Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities H Zhou, W Xu, J Chen, W Wang Proceedings of the IEEE 108 (2), 308-323, 2020 | 547 | 2020 |
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system B Li, R Lu, W Wang, KKR Choo Journal of Parallel and Distributed Computing 103, 32-41, 2017 | 150 | 2017 |
Artificial noise aided physical layer security in multi-antenna small-cell networks W Wang, KC Teh, KH Li IEEE Transactions on Information Forensics and Security 12 (6), 1470-1482, 2017 | 98 | 2017 |
DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system B Li, R Lu, W Wang, KKR Choo IEEE Transactions on Information Forensics and Security 11 (11), 2415-2425, 2016 | 93 | 2016 |
UAV-assisted physical layer security in multi-beam satellite-enabled vehicle communications Z Yin, M Jia, N Cheng, W Wang, F Lyu, Q Guo, X Shen IEEE Transactions on Intelligent Transportation Systems 23 (3), 2739-2751, 2021 | 89 | 2021 |
Enhanced physical layer security in D2D spectrum sharing networks W Wang, KC Teh, KH Li IEEE Wireless Communications Letters 6 (1), 106-109, 2016 | 65 | 2016 |
Relay selection for secure successive AF relaying networks with untrusted nodes W Wang, KC Teh, KH Li IEEE Transactions on Information Forensics and Security 11 (11), 2466-2476, 2016 | 65 | 2016 |
Cellular traffic load prediction with LSTM and Gaussian process regression W Wang, C Zhou, H He, W Wu, W Zhuang, X Shen ICC 2020-2020 IEEE international conference on communications (ICC), 1-6, 2020 | 62 | 2020 |
Generalized relay selection for improved security in cooperative DF relay networks W Wang, KC Teh, KH Li IEEE Wireless Communications Letters 5 (1), 28-31, 2015 | 60 | 2015 |
Extended azimuth nonlinear chirp scaling algorithm for bistatic SAR processing in high-resolution highly squinted mode D Li, G Liao, W Wang, Q Xu IEEE Geoscience and Remote Sensing Letters 11 (6), 1134-1138, 2013 | 48 | 2013 |
Physical layer security assisted computation offloading in intelligently connected vehicle networks Y Liu, W Wang, HH Chen, F Lyu, L Wang, W Meng, X Shen IEEE Transactions on Wireless communications 20 (6), 3555-3570, 2021 | 41 | 2021 |
On countermeasures of pilot spoofing attack in massive MIMO systems: A double channel training based approach W Wang, N Cheng, KC Teh, X Lin, W Zhuang, X Shen IEEE Transactions on Vehicular Technology 68 (7), 6697-6708, 2019 | 41 | 2019 |
Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels W Wang, KC Teh, KH Li IEEE Transactions on Information Forensics and Security 12 (3), 505-515, 2016 | 40 | 2016 |
Focus improvement of squint bistatic SAR data using azimuth nonlinear chirp scaling W Wang, G Liao, D Li, Q Xu IEEE Geoscience and Remote Sensing Letters 11 (1), 229-233, 2013 | 36 | 2013 |
Green interference based symbiotic security in integrated satellite-terrestrial communications Z Yin, N Cheng, TH Luan, Y Hui, W Wang IEEE Transactions on Wireless Communications 21 (11), 9962-9973, 2022 | 35 | 2022 |
Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach W Wang, KC Teh, KH Li, S Luo IEEE Transactions on Communications 66 (12), 6437 - 6449, 2018 | 35 | 2018 |
Secrecy rate maximization via radio resource allocation in cellular underlaying V2V communications Y Liu, W Wang, HH Chen, L Wang, N Cheng, W Meng, X Shen IEEE Transactions on Vehicular Technology 69 (7), 7281-7294, 2020 | 34 | 2020 |
Content delivery analysis in cellular networks with aerial caching and mmwave backhaul W Wang, N Cheng, Y Liu, H Zhou, X Lin, X Shen IEEE Transactions on Vehicular Technology 70 (5), 4809-4822, 2021 | 33 | 2021 |
Secrecy rate analysis of satellite communications with frequency domain NOMA Z Yin, M Jia, W Wang, N Cheng, F Lyu, Q Guo, X Shen IEEE Transactions on Vehicular Technology 68 (12), 11847-11858, 2019 | 33 | 2019 |
On the impact of adaptive eavesdroppers in multi-antenna cellular networks W Wang, KC Teh, KH Li, S Luo IEEE Transactions on Information Forensics and Security 13 (2), 269-279, 2018 | 30 | 2018 |