Pinyi Ren
Pinyi Ren
Department of Information and Communications Engineering, School of Electronic and Information
Verified email at
Cited by
Cited by
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
Q Xu, P Ren, H Song, Q Du
IEEE Access 4, 2840-2853, 2016
Epidemic information dissemination in mobile social networks with opportunistic links
Q Xu, Z Su, K Zhang, P Ren, XS Shen
IEEE Transactions on Emerging Topics in Computing 3 (3), 399-409, 2015
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
L Sun, P Ren, Q Du, Y Wang, Z Gao
IEEE Communications Letters 19 (3), 463-466, 2014
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks
P Ren, Y Wang, Q Du, J Xu
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-21, 2012
CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks
P Ren, Y Wang, Q Du
IEEE Journal on Selected Areas in Communications 32 (2), 237-250, 2013
A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning
Y Wang, P Ren, F Gao, Z Su
IEEE Transactions on Wireless Communications 13 (3), 1482-1498, 2014
Combating full-duplex active eavesdropper: A hierarchical game perspective
X Tang, P Ren, Y Wang, Z Han
IEEE Transactions on Communications 65 (3), 1379-1395, 2016
Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
L Sun, P Ren, Q Du, Y Wang
IEEE Transactions on Industrial Informatics 12 (1), 291-300, 2015
Traffic-aware ACB scheme for massive access in machine-to-machine networks
H He, Q Du, H Song, W Li, Y Wang, P Ren
2015 IEEE international conference on communications (ICC), 617-622, 2015
Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation
L Sun, Q Du, P Ren, Y Wang
IEEE Transactions on Vehicular Technology 65 (10), 8767-8774, 2015
Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks
W Yin, P Ren, Q Du, Y Wang
IEEE Transactions on Wireless Communications 11 (6), 2148-2159, 2012
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
D Wang, P Ren, Q Du, L Sun, Y Wang
IEEE Transactions on Vehicular Technology 66 (12), 10732-10747, 2017
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS
Q Du, H Song, Q Xu, P Ren, L Sun
Personal and ubiquitous Computing 19 (7), 1033-1043, 2015
Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks
Y Chai, Q Du, P Ren
2013 IEEE International Conference on Communications (ICC), 6055-6059, 2013
Securing wireless transmission against reactive jamming: A Stackelberg game framework
X Tang, P Ren, Y Wang, Q Du, L Sun
2015 IEEE global communications conference (GLOBECOM), 1-6, 2015
Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks
B Hussain, Q Du, P Ren
China Communications 15 (4), 41-57, 2018
Joint packet scheduling and subcarrier assignment for video communications over downlink OFDMA systems
F Li, P Ren, Q Du
IEEE Transactions on Vehicular Technology 61 (6), 2753-2767, 2012
Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions
Q Xu, P Ren, H Song, Q Du
IEEE Internet of Things Journal 4 (6), 1924-1933, 2017
Security enhancement for video transmission via noise aggregation in immersive systems
M Hussain, Q Du, L Sun, P Ren
Multimedia Tools and Applications 75 (9), 5345-5357, 2016
Optimal power allocation for underlay-based cognitive radio networks with primary user's statistical delay QoS provisioning
Y Wang, P Ren, Q Du, L Sun
IEEE Transactions on Wireless Communications 14 (12), 6896-6910, 2015
The system can't perform the operation now. Try again later.
Articles 1–20