTC Spring 2022: 1-5 - [c167]Yuan Liu, Pinyi Ren, Dongyang Xu:
Blind Signal Detection for Asynchronous Multi-Tag Transmission in Ambient Backscatter Communications. VTC Spring 2022: 1-5 - [c166]Ruolin Wang, Pinyi Ren, Dongyang Xu, Lei Lu:
Stochastic Geometry Analysis of LEO Constellation Coverage under Atmospheric Attenuation. VTC Fall 2022: 1-5 - [c165]Zhenguo Wu, Pinyi Ren, Dongyang Xu:
Flexible Resource Allocation for Differentiated QoS Provisioning in Beam-Hopping Satellite Communications System. VTC Spring 2022: 1-5 - [c164]Tiantian Zhang, Pinyi Ren, Zhanyi Ren, Dongyang Xu:
FWSResNet: An Edge Device Fingerprinting Framework Based on Scattering and Convolutional Networks. VTC Spring 2022: 1-6 - [c163]Liwei Huang, Pinyi Ren, Dongyang Xu:
Adaptive Noise Aggregation Based Secure Image Transmission over Wireless Fading Channels. WCNC 2022: 37-42 - [c162]Zhanyi Ren, Pinyi Ren, Tiantian Zhang:
Deep RF Device Fingerprinting by Semi-Supervised Learning with Meta Pseudo Time-Frequency Labels. WCNC 2022: 2369-2374 - 2021
- [j90]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. IEEE Trans. Inf. Forensics Secur. 16: 585-600 (2021) - [j89]Dongyang Xu, Pinyi Ren:
Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC. IEEE Trans. Inf. Forensics Secur. 16: 2429-2444 (2021) - [c161]Yuncong Xie, Pinyi Ren:
Reliability Analysis of Grant-Free Uplink Data Transmission for URLLC. GLOBECOM 2021: 1-5 - [c160]Qiang Li, Pinyi Ren, Dongyang Xu, Yuncong Xie:
Energy-Efficient Device-to-Device Privacy Content Transmission in Uplink Relay Networks. ICC Workshops 2021: 1-6 - [c159]Yuncong Xie, Pinyi Ren, Dongyang Xu, Qiang Li:
Security and Reliability Performance Analysis for URLLC With Randomly Distributed Eavesdroppers. ICC Workshops 2021: 1-6 - [c158]Linchun Hao, Pinyi Ren, Qinghe Du:
Cooperative Regional Caching and Distribution in Space-Terrestrial Integrated Networks. ICCC 2021: 1042-1047 - [c157]Yanyan Liu, Pinyi Ren, Qinghe Du:
Cooperative Routing and Transmission over Multi-hop Network of RFID Tags. VTC Fall 2021: 1-5 - [c156]Tiantian Zhang, Pinyi Ren, Zhanyi Ren:
Deep Radio Fingerprint ResNet for Reliable Lightweight Device Identification. VTC Fall 2021: 1-6 - [c155]Xiaojing Shi, Pinyi Ren, Qinghe Du:
Reinforcement Learning Routing in Space-Air-Ground Integrated Networks. WCSP 2021: 1-6 - [i12]Dongyang Xu, Pinyi Ren:
Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC. CoRR abs/2101.09712 (2021) - 2020
- [j88]Yuncong Xie, Pinyi Ren, Dongyang Xu:
Transmission Performance Optimization for URLLC With Limited Training and Feedback Overheads. IEEE Access 8: 140467-140477 (2020) - [j87]Qian Xu, Pinyi Ren:
Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping. IEEE Access 8: 140981-140997 (2020) - [j86]Qian Xu, Pinyi Ren:
Channel-Aware Key Generation Under Wireless Fading Environment. IEEE Commun. Lett. 24(8): 1636-1640 (2020) - [j85]Dongyang Xu, Pinyi Ren:
Concatenated Graph Coding on Bandwidth Part for Secure Pilot Authentication in Grant-Free URLLC. IEEE Open J. Comput. Soc. 1: 193-208 (2020) - [c154]Qiang Li, Pinyi Ren, Dongyang Xu, Yuncong Xie:
Adaptive Cooperative NOMA with Energy Harvesting. GLOBECOM (Workshops) 2020: 1-5 - [c153]Qiang Li, Pinyi Ren, Dongyang Xu, Yuncong Xie:
Covert Non-Orthogonal Multiple Access Vehicular Communications with Friendly Jamming. GLOBECOM (Workshops) 2020: 1-6 - [c152]Xiaojing Shi, Pinyi Ren, Qinghe Du:
Heterogeneous Satellite Network Routing Algorithm Based on Reinforcement Learning and Mobile Agent. GLOBECOM (Workshops) 2020: 1-6 - [c151]Yuncong Xie, Pinyi Ren, Dongyang Xu, Qiang Li:
Optimizing Training and Transmission Overheads of URLLC in Industrial IoT Networks. GLOBECOM (Workshops) 2020: 1-6 - [c150]Dongyang Xu, Pinyi Ren:
Feature-Embedded Hash Coding for Secure Uplink Access in Grant-Free URLLC. GLOBECOM (Workshops) 2020: 1-6 - [c149]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Secure Symbol-Level Miso Precoding. ICASSP 2020: 8946-8950 - [c148]Xuefei Zhang, Weilong Lin, Yijing Li, Qimei Cui, Xiaofeng Tao, Xueqing Huang, Pinyi Ren:
Moving Server: Follow-up Computation Offloading Paradigm for Vehicular Users. ICCC 2020: 226-231 - [c147]Le Chai, Pinyi Ren, Qinghe Du:
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code. ICCC 2020: 600-604 - [c146]Shiqi Zhang, Pinyi Ren, Qinghe Du:
Dual-antenna Time-delay Countermeasure Against Passive Location System. ICCC 2020: 1238-1243 - [c145]Qian Xu, Pinyi Ren:
Delay-aware Secure Transmission in MEC-enabled Multicast Network. ICCC 2020: 1262-1267 - [c144]Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren:
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information. INFOCOM Workshops 2020: 538-543 - [c143]Yuan Liu, Pinyi Ren, Qinghe Du:
Optimal Thresholds for Differential Energy Detection of Ambient Backscatter Communication. IoTaaS 2020: 36-53 - [c142]Yuncong Xie, Pinyi Ren, Dongyang Xu:
Double-Threshold-Based Massive Random Access Protocol for Heterogeneous MTC Networks. IoTaaS 2020: 493-509 - [c141]Yuncong Xie, Pinyi Ren, Dongyang Xu:
On the Uplink Transmission Performance of URLLC With Interference Channel. PIMRC 2020: 1-6 - [c140]Linchun Hao, Pinyi Ren, Qinghe Du:
Satellite QoS Routing Algorithm Based on Energy Aware and Load Balancing. WCSP 2020: 685-690 - [c139]Yanyan Liu, Pinyi Ren, Qinghe Du:
Symbiotic Communication: Concurrent Transmission for Multi-Users Based on Backscatter Communication. WCSP 2020: 835-839
2010 – 2019
- 2019
- [j84]Hongliang He, Pinyi Ren:
Secure Communications in Cooperative D2D Networks by Jointing Wyner's Code and Network Coding. IEEE Access 7: 34533-34540 (2019) - [j83]Qiang Li, Pinyi Ren, Dongyang Xu:
Security Enhancement and QoS Provisioning for NOMA-Based Cooperative D2D Networks. IEEE Access 7: 129387-129401 (2019) - [j82]Dongyang Xu, Pinyi Ren, James A. Ritcey:
PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof. IEEE Internet Things J. 6(1): 171-187 (2019) - [j81]Hongliang He, Pinyi Ren, Xiao Tang:
Joint Network Coding and ARQ Design Toward Secure Wireless Communications. IEEE Trans. Commun. 67(5): 3351-3362 (2019) - [j80]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. IEEE Trans. Inf. Forensics Secur. 14(2): 387-402 (2019) - [j79]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. IEEE Trans. Inf. Forensics Secur. 14(3): 592-607 (2019) - [j78]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Reliability and Accessibility of Low-Latency V2I Channel Training Protocol Using Cover-Free Coding: Win-Win or Tradeoff ? IEEE Trans. Veh. Technol. 68(3): 2294-2305 (2019) - [j77]Hongliang He, Pinyi Ren:
Joint Artificial Noise and Repetition Coding for Secure Wireless Communications in TDD Systems. IEEE Wirel. Commun. Lett. 8(6): 1700-1703 (2019) - [c138]Qian Xu, Pinyi Ren, Dongyang Xu:
Combating Unknown Eavesdroppers by using Multipath Wireless Receptions. ICC 2019: 1-6 - [c137]Wenyan Ding, Pinyi Ren, Qinghe Du:
Scheduling and Resource Allocation Over LAA-WLAN Co-sited Networks. ICCC 2019: 152-156 - [c136]Qiang Li, Pinyi Ren, Qinghe Du, Dongyang Xu, Yuncong Xie:
Optimal Full-Duplex Jamming for Safeguarding Two-Hop Relay Networks. VTC Fall 2019: 1-5 - [c135]Qiang Li, Pinyi Ren, Qinghe Du, Dongyang Xu, Yuncong Xie:
Safeguarding NOMA Enhanced Cooperative D2D Communications via Friendly Jamming. VTC Fall 2019: 1-5 - [c134]Yuncong Xie, Pinyi Ren, Yichen Wang, Dongyang Xu, Qiang Li, Qinghe Du:
Power-Efficient Uplink Resource Allocation for Ultra-Reliable and Low-Latency Communication. VTC Fall 2019: 1-5 - [c133]Yuncong Xie, Pinyi Ren, Yichen Wang, Jiuchao Li:
Power Consumption-Oriented Resource Allocation Strategy for Ultra-Reliable Low-Latency Communication. WCNC 2019: 1-6 - [c132]Dongyang Xu, Pinyi Ren, Hongliang He, Qiang Li:
Jamming-Immune Receiver Design for MIMO-NOMA Systems Using Optimal Manifold Filtering. WCNC 2019: 1-6 - [c131]Wenyan Ding, Pinyi Ren, Qinghe Du:
Fountain Code Transmission in Dual Connectivity Based on Partial Overlapped Data. WCSP 2019: 1-6 - [i11]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. CoRR abs/1901.06817 (2019) - [i10]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. CoRR abs/1901.07897 (2019) - [i9]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. CoRR abs/1908.03174 (2019) - [i8]Dongyang Xu, Pinyi Ren, Yichen Wang, James A. Ritcey:
Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI. CoRR abs/1909.01521 (2019) - 2018
- [j76]Xiao Tang, Pinyi Ren, Zhu Han:
Jamming Mitigation via Hierarchical Security Game for IoT Communications. IEEE Access 6: 5766-5779 (2018) - [j75]Xiao Tang, Pinyi Ren, Zhu Han:
Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks. IEEE J. Sel. Areas Commun. 36(7): 1564-1578 (2018) - [j74]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User. Mob. Networks Appl. 23(4): 1068-1079 (2018) - [j73]Dawei Wang, Pinyi Ren, Julian Cheng:
Cooperative Secure Communication in Two-Hop Buffer-Aided Networks. IEEE Trans. Commun. 66(3): 972-985 (2018) - [j72]Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. IEEE Trans. Inf. Forensics Secur. 13(7): 1778-1793 (2018) - [j71]Datong Xu, Pinyi Ren, Hai Lin:
Combat Hybrid Eavesdropping in Power-Domain NOMA: Joint Design of Timing Channel and Symbol Transformation. IEEE Trans. Veh. Technol. 67(6): 4998-5012 (2018) - [j70]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission. IEEE Trans. Veh. Technol. 67(6): 5486-5490 (2018) - [j69]Hongliang He, Pinyi Ren:
Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design. IEEE Trans. Veh. Technol. 67(8): 7158-7169 (2018) - [c130]Xiao Tang, Pinyi Ren, Zhu Han:
Energy Efficiency Competition for Visible Light Communication under Illumination Constraint. APSIPA 2018: 932-936 - [c129]Bilal Hussain, Qinghe Du, Pinyi Ren:
Deep Learning-Based Big Data-Assisted Anomaly Detection in Cellular Networks. GLOBECOM 2018: 1-6 - [c128]Jun Li, Qinghe Du, Li Sun, Pinyi Ren:
Queue-Aware Joint ACB Control and Resource Allocation for mMTC Networks. GLOBECOM Workshops 2018: 1-6 - [c127]Xiao Tang, Pinyi Ren, Zhu Han:
Securing Small Cell Networks Under Interference Constraint: A Quasi-Variational Inequality Approach. GLOBECOM 2018: 1-6 - [c126]Dawei Wang, Pinyi Ren:
