期刊论文

期刊论文:

  1. Y. Xiao, Q. Du, “Statistical Age-of-Information Optimization for Status Update Over Multi-State Fading Channels,” accepted to appear, IEEE Transactions on Vehicular Technology, 2023.
  2. Y. Xiao, Q. Du, W. Cheng, W. Zhang, “Adaptive Sampling and Transmission for Minimizing Age of Information in Metaverse,” accepted to appear, IEEE Journal on Selected Areas in Communications, 2023.
  3. Y. Xiao, Q. Du, Y. Zhang, and C. Lu, “Secure Vehicular Communications with Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation Approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 13462–13471, Nov. 2023, doi: 10.1109/TITS.2023.3283259.
  4. Y. Xiao, Q. Du, W. Cheng, and N. Lu, “Secure Communication Guarantees for Diverse Extended-Reality Applications: A Unified Statistical Security Model,” IEEE Journal of Selected Topics in Signal Processing, vol. 17, no. 5, pp. 1007–1021, Sep. 2023, doi: 10.1109/JSTSP.2023.3304117.
  5. Z. Zhao, Q. Du, H. Song, “Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks,” IEEE Transactions on Industrial Informatics, vol. 19, no. 7, pp. 8441–8451, Jul. 2023, doi: 10.1109/TII.2022.3218722.
  6. Z. Zhao, Q. Du, G. K. Karagiannidis, “Improved Grant-Free Access for URLLC via Multi-Tier-Driven Computing: Network-Load Learning, Prediction, and Resource Allocation,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 3, pp. 607–622, Mar. 2023, doi: 10.1109/JSAC.2023.3234696.
  7. L. Zhang, Q. Du, L. Lu, S. Zhang, “Overview of the Integration of Communications, Sensing, Computing, and Storage as Enabling Technologies for the Metaverse over 6G Networks,” Electronics, vol. 12, no. 17, p. 3651, Aug. 2023, doi: 10.3390/electronics12173651.
  8. Y. Xiao, Q. Du, W. Cheng, G. K. Karagiannidis, Z. Zhao, “Model-ML Integrated Intelligence in URLLC Towards End-to-End Delay Fulfillment Over Vehicular Networks,” IEEE Internet of Things Magazine, vol. 6, no. 3, pp. 62–68, Sep. 2023, doi: 10.1109/IOTM.001.2300049.
  9. X. Tang, H. He, L. Dong, L. Li, Q. Du, Z. Han, “Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission,” IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12562–12576, Jul. 2023, doi: 10.1109/JIOT.2023.3251993.
  10. Z. Zhao, Q. Du, D. Wang, X. Tang, H. Song, “Overview of Prospects for Service-Aware Radio Access towards 6G Networks,” Electronics, vol. 11, no. 8, p. 1262, Apr. 2022, doi: 10.3390/electronics11081262.
  11. C. Shao, O. Muta, Q. Du, K. R. Dandekar, X. Wang, “Multiple Access in Large-Scale LoRaWAN: Challenges, Solutions, and Future Perspectives,” IEEE Consumer Electronics Magazine, pp. 1–9, 2022, doi: 10.1109/MCE.2022.3182518.
  12. Y. Liu, P. Ren, Q. Du, D. Xu, “Performance enhancement for differential energy signal detection of ambient backscatter communications,” Transactions on Emerging Telecommunications Technologies, Mar. 2022, doi: 10.1002/ett.4483.
  13. B. Hussain, Q. Du, B. Sun, Z. Han, “Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 860–870, Feb. 2021, doi: 10.1109/TII.2020.2974520.
  14. B. Hussain, Q. Du, A. Imran, M. A. Imran, “Artificial Intelligence-Powered Mobile Edge Computing-Based Anomaly Detection in Cellular Networks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 4986–4996, Aug. 2020, doi: 10.1109/TII.2019.2953201.
  15. B. Hussain, Q. Du, S. Zhang, A. Imran, M. A. Imran, “Mobile Edge Computing-Based Data-Driven Deep Learning Framework for Anomaly Detection,” IEEE Access, vol. 7, pp. 137656–137667, 2019, doi: 10.1109/ACCESS.2019.2942485.
  16. Q. Du, H. Song, X. Zhu, “Social-Feature Enabled Communications Among Devices Toward the Smart IoT Community,” IEEE Communications Magazine, vol. 57, no. 1, pp. 130–137, Jan. 2019, doi: 10.1109/MCOM.2018.1700563.
  17. H. Zhang, Z. Wang, Q. Du, “Social-Aware D2D Relay Networks for Stability Enhancement: An Optimal Stopping Approach,” IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8860–8874, Sep. 2018, doi: 10.1109/TVT.2018.2851779.
  18. Q. Xu, P. Ren, Q. Du, L. Sun, “Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5486–5490, Jun. 2018, doi: 10.1109/TVT.2018.2813318.
  19. D. Xu, P. Ren, Q. Du, L. Sun, Y. Wang, “Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User,” Mobile Networks and Applications, vol. 23, no. 4, pp. 1068–1079, Aug. 2018, doi: 10.1007/s11036-017-0965-z.
  20. L. Sun, Q. Du, “A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions,” Entropy, vol. 20, no. 10, p. 730, Sep. 2018, doi: 10.3390/e20100730.
  21. B. Hussain, Q. Du, P. Ren, “Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks,” China Communications, vol. 15, no. 4, pp. 41–57, Apr. 2018, doi: 10.1109/CC.2018.8357700.
  22. Q. Du, Y. Xu, W. Li, H. Song, “Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–11, 2018, doi: 10.1155/2018/8404219.
  23. Q. Xu, P. Ren, H. Song, Q. Du, “Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1924–1933, Dec. 2017, doi: 10.1109/JIOT.2017.2684221.
  24. H. Xu, L. Sun, P. Ren, Q. Du, Y. Wang, “Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 825–839, Apr. 2017, doi: 10.1109/TIFS.2016.2636091.
  25. D. Xu, P. Ren, Q. Du, L. Sun, Y. Wang, “Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” Science China Information Sciences, vol. 60, no. 4, p. 040303, Apr. 2017, doi: 10.1007/s11432-016-9013-0.
  26. D. Wang, P. Ren, Q. Du, L. Sun, Y. Wang, “Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10732–10747, Dec. 2017, doi: 10.1109/TVT.2017.2703780.
  27. D. Wang, P. Ren, Q. Du, Y. Wang, L. Sun, “Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks,” IEEE Access, vol. 5, pp. 3763–3776, 2017, doi: 10.1109/ACCESS.2017.2679063.
  28. D. Wang, P. Ren, J. Cheng, Q. Du, Y. Wang, L. Sun, “Secure transmission for mixed FSO-RF relay networks with physical-layer key encryption and wiretap coding,” Optics Express, vol. 25, no. 9, p. 10078, May 2017, doi: 10.1364/OE.25.010078.
  29. X. Tang, P. Ren, F. Gao, Q. Du, “Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks,” IEEE Transactions on Communications, vol. 65, no. 12, pp. 5415–5428, Dec. 2017, doi: 10.1109/TCOMM.2017.2744648.
  30. L. Sun, Q. Du, “Physical layer security with its applications in 5G networks: A review,” China Communications, vol. 14, no. 12, pp. 1–14, Dec. 2017, doi: 10.1109/CC.2017.8246328.
  31. Y. Qiao, Q. Du, D. Wan, “A study on query terms proximity embedding for information retrieval,” International Journal of Distributed Sensor Networks, vol. 13, no. 2, p. 155014771769489, Feb. 2017, doi: 10.1177/1550147717694891.
  32. H. He, P. Ren, Q. Du, L. Sun, Y. Wang, “Traffic-aware overload control scheme in 5G ultra-dense M2M networks,” Transactions on Emerging Telecommunications Technologies, vol. 28, no. 9, p. e3146, Sep. 2017, doi: 10.1002/ett.3146.
  33. H. He, P. Ren, Q. Du, H. Lin, “Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper’s CSI,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 11414–11418, Dec. 2017, doi: 10.1109/TVT.2017.2729561.
  34. H. He, P. Ren, Q. Du, L. Sun, Y. Wang, “Enhancing physical-layer security via big-data-aided hybrid relay selection,” Journal of Communications and Information Networks, vol. 2, no. 1, pp. 97–110, Mar. 2017, doi: 10.1007/s41650-017-0008-8.
  35. Q. Du, N. Lu, L. Sun, X. Zhang, B. Sun, “Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access,” Journal of Sensors, vol. 2017, pp. 1–10, 2017, doi: 10.1155/2017/9270907.
  36. Q. Du, M. Liu, Q. Xu, H. Song, L. Sun, P. Ren, “Interference-constrained routing over P2P-share enabled multi-hop D2D networks,” Peer-to-Peer Networking and Applications, vol. 10, no. 6, pp. 1354–1370, Nov. 2017, doi: 10.1007/s12083-016-0539-z.
  37. Q. Xu, P. Ren, H. Song, Q. Du, “Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations,” IEEE Access, vol. 4, pp. 2840–2853, 2016, doi: 10.1109/ACCESS.2016.2575863.
  38. D. Xu, P. Ren, Q. Du, L. Sun, “Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems,” International Journal of Distributed Sensor Networks, vol. 12, no. 8, p. 155014771666278, Aug. 2016, doi: 10.1177/1550147716662783.
  39. D. Xu, P. Ren, Q. Du, L. Sun, “Active jamming for multi-user information security improvement with the access statuses of users,” Security and Communication Networks, vol. 9, no. 16, pp. 3893–3910, Nov. 2016, doi: 10.1002/sec.1592.
  40. X. Wu, Q. Du, “Utility-function-based radio-access-technology selection for heterogeneous wireless networks,” Computers & Electrical Engineering, vol. 52, pp. 171–182, May 2016, doi: 10.1016/j.compeleceng.2015.06.010.
  41. D. Wang, P. Ren, Q. Du, L. Sun, Y. Wang, “Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks,” Sensors, vol. 16, no. 12, p. 1998, Nov. 2016, doi: 10.3390/s16121998.
  42. L. Sun, P. Ren, Q. Du, Y. Wang, “Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291–300, Feb. 2016, doi: 10.1109/TII.2015.2509442.
  43. L. Sun, Q. Du, P. Ren, Y. Wang, “Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767–8774, Oct. 2016, doi: 10.1109/TVT.2015.2505715.
  44. M. Hussain, Q. Du, L. Sun, P. Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345–5357, May 2016, doi: 10.1007/s11042-015-2936-3.
  45. Q. Du, W. Zhao, W. Li, X. Zhang, B. Sun, H. Song, P. Ren, L. Sun, Y. Wang, “Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks,” Journal of Medical Systems, vol. 40, no. 7, p. 171, Jul. 2016, doi: 10.1007/s10916-016-0506-5.
  46. Q. Du, W. Li, L. Liu, P. Ren, Y. Wang, L. Sun, “Dynamic RACH Partition for Massive Access of Differentiated M2M Services,” Sensors, vol. 16, no. 4, p. 455, Mar. 2016, doi: 10.3390/s16040455.
  47. H. Xu, L. Sun, P. Ren, Q. Du, “Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270–2273, Dec. 2015, doi: 10.1109/LCOMM.2015.2479231.
  48. D. Xu, P. Ren, Q. Du, L. Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147–159, Dec. 2015, doi: 10.1109/CC.2015.7385522.
  49. G. Wu, Q. Du, K. Hua, “Selective Random CDD Enhanced Joint Cooperative Relay and HARQ for Delay-Tolerant Vehicular Communications,” International Journal of Distributed Sensor Networks, vol. 11, no. 5, p. 657938, May 2015, doi: 10.1155/2015/657938.
  50. Y. Wang, P. Ren, Q. Du, L. Sun, “Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User’s Statistical Delay QoS Provisioning,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6896–6910, Dec. 2015, doi: 10.1109/TWC.2015.2462816.
  51. D. Wang, P. Ren, Q. Du, L. Sun, “Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network,” IEEE Access, vol. 3, pp. 1248–1259, 2015, doi: 10.1109/ACCESS.2015.2464081.
  52. D. Wang, P. Ren, Q. Du, L. Sun, Y. Wang, “Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–14, 2015, doi: 10.1155/2015/152851.
  53. L. Sun, P. Ren, Q. Du, Y. Wang, Z. Gao, “Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463–466, Mar. 2015, doi: 10.1109/LCOMM.2014.2385095.
  54. Q. Du, H. Song, Q. Xu, P. Ren, L. Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033–1043, Oct. 2015, doi: 10.1007/s00779-015-0872-x.
  55. Q. Xu, P. Ren, Q. Du, G. Wu, Q. Li, L. Sun, “AngleBased InterferenceAware Routing Algorithm for Multicast overWireless D2D Networks,” ZTE COMMUNICATIONS, vol. 12, no. 4, pp. 30–39, Dec. 2014, doi: 10.3969/j.issn.1673-5188.2014.04.005.
  56. L. Sun, P. Ren, Q. Du, “Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, p. 109, Dec. 2014, doi: 10.1186/1687-1499-2014-109.
  57. Pinyi Ren, Yichen Wang, Qinghe Du, “CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 2, pp. 237–250, Feb. 2014, doi: 10.1109/JSAC.2014.141205.
  58. H. Niu, M. Iwai, K. Sezaki, L. Sun, Q. Du, “Exploiting Fountain Codes for Secure Wireless Delivery,” IEEE Communications Letters, vol. 18, no. 5, pp. 777–780, May 2014, doi: 10.1109/LCOMM.2014.030914.140030.
  59. G. Li, P. Ren, G. Lv, Q. Du, “Highrate relay beamforming for simultaneous wireless information and power transfer, Electronics Letters, vol. 50, no. 23, pp. 17591761, Nov. 2014, doi: 10.1049/el.2014.2777.
  60. H. Chen, Q. Du, P. Ren, “A Joint Routing and Time-Slot Assignment Algorithm for Multi-Hop Cognitive Radio Networks with Primary-User Protection,” International Journal of Computers Communications & Control, vol. 7, no. 3, p. 403, Sep. 2014, doi: 10.15837/ijccc.2012.3.1383.
  61. W. Yin, P. Ren, F. Li, Q. Du, “Joint Sensing and Transmission for AF Relay Assisted PU Transmission in Cognitive Radio Networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp. 2249–2261, Nov. 2013, doi: 10.1109/JSAC.2013.131116.
  62. G. Wu, P. Ren, Q. Du, C. Zhang, “A DOF-based dynamic spectrum auction algorithm in cognitive femtocell: A DOF-BASED DYNAMIC SPECTRUM AUCTION ALGORITHM IN COGNITIVE FEMTOCELL,” Concurrency and Computation: Practice and Experience, vol. 25, no. 9, pp. 1126–1143, Jun. 2013, doi: 10.1002/cpe.2883.
  63. L. Sun, Q. Du, P. Ren, “Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 11, p. 505831, Nov. 2013, doi: 10.1155/2013/505831.
  64. Q. Du, C. Zhang, “Queuing analyses and statistically bounded delay control for two-hop green wireless relay transmissions: QUEUING ANALYSES AND STATISTICALLY BOUNDED DELAY CONTROL FOR WIRELESS RELAY,” Concurrency and Computation: Practice and Experience, vol. 25, no. 9, pp. 1050–1063, Jun. 2013, doi: 10.1002/cpe.2875.
  65. G. Wu, P. Ren, Q. Du, “Recall-Based Dynamic Spectrum Auction with the Protection of Primary Users,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 10, pp. 2070–2081, Nov. 2012, doi: 10.1109/JSAC.2012.121120.
  66. Wenshan Yin, Pinyi Ren, Qinghe Du, Yichen Wang, “Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2148–2159, Jun. 2012, doi: 10.1109/TWC.2012.032812.110594.
  67. Y. Wang, P. Ren, Q. Du, C. Zhang, “Optimal Resource Allocation for Spectrum Sensing Based Cognitive Radio Networks with Statistical QoS Guarantees,” Mobile Networks and Applications, vol. 17, no. 6, pp. 711–720, Dec. 2012, doi: 10.1007/s11036-012-0388-9.
  68. P. Ren, Y. Wang, Q. Du, J. Xu, “A survey on dynamic spectrum access protocols for distributed cognitive wireless networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 60, Dec. 2012, doi: 10.1186/1687-1499-2012-60.
  69. F. Li, P. Ren, Q. Du, “Joint Packet Scheduling and Subcarrier Assignment for Video Communications Over Downlink OFDMA Systems,” IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2753–2767, Jul. 2012, doi: 10.1109/TVT.2012.2195511.
  70. Q. Du, X. Zhang, “QoS-Aware Base-Station Selections for Distributed MIMO Links in Broadband Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 6, pp. 1123–1138, Jun. 2011, doi: 10.1109/JSAC.2011.110602.
  71. Q. Du, X. Zhang, “Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 3, pp. 420–433, Apr. 2010, doi: 10.1109/JSAC.2010.100413.
  72. Q. Du, X. Zhang, “A cross-layer framework for multi-layer-video multicast with QoS requirements in multirate wireless networks,” IEEE Communications Letters, vol. 13, no. 9, pp. 658–660, Sep. 2009, doi: 10.1109/LCOMM.2009.082211.
  73. X. Zhang, Q. Du, “Cross-Layer Modeling for QoS-Driven Multimedia Multicast/Broadcast over Fading Channels in Mobile Wireless Networks,” IEEE Communications Magazine, vol. 45, no. 8, pp. 62–70, Aug. 2007, doi: 10.1109/MCOM.2007.4290316.
  74. X. Zhang, Q. Du, “Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services Over Wireless Networks,” IEEE Transactions on Vehicular Technology, vol. 55, no. 5, pp. 1633–1647, Sep. 2006, doi: 10.1109/TVT.2006.874547.