Pinyi Ren
Pinyi Ren
Department of Information and Communications Engineering, School of Electronic and Information
Adresse e-mail validée de
Citée par
Citée par
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
Q Xu, P Ren, H Song, Q Du
IEEE Access 4, 2840-2853, 2016
Epidemic information dissemination in mobile social networks with opportunistic links
Q Xu, Z Su, K Zhang, P Ren, XS Shen
IEEE Transactions on Emerging Topics in Computing 3 (3), 399-409, 2015
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
L Sun, P Ren, Q Du, Y Wang, Z Gao
IEEE Communications Letters 19 (3), 463-466, 2014
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks
P Ren, Y Wang, Q Du, J Xu
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-21, 2012
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks
P Ren, Y Wang, Q Du
IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013
Combating full-duplex active eavesdropper: A hierarchical game perspective
X Tang, P Ren, Y Wang, Z Han
IEEE Transactions on Communications 65 (3), 1379-1395, 2016
A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning
Y Wang, P Ren, F Gao, Z Su
IEEE Transactions on Wireless Communications 13 (3), 1482-1498, 2014
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
L Sun, P Ren, Q Du, Y Wang
IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2015
Traffic-aware ACB scheme for massive access in machine-to-machine networks
H He, Q Du, H Song, W Li, Y Wang, P Ren
2015 IEEE international conference on communications (ICC), 617-622, 2015
Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation
L Sun, Q Du, P Ren, Y Wang
IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2015
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks
W Yin, P Ren, Q Du, Y Wang
IEEE Transactions on Wireless Communications 11 (6), 2148-2159, 2012
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
D Wang, P Ren, Q Du, L Sun, Y Wang
IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
Q Du, H Song, Q Xu, P Ren, L Sun
Personal and ubiquitous Computing 19 (7), 1033-1043, 2015
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks
Y Chai, Q Du, P Ren
2013 IEEE International Conference on Communications (ICC), 6055-6059, 2013
Securing wireless transmission against reactive jamming: A Stackelberg game framework
X Tang, P Ren, Y Wang, Q Du, L Sun
2015 IEEE global communications conference (GLOBECOM), 1-6, 2015
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions
Q Xu, P Ren, H Song, Q Du
IEEE Internet of Things Journal 4 (6), 1924-1933, 2017
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks
B Hussain, Q Du, P Ren
China Communications 15 (4), 41-57, 2018
Joint packet scheduling and subcarrier assignment for video communications over downlink OFDMA systems
F Li, P Ren, Q Du
IEEE Transactions on Vehicular Technology 61 (6), 2753-2767, 2012
Security enhancement for video transmission via noise aggregation in immersive systems
M Hussain, Q Du, L Sun, P Ren
Multimedia Tools and Applications 75 (9), 5345-5357, 2016
Optimal power allocation for underlay-based cognitive radio networks with primary user's statistical delay QoS provisioning
Y Wang, P Ren, Q Du, L Sun
IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20