Welcome

 

Li SUN  Ph.D./Associate Professor/Ph.D. Advisor

 

Department of Information and Communications Engineering

Xi’an Jiaotong University (XJTU)

No.28 West Xianning Road, Xi’an 710049, Shaanxi Province, China

Email: lisun@mail.xjtu.edu.cn

 

Education                                                            

Ø  Sep. 2006 -- Dec. 2011  Ph.D. in Information and Communications Engineering, Xi’an Jiaotong University

Ø  Sep. 2002 -- Jul. 2006    B.S. in Information Engineering, Xi’an Jiaotong University

Working Experience                                                  

Ø  Jan. 2016 -- Present       Associate Professor,  Xi’an Jiaotong University

Ø  Jan. 2012 -- Dec. 2015    Assistant Professor,    Xi’an Jiaotong University

Research Interests                                                   

Ø  Wireless Physical-Layer Security

Ø  Cooperative and Relaying Networks

Ø  Internet-of-Things (IoT)

Ø  The 5th Generation Cellular Systems (5G)

Research Grants                                                     

Ø       “Research on Content-Aware Physical-Layer Anti-Eavesdropping Techniques for Wireless Networks”, National Natural Science Foundation of China (Grant No. 61671369), Solo Principle Investigator, 01/2017 -- 12/2020

Ø        “Physical-Layer Information Driven Security Provisioning Techniques for 5G Networks”, Open Research Fund of The State Key Laboratory of Integrated Services Networks (Grant No. ISN18-02), Solo Principle Investigator, 01/2017 -- 12/2018

Ø       “Physical-Layer Security Transmission Techniques for 5G with Multi-Scenario Multi-Service Features”, Fundamental Research Funds for the Central Universities of China, Solo Principle Investigator, 01/2017 -- 12/2019

Ø        “Research and Evaluation for 5G Low-Power Massive Access Techniques”, National Science and Technology Major Project of China (Grant No. 2016ZX03001012-004), Sub-Project Solo Principle Investigator, 01/2016 -- 12/2017

Ø       “Research on Low-Complexity Cooperative Transmission Technologies towards Security-Guaranteed Relay Networks”, National Natural Science Foundation of China (Grant No. 61201207), Solo Principle Investigator, 01/2013 -- 12/2015

Ø       “Research and Evaluation for 3D MIMO Techniques,” National Science and Technology Major Project of China (Grant No. 2013ZX03003007-003), Sub-Project Solo Principle Investigator, 01/2013 -- 12/2014

Ø       “Cooperative Transmission Schemes for Wireless Relay Networks based on PHY-Security Theory,” Open Research Fund of National Mobile Communications Research Laboratory (Grant No. 2012D04), Solo Principle Investigator, 09/2012 -- 08/2015

Ø        “Physical Layer Techniques for Cooperative Communication Systems: Theory, Algorithms, and Performance Evaluation,” Scientific Research Fund for New Faculties of  Xi’an Jiaotong University, Solo Principle Investigator, 01/2012 -- 12/2014

Ø         Research on Theory of Physical-Layer Security for Information Transmissions in Wireless Communications”, Key Program of National Natural Science Foundation of China (Grant No. 61431011), Major Participant, 01/2015 -- 12/2019

Ø        Innovation of Transmission Technologies towards 5G Networks”, International Collaboration and Interaction Project of National Natural Science Foundation of China (Grant No. 61461136001), Major Participant, 01/2015 -- 12/2017

Ø        Research on M2M Networking Technologies by Sharing the Resource of Cellular Networks”, Collaborative Project with ZTE, Major Participant, 01/2014 -- 12/2014

Selected Publications                                                  

Ø     Book Chapters

1.         Li Sun and Qinghe Du, “Secure Data Dissemination for Intelligent Transportation Systems,” Chapter 6 of Secure and Trustworthy Transportation Cyber-Physical Systems, Springer, 2017.

Ø     Journal Papers

1.         Li Sun and Qinghe Du, “Physical Layer Security Technique with Its Applications in 5G Networks: A Review,” China Communications, vol. 14, no. 12, pp. 1-14, Dec. 2017.

2.         Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10732-10747, Dec. 2017.

3.         Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design in power-domain NOMA: Eavesdropping suppression in the two-user relay network with compensation for the relay user,” Mobile Networks and Applications, published online, Nov. 2017.

4.         Qinghe Du, Nan Lu, Li Sun, Xuelin Zhang, and Bo Sun, “Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access,” Journal of Sensors, Volume 2017, Article ID 9270907, 10 pages, 2017.

5.         Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Traffic-aware overload control scheme in 5G ultra-dense M2M networks”, Transactions on Emerging Telecommunications Technologies, vol. 28, no. 9, Sep. 2017.

6.         Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun, “Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks,” IEEE Access, vol. 5, pp. 3763-3776, 2017.

7.         Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, Qinghe Du, and Yichen Wang, “Cooperative privacy preserving scheme for downlink transmission  in multiuser relay networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no.4, pp. 825-839, Apr. 2017.

8.         Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” SCIENCE CHINA Information Sciences, Apr. 2017.

9.         Zhijie Huang, Zhenzhen Gao, and Li Sun, “Anti-eavesdropping scheme based on quadrature spatial modulation,” IEEE Communications Letters, vol. 21, no. 3, pp. 532-535, Mar. 2017.

10.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Reciprocally-benefited secure transmission for spectrum sensing-based cognitive radio sensor networks,” Sensors, vol. 16, no. 12, Dec. 2016.

11.     Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Active jamming for multi-user information security improvement with the access statuses of users,” (Wiley) Security and Communication Networks, vol. 9, no. 16, pp. 3893-3910, Nov. 2016.

12.     Li Sun, Qinghe Du, Pinyi Ren, and Yichen Wang, “Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016.

13.     Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN based V2I communications in vehicular cyber-physical systems,” accepted by International Journal of Distributed Sensor Networks, Jun. 2016.

14.     Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345-5357, May 2016.

15.     Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, and Li Sun, “Dynamic RACH partition for massive access of differentiated M2M services,” Sensors, published online, doi: 10.3390/s16040455, Mar. 2016.

16.     Datong Xu, Pinyi Ren, Li Sun, and Houbing Song, “Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems,” IET Communications, vol. 10, no. 3, pp. 292-299, Mar. 2016.

17.     Li Sun, Pinyi Ren, Qinghe Du, and Yichen Wang, “Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, Feb. 2016.

18.     Yichen Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Optimal power allocation for underlay-based cognitive radio networks with primary user’s statistical delay QoS provisioning,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6896-6910, Dec. 2015.

19.     Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, and Qinghe Du, “Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270-2273, Dec. 2015. (The first author is an undergraduate student under my supervision)

20.     Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147-157, Dec. 2015.

21.     Li Sun and Hongbin Xu, “A scheme to avoid interference via constellation rotation for cooperative device-to-device systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 49, no. 12, pp. 6-11, Dec. 2015.

22.     Datong Xu, Pinyi Ren, and Li Sun, “ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells,” International Journal of Communication Systems, vol. 28, no. 17, pp. 2214-2238, Nov. 2015.

23.     Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, and Li Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033-1043, Oct. 2015.

24.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Downlink and uplink cooperative transmission for primary secrecy based cognitive radio sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 152851, 14 pages, 2015. doi:10.1155/2015/152851, Sep. 2015.

25.     Hao Niu, Nanhao Zhu, Li Sun, Athanasios V. Vasilakos, and Kaoru Sezaki, “Security-embedded opportunistic user cooperation with full diversity,” (Springer) Wireless Networks, published online, DOI: 10.1007/s11276-015-1044-7, Aug. 2015.

26.     Dawei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Reciprocally benefited spectrum access scheme with joint power and subcarrier allocation in a software-defined network,” IEEE Access, vol. 3, pp. 1248-1259, Aug. 2015.

27.     Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463-466, Mar. 2015. (ranked No.3 in the Top Accessed Articles from March 2015 to August 2015 for the IEEE Communications Letters)

28.     Zhenzhen Gao, Li Sun, Yichen Wang, and Xuewen Liao, “Double differential transmission for amplify-and-forward two-way relay systems,” IEEE Communications Letters, vol. 18, no. 10, pp. 1839-1842, Oct. 2014.

29.     Li Sun, Pinyi Ren, and Qinghe Du, “Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks,” EURASIP Journal on Wireless Communications and Networking, 2014: 109, Jul. 2014.

30.     Hao Niu, Masayuki Iwai, Kaoru Sezaki, Li Sun, and Qinghe Du, “Exploiting fountain codes for secure wireless delivery,” IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, May 2014.

31.     Li Sun, Qinghe Du, and Pinyi Ren, “Secrecy-enhanced data dissemination using cooperative relaying in vehicular networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID: 505831, 11pages, Nov. 2013.

32.     Hao Niu, Li Sun, Masayuki Iwai, and Kaoru Sezaki, “Secrecy-enhanced cooperation scheme with multiuser diversity in wireless relay networks,” IEICE Communications Express, vol. 2, no. 10, pp. 409-414, Oct. 2013.

33.     Li Sun and Fan Li, “Adaptive protocol for cooperative communication systems with a single semi-blind amplify-and-forward relay,” (Springer) Telecommunication Systems, vol. 53, no. 1, pp. 85-90, May 2013.

34.     Li Sun, Taiyi Zhang, Yubo Li, and Hao Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3801-3807, Oct. 2012.

35.     Yubo Li, Qinye Yin, Li Sun, Hongyang Chen, and Huiming Wang, “A channel quality metric in opportunistic selection with outdated CSI over Nakagami-m fading channels,” IEEE Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1427-1432, Mar. 2012.

36.     Li Sun, Taiyi Zhang, and Hao Niu, “Inter-relay interference in two-path digital relaying systems: detrimental or beneficial?” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2468-2473, Aug. 2011.

37.     Runping Yuan, Taiyi Zhang, Jianxiong Huang, and Li Sun, “Opportunistic cooperation and optimal power allocation for wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 56, no. 3, pp. 1898-1904, Aug. 2010.

38.     Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Spectrally-efficient decode-and-forward scheme based on constellation rotation,” ETRI Journal, vol. 32, no. 4, pp. 607-609, Aug. 2010.

39.     Li Sun, Taiyi Zhang, Hao Niu, and Junsong Wang, “Effect of multiple antennas at the destination on the diversity performance of amplify-and-forward systems with partial relay selection,” IEEE Signal Processing Letters, vol. 17, no. 7, pp. 631-634, Jul. 2010. (ranked No.3 in the Top Accessed Articles in May 2010 for the IEEE Signal Processing Letters)

40.   Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 535-538, Jun. 2010. (ranked No.3 in the Top Accessed Articles in April 2010 for the IEEE Signal Processing Letters)

41.     Li Sun and Taiyi Zhang, “Semi-distributed user selection scheme in decode-and-forward systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 43, no. 12, pp. 115-119, Dec. 2009.

42.     Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Cooperative communications with relay selection in wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 513-517, May 2009.

Ø     Conference Papers

1.         Li Sun, Hongbin Xu, and Fan Li, “Message-prioritization based unequal secrecy protection for untrusted two-way relaying networks,” accepted by the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018.

2.         Hongbin Xu, Li Sun, and Fan Li, “Towards enhanced security for two-way untrusted relaying systems: a constellation overlapping scheme,” accepted by the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018.

3.         Nan Lu, Qinghe Du, Li Sun, and Pinyi Ren, “Traffic-driven intrusion detection for massive MTC towards 5G networks,” accepted by IEEE International Conference on Computer Communications (INFOCOM’18) Workshop on MobiSec, Honolulu, USA, Apr. 2018.

4.         Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network,” accepted by the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017.

5.         Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks,” accepted by the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017.

6.         Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Signal conversion: combat eavesdropping for physical layer security improvement,” accepted by the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017.

7.         Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Weighted-voronoi-diagram based codebook design against passive eavesdropping for MISO systems,” accepted by the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017.

8.         Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission,” accepted by the IEEE International Conference on Communications (ICC), Paris, France, May 2017.

9.         Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “ICA-SBDC: a channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack,” accepted by the IEEE International Conference on Communications (ICC), Paris, France, May 2017.

10.     Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Physical layer security improvement by constellation selection and artificial interference,” accepted by the IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, USA, Mar. 2017.

11.     Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Outage constrained secrecy rate maximization for relay networks against unknown eavesdroppers,” accepted by the IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, USA, Mar. 2017.

12.     Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Cooperative physical-layer approach for downlink privacy preserving in multiuser relay networks,” accepted by the IEEE Global Communications Conference (GLOBECOM), Washington D. C., USA, Dec. 2016.

13.     Hongliang He, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Secure communication using noisy feedback,” accepted by the IEEE Global Communications Conference (GLOBECOM), Washington D. C., USA, Dec. 2016.

14.     Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Jamming or forwarding? full-duplex relaying for physical layer security,” accepted by the IEEE Global Communications Conference (GLOBECOM) Workshop on Full Duplex Wireless Communications, Washington D. C., USA, Dec. 2016.

15.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint,” accepted by the 15th IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, Dec. 2016.

16.     Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security protection over wireless fading channels by exploiting frequency selectivity,” accepted by the International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, Oct. 2016.

17.     Xin Wang, Xia Wang, and Li Sun, “Spatial modulation aided physical layer security enhancement for fading wiretap channel,” accepted by the International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, Oct. 2016.

18.     Fengyi Bai, Pinyi Ren, Qinghe Du, and Li Sun, “A hybrid channel estimation strategy against pilot spoofing attack in MISO system,” accepted by the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, Sep. 2016.

19.     Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Secure and energy efficient transmission in multiuser uplink wireless networks,” accepted by the 84th IEEE Vehicular Technology Conference (VTC-Fall), Montréal, Canada, Sep. 2016.

20.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Primary secure communication with the cooperation of energy harvesting secondary system,” accepted by the 84th IEEE Vehicular Technology Conference (VTC-Fall), Montréal, Canada, Sep. 2016.

21.     Caihong Han, Li Sun, Pinyi Ren, and Yichen Wang, “Toward secure Internet of Things via hybrid forwarding and opportunistic relaying,” in Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC) Workshop on Wireless Communications for Internet of Things Networking, Chengdu, China, Jul. 2016, pp. 1-6.

22.     Caihong Han, Li Sun, and Qinghe Du, “Securing image transmissions via fountain coding and adaptive resource allocation,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

23.     Qian Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Secure secondary communications with curious primary users in cognitive underlay networks,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

24.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Cooperative relaying and jamming for primary secure communication in cognitive two-way networks,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

25.     Hongliang He, Pinyi Ren, Qinghe Du, and Li Sun, “Full-duplex or half-duplex? Hybrid relay selection for physical layer secrecy,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

26.     Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “On achievable secrecy rate by noise aggregation over wireless fading channels,” in Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 1-6.

27.     Ye Fan, Xuewen Liao, Zhenzhen Gao, and Li Sun, “Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels,” in Proceedings of the IEEE International Conference on Communications (ICC) Workshop on Wireless Physical Layer Security, Kuala Lumpur, Malaysia, May 2016, pp. 1-6.

28.     Wanyu Li, Qinghe Du, Li Sun, Pinyi Ren, and Yichen Wang, “Security enhanced via dynamic fountain code design for wireless delivery,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, Apr. 2016, pp. 1-6.

29.     Yiyan Zhang, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Antenna tilt assignment for three-dimensional beamforming in multiuser systems,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

30.     Dongyang Xu, Qinghe Du, Pinyi Ren, Li Sun, Weidong Zhao, and Zunhe Hu, “AF-based CSI feedback for user selection in multi-user MIMO systems,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

31.     He Zhang, Qinghe Du, Pinyi Ren, and Li Sun, “Joint battery-buffer sustainable guarantees in energy-harvesting enabled wireless networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

32.     Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Securing wireless transmission against reactive jamming: a stackelberg game framework,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

33.     Pinyi Ren, Yichen Wang, Bei Qi, Qinghe Du, and Li Sun, “Cyclic-shifting based sequential cooperative spectrum sensing strategy for multi-channel cognitive radio networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

34.     Qinghe Du, Li Sun, Pinyi Ren, and Yichen Wang, “Statistical security model and power adaptation over wireless fading channels,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China, Oct. 2015, pp. 1-6.

35.     Jun Shi, Xia Wang, and Li Sun, “Dynamic configuration of the almost blank subframes in heterogeneous networks,” in Proceedings of the IEEE 82nd Vehicular Technology Conference (VTC-Fall), Boston, USA, Sep. 2015, pp. 1-6.

36.     Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Cooperative jamming with untrusted SUs for secure communication of two-hop primary system,” in Proceedings of the 11th IEEE International Wireless Communications & Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, Aug. 2015, pp. 90-95.

37.     Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs,” in Proceedings of the IEEE International Conference on Communications (ICC) Workshop on Cooperative and Cognitive Networks, London, UK, Jun. 2015, pp. 1003-1008.

38.     Yichen Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Power allocation for cognitive radio networks with statistical QoS provisioning of primary users,” in Proceedings of the IEEE International Conference on Communications (ICC), London, UK, Jun. 2015, pp. 7719-7724.

39.     Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “User association as a stochastic game for enhanced performance in heterogeneous networks,” in Proceedings of the IEEE International Conference on Communications (ICC), London, UK, Jun. 2015, pp. 3417-3422.

40.     Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Robust precoder-and-receiver design for interference suppression and channel uncertainty restraint in multi-user CoMP system,” in Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC-Spring), Glasgow, Scotland, May 2015, pp. 1-5.

41.     Jun Shi, Xia Wang, and Li Sun, “Gray-model based SINR estimation for enhanced intercell interference coordination,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, USA, Mar. 2015, pp. 631-635.

42.     Qian Yang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang, and Gangming Lv, “Prediction based interference management and distributed trajectory regulation in amorphous cells,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) Workshop on Self-Organizing Heterogeneous Networks, New Orleans, USA, Mar. 2015, pp. 299-304.

43.     Long Wang, Qinghe Du, Pinyi Ren, Li Sun, and Yichen Wang, “Buffering-aided resource allocation for type I relay in LTE-Advanced cellular networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Austin, USA, Dec. 2014, pp. 4484-4489.

44.     Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Austin, USA, Dec. 2014, pp. 2479-2484.

45.     Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks,” in Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Atlanta, Georgia, USA, Dec. 2014, pp. 1320-1324.

46.     Qinghe Du, Pinyi Ren, Houbing Song, Yichen Wang, and Li Sun, “On P2P-share oriented routing over interference-constrained D2D networks,” in Proceedings of the IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, USA, Dec. 2014, pp. 138-143.

47.     Long Wang, Qinghe Du, Pinyi Ren, Li Sun, and Yichen Wang, “Load-aware relay selection in LTE-A system via global differentiated-fairness control,” in Proceedings of the IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, USA, Dec. 2014, pp. 308-314.

48.     Fengyi Bai, Li Sun, and Pinyi Ren, “Adaptive analog network coding strategy with variable slot numbers in two-way relay systems,” in Proceedings of the 14th IEEE International Conference on Communication Systems (ICCS), Macau, China, Nov. 2014, pp. 409-413.

49.     Dong Liang, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels,” in Proceedings of the 14th IEEE International Conference on Communication Systems (ICCS), Macau, China, Nov. 2014, pp. 467-471.

50.     Hao Niu, Li Sun, Masaki Ito, and Kaoru Sezaki, “Secure transmission through multihop relaying in wireless body area networks,” in Proceedings of the 3rd IEEE Global Conference on Consumer Electronics (GCCE), Tokyo, Japan, Oct. 2014, pp. 395-396.

51.     Di Zhang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Energy management scheme for mobile terminals in energy efficient heterogeneous network,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Heifei, China, Oct. 2014, pp. 1-5.

52.     Hao Niu, Li Sun, Masaki Ito, and Kaoru Sezaki, “User cooperation analysis under eavesdropping attack: a game theory perspective,” in Proceedings of the 25th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Washington D.C, USA, Sep. 2014, pp. 139-144.

53.     Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Interference mitigation via CECRS precoding in a two-tier heterogeneous network with cooperative femtocells,” in Proceedings of the 80th IEEE Vehicular Technology Conference (VTC-Fall), Vancouver, Canada, Sep. 2014, pp. 1-5.

54.     Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Efficient power control via non-cooperative target SINR competition in distributed wireless networks,” in Proceedings of the 80th IEEE Vehicular Technology Conference (VTC-Fall), Vancouver, Canada, Sep. 2014, pp. 1-5.

55.     Qinghe Du, Pinyi Ren, Yichen Wang, and Li Sun, “Sustainability-driven power control for energy harvesting enhanced wireless transmission,” in Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), Xi’an, China, Sep. 2014, pp. 812-817. (Invited Paper)

56.     Guangen Wu, Pinyi Ren, Li Sun, and Qinghe Du, “Combating time-duration uncertainty of spectrum resources: a risk-reduced auction approach,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Atlanta, USA, Dec. 2013, pp. 941-946.

57.     Weilei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Robust detection with stable throughput over ill-conditioned channels for high-order MIMO Systems,” in Proceedings of the 78th IEEE Vehicular Technology Conference (VTC-Fall), Las Vegas, USA, Sept. 2013, pp. 1-5.

58.     Pinyi Ren, Qinghe Du, and Li Sun, “Interference-aware routing for hop-count minimization in wireless D2D networks,” in Proceedings of the 1st International Workshop on Internet of Things (IOT), Xi’an, China, Aug. 2013, pp. 65-70. (Invited Paper)

59.     Hao Chen, Pinyi Ren, Li Sun, and Qinghe Du, “A Joint optimization of transmission mode selection and resource allocation for cognitive relay networks,” in Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, Jun. 2013, pp. 2852-2856.

60.     Li Sun, Taiyi Zhang, Hao Niu, and Bin Li, “Exploiting multiuser diversity in wireless cooperative networks,” in Proceedings of the 74th IEEE Vehicular Technology Conference (VTC-Fall), San Francisco, USA, Sept. 2011, pp. 1-5.

Ø     Book Translation

1.        Pinyi Ren, Li Sun, and Zhenzhen Gao, A First Course in Digital Communications (written by Ha H. Nguyen and Ed Shwedyk), translation from English to Chinese, Publisher: Xi’an Jiaotong University Press, China, 2014.

Teaching                                                             

Ø     Instructor, Matrix Analysis and Its Applications, Spring 2018, Xi’an Jiaotong University

Ø     Instructor, Digital Communications Theory, Fall 2017, Xi’an Jiaotong University

Ø     Instructor, Signals and Systems, Spring 2016, Xi’an Jiaotong University

Ø     Instructor, Digital Communications Theory, Fall 2015, Xi’an Jiaotong University

Ø     Instructor, Digital Communications Theory, Fall 2014, Xi’an Jiaotong University

Ø     Instructor, Signals and Systems, Spring 2014, Xi’an Jiaotong University

Ø     Instructor, Digital Communications Theory, Fall 2013, Xi’an Jiaotong University

Ø     Instructor, Digital Communications Theory, Fall 2012, Xi’an Jiaotong University

Ø     Co-Instructor, Signals and Systems, Spring 2012, Xi’an Jiaotong University

Awards and Honors                                                  

Ø  First Price of the Teaching Achievement Award of Shaanxi Province, 2018

Ø  Teaching Achievement Outstanding Award of Xi’an Jiaotong University, 2017

Ø  First Prize of the National Young Teachers’ Teaching Competition for Electronics and Information Related Specialties, 2017

Ø  Third Prize of the Outstanding Scientific Paper Award of Shaanxi Province, The People’s Government of Shaanxi Province, 2017

Ø  Co-recipient of the Best Paper Award of China Communications, China Institute of Communications, 2017

Ø  Outstanding Supervisor for Undergraduate Graduation Project (Top 1%), Xi’an Jiaotong University, 2016

Ø  Exemplary Reviewers for IEEE Communications Letters (3% of all the reviewers)IEEE Communications Society, 2013, 2016

Ø  Provincial Outstanding Graduates (Highest Honor for Graduates)Education Department of Shaanxi Province, 2011

Ø  Outstanding Award of Baosteel Scholarship (1 for the whole university)Baosteel Education Foundation, 2011

Ø  Teleepoch Excellent Paper Award for Graduate Students, Xi’an Jiaotong University, 2011,2012

Ø  Panwenyuan Scholarship (1 for the whole department), Xi’an Jiaotong University, 2009

Ø  The team led by me won the Second Prize of TI DSP National Contest, Texas Instrument, 2008

Ø  Outstanding Graduates, Xi’an Jiaotong University, 2006

Academic Activities and Services                                     

Ø  Editor, KSII Transactions on Internet and Information Systems, Dec.2014~present

Ø  Leading Guest Editor, Wireless Communications and Mobile Computing, Special Issue on Safeguarding 5G Networks through Physical Layer Security Technologies

Ø  TPC Co-chair: IEEE GLOBECOM’17 Workshop on PHY and Cross-Layer Security Solutions for 5G Networks, 2017

Ø  TPC Co-chair: IEEE ICC’16 Workshop on Novel Medium Access and Resource Allocation for 5G Networks, 2016

Ø  Track Co-chair: Cognitive Radio and Networks Symposium of the 12th International Conference on Communications and Networking in China (CHINACOM), 2017

Ø  TPC Member: IEEE Global Communications Conference (GLOBECOM), 2015, 2016, 2017, 2018

Ø  TPC Member: IEEE International Conference on Communications (ICC), 2015, 2016, 2017, 2018

Ø  TPC Member: IEEE Wireless Communications and Networking Conference (WCNC), 2016

Ø  TPC Member: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2015, 2016, 2017, 2018

Ø  TPC Member: IEEE 82nd Vehicular Technology Conference (VTC-Fall), 2015

Ø  TPC Member: IEEE International Conference on Computing, Networking and Communications (ICNC), 2018

Ø  TPC Member: IEEE ICC’18 Workshop on 5G and Cooperative Autonomous Driving

Ø  TPC Member: IEEE VTC’16-Spring Workshop on User-Centric Networking for 5G and Beyond, 2016

Ø  TPC Member: IEEE Wireless Communications and Networking Conference (WCNC) Workshop on E2IoT, 2015

Ø  TPC Member: International Conference on Wireless Communications and Signal Processing (WCSP), 2013, 2014, 2015, 2016, 2017

Ø  TPC Member: IEEE ICCC International Workshop on Wireless Communications for Internet of Things Networking (ICCC-WIN), 2016

Ø  TPC Member: IEEE ICCC International Workshop on Internet of Things (ICCC-IOT), 2013, 2014, 2015

Ø  Reviewer: IEEE Transactions on Communications

Ø  Reviewer: IEEE Transactions on Wireless Communications

Ø  Reviewer: IEEE Transactions on Vehicular Technology

Ø  Reviewer: IEEE Transactions on Information Forensics and Security

Ø  Reviewer: IEEE Transactions on Circuits and Systems II: Express Briefs

Ø  Reviewer: IEEE Transactions on Emerging Topics in Computing

Ø  Reviewer: IEEE Internet of Things Journal

Ø  Reviewer: IEEE Signal Processing Letters

Ø  Reviewer: IEEE Communications Letters

Ø  Reviewer: IEEE Wireless Communications Letters

Ø  Reviewer: IEEE Access

Ø  Reviewer: IET Communications

Ø  Reviewer: Electronics Letters

Ø  Reviewer: Computer Networks

Ø  Reviewer: Computer Communications

Ø  Reviewer: EURASIP Journal on Wireless Communications and Networking

Ø  Reviewer: Wireless Communications and Mobile Computing

Ø  Reviewer: Telecommunication Systems

Ø  Reviewer: International Journal of Communication Systems

Ø  Reviewer: Ad Hoc Networks

Ø  Reviewer: Concurrency and Computation: Practice and Experience

Ø  Reviewer: KSII Transactions on Internet and Information Systems

Ø  Reviewer: IEICE Transactions on Communications

Ø  Reviewer: Physical Communications

Ø  Reviewer: Science China-Information Sciences

Ø  Reviewer: China Communications

Ø  Reviewer: Chinese Journal of Electronics

Ø  Reviewer: Journal of Electronics and Information Technology (in Chinese)

Ø  Reviewer: Journal of Xi’an Jiaotong University (in Chinese)

Ø  Reviewer: International Conferences, including IEEE ICC, GLOBECOM, VTC, WCNC, PIMRC, etc.