Energy-Efficient Primary Security Provisioning for the Full-Duplex Cognitive Radio Networks. GLOBECOM 2018: 1-6 - [c125]Qian Xu, Pinyi Ren:
Secrecy Energy Efficiency of Massive MIMO AF Relaying System with Low-Resolution ADCs. GLOBECOM 2018: 1-6 - [c124]Zhihao Ding, Pinyi Ren, Qinghe Du:
Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks. ICC Workshops 2018: 1-6 - [c123]Dawei Wang, Pinyi Ren, Qian Xu, Qinghe Du:
Secondary Encrypted Secure Transmission in Cognitive Radio Networks. ICC 2018: 1-5 - [c122]Qian Xu, Pinyi Ren, Qinghe Du, Dawei Wang:
Channel-Aware Secure Communication via Hybrid Wiretap Encoding and Secret Key Generation. ICC 2018: 1-6 - [c121]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Optimal Independence-Checking Coding for Secure Uplink Training in Large-Scale MISO-OFDM Systems. ICC 2018: 1-6 - [c120]Nan Lu, Qinghe Du, Li Sun, Pinyi Ren:
Traffic-driven intrusion detection for massive MTC towards 5G networks. INFOCOM Workshops 2018: 426-431 - [c119]Pengxiang Qin, Pinyi Ren, Qinghe Du, Li Sun:
Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design. IoTaaS 2018: 40-47 - [c118]Wenjun Yang, Qinghe Du, Xinlei Xiong, Li Sun, Pinyi Ren:
Development of 3D Exhibition System for IoT-Oriented Simulation Platform. IoTaaS 2018: 73-80 - [c117]Chenxi Zhang, Pinyi Ren, Qinghe Du:
Learning-to-Rank Based Strategy for Caching in Wireless Small Cell Networks. IoTaaS 2018: 111-119 - [c116]Zhihao Ding, Pinyi Ren, Qinghe Du:
Ant Colony Optimization Based Delay-Sensitive Routing Protocol in Vehicular Ad Hoc Networks. IoTaaS 2018: 138-148 - [c115]Xiaojing Shi, Pinyi Ren, Dongyang Xu:
A Flexible Iterative Log-MPA Detector for Uplink SCMA Systems. IoTaaS 2018: 292-302 - [c114]Yichen Wang, Tao Wang, Xiao Tang, Pinyi Ren:
QoS and Security Aware Power Allocation Scheme for Wiretap Cognitive Radio Networks. VTC Fall 2018: 1-6 - [c113]Jing Xu, Ya Zhang, Pinyi Ren, Zhenzhen Gao:
Secure Transmission for GPQSM System Exploiting Artificial Noise and Signal Space Diversity. VTC Spring 2018: 1-5 - [c112]Qian Xu, Pinyi Ren, Hongliang He, Dongyang Xu:
Security-aware routing for artificial-noise-aided multi-hop secondary communications. WCNC 2018: 1-6 - [c111]Dongyang Xu, Pinyi Ren, James A. Ritcey, Hongliang He, Qian Xu:
ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems. WCNC 2018: 1-6 - [i7]Zhihao Ding, Pinyi Ren, Qinghe Du:
Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks. CoRR abs/1801.06502 (2018) - [i6]Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. CoRR abs/1801.07356 (2018) - [i5]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels. CoRR abs/1803.02107 (2018) - 2017
- [j68]Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun:
Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks. IEEE Access 5: 3763-3776 (2017) - [j67]Xiao Tang, Pinyi Ren, Zhu Han:
Power-Efficient Secure Transmission Against Full-Duplex Active Eavesdropper: A Game-Theoretic Framework. IEEE Access 5: 24632-24645 (2017) - [j66]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60(4): 040303:1-040303:17 (2017) - [j65]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Traffic-aware overload control scheme in 5G ultra-dense M2M networks. Trans. Emerg. Telecommun. Technol. 28(9) (2017) - [j64]Qian Xu, Pinyi Ren, Houbing Song, Qinghe Du:
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions. IEEE Internet Things J. 4(6): 1924-1933 (2017) - [j63]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Enhancing physical-layer security via big-data-aided hybrid relay selection. J. Commun. Inf. Networks 2(1): 97-110 (2017) - [j62]Qinghe Du, Meng Liu, Qian Xu, Houbing Song, Li Sun, Pinyi Ren:
Interference-constrained routing over P2P-share enabled multi-hop D2D networks. Peer-to-Peer Netw. Appl. 10(6): 1354-1370 (2017) - [j61]Xiao Tang, Pinyi Ren, Yichen Wang, Zhu Han:
Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective. IEEE Trans. Commun. 65(3): 1379-1395 (2017) - [j60]Xiao Tang, Pinyi Ren, Zhu Han:
Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework. IEEE Trans. Commun. 65(9): 4065-4079 (2017) - [j59]Dawei Wang, Pinyi Ren, Julian Cheng, Yichen Wang:
Achieving Full Secrecy Rate With Energy-Efficient Transmission Control. IEEE Trans. Commun. 65(12): 5386-5400 (2017) - [j58]Xiao Tang, Pinyi Ren, Feifei Gao, Qinghe Du:
Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks. IEEE Trans. Commun. 65(12): 5415-5428 (2017) - [j57]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. IEEE Trans. Inf. Forensics Secur. 12(4): 825-839 (2017) - [j56]Jing Xu, Pinyi Ren, Chongbin Xu, Yizhai Zhang:
Distributed Cooperative Two-Cell Zero-Forcing Precoding With Local Channel Correlation. IEEE Trans. Veh. Technol. 66(9): 8086-8102 (2017) - [j55]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition. IEEE Trans. Veh. Technol. 66(12): 10732-10747 (2017) - [j54]Hongliang He, Pinyi Ren, Qinghe Du, Hai Lin:
Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI. IEEE Trans. Veh. Technol. 66(12): 11414-11418 (2017) - [j53]Jing Xu, Pinyi Ren:
