Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations Q Xu, P Ren, H Song, Q Du IEEE Access, 2016 | 151 | 2016 |
Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams Q Du, X Zhang IEEE Journal on Selected Areas in Communications 28 (3), 420-433, 2010 | 97 | 2010 |
Security-Aware Relaying Scheme for Cooperative Networks with Untrusted Relay Nodes L Sun, P Ren, Q Du, Y Wang, Z Gao IEEE Communications Letters, 2015 | 95 | 2015 |
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks P Ren, Y Wang, Q Du, J Xu EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-21, 2012 | 88 | 2012 |
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks P Ren, Y Wang, Q Du IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013 | 80 | 2013 |
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks L Sun, P Ren, Q Du, Y Wang IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2016 | 72 | 2016 |
Physical layer security with its applications in 5G networks: A review L Sun, Q Du China Communications 14 (12), 1-14, 2017 | 67 | 2017 |
Traffic-aware ACB scheme for massive access in machine-to-machine networks H He, Q Du, H Song, W Li, Y Wang, P Ren 2015 IEEE International Conference on Communications (ICC), 617-622, 2015 | 65 | 2015 |
Cross-layer modeling for QoS-driven multimedia multicast/broadcast over fading channels in [advances in mobile multimedia] X Zhang, Q Du IEEE Communications Magazine 45 (8), 62-70, 2007 | 63 | 2007 |
Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation L Sun, Q Du, P Ren, Y Wang IEEE Transactions on Vehicular Technology, 2016 | 62 | 2016 |
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks W Yin, P Ren, Q Du, Y Wang IEEE transactions on wireless communications 11 (6), 2148-2159, 2012 | 59 | 2012 |
Adaptive low-complexity erasure-correcting code-based protocols for QoS-driven mobile multicast services over wireless networks X Zhang, Q Du IEEE transactions on vehicular technology 55 (5), 1633-1647, 2006 | 58 | 2006 |
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition D Wang, P Ren, Q Du, L Sun, Y Wang IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017 | 49 | 2017 |
Exploiting Fountain Codes for Secure Wireless Delivery H Niu, M Iwai, K Sezaki, L Sun, Q Du IEEE Communications Letters 18 (5), 777-780, 2014 | 49 | 2014 |
QoS-aware base-station selections for distributed MIMO links in broadband wireless networks Q Du, X Zhang IEEE Journal on Selected Areas in Communications 29 (6), 1123-1138, 2011 | 46 | 2011 |
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS Q Du, H Song, Q Xu, P Ren, L Sun Personal and Ubiquitous Computing 19 (7), 1033-1043, 2015 | 45 | 2015 |
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks Y Chai, Q Du, P Ren 2013 IEEE International Conference on Communications (ICC), 6055-6059, 2013 | 39 | 2013 |
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions L Sun, Q Du Entropy 20 (10), 730, 2018 | 37 | 2018 |
Securing Wireless Transmission Against Reactive Jamming: A Stackelberg Game Framework X Tang, P Ren, Y Wang, Q Du, L Sun IEEE GLOBECOM 2015, 2015 | 37 | 2015 |
Social-feature enabled communications among devices toward the smart iot community Q Du, H Song, X Zhu IEEE Communications Magazine 57 (1), 130-137, 2019 | 33 | 2019 |