Search

Your search keyword '"Ren, Pinyi"' showing total 595 results

Search Constraints

Start Over You searched for: Author "Ren, Pinyi" Remove constraint Author: "Ren, Pinyi"
595 results on '"Ren, Pinyi"'

Search Results

1. Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC

2. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective

3. Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI

4. Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective

5. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis

6. Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective

7. Optimal Independence-Checking Coding For Secure Uplink Training in Large-Scale MISO-OFDM Systems

8. Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels

9. Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems

10. Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

11. Double-Threshold-Based Massive Random Access Protocol for Heterogeneous MTC Networks

12. Optimal Thresholds for Differential Energy Detection of Ambient Backscatter Communication

14. A Flexible Iterative Log-MPA Detector for Uplink SCMA Systems

15. Ant Colony Optimization Based Delay-Sensitive Routing Protocol in Vehicular Ad Hoc Networks

16. Learning-to-Rank Based Strategy for Caching in Wireless Small Cell Networks

17. Development of 3D Exhibition System for IoT-Oriented Simulation Platform

18. Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design

20. Secure Algorithm via Hybrid Relaying Scheme and Resource Allocation for OFDM Networks

21. Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission

22. System-Level Simulation Platform for Device-to-Device Communications in 5G Networks

23. Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers

24. A Multi-Channel Diversity Based MAC Protocol for Power-Constrained Cognitive Ad Hoc Networks

25. Statistical Delay Control and QoS-Driven Power Allocation Over Two-Hop Wireless Relay Links

26. The Effects of Narrowband Interference on Finite-Resolution IR-UWB Digital Receiver

33. DFLNet: Deep Federated Learning Network With Privacy Preserving for Vehicular LoRa Nodes Fingerprinting

34. Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages

35. Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System

36. Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework

37. Estimation Based Adaptive ACB Scheme for M2M Communications

44. Joint Subcarrier and Power Allocation Considering Fairness in OFDM-Based Cognitive Radio Systems

45. Throughput and Sensing Bandwidth Tradeoff in Cognitive Radio Networks

46. Statistical QoS Driven Power and Rate Allocation over Rayleigh Fading Cognitive Radio Links

47. Optimal Joint Subcarrier Assignment and Power Allocation for Multi-user Video Streaming over OFDMA Downlink Systems

Catalog

Books, media, physical & digital resources