Associate Professor of Information and Communications Engineering, Xi'an Jiaotong University
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Performance Study of Two-Hop Amplify-and-Forward Systems with Untrustworthy Relay Nodes
L Sun, T Zhang, Y Li, H Niu
Vehicular Technology, IEEE Transactions on 61 (8), 3801-3807, 2012
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
L Sun, P Ren, Q Du, Y Wang, Z Gao
IEEE Communications Letters 19 (3), 463-466, 2015
On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks
L Sun, T Zhang, L Lu, H Niu
IEEE Signal Processing Letters 17 (6), 535-538, 2010
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
L Sun, P Ren, Q Du, Y Wang
IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2016
Physical Layer Security with Its Applications in 5G Networks: A Review
L Sun, Q Du
China Communications 14 (12), 1-14, 2017
Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation
L Sun, Q Du, P Ren, Y Wang
IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2016
Exploiting Fountain Codes for Secure Wireless Delivery
H Niu, M Iwai, K Sezaki, L Sun, Q Du
IEEE Communications Letters 18 (5), 777-780, 2014
Cooperative communications with relay selection in wireless sensor networks
L Sun, T Zhang, L Lu, H Niu
IEEE Transactions on Consumer Electronics 55 (2), 513-517, 2009
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
D Wang, P Ren, Q Du, L Sun, Y Wang
accepted by IEEE Transactions on Vehicular Technology, 2017
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
Q Du, H Song, Q Xu, P Ren, L Sun
Personal and Ubiquitous Computing 19 (7), 1033-1043, 2015
A review of physical layer security techniques for Internet of Things: challenges and solutions
L Sun, Q Du
Entropy, 2018
Securing wireless transmission against reactive jamming: a stackelberg game framework
X Tang, P Ren, Y Wang, Q Du, L Sun
IEEE Global Communications Conference (GLOBECOM'15), 2015
Anti-eavesdropping scheme based on quadrature spatial modulation
Z Huang, Z Gao, L Sun
IEEE Communications Letters 21 (3), 532-535, 2016
Spatial Modulation Aided Physical Layer Security Enhancement for Fading Wiretap Channels
X Wang, X Wang, L Sun
International Conference on Wireless Communications and Signal Processing (WCSP), 2016
Inter-Relay Interference in Two-Path Digital Relaying Systems: Detrimental or Beneficial?
L Sun, T Zhang, H Niu
Wireless Communications, IEEE Transactions on 10 (8), 2468-2473, 2011
Security enhancement for video transmission via noise aggregation in immersive systems
M Hussain, Q Du, L Sun, P Ren
Multimedia Tools and Applications 75 (9), 5345–5357, 2016
Optimal power allocation for underlay-based cognitive radio networks with primary user’s statistical delay QoS provisioning
Y Wang, P Ren, Q Du, L Sun
IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015
Interference-Aware Routing for Hop-Count Minimization in Wireless D2D Networks
P Ren, Q Du, L Sun
The First IEEE ICCC International Workshop on Internet of Things (IOT 2013), 1-6, 2013
A Channel Quality Metric in Opportunistic Selection with Outdated CSI over Nakagami- Fading Channels
Y Li, Q Yin, L Sun, H Chen, H Wang
Vehicular Technology, IEEE Transactions on 61 (3), 1427-1432, 2012
Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems
D Xu, P Ren, L Sun, H Song
IET Communications 10 (3), 292-299, 2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20