Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations Q Xu, P Ren, H Song, Q Du IEEE Access, 2016 | 203 | 2016 |
Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network B Hussain, Q Du, B Sun, Z Han IEEE Transactions on Industrial Informatics 17 (2), 860-870, 2021 | 169 | 2021 |
Physical layer security with its applications in 5G networks: A review L Sun, Q Du China Communications 14 (12), 1-14, 2017 | 152 | 2017 |
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions L Sun, Q Du Entropy 20 (10), 730, 2018 | 114 | 2018 |
Security-Aware Relaying Scheme for Cooperative Networks with Untrusted Relay Nodes L Sun, P Ren, Q Du, Y Wang, Z Gao IEEE Communications Letters, 2015 | 109 | 2015 |
Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams Q Du, X Zhang IEEE Journal on Selected Areas in Communications 28 (3), 420-433, 2010 | 103 | 2010 |
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks P Ren, Y Wang, Q Du, J Xu EURASIP Journal on Wireless Communications and Networking 2012, 1-21, 2012 | 102 | 2012 |
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks L Sun, P Ren, Q Du, Y Wang IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2016 | 95 | 2016 |
Social-feature enabled communications among devices toward the smart iot community Q Du, H Song, X Zhu IEEE Communications Magazine 57 (1), 130-137, 2019 | 94 | 2019 |
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks P Ren, Y Wang, Q Du IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013 | 89 | 2013 |
Traffic-aware ACB scheme for massive access in machine-to-machine networks H He, Q Du, H Song, W Li, Y Wang, P Ren 2015 IEEE International Conference on Communications (ICC), 617-622, 2015 | 88 | 2015 |
Exploiting Fountain Codes for Secure Wireless Delivery H Niu, M Iwai, K Sezaki, L Sun, Q Du IEEE Communications Letters 18 (5), 777-780, 2014 | 75 | 2014 |
Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation L Sun, Q Du, P Ren, Y Wang IEEE Transactions on Vehicular Technology, 2016 | 72 | 2016 |
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks W Yin, P Ren, Q Du, Y Wang IEEE transactions on wireless communications 11 (6), 2148-2159, 2012 | 67 | 2012 |
Cross-layer modeling for QoS-driven multimedia multicast/broadcast over fading channels in [advances in mobile multimedia] X Zhang, Q Du IEEE Communications Magazine 45 (8), 62-70, 2007 | 67 | 2007 |
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks B Hussain, Q Du, P Ren China Communications 15 (4), 41-57, 2018 | 66 | 2018 |
Adaptive low-complexity erasure-correcting code-based protocols for QoS-driven mobile multicast services over wireless networks X Zhang, Q Du IEEE transactions on vehicular technology 55 (5), 1633-1647, 2006 | 64 | 2006 |
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions Q Xu, P Ren, H Song, Q Du IEEE Internet of Things Journal 4 (6), 1924-1933, 2017 | 60 | 2017 |
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition D Wang, P Ren, Q Du, L Sun, Y Wang IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017 | 60 | 2017 |
Artificial Intelligence-powered Mobile Edge Computing-based Anomaly Detection in Cellular Networks B Hussain, Q Du, A Imran, MA Imran IEEE Transactions on Industrial Informatics 16 (8), 4986-4996, 2019 | 59 | 2019 |