Author of the publication

Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation.

, , , and . IEEE Trans. Veh. Technol., 65 (10): 8767-8774 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , and . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks., , and . IEICE Trans. Commun., 94-B (5): 1265-1275 (2011)A survey on dynamic spectrum access protocols for distributed cognitive wireless networks., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Traffic-aware overload control scheme in 5G ultra-dense M2M networks., , , , and . Trans. Emerg. Telecommun. Technol., (2017)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., and . 计算机科学, 46 (11A): 507-516 (2019)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , and . VTC Spring, page 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , and . WCNC, page 1-6. IEEE, (2017)Prediction based interference management and distributed trajectory regulation in amorphous cells., , , , , and . WCNC Workshops, page 299-304. IEEE, (2015)Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks., , , , , and . GLOBECOM, page 1-7. IEEE, (2016)Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (4): 825-839 (2017)