Performance Study of Two-Hop Amplify-and-Forward Systems with Untrustworthy Relay Nodes L Sun, T Zhang, Y Li, H Niu Vehicular Technology, IEEE Transactions on 61 (8), 3801-3807, 2012 | 168 | 2012 |
Physical Layer Security with Its Applications in 5G Networks: A Review L Sun, Q Du China Communications 14 (12), 1-14, 2017 | 152 | 2017 |
A review of physical layer security techniques for Internet of Things: challenges and solutions L Sun, Q Du Entropy, 2018 | 115 | 2018 |
Security-aware relaying scheme for cooperative networks with untrusted relay nodes L Sun, P Ren, Q Du, Y Wang, Z Gao IEEE Communications Letters 19 (3), 463-466, 2015 | 109 | 2015 |
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks L Sun, P Ren, Q Du, Y Wang IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2016 | 95 | 2016 |
On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks L Sun, T Zhang, L Lu, H Niu IEEE Signal Processing Letters 17 (6), 535-538, 2010 | 84 | 2010 |
Exploiting Fountain Codes for Secure Wireless Delivery H Niu, M Iwai, K Sezaki, L Sun, Q Du IEEE Communications Letters 18 (5), 777-780, 2014 | 75 | 2014 |
Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation L Sun, Q Du, P Ren, Y Wang IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2016 | 72 | 2016 |
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition D Wang, P Ren, Q Du, L Sun, Y Wang accepted by IEEE Transactions on Vehicular Technology, 2017 | 60 | 2017 |
Cooperative communications with relay selection in wireless sensor networks L Sun, T Zhang, L Lu, H Niu IEEE Transactions on Consumer Electronics 55 (2), 513-517, 2009 | 58 | 2009 |
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS Q Du, H Song, Q Xu, P Ren, L Sun Personal and Ubiquitous Computing 19 (7), 1033-1043, 2015 | 53 | 2015 |
Securing wireless transmission against reactive jamming: a stackelberg game framework X Tang, P Ren, Y Wang, Q Du, L Sun IEEE Global Communications Conference (GLOBECOM'15), 2015 | 48 | 2015 |
Anti-eavesdropping scheme based on quadrature spatial modulation Z Huang, Z Gao, L Sun IEEE Communications Letters 21 (3), 532-535, 2016 | 46 | 2016 |
Spatial Modulation Aided Physical Layer Security Enhancement for Fading Wiretap Channels X Wang, X Wang, L Sun International Conference on Wireless Communications and Signal Processing (WCSP), 2016 | 46 | 2016 |
Generative-Adversarial-Network Enabled Signal Detection for Communication Systems with Unknown Channel Models L Sun, Y Wang, AL Swindlehurst, X Tang IEEE Journal on Selected Areas in Communications 39 (1), 47-60, 2021 | 39 | 2021 |
Optimal power allocation for underlay-based cognitive radio networks with primary user’s statistical delay QoS provisioning Y Wang, P Ren, Q Du, L Sun IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015 | 39 | 2015 |
Security enhancement for video transmission via noise aggregation in immersive systems M Hussain, Q Du, L Sun, P Ren Multimedia Tools and Applications 75 (9), 5345–5357, 2016 | 36 | 2016 |
Fountain-coding based secure communications exploiting outage prediction and limited feedback L Sun, H Xu IEEE Transactions on Vehicular Technology 68 (1), 740-753, 2019 | 35 | 2019 |
A Channel Quality Metric in Opportunistic Selection with Outdated CSI over Nakagami- Fading Channels Y Li, Q Yin, L Sun, H Chen, H Wang Vehicular Technology, IEEE Transactions on 61 (3), 1427-1432, 2012 | 34 | 2012 |
Inter-Relay Interference in Two-Path Digital Relaying Systems: Detrimental or Beneficial? L Sun, T Zhang, H Niu Wireless Communications, IEEE Transactions on 10 (8), 2468-2473, 2011 | 33 | 2011 |