Follow
Pinyi Ren
Pinyi Ren
Department of Information and Communications Engineering, School of Electronic and Information
Verified email at mail.xjtu.edu.cn
Title
Cited by
Cited by
Year
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
Q Xu, P Ren, H Song, Q Du
IEEE Access 4, 2840-2853, 2016
2042016
Epidemic information dissemination in mobile social networks with opportunistic links
Q Xu, Z Su, K Zhang, P Ren, XS Shen
IEEE Transactions on Emerging Topics in Computing 3 (3), 399-409, 2015
1502015
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
L Sun, P Ren, Q Du, Y Wang, Z Gao
IEEE Communications Letters 19 (3), 463-466, 2014
1112014
Combating full-duplex active eavesdropper: A hierarchical game perspective
X Tang, P Ren, Y Wang, Z Han
IEEE Transactions on Communications 65 (3), 1379-1395, 2016
1092016
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks
P Ren, Y Wang, Q Du, J Xu
EURASIP Journal on Wireless Communications and Networking 2012, 1-21, 2012
1042012
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
L Sun, P Ren, Q Du, Y Wang
IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2015
962015
Traffic-aware ACB scheme for massive access in machine-to-machine networks
H He, Q Du, H Song, W Li, Y Wang, P Ren
2015 IEEE international conference on communications (ICC), 617-622, 2015
902015
A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning
Y Wang, P Ren, F Gao, Z Su
IEEE Transactions on Wireless Communications 13 (3), 1482-1498, 2014
902014
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks
P Ren, Y Wang, Q Du
IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013
892013
Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation
L Sun, Q Du, P Ren, Y Wang
IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2015
732015
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks
B Hussain, Q Du, P Ren
China Communications 15 (4), 41-57, 2018
702018
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks
W Yin, P Ren, Q Du, Y Wang
IEEE Transactions on Wireless Communications 11 (6), 2148-2159, 2012
672012
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions
Q Xu, P Ren, H Song, Q Du
IEEE Internet of Things Journal 4 (6), 1924-1933, 2017
632017
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
D Wang, P Ren, Q Du, L Sun, Y Wang
IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017
612017
Jamming mitigation via hierarchical security game for IoT communications
X Tang, P Ren, Z Han
IEEE Access 6, 5766-5779, 2018
592018
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
Q Du, H Song, Q Xu, P Ren, L Sun
Personal and ubiquitous Computing 19, 1033-1043, 2015
552015
Cooperative secure communication in two-hop buffer-aided networks
D Wang, P Ren, J Cheng
IEEE Transactions on Communications 66 (3), 972-985, 2017
532017
Securing wireless transmission against reactive jamming: A Stackelberg game framework
X Tang, P Ren, Y Wang, Q Du, L Sun
2015 IEEE global communications conference (GLOBECOM), 1-6, 2015
482015
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks
Y Chai, Q Du, P Ren
2013 IEEE International Conference on Communications (ICC), 6055-6059, 2013
462013
Optimal power allocation for underlay-based cognitive radio networks with primary user's statistical delay QoS provisioning
Y Wang, P Ren, Q Du, L Sun
IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015
402015
The system can't perform the operation now. Try again later.
Articles 1–20