419 results on '"Du, Qinghe"'
Search Results
52. Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission
53. Adaptive Sampling and Transmission for Minimizing Age of Information in Metaverse
54. Secure Communication Guarantees for Diverse Extended-Reality Applications: A Unified Statistical Security Model
55. Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission
56. Secure Algorithm via Hybrid Relaying Scheme and Resource Allocation for OFDM Networks
57. System-Level Simulation Platform for Device-to-Device Communications in 5G Networks
58. Waveform Design of UNB Modulation and Performance Analysis
59. Sustainable Wireless Delivery for HD-Video Streaming via Short Fountain-Code Assisted UDP
60. Neural Network-Assisted Receiver Design via Learning Trellis Diagram Online
61. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback
62. Enhancing physical-layer security via big-data-aided hybrid relay selection
63. Statistical QoS Driven Power and Rate Allocation over Rayleigh Fading Cognitive Radio Links
64. Optimal Joint Subcarrier Assignment and Power Allocation for Multi-user Video Streaming over OFDMA Downlink Systems
65. Resource Allocation Scheme in High Throughput Satellite Systems Based on Dynamic Beam-coverage Algorithm
66. QoS-Aware Joint User Scheduling and Power Allocation for Energy Harvesting Wireless Networks
67. Security Enhancement via Dynamic Fountain Code for Wireless Multicast
68. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks
69. Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
70. Self-coupling Encryption via Polar Codes for Secure Wireless Transmission
71. Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring System
72. Overview of Prospects for Service-Aware Radio Access towards 6G Networks
73. Performance enhancement for differential energy signal detection of ambient backscatter communications
74. Traffic-Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks
75. Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks
76. Secure Transmission Using Angle Reciprocity for TDD/FDD Massive MIMO Systems
77. Reinforcement Learning Routing in Space-Air-Ground Integrated Networks
78. Estimation Based Adaptive ACB Scheme for M2M Communications
79. Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages
80. Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System
81. Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework
82. A Cooperative Multi-RSU Caching Scheme in Vehicular Networks With Fountain Codes
83. Network-Load Estimation for K-Repetition Grant-Free Access Enabling Adaptive Resource Allocation Towards QoS Enhancement
84. Cooperative Routing and Transmission over Multi-hop Network of RFID Tags
85. Neural Network-Assisted Robust Symbol Detection Under Intersymbol Interference
86. Cooperative Regional Caching and Distribution in Space-Terrestrial Integrated Networks
87. Phase Shift Matrix Optimization for IRS-Aided Legitimate Monitoring
88. A survey on dynamic spectrum access protocols for distributed cognitive wireless networks
89. Optimal Resource Allocation for Spectrum Sensing Based Cognitive Radio Networks with Statistical QoS Guarantees
90. Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network
91. Adaptive low-complexity erasure-correcting code-based protocols for QoS-driven mobile multicast services over wireless networks
92. Heterogeneous Satellite Network Routing Algorithm Based on Reinforcement Learning and Mobile Agent
93. Satellite QoS Routing Algorithm Based on Energy Aware and Load Balancing
94. Symbiotic Communication: Concurrent Transmission for Multi-Users Based on Backscatter Communication
95. Private Blockchain in Industrial IoT
96. A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
97. Dual-antenna Time-delay Countermeasure Against Passive Location System
98. Artificial Intelligence-Powered Mobile Edge Computing-Based Anomaly Detection in Cellular Networks
99. Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading Channels
100. Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.