Channel Correlation Based Zero-Forcing Beamforming in Two-User MISO Broadcast Channel. Wirel. Pers. Commun. 97(4): 5841-5851 (2017) - [c110]Zhihao Ding, Pinyi Ren, Qinghe Du:
System-Level Simulation Platform for Device-to-Device Communications in 5G Networks. ChinaCom (1) 2017: 95-105 - [c109]Xianwen Zhou, Pinyi Ren, Qinghe Du:
Secure Algorithm via Hybrid Relaying Scheme and Resource Allocation for OFDM Networks. ChinaCom (2) 2017: 283-291 - [c108]Chao Lyu, Pinyi Ren, Qinghe Du, Li Sun:
Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission. ChinaCom (1) 2017: 341-350 - [c107]Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks. GLOBECOM 2017: 1-6 - [c106]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network. GLOBECOM 2017: 1-6 - [c105]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels. GLOBECOM 2017: 1-6 - [c104]Huaqing Zhang, Xiao Tang, Reginald Banez, Pinyi Ren, Lingyang Song, Zhu Han:
An EPEC Analysis for Power Allocation in LTE-V Networks. GLOBECOM 2017: 1-6 - [c103]Xiao Tang, Pinyi Ren, Zhu Han:
Hierarchical power competition for security enhancement in wireless networks. ICC 2017: 1-6 - [c102]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. ICC 2017: 1-6 - [c101]Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack. ICC 2017: 1-6 - [c100]He Zhang, Qinghe Du, Pinyi Ren, Zehua Wang:
Social stability enhanced mobile D2D relay networks: An optimal stopping approach. ICC 2017: 1-6 - [c99]Bilal Hussain, Qinghe Du, Pinyi Ren:
Big data-driven anomaly detection in cellular networks. ICCC 2017: 1-6 - [c98]Xiao Tang, Pinyi Ren, Datong Xu, Dongyang Xu:
Robust secrecy competition in wireless networks. PIMRC 2017: 1-5 - [c97]Chen Tian, Pinyi Ren:
Enhancing Physical Layer Security through the Use of Suprathreshold Stochastic Resonance and Jamming. VTC Spring 2017: 1-5 - [c96]Dawei Wang, Pinyi Ren, Julian Cheng, Yichen Wang, Li Sun, Qinghe Du:
Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback. VTC Fall 2017: 1-5 - [c95]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement. VTC Spring 2017: 1-5 - [c94]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Weighted-Voronoi-Diagram Based Codebook Design against Passive Eavesdropping for MISO Systems. VTC Spring 2017: 1-5 - [c93]Dongyang Xu, Pinyi Ren, James A. Ritcey:
Artificial-Noise-Resistant Eavesdropping in MISO Wiretap Channels: Receiver Construction and Performance Analysis. VTC Fall 2017: 1-5 - [c92]Xuejie Zhu, Qinghe Du, Pinyi Ren:
Social-Aware Relay Selection for Device-to-Device Underlaying Cellular Networks. VTC Fall 2017: 1-5 - [c91]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers. WCNC 2017: 1-6 - [c90]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Physical Layer Security Improvement by Constellation Selection and Artificial Interference. WCNC 2017: 1-6 - [c89]Chenxi Zhang, Pinyi Ren, Qinghe Du:
A contextual multi-armed bandit approach to caching in wireless small cell network. WCSP 2017: 1-6 - 2016
- [j52]Qian Xu, Pinyi Ren, Houbing Song, Qinghe Du:
Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations. IEEE Access 4: 2840-2853 (2016) - [j51]Datong Xu, Pinyi Ren, Li Sun, Houbing Song:
Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems. IET Commun. 10(3): 292-299 (2016) - [j50]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun:
Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int. J. Distributed Sens. Networks 12(8) (2016) - [j49]Qinghe Du, Weidong Zhao, Weimin Li, Xuelin Zhang, Bo Sun, Houbing Song, Pinyi Ren, Li Sun, Yichen Wang:
Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks. J. Medical Syst. 40(7): 171:1-171:8 (2016) - [j48]Mukhtar Hussain, Qinghe Du, Li Sun, Pinyi Ren:
Security enhancement for video transmission via noise aggregation in immersive systems. Multim. Tools Appl. 75(9): 5345-5357 (2016) - [j47]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Active jamming for multi-user information security improvement with the access statuses of users. Secur. Commun. Networks 9(16): 3893-3910 (2016) - [j46]Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic RACH Partition for Massive Access of Differentiated M2M Services. Sensors 16(4): 455 (2016) - [j45]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks. Sensors 16(12): 1998 (2016) - [j44]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 12(1): 291-300 (2016) - [j43]Li Sun, Qinghe Du, Pinyi Ren, Yichen Wang:
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation. IEEE Trans. Veh. Technol. 65(10): 8767-8774 (2016) - [c88]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security. GLOBECOM Workshops 2016: 1-6 - [c87]Hongliang He, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Secure Communication Using Noisy Feedback. GLOBECOM 2016: 1-6 - [c86]Xiao Tang, Pinyi Ren, Zhu Han:
Iterative Power Optimization Towards Secure Multi-Channel Full-Duplex Communication. GLOBECOM 2016: 1-6 - [c85]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks. GLOBECOM 2016: 1-7 - [c84]Xiao Tang, Pinyi Ren, Zhu Han:
Combating full-duplex active eavesdropper: A game-theoretic perspective. ICC 2016: 1-6 - [c83]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
On achievable secrecy rate by noise aggregation over wireless fading channels. ICC 2016: 1-6 - [c82]Meng Liu, Pinyi Ren, Qinghe Du, Wenchao Ou, Xinlei Xiong, Guobing Li:
Design of system-level simulation platform for 5G networks. ICCC 2016: 1-6 - [c81]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint. ICCS 2016: 1-5 - [c80]Fengyi Bai, Pinyi Ren, Qinghe Du, Li Sun:
A hybrid channel estimation strategy against pilot spoofing attack in MISO system. PIMRC 2016: 1-6 - [c79]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun:
Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy. VTC Spring 2016: 1-5 - [c78]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks. VTC Fall 2016: 1-5 - [c77]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks. VTC Spring 2016: 1-5 - [c76]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System. VTC Fall 2016: 1-5 - [c75]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks. VTC Spring 2016: 1-5 - [c74]Wanyu Li, Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Security enhanced via dynamic fountain code design for wireless delivery. WCNC 2016: 1-6 - [c73]Mukhtar Hussain, Qinghe Du, Li Sun, Pinyi Ren:
Security protection over wireless fading channels by exploiting frequency selectivity. WCSP 2016: 1-5 - [c72]Xuejie Zhu, Qinghe Du, Pinyi Ren:
Credit-aware power control for device-to-device underlaying cellular networks. WCSP 2016: 1-5 - [c71]Dawei Wang, Pinyi Ren, Yichen Wang, Li Sun, Qinghe Du:
Two-path successive relaying and jamming for securing the primary system. WPMC 2016: 166-171 - 2015
- [j42]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun:
Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network. IEEE Access 3: 1248-1259 (2015) - [j41]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes. IEEE Commun. Lett. 19(3): 463-466 (2015) - [j40]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du:
Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach. IEEE Commun. Lett. 19(12): 2270-2273 (2015) - [j39]Datong Xu, Pinyi Ren, Li Sun:
ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells. Int. J. Commun. Syst. 28(17): 2214-2238 (2015) - [j38]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks. Int. J. Distributed Sens. Networks 11: 152851:1-152851:14 (2015) - [j37]Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, Li Sun:
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS. Pers. Ubiquitous Comput. 19(7): 1033-1043 (2015) - [j36]Qichao Xu, Zhou Su, Kuan Zhang, Pinyi Ren, Xuemin Sherman Shen:
Epidemic Information Dissemination in Mobile Social Networks With Opportunistic Links. IEEE Trans. Emerg. Top. Comput. 3(3): 399-409 (2015) - [j35]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning. IEEE Trans. Wirel. Commun. 14(12): 6896-6910 (2015) - [c70]Pinyi Ren, Yichen Wang, Bei Qi, Qinghe Du, Li Sun:
Cyclic-Shifting Based Sequential Cooperative Spectrum Sensing Strategy for Multi-Channel Cognitive Radio Networks. GLOBECOM 2015: 1-5 - [c69]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework. GLOBECOM 2015: 1-6 - [c68]Dongyang Xu, Qinghe Du, Pinyi Ren, Li Sun, Weidong Zhao, Zunhe Hu:
AF-Based CSI Feedback for User Selection in Multi-User MIMO Systems. GLOBECOM 2015: 1-6 - [c67]He Zhang, Qinghe Du, Pinyi Ren, Li Sun:
Joint Battery-Buffer Sustainable Guarantees in Energy-Harvesting Enabled Wireless Networks. GLOBECOM 2015: 1-6 - [c66]Yiyan Zhang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Antenna Tilt Assignment for Three-Dimensional Beamforming in Multiuser Systems. GLOBECOM 2015: 1-6 - [c65]Hongliang He, Qinghe Du, Houbing Song, Wanyu Li, Yichen Wang, Pinyi Ren:
Traffic-aware ACB scheme for massive access in machine-to-machine networks. ICC 2015: 617-622 - [c64]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs. ICC Workshops 2015: 1003-1008 - [c63]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
User association as a stochastic game for enhanced performance in heterogeneous networks. ICC 2015: 3417-3422 - [c62]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Power allocation for cognitive radio networks with statistical QoS provisioning of primary users. ICC 2015: 7719-7724 - [c61]Wanyu Li, Qinghe Du, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks. IIKI 2015: 140-145 - [c60]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system. IWCMC 2015: 90-95 - [c59]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Robust Precoder-and-Receiver Design for Interference Suppression and Channel Uncertainty Restraint in Multi-User CoMP System. VTC Spring 2015: 1-5 - [c58]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun:
Estimation Based Adaptive ACB Scheme for M2M Communications. WASA 2015: 165-174 - [c57]Xiao Tang, Pinyi Ren, Qinghe Du, Li Sun:
Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. WASA 2015: 487-496 - [c56]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System. WASA 2015: 634-643 - [c55]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun:
Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages. WASA 2015: 644-653 - [c54]Qian Yang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang, Gangming Lv:
Prediction based interference management and distributed trajectory regulation in amorphous cells. WCNC Workshops 2015: 299-304 - [c53]Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Statistical security model and power adaptation over wireless fading channels. WCSP 2015: 1-6 - 2014
- [j34]Li Sun, Pinyi Ren, Qinghe Du:
Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks. EURASIP J. Wirel. Commun. Netw. 2014: 109 (2014) - [j33]Chao Zhang, Pinyi Ren:
Two-pilot channel estimation scheme for amplify-and-forward relay networks. Int. J. Commun. Syst. 27(3): 499-512 (2014) - [j32]Pinyi Ren, Yichen Wang, Qinghe Du:
CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks. IEEE J. Sel. Areas Commun. 32(2): 237-250 (2014) - [j31]Yichen Wang, Pinyi Ren, Feifei Gao, Zhou Su:
A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning. IEEE Trans. Wirel. Commun. 13(3): 1482-1498 (2014) - [j30]Chao Zhang, Suhua Tang, Pinyi Ren:
Iterative receiver for amplify-and-forward relay networks with unknown noise correlation. Wirel. Commun. Mob. Comput. 14(17): 1601-1612 (2014) - [c52]Qinghe Du, Pinyi Ren, Yichen Wang, Li Sun:
Sustainability-Driven Power Control for Energy Harvesting Enhanced Wireless Transmission. CIT 2014: 812-817 - [c51]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks. GlobalSIP 2014: 1320-1324 - [c50]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation. GLOBECOM 2014: 2479-2484 - [c49]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Buffering-aided resource allocation for Type I relay in LTE-Advanced cellular networks. GLOBECOM 2014: 4484-4489 - [c48]Zhou Su, Pinyi Ren, Xiaoying Gan:
A novel algorithm to cache vehicular content with parked vehicles applications. ICC 2014: 5665-5669 - [c47]Fengyi Bai, Li Sun, Pinyi Ren:
Adaptive analog network coding strategy with variable slot numbers in two-way relay systems. ICCS 2014: 409-413 - [c46]Dong Liang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels. ICCS 2014: 467-471 - [c45]Qinghe Du, Pinyi Ren, Houbing Song, Yichen Wang, Li Sun:
On P2P-Share Oriented Routing over Interference-Constrained D2D Networks. MSN 2014: 138-143 - [c44]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Load-Aware Relay Selection in LTE - A System via Global Differentiated-Fairness Control. MSN 2014: 308-314 - [c43]Gangming Lv, Pei Zhang, Pinyi Ren, Guobing Li:
Channel dependant dynamic threshold control for energy detection based spectrum sensing. PIMRC 2014: 1763-1767 - [c42]Guobing Li, Shihua Zhu, Pinyi Ren, Hui Hui:
A dynamic power allocation and relay selection scheme for energy-harvesting wireless networks. RWS 2014: 247-249 - [c41]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks. VTC Fall 2014: 1-5 - [c40]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Interference Mitigation via CECRS Precoding in a Two-Tier Heterogeneous Network with Cooperative Femtocells. VTC Fall 2014: 1-5 - [c39]Dawei Wang, Pinyi Ren, Yichen Wang:
Joint subcarrier and power allocation for reciprocally-benefited spectrum sharing in cognitive radio networks. WCNC 2014: 1809-1814 - [c38]Di Zhang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy management scheme for mobile terminals in energy efficient heterogeneous network. WCSP 2014: 1-5 - 2013
- [j29]Pinyi Ren, Zhou Su:
Guest editorial: advances in networking technologies for wireless internet. Concurr. Comput. Pract. Exp. 25(9): 1031-1033 (2013) - [j28]Guangen Wu, Pinyi Ren, Qinghe Du, Chao Zhang:
A DOF-based dynamic spectrum auction algorithm in cognitive femtocell. Concurr. Comput. Pract. Exp. 25(9): 1126-1143 (2013) - [j27]Li Sun, Qinghe Du, Pinyi Ren:
Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j26]Wenshan Yin, Pinyi Ren, Fan Li, Qinghe Du:
Joint Sensing and Transmission for AF Relay Assisted PU Transmission in Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 31(11): 2249-2261 (2013) - [j25]Yichen Wang, Pinyi Ren, Feifei Gao:
Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks. IEEE Signal Process. Lett. 20(1): 43-46 (2013) - [j24]Fan Li, Pinyi Ren:
Joint packet scheduling and resource allocation with quality fairness for wireless VoD system. Telecommun. Syst. 53(1): 139-146 (2013) - [j23]Wenshan Yin, Pinyi Ren, Jun Cai, Zhou Su:
A pilot-aided detector for spectrum sensing of Digital Video Broadcasting - Terrestrial signals in cognitive radio networks. Wirel. Commun. Mob. Comput. 13(13): 1177-1191 (2013) - [j22]Wenshan Yin, Pinyi Ren, Jun Cai, Zhou Su:
Performance of energy detector in the presence of noise uncertainty in cognitive radio networks. Wirel. Networks 19(5): 629-638 (2013) - [c37]Guangen Wu, Pinyi Ren, Li Sun, Qinghe Du:
Combating time-duration uncertainty of spectrum resources: A risk-reduced auction approach. GLOBECOM 2013: 919-924 - [c36]Hao Chen, Pinyi Ren, Li Sun, Qinghe Du:
A joint optimization of transmission mode selection and resource allocation for cognitive relay networks. ICC 2013: 2852-2856 - [c35]Yingqi Chai, Qinghe Du, Pinyi Ren:
