Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations Q Xu, P Ren, H Song, Q Du IEEE Access 4, 2840-2853, 2016 | 204 | 2016 |
Epidemic information dissemination in mobile social networks with opportunistic links Q Xu, Z Su, K Zhang, P Ren, XS Shen IEEE Transactions on Emerging Topics in Computing 3 (3), 399-409, 2015 | 150 | 2015 |
Security-aware relaying scheme for cooperative networks with untrusted relay nodes L Sun, P Ren, Q Du, Y Wang, Z Gao IEEE Communications Letters 19 (3), 463-466, 2014 | 111 | 2014 |
Combating full-duplex active eavesdropper: A hierarchical game perspective X Tang, P Ren, Y Wang, Z Han IEEE Transactions on Communications 65 (3), 1379-1395, 2016 | 109 | 2016 |
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks P Ren, Y Wang, Q Du, J Xu EURASIP Journal on Wireless Communications and Networking 2012, 1-21, 2012 | 104 | 2012 |
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks L Sun, P Ren, Q Du, Y Wang IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2015 | 96 | 2015 |
Traffic-aware ACB scheme for massive access in machine-to-machine networks H He, Q Du, H Song, W Li, Y Wang, P Ren 2015 IEEE international conference on communications (ICC), 617-622, 2015 | 90 | 2015 |
A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning Y Wang, P Ren, F Gao, Z Su IEEE Transactions on Wireless Communications 13 (3), 1482-1498, 2014 | 90 | 2014 |
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks P Ren, Y Wang, Q Du IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013 | 89 | 2013 |
Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation L Sun, Q Du, P Ren, Y Wang IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2015 | 73 | 2015 |
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks B Hussain, Q Du, P Ren China Communications 15 (4), 41-57, 2018 | 70 | 2018 |
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks W Yin, P Ren, Q Du, Y Wang IEEE Transactions on Wireless Communications 11 (6), 2148-2159, 2012 | 67 | 2012 |
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions Q Xu, P Ren, H Song, Q Du IEEE Internet of Things Journal 4 (6), 1924-1933, 2017 | 63 | 2017 |
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition D Wang, P Ren, Q Du, L Sun, Y Wang IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017 | 61 | 2017 |
Jamming mitigation via hierarchical security game for IoT communications X Tang, P Ren, Z Han IEEE Access 6, 5766-5779, 2018 | 59 | 2018 |
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS Q Du, H Song, Q Xu, P Ren, L Sun Personal and ubiquitous Computing 19, 1033-1043, 2015 | 55 | 2015 |
Cooperative secure communication in two-hop buffer-aided networks D Wang, P Ren, J Cheng IEEE Transactions on Communications 66 (3), 972-985, 2017 | 53 | 2017 |
Securing wireless transmission against reactive jamming: A Stackelberg game framework X Tang, P Ren, Y Wang, Q Du, L Sun 2015 IEEE global communications conference (GLOBECOM), 1-6, 2015 | 48 | 2015 |
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks Y Chai, Q Du, P Ren 2013 IEEE International Conference on Communications (ICC), 6055-6059, 2013 | 46 | 2013 |
Optimal power allocation for underlay-based cognitive radio networks with primary user's statistical delay QoS provisioning Y Wang, P Ren, Q Du, L Sun IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015 | 40 | 2015 |