Relaying protocols for wireless energy harvesting and information processing AA Nasir, X Zhou, S Durrani, RA Kennedy IEEE Transactions on Wireless Communications 12 (7), 3622-3636, 2013 | 2092 | 2013 |
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation X Zhou, MR McKay IEEE Transactions on Vehicular Technology 59 (8), 3831-3842, 2010 | 630 | 2010 |
Cutting the last wires for mobile communications by microwave power transfer K Huang, X Zhou IEEE Communications Magazine 53 (6), 86-93, 2015 | 366 | 2015 |
Wireless-powered relays in cooperative communications: Time-switching relaying protocols and throughput analysis AA Nasir, X Zhou, S Durrani, RA Kennedy IEEE Transactions on Communications 63 (5), 1607-1622, 2015 | 347 | 2015 |
Physical layer security in wireless communications X Zhou, L Song, Y Zhang Crc Press, 2013 | 320 | 2013 |
Pilot contamination for active eavesdropping X Zhou, B Maham, A Hjorungnes IEEE Transactions on Wireless Communications 11 (3), 903-907, 2012 | 314 | 2012 |
Rethinking the secrecy outage formulation: A secure transmission design perspective X Zhou, MR McKay, B Maham, A Hjørungnes IEEE Communications Letters 15 (3), 302-304, 2011 | 284 | 2011 |
Throughput and ergodic capacity of wireless energy harvesting based DF relaying network AA Nasir, X Zhou, S Durrani, RA Kennedy 2014 IEEE international conference on communications (ICC), 4066-4071, 2014 | 274 | 2014 |
On covert communication with noise uncertainty B He, S Yan, X Zhou, VKN Lau IEEE Communications Letters 21 (4), 941-944, 2017 | 270 | 2017 |
Low probability of detection communication: Opportunities and challenges S Yan, X Zhou, J Hu, SV Hanly IEEE Wireless Communications 26 (5), 19-25, 2019 | 269 | 2019 |
On the throughput cost of physical layer security in decentralized wireless networks X Zhou, R Ganti, J Andrews, A Hjorungnes Wireless Communications, IEEE Transactions on, 1-12, 2011 | 265 | 2011 |
Error bounds for uplink and downlink 3D localization in 5G millimeter wave systems Z Abu-Shaban, X Zhou, T Abhayapala, G Seco-Granados, H Wymeersch IEEE Transactions on Wireless Communications 17 (8), 4939-4954, 2018 | 241 | 2018 |
Achieving covert wireless communications using a full-duplex receiver K Shahzad, X Zhou, S Yan, J Hu, F Shu, J Li IEEE Transactions on Wireless Communications 17 (12), 8517-8530, 2018 | 235 | 2018 |
On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels X Zhang, X Zhou, MR McKay IEEE Transactions on Vehicular Technology 62 (5), 2170-2181, 2013 | 230 | 2013 |
Delay-intolerant covert communications with either fixed or random transmit power S Yan, B He, X Zhou, Y Cong, AL Swindlehurst IEEE Transactions on Information Forensics and Security 14 (1), 129-140, 2018 | 217 | 2018 |
Covert communication achieved by a greedy relay in wireless networks J Hu, S Yan, X Zhou, F Shu, J Li, J Wang IEEE Transactions on Wireless Communications 17 (7), 4766-4779, 2018 | 194 | 2018 |
Covert communication in fading channels under channel uncertainty K Shahzad, X Zhou, S Yan 2017 IEEE 85th Vehicular technology conference (VTC Spring), 1-5, 2017 | 175 | 2017 |
Secure communication with a wireless-powered friendly jammer W Liu, X Zhou, S Durrani, P Popovski IEEE Transactions on Wireless Communications 15 (1), 401-415, 2015 | 152 | 2015 |
Next generation backscatter communication: systems, techniques, and applications W Liu, K Huang, X Zhou, S Durrani EURASIP Journal on Wireless Communications and Networking 2019, 1-11, 2019 | 150* | 2019 |
Secure wireless network connectivity with multi-antenna transmission X Zhou, RK Ganti, JG Andrews IEEE Transactions on Wireless Communications 10 (2), 425-430, 2010 | 150 | 2010 |