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks. ICC 2013: 6055-6059 - [c34]Hao Xu, Pinyi Ren:
Joint user scheduling and power control for cell-edge performance improvement in backhaul-constrained network MIMO. PIMRC 2013: 1342-1346 - [c33]Weilei Wang, Pinyi Ren, Qinghe Du, Li Sun:
Robust Detection with Stable Throughput over Ill-Conditioned Channels for High-Order MIMO Systems. VTC Fall 2013: 1-5 - [c32]Ruijuan Ma, Pinyi Ren, Shaoli Xue, Qinghe Du:
Adaptive low-complexity constellation-reduction aided detection in MIMO systems employing high-order modulation. WCNC 2013: 4083-4088 - [c31]Yingqi Chai, Qinghe Du, Pinyi Ren:
Precoding for MU-MIMO system in low scattering channel environments. WCSP 2013: 1-6 - [c30]Ruya Yan, Guomei Zhang, Bin Li, Pinyi Ren, Qinghe Du:
An effective semi-static interference coordination scheme for wireless cellular systems. WTS 2013: 1-6 - 2012
- [j21]Pinyi Ren, Jia Feng, Yichen Wang:
A directional MAC protocol with long-range communication ability in ad hoc networks. Sci. China Inf. Sci. 55(4): 765-777 (2012) - [j20]Chao Zhang, Jun Zhang, Guo Wei, Pinyi Ren:
An efficient cooperative ARQ protocol for wireless relay networks. Comput. Commun. 36(1): 105-112 (2012) - [j19]Yichen Wang, Pinyi Ren, Fan Li, Zhou Su:
Cross-layer based power allocation over cognitive wireless relay link with statistical delay QoS guarantees. Concurr. Comput. Pract. Exp. 24(11): 1239-1251 (2012) - [j18]Pinyi Ren, Yichen Wang, Qinghe Du, Jing Xu:
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks. EURASIP J. Wirel. Commun. Netw. 2012: 60 (2012) - [j17]Hao Chen, Qinghe Du, Pinyi Ren:
A Joint Routing and Time-Slot Assignment Algorithm for Multi-Hop Cognitive Radio Networks with Primary-User Protection. Int. J. Comput. Commun. Control 7(3): 403-416 (2012) - [j16]Guangen Wu, Pinyi Ren, Qinghe Du:
Recall-Based Dynamic Spectrum Auction with the Protection of Primary Users. IEEE J. Sel. Areas Commun. 30(10): 2070-2081 (2012) - [j15]Pinyi Ren, Jun Cai, Zhou Su:
Advanced Technologies in Wireless Internet and Communications Networks (Editorial for WICON 2011 Special Issue). Mob. Networks Appl. 17(6): 709-710 (2012) - [j14]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
Optimal Resource Allocation for Spectrum Sensing Based Cognitive Radio Networks with Statistical QoS Guarantees. Mob. Networks Appl. 17(6): 711-720 (2012) - [j13]Fan Li, Pinyi Ren, Qinghe Du:
Joint Packet Scheduling and Subcarrier Assignment for Video Communications Over Downlink OFDMA Systems. IEEE Trans. Veh. Technol. 61(6): 2753-2767 (2012) - [j12]Wenshan Yin, Pinyi Ren, Qinghe Du, Yichen Wang:
Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 11(6): 2148-2159 (2012) - [c29]Ruijuan Ma, Pinyi Ren, Chao Zhang, Qinghe Du:
An improved LLR approximation algorithm for low-complexity MIMO detection towards green communications. APSIPA 2012: 1-5 - [c28]Hao Chen, Pinyi Ren, Li Sun, Qinghe Du:
A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection. CHINACOM 2012: 470-474 - [c27]Cui Zeng, Pinyi Ren, Chao Zhang, Gangming Lv:
A hybrid clustering approach in Coordinated Multi-Point transmission system. CHINACOM 2012: 627-631 - [c26]Fei Zhang, Pinyi Ren, Hao Chen, Guobing Li:
Embedded intelligent video surveillance and cooperative tracking system. CHINACOM 2012: 632-637 - [c25]Yichen Wang, Pinyi Ren, Qinghe Du, Zhou Su:
Resource allocation and access strategy selection for QoS provisioning in cognitive networks. ICC 2012: 4637-4641 - [c24]Jie Xiao, Pinyi Ren, Qinghe Du:
A variable breadth based adaptive tree search algorithm for MIMO systems. ICCC 2012: 377-381 - [c23]Jing Liu, Pinyi Ren, Shaoli Xue, Hao Chen:
Expected path duration maximized routing algorithm in CR-VANETs. ICCC 2012: 659-663 - [c22]Minghao Zhan, Pinyi Ren, Chao Zhang, Fan Li:
Throughput-optimized cross-layer routing for cognitive radio networks. ICCC 2012: 745-750 - [c21]Qi Jiang, Xuewen Liao, Pinyi Ren, Zhenzhen Gao:
Joint power allocation and subchannel-pairing for two-way MIMO-OFDM relay system. ICCS 2012: 31-35 - [c20]Yichen Wang, Pinyi Ren, Qinghe Du:
Statistical QoS driven power allocation for cognitive networks under primary user's outage probability constraint. PIMRC 2012: 167-172 - [c19]Datong Xu, Pinyi Ren:
Inter-user interference suppression precoding based on SLNR for multi-user joint transmission in coordinated multi-point system. PIMRC 2012: 1829-1834 - [c18]Guangen Wu, Pinyi Ren, Qinghe Du:
Dynamic Spectrum Auction with Time Optimization in Cognitive Radio Networks. VTC Fall 2012: 1-5 - [c17]Datong Xu, Pinyi Ren:
A Two-Step Precoding Scheme for Multi-User Joint Transmission in Coordinated Multi-Point System. VTC Fall 2012: 1-5 - [c16]Wenshan Yin, Pinyi Ren, Qinghe Du, Zhou Su:
Cognitive AF Relay Schemes for Uplink Transmission in Macrocellular Networks. VTC Fall 2012: 1-5 - [c15]Chao Zhang, Suhua Tang, Pinyi Ren:
EM Algorithm Based Channel Estimation for Amplify-and-Forward Relay Networks with Unknown Noise Correlation. VTC Fall 2012: 1-5 - [e1]Pinyi Ren, Chao Zhang, Xin Liu, Pei Liu, Song Ci:
Wireless Internet - 6th International ICST Conference, WICON 2011, Xi'an, China, October 19-21, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 98, Springer 2012, ISBN 978-3-642-30492-7 [contents] - 2011
- [j11]Pinyi Ren, Qiang Yuan, Rui Wang, Jun Cai:
Low complexity construction for quasi-cyclic low-density parity-check codes by Progressive-Block Growth. Sci. China Inf. Sci. 54(2): 371-380 (2011) - [j10]Chao Zhang, Huarui Yin, Pinyi Ren:
The Effects of Narrowband Interference on Finite-Resolution IR-UWB Digital Receivers. IEEE Commun. Lett. 15(5): 536-538 (2011) - [j9]Wenshan Yin, Pinyi Ren, Zhou Su, Ruijuan Ma:
A Multiple Antenna Spectrum Sensing Scheme Based on Space and Time Diversity in Cognitive Radios. IEICE Trans. Commun. 94-B(5): 1254-1264 (2011) - [j8]Yichen Wang, Pinyi Ren, Zhou Su:
Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 94-B(5): 1265-1275 (2011) - [j7]Hong Zhang, Xue Li, Suming Lai, Pinyi Ren:
A High-Linearity 264-MHz Source-Follower-Based Low-Pass Filter with High-Q Second-Order Cell for MB-OFDM UWB. IEICE Trans. Electron. 94-C(6): 999-1007 (2011) - [j6]Yichen Wang, Pinyi Ren, Zhou Su:
A POMDP Based Distributed Adaptive Opportunistic Spectrum Access Strategy for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 94-B(6): 1621-1624 (2011) - [j5]Guangen Wu, Pinyi Ren, Zhou Su:
Dynamic Spectrum Allocation Based on MEG Algorithm. IEICE Trans. Commun. 94-B(11): 3077-3088 (2011) - [c14]Qinghe Du, Yi Huang, Pinyi Ren, Chao Zhang:
Statistical Delay Control and QoS-Driven Power Allocation over Two-Hop Wireless Relay Links. GLOBECOM 2011: 1-5 - [c13]Zhou Su, Pinyi Ren, Yu Chen:
Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks. GLOBECOM 2011: 1-5 - [c12]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
A Channel-Aggregation Diversity Based MAC Protocol in Power-Constrained Cognitive Ad Hoc Networks. GLOBECOM 2011: 1-6 - [c11]Guangen Wu, Pinyi Ren, Chao Zhang:
A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks. GLOBECOM 2011: 1-5 - [c10]Wenshan Yin, Pinyi Ren, Chao Zhang:
A Joint Sensing-Time Adaption and Data Transmission Scheme in Cognitive Radio Networks. GLOBECOM 2011: 1-5 - [c9]Fan Li, Pinyi Ren, Qinghe Du:
Optimal Joint Subcarrier Assignment and Power Allocation for Multi-user Video Streaming over OFDMA Downlink Systems. WICON 2011: 1-11 - [c8]Wenshan Yin, Pinyi Ren, Shuangcheng Yan:
Throughput and Sensing Bandwidth Tradeoff in Cognitive Radio Networks. WICON 2011: 12-22 - [c7]Yichen Wang, Pinyi Ren, Qinghe Du:
Statistical QoS Driven Power and Rate Allocation over Rayleigh Fading Cognitive Radio Links. WICON 2011: 33-44 - [c6]Shuangcheng Yan, Pinyi Ren, Yu Hong:
Joint Subcarrier and Power Allocation Considering Fairness in OFDM-Based Cognitive Radio Systems. WICON 2011: 45-57 - [i4]Qinghe Du, Yi Huang, Pinyi Ren, Chao Zhang:
Statistical Delay Control and QoS-Driven Power Allocation Over Two-Hop Wireless Relay Links. CoRR abs/1105.0099 (2011) - [i3]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
A Multi-Channel Diversity Based MAC Protocol for Power-Constrained Cognitive Ad Hoc Networks. CoRR abs/1105.0101 (2011) - [i2]Chao Zhang, Pinyi Ren, Jingbo Peng, Guo Wei, Qinghe Du, Yichen Wang:
Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers. CoRR abs/1105.0116 (2011) - 2010
- [j4]Pinyi Ren, Rui Wang, Shijiao Zhang:
Rectangle blocking matrices based unitary multistage Wiener reduced-rank joint detection algorithm for multiple input multiple output systems. Sci. China Inf. Sci. 53(10): 2116-2126 (2010) - [j3]Guomei Zhang, Shihua Zhu, Feng Li, Pinyi Ren:
Improved SISO MMSE Detection for Joint Coded-Precoded OFDM under Imperfect Channel Estimation. IEICE Trans. Commun. 93-B(3): 757-761 (2010) - [j2]Yichen Wang, Pinyi Ren, Guangen Wu:
A Throughput-Aimed MAC Protocol with QoS Provision for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 93-B(6): 1426-1429 (2010) - [c5]Wenshan Yin, Pinyi Ren:
A Suboptimal Sensing Scheme for OFDM Signal Based on Pilots Estimation in Cognitive Radios. GLOBECOM 2010: 1-6 - [c4]Zhou Su, Pinyi Ren, Rongtao Xu, Jiro Katto, Yasuhiko Yasuda:
A Novel Algorithm to Control Contents Selectively for Vehicular Communication Networks. VTC Fall 2010: 1-2 - [i1]Chao Zhang, Huarui Yin, Pinyi Ren:
The Effects of Narrowband Interference on Finite-Resolution IR-UWB Digital Receiver. CoRR abs/1011.4302 (2010)
2000 – 2009
- 2009
- [c3]Pinyi Ren, Jia Feng, Ping Hu, Jun Cai:
Energy Saving Ad-Hoc On-Demand Distance Vector Routing for Mobile Ad-Hoc Networks. ICC 2009: 1-5 - 2008
- [j1]Jun Cai, Attahiru Sule Alfa, Pinyi Ren, Xuemin Shen, Jon W. Mark:
Packet level performance analysis in wireless user-relaying networks. IEEE Trans. Wirel. Commun. 7(12-2): 5336-5345 (2008) - 2006
- [c2]Xingle Feng, Shihua Zhu, Pinyi Ren:
Hybrid order detection algorithm for V-BLAST system employing adaptive modulation. ISCAS 2006 - 2005
- [c1]Pinyi Ren, Shihua Zhu:
The ByTENs: an open software platform for beyond 3G air interface performance evaluation. PIMRC 2005: 977-983
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint