default search action
Li Sun 0001
Person information
- affiliation (PhD 2011): Xi'an Jiaotong University, Department of Information and Communications Engineering, China
Other persons with the same name
- Li Sun — disambiguation page
- Li Sun 0002 — Southeast University, MoE Key Lab of Energy Thermal Conversion and Control, Nanjing, China (and 1 more)
- Li Sun 0003 — State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
- Li Sun 0004 — Beijing Technology and Business University, School of Computer and Information Engineering, China
- Li Sun 0005 — University of Sheffield, Sheffield Robotics, UK (and 3 more)
- Li Sun 0006 — Shanghai Maritime University, Information Engineering College, China (and 1 more)
- Li Sun 0007 — Beihang University, Beijing, China
- Li Sun 0008 — North China Electric Power University, Beijing, China (and 1 more)
- Li Sun 0009 — National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Yuwei Wang, Li Sun, A. Lee Swindlehurst:
Knowledge-Driven Signal Detector for Uplink Transmission in IoT Networks With Unknown Channel Models. IEEE Internet Things J. 11(15): 25839-25852 (2024) - [j58]Yuwei Wang, Li Sun, Qinghe Du:
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing. IEEE Trans. Inf. Forensics Secur. 19: 6305-6320 (2024) - [j57]Yuwei Wang, Li Sun, Qinghe Du, Maged Elkashlan:
PriSense: Privacy-Preserving Wireless Sensing for Vital Signs Monitoring. IEEE Wirel. Commun. Lett. 13(11): 3000-3004 (2024) - 2023
- [c75]Meng Li, Li Sun, Yichen Wang:
A Deep Learning Based Receiver for Wireless Communications Systems With Unknown Channel Models. ICCCS 2023: 588-596 - [c74]Yuwei Wang, Li Sun, Qinghe Du:
UC-FL: A User Cooperation Framework for Wireless Federated Learning. GLOBECOM 2023: 589-594 - [c73]Wanting Geng, Li Sun, Qinghe Du:
Distributed Physical Layer Key Generation Algorithm Based on Deep Learning. VTC Fall 2023: 1-6 - 2022
- [c72]Yuwei Wang, Li Sun:
Signal Detection for IoT Networks with Unknown Channel Models: A Knowledge-Driven Approach. ICC 2022: 2603-2608 - [c71]Cheng Feng, Li Sun:
Physical Layer Key Generation from Wireless Channels with Non-ideal Channel Reciprocity: A Deep Learning Based Approach. VTC Spring 2022: 1-6 - 2021
- [j56]Lei Chen, Li Sun:
Self-Attention-Based Real-Time Signal Detector for Communication Systems With Unknown Channel Models. IEEE Commun. Lett. 25(8): 2639-2643 (2021) - [j55]Li Sun, Yuwei Wang, A. Lee Swindlehurst, Xiao Tang:
Generative-Adversarial-Network Enabled Signal Detection for Communication Systems With Unknown Channel Models. IEEE J. Sel. Areas Commun. 39(1): 47-60 (2021) - [j54]Li Sun, Yong Zhang, A. Lee Swindlehurst:
Alternate-Jamming-Aided Wireless Physical-Layer Surveillance: Protocol Design and Performance Analysis. IEEE Trans. Inf. Forensics Secur. 16: 1989-2003 (2021) - [j53]Li Sun, Hongbin Xu, Yong Zhang:
Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results. IEEE Wirel. Commun. Lett. 10(1): 121-125 (2021) - [c70]Zixiao Zhao, Qinghe Du, Li Sun:
Network-Load Estimation for K-Repetition Grant-Free Access Enabling Adaptive Resource Allocation Towards QoS Enhancement. PIMRC 2021: 1073-1078 - [c69]Li Sun, Yong Zhang, A. Lee Swindlehurst:
Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming. WCNC 2021: 1-7 - 2020
- [j52]Qiqi Zhu, Li Sun:
Big Data Driven Anomaly Detection for Cellular Networks. IEEE Access 8: 31398-31408 (2020) - [j51]Minho Jo, Kai Hu, Richard Yu, Li Sun, Mauro Conti, Qinghe Du:
Private Blockchain in Industrial IoT. IEEE Netw. 34(5): 76-77 (2020) - [j50]Li Sun, Yuwei Wang:
CTBRNN: A Novel Deep-Learning Based Signal Sequence Detector for Communications Systems. IEEE Signal Process. Lett. 27: 21-25 (2020) - [j49]Li Sun, Dantong Huang, A. Lee Swindlehurst:
Fountain-Coding Aided Secure Transmission With Delay and Content Awareness. IEEE Trans. Veh. Technol. 69(7): 7992-7997 (2020)
2010 – 2019
- 2019
- [j48]Li Sun, Hongbin Xu:
Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback. IEEE Trans. Veh. Technol. 68(1): 740-753 (2019) - [j47]Hongbin Xu, Li Sun:
Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming. IEEE Trans. Veh. Technol. 68(11): 10713-10727 (2019) - [c68]Hongbin Xu, Li Sun:
Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach. GLOBECOM 2019: 1-6 - 2018
- [j46]Li Sun, Qinghe Du:
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 20(10): 730 (2018) - [j45]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User. Mob. Networks Appl. 23(4): 1068-1079 (2018) - [j44]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission. IEEE Trans. Veh. Technol. 67(6): 5486-5490 (2018) - [j43]Zhenzhen Gao, Zhijie Huang, Li Sun:
Secure Cooperative Communication With Nondedicated Relays. IEEE Trans. Veh. Technol. 67(8): 7811-7815 (2018) - [j42]Li Sun, Hongbin Xu:
Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation. IEEE Trans. Veh. Technol. 67(10): 9681-9695 (2018) - [j41]Hongbin Xu, Li Sun:
Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping. IEEE Trans. Wirel. Commun. 17(12): 8268-8282 (2018) - [j40]Li Sun, Kamel Tourki, Yafei Hou, Lu Wei:
Safeguarding 5G Networks through Physical Layer Security Technologies. Wirel. Commun. Mob. Comput. 2018: 7503735:1-7503735:2 (2018) - [c67]Jun Li, Qinghe Du, Li Sun, Pinyi Ren:
Queue-Aware Joint ACB Control and Resource Allocation for mMTC Networks. GLOBECOM Workshops 2018: 1-6 - [c66]Li Sun, Hongbin Xu, Fan Li:
Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks. ICC 2018: 1-6 - [c65]Hongbin Xu, Li Sun, Fan Li:
Towards Enhanced Security for Two-Way Untrusted Relaying Systems: A Constellation Overlapping Scheme. ICC 2018: 1-7 - [c64]Nan Lu, Qinghe Du, Li Sun, Pinyi Ren:
Traffic-driven intrusion detection for massive MTC towards 5G networks. INFOCOM Workshops 2018: 426-431 - [c63]Pengxiang Qin, Pinyi Ren, Qinghe Du, Li Sun:
Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design. IoTaaS 2018: 40-47 - [c62]Wenjun Yang, Qinghe Du, Xinlei Xiong, Li Sun, Pinyi Ren:
Development of 3D Exhibition System for IoT-Oriented Simulation Platform. IoTaaS 2018: 73-80 - 2017
- [j39]Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun:
Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks. IEEE Access 5: 3763-3776 (2017) - [j38]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60(4): 040303:1-040303:17 (2017) - [j37]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Traffic-aware overload control scheme in 5G ultra-dense M2M networks. Trans. Emerg. Telecommun. Technol. 28(9) (2017) - [j36]Zhijie Huang, Zhenzhen Gao, Li Sun:
Anti-Eavesdropping Scheme Based on Quadrature Spatial Modulation. IEEE Commun. Lett. 21(3): 532-535 (2017) - [j35]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Enhancing physical-layer security via big-data-aided hybrid relay selection. J. Commun. Inf. Networks 2(1): 97-110 (2017) - [j34]Qinghe Du, Nan Lu, Li Sun, Xuelin Zhang, Bo Sun:
Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access. J. Sensors 2017: 9270907:1-9270907:10 (2017) - [j33]Qinghe Du, Meng Liu, Qian Xu, Houbing Song, Li Sun, Pinyi Ren:
Interference-constrained routing over P2P-share enabled multi-hop D2D networks. Peer-to-Peer Netw. Appl. 10(6): 1354-1370 (2017) - [j32]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. IEEE Trans. Inf. Forensics Secur. 12(4): 825-839 (2017) - [j31]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition. IEEE Trans. Veh. Technol. 66(12): 10732-10747 (2017) - [c61]Chao Lyu, Pinyi Ren, Qinghe Du, Li Sun:
Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission. ChinaCom (1) 2017: 341-350 - [c60]Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks. GLOBECOM 2017: 1-6 - [c59]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network. GLOBECOM 2017: 1-6 - [c58]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. ICC 2017: 1-6 - [c57]Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack. ICC 2017: 1-6 - [c56]Dawei Wang, Pinyi Ren, Julian Cheng, Yichen Wang, Li Sun, Qinghe Du:
Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback. VTC Fall 2017: 1-5 - [c55]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement. VTC Spring 2017: 1-5 - [c54]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Weighted-Voronoi-Diagram Based Codebook Design against Passive Eavesdropping for MISO Systems. VTC Spring 2017: 1-5 - [c53]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers. WCNC 2017: 1-6 - [c52]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Physical Layer Security Improvement by Constellation Selection and Artificial Interference. WCNC 2017: 1-6 - 2016
- [j30]Datong Xu, Pinyi Ren, Li Sun, Houbing Song:
Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems. IET Commun. 10(3): 292-299 (2016) - [j29]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun:
Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int. J. Distributed Sens. Networks 12(8) (2016) - [j28]Qinghe Du, Weidong Zhao, Weimin Li, Xuelin Zhang, Bo Sun, Houbing Song, Pinyi Ren, Li Sun, Yichen Wang:
Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks. J. Medical Syst. 40(7): 171:1-171:8 (2016) - [j27]Mukhtar Hussain, Qinghe Du, Li Sun, Pinyi Ren:
Security enhancement for video transmission via noise aggregation in immersive systems. Multim. Tools Appl. 75(9): 5345-5357 (2016) - [j26]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Active jamming for multi-user information security improvement with the access statuses of users. Secur. Commun. Networks 9(16): 3893-3910 (2016) - [j25]Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic RACH Partition for Massive Access of Differentiated M2M Services. Sensors 16(4): 455 (2016) - [j24]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks. Sensors 16(12): 1998 (2016) - [j23]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 12(1): 291-300 (2016) - [j22]Li Sun, Qinghe Du, Pinyi Ren, Yichen Wang:
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation. IEEE Trans. Veh. Technol. 65(10): 8767-8774 (2016) - [j21]Hao Niu, Nanhao Zhu, Li Sun, Athanasios V. Vasilakos, Kaoru Sezaki:
Security-embedded opportunistic user cooperation with full diversity. Wirel. Networks 22(5): 1513-1522 (2016) - [c51]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security. GLOBECOM Workshops 2016: 1-6 - [c50]Hongliang He, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Secure Communication Using Noisy Feedback. GLOBECOM 2016: 1-6 - [c49]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks. GLOBECOM 2016: 1-7 - [c48]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
On achievable secrecy rate by noise aggregation over wireless fading channels. ICC 2016: 1-6 - [c47]Ye Fan, Xuewen Liao, Zhenzhen Gao, Li Sun:
Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels. ICC Workshops 2016: 207-212 - [c46]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint. ICCS 2016: 1-5 - [c45]Fengyi Bai, Pinyi Ren, Qinghe Du, Li Sun:
A hybrid channel estimation strategy against pilot spoofing attack in MISO system. PIMRC 2016: 1-6 - [c44]Caihong Han, Li Sun, Qinghe Du:
Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation. VTC Spring 2016: 1-5 - [c43]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun:
Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy. VTC Spring 2016: 1-5 - [c42]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks. VTC Fall 2016: 1-5 - [c41]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks. VTC Spring 2016: 1-5 - [c40]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System. VTC Fall 2016: 1-5 - [c39]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks. VTC Spring 2016: 1-5 - [c38]Wanyu Li, Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Security enhanced via dynamic fountain code design for wireless delivery. WCNC 2016: 1-6 - [c37]Mukhtar Hussain, Qinghe Du, Li Sun, Pinyi Ren:
Security protection over wireless fading channels by exploiting frequency selectivity. WCSP 2016: 1-5 - [c36]Dawei Wang, Pinyi Ren, Yichen Wang, Li Sun, Qinghe Du:
Two-path successive relaying and jamming for securing the primary system. WPMC 2016: 166-171 - 2015
- [j20]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun:
Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network. IEEE Access 3: 1248-1259 (2015) - [j19]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes. IEEE Commun. Lett. 19(3): 463-466 (2015) - [j18]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du:
Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach. IEEE Commun. Lett. 19(12): 2270-2273 (2015) - [j17]Datong Xu, Pinyi Ren, Li Sun:
ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells. Int. J. Commun. Syst. 28(17): 2214-2238 (2015) - [j16]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks. Int. J. Distributed Sens. Networks 11: 152851:1-152851:14 (2015) - [j15]Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, Li Sun:
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS. Pers. Ubiquitous Comput. 19(7): 1033-1043 (2015) - [j14]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning. IEEE Trans. Wirel. Commun. 14(12): 6896-6910 (2015) - [c35]Pinyi Ren, Yichen Wang, Bei Qi, Qinghe Du, Li Sun:
Cyclic-Shifting Based Sequential Cooperative Spectrum Sensing Strategy for Multi-Channel Cognitive Radio Networks. GLOBECOM 2015: 1-5 - [c34]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework. GLOBECOM 2015: 1-6 - [c33]Dongyang Xu, Qinghe Du, Pinyi Ren, Li Sun, Weidong Zhao, Zunhe Hu:
AF-Based CSI Feedback for User Selection in Multi-User MIMO Systems. GLOBECOM 2015: 1-6 - [c32]He Zhang, Qinghe Du, Pinyi Ren, Li Sun:
Joint Battery-Buffer Sustainable Guarantees in Energy-Harvesting Enabled Wireless Networks. GLOBECOM 2015: 1-6 - [c31]Yiyan Zhang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Antenna Tilt Assignment for Three-Dimensional Beamforming in Multiuser Systems. GLOBECOM 2015: 1-6 - [c30]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs. ICC Workshops 2015: 1003-1008 - [c29]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
User association as a stochastic game for enhanced performance in heterogeneous networks. ICC 2015: 3417-3422 - [c28]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Power allocation for cognitive radio networks with statistical QoS provisioning of primary users. ICC 2015: 7719-7724 - [c27]Wanyu Li, Qinghe Du, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks. IIKI 2015: 140-145 - [c26]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system. IWCMC 2015: 90-95 - [c25]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Robust Precoder-and-Receiver Design for Interference Suppression and Channel Uncertainty Restraint in Multi-User CoMP System. VTC Spring 2015: 1-5 - [c24]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun:
Estimation Based Adaptive ACB Scheme for M2M Communications. WASA 2015: 165-174 - [c23]Xiao Tang, Pinyi Ren, Qinghe Du, Li Sun:
Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. WASA 2015: 487-496 - [c22]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System. WASA 2015: 634-643 - [c21]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun:
Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages. WASA 2015: 644-653 - [c20]Qian Yang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang, Gangming Lv:
Prediction based interference management and distributed trajectory regulation in amorphous cells. WCNC Workshops 2015: 299-304 - [c19]Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Statistical security model and power adaptation over wireless fading channels. WCSP 2015: 1-6 - 2014
- [j13]Li Sun, Pinyi Ren, Qinghe Du:
Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks. EURASIP J. Wirel. Commun. Netw. 2014: 109 (2014) - [j12]Hao Niu, Masayuki Iwai, Kaoru Sezaki, Li Sun, Qinghe Du:
Exploiting Fountain Codes for Secure Wireless Delivery. IEEE Commun. Lett. 18(5): 777-780 (2014) - [j11]Zhenzhen Gao, Li Sun, Yichen Wang, Xuewen Liao:
Double Differential Transmission for Amplify-and-Forward Two-Way Relay Systems. IEEE Commun. Lett. 18(10): 1839-1842 (2014) - [c18]Qinghe Du, Pinyi Ren, Yichen Wang, Li Sun:
Sustainability-Driven Power Control for Energy Harvesting Enhanced Wireless Transmission. CIT 2014: 812-817 - [c17]Hao Niu, Li Sun, Masaki Ito, Kaoru Sezaki:
Secure transmission through multihop relaying in wireless body area networks. GCCE 2014: 395-396 - [c16]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks. GlobalSIP 2014: 1320-1324 - [c15]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation. GLOBECOM 2014: 2479-2484 - [c14]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Buffering-aided resource allocation for Type I relay in LTE-Advanced cellular networks. GLOBECOM 2014: 4484-4489 - [c13]Fengyi Bai, Li Sun, Pinyi Ren:
Adaptive analog network coding strategy with variable slot numbers in two-way relay systems. ICCS 2014: 409-413 - [c12]Dong Liang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels. ICCS 2014: 467-471 - [c11]Qinghe Du, Pinyi Ren, Houbing Song, Yichen Wang, Li Sun:
On P2P-Share Oriented Routing over Interference-Constrained D2D Networks. MSN 2014: 138-143 - [c10]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Load-Aware Relay Selection in LTE - A System via Global Differentiated-Fairness Control. MSN 2014: 308-314 - [c9]Hao Niu, Li Sun, Masaki Ito, Kaoru Sezaki:
User cooperation analysis under eavesdropping attack: A game theory perspective. PIMRC 2014: 139-144 - [c8]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks. VTC Fall 2014: 1-5 - [c7]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Interference Mitigation via CECRS Precoding in a Two-Tier Heterogeneous Network with Cooperative Femtocells. VTC Fall 2014: 1-5 - [c6]Di Zhang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy management scheme for mobile terminals in energy efficient heterogeneous network. WCSP 2014: 1-5 - 2013
- [j10]Li Sun, Qinghe Du, Pinyi Ren:
Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j9]Li Sun, Fan Li:
Adaptive protocol for cooperative communication systems with a single semi-blind amplify-and-forward relay. Telecommun. Syst. 53(1): 85-90 (2013) - [c5]Guangen Wu, Pinyi Ren, Li Sun, Qinghe Du:
Combating time-duration uncertainty of spectrum resources: A risk-reduced auction approach. GLOBECOM 2013: 919-924 - [c4]Hao Chen, Pinyi Ren, Li Sun, Qinghe Du:
A joint optimization of transmission mode selection and resource allocation for cognitive relay networks. ICC 2013: 2852-2856 - [c3]Weilei Wang, Pinyi Ren, Qinghe Du, Li Sun:
Robust Detection with Stable Throughput over Ill-Conditioned Channels for High-Order MIMO Systems. VTC Fall 2013: 1-5 - 2012
- [j8]Li Sun, Taiyi Zhang, Yubo Li, Hao Niu:
Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes. IEEE Trans. Veh. Technol. 61(8): 3801-3807 (2012) - [c2]Hao Chen, Pinyi Ren, Li Sun, Qinghe Du:
A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection. CHINACOM 2012: 470-474 - 2011
- [j7]Li Sun, Taiyi Zhang, Hao Niu:
Inter-Relay Interference in Two-Path Digital Relaying Systems: Detrimental or Beneficial? IEEE Trans. Wirel. Commun. 10(8): 2468-2473 (2011) - [c1]Li Sun, Taiyi Zhang, Hao Niu, Bin Li:
Exploiting Multiuser Diversity in Wireless Cooperative Networks. VTC Fall 2011: 1-5 - 2010
- [j6]Hao Niu, Taiyi Zhang, Li Sun:
Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks. Commun. Netw. 2(2): 87-92 (2010) - [j5]Li Sun, Taiyi Zhang, Long Lu, Hao Niu:
On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks. IEEE Signal Process. Lett. 17(6): 535-538 (2010) - [j4]Li Sun, Taiyi Zhang, Hao Niu, Junsong Wang:
Effect of Multiple Antennas at the Destination on the Diversity Performance of Amplify-and-Forward Systems With Partial Relay Selection. IEEE Signal Process. Lett. 17(7): 631-634 (2010) - [j3]Runping Yuan, Taiyi Zhang, Jianxiong Huang, Li Sun:
Opportunistic cooperation and optimal power allocation for wireless sensor networks. IEEE Trans. Consumer Electron. 56(3): 1898-1904 (2010)
2000 – 2009
- 2009
- [j2]Li Sun, Taiyi Zhang:
Comments on "Spectrally-Efficient Relay Selection with Limited Feedback". IEEE J. Sel. Areas Commun. 27(7): 1306 (2009) - [j1]Li Sun, Taiyi Zhang, Long Lu, Hao Niu:
Cooperative communications with relay selection in wireless sensor networks. IEEE Trans. Consumer Electron. 55(2): 513-517 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint