期刊论文

​​​​​

  1. Dongyang Xu, Keping Yu, Lei Liu, Guolong Chen, Neeraj Kumar, Mohsen Guizani  and James A. Ritcey, ``Post-Quantum Authentication Against Cyber-Physical Attacks in V2X Based Autonomous Vehicle Platoon,’’ MAJOR REVISIONS, IEEE Transactions on Intelligent Transportation Systems, 2023.
  2. Dongyang Xu, Keping YuKim Kwang Raymond Choo and James A. Ritcey, ``Edge Security Architecture with Post-Quantum AI  for  Blockchain-Based  IoT Healthcare Systems,’’ submitted to IEEE Transactions on Dependable and Secure Computing, 2022.
  3. Dongyang Xu, Keping Yu, Li Zhen, Kim-Kwang Raymond Choo, and Mohsen Guizani, ``Quantum Learning on Structured Code with Computing Traps for Secure URLLC in Industrial IoT Scenarios,’’ accepted by IEEE Internet of Things Journal, 2023.
  4. Dongyang Xu, Lei Liu, Ning Zhang, Mianxiong Dong, Victor C. M. Leung and James A. Ritcey, ``Nested Hash Access with Post Quantum Encryption for Mission-Critical IoT Communications,’’ accepted by IEEE Internet of Things Journal, 2023.
  5. Tiantian Zhang, Pinyi Ren, Dongyang Xu* and Zhanyi Ren, ``RIS Subarray Optimization With Reinforcement Learning for Green Symbiotic Communications in Internet of Things (IoT),’’ accepted by IEEE Internet of Things Journal, 2023.
  6. Yuncong Xie, Pinyi Ren and Dongyang Xu*, ``Security-Oriented Pilot and Data Transmission for URLLC in Mission-Critical IoT Scenarios,’’ accepted by IEEE Internet of Things Journal, 2023.
  7. Dongyang Xu, Keping Yu and James A. Ritcey, “Cross-Layer Device Authentication with Quantum Encryption for 5G Enabled IIoT in Industry 4.0” accepted by IEEE Transactions on Industrial Informatics, 2021.(Hot Paper 0.1%) 
  8. Dongyang Xu and Pinyi Ren, “Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC,” accepted by IEEE Transactions on Information Forensics and Security, 2021.
  9. Dongyang Xu and James A. Ritcey, “Hashed Anti-Denial of Access for V2N URLLC Services: A Probabilistic Graph Approach,” accepted by IEEE Transactions on Vehicular Technology, 2021.
  10. Dongyang Xu and Pinyi Ren, “Concatenated Graph Coding on Bandwidth Part for Secure Pilot Authentication in Grant-Free URLLC,” accepted by IEEE Open Journal of the Computer Society, 2020.
  11. Dongyang Xu, Pinyi Ren, and James A. Ritcey, “PHY-layer cover-free coding for wireless pilot authentication in IoV communications: Protocol design and ultra-security proofIEEE Internet of Things Journalvol. 6, no. 1, pp. 171-187, Feb. 2019.
  12. Dongyang Xu, Pinyi Ren, and James A. Ritcey, “Hierarchical 2-D feature coding for secure pilot authentication in multi-user multi-antenna OFDM systems: A reliability bound contraction perspective,” IEEE Transactions on Information Forensics and Security, vol.14, no. 3, pp. 592-607, Mar. 2019.
  13. Dongyang Xu, Pinyi Ren, and James A. Ritcey,“Independence-checking coding for OFDM channel trainingauthentication: Protocol design, security, stability, and tradeoff analysis,” IEEE Transactions on Information Forensics and Security, vol.14, no. 2, pp. 387-402, Feb. 2019.
  14. Dongyang Xu, Pinyi Ren, James A. Ritcey and Yichen Wang,“Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1778-1793, July 2018.
  15. Dongyang Xu, Pinyi Ren, and James A. Ritcey, “Reliability and accessibility of low-latency V2I channel training protocol using cover-free coding: Win–win or tradeoff?”IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2294 -2305, Mar. 2019.
  16. Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147-159, Dec. 2015. (SCI Source, Best Paper Award 2017)
  17. Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Towards win-win: Weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” SCIENCE CHINA-Information Sciences, vol. 60, no. 4, pp. 1-17, Mar. 2017.
  18. Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems,” International Journal of Distributed Sensor Networks, vol. 12, no. 8, Aug. 2016.

会议论文

未更新

  Dongyang Xu, Pinyi Ren, Qiang Li and Hongliang, He, “Jamming-immune receiver design for MIMO NOMA systems using optimal manifold filtering,” in Proc. IEEE Wireless Communications and Netwokring Conference (WCNC), Marrakesh, Morocco, 15-18 Apr. 2019, pp. 1-6.

11.    Dongyang Xu, Pinyi Ren, and James A. Ritcey, “Optimal independence-checking coding for secure uplink training in large-scale MISO-OFDM systems,” in Proc. IEEE International Conference on Communications (ICC), Kansas City, USA, 20-24 May 2018, pp. 1-6.

12.    Dongyang Xu, Pinyi Ren, James A. Ritcey, Hongliang He, and Qian Xu, “ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15-18 Apr. 2018, pp. 1-6.

13.    Dongyang Xu, Pinyi Ren, and James A. Ritcey, “Optimal grassmann manifold eavesdropping: A huge security disaster for M-1-2 wiretap channels,” in Porc. IEEE Global Communications Conference (GLOBECOM), Singapore, Singapore, 4-8 Dec. 2017, pp. 1-6.

14.    Dongyang Xu, Pinyi Ren, and James A. Ritcey, “Artificial-noise-resistant eavesdropping in MISO wiretap channels: Receiver construction and performance analysis,” in Proc. IEEE Vehicular Technology Conference (VTC -Fall), Toronto, Canada, 24-27 Sept. 2017, pp. 1-5.

15.    Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack,” in Proc. IEEE International Conference on Communications (ICC), Paris, France,  21-25 May 2017, pp. 1-6.

16.    Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun and Yichen Wang, “Weighted-Voronoi-diagram based codebook design against passive eavesdropping for MISO systems,” in Proc. IEEE Vehicular Technology Conference (VTC-Spring), Sydney, NSW, Australia, 4-7 June 2017, pp.1-5.

17.    Dongyang Xu, Qinghe Du, Pinyi Ren, Li Sun, Weidong Zhao, and Zunhe Hu, “AF-based CSI feedback for user selection in multi-user MIMO systems,” in Proc. IEEE Global Communication Conference (GLOBECOM), 2015, San Diego, USA, 6-10 Dec. 2015, pp. 1-6.

18.    Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint secure beamforming and user selection for multiuser MISO systems with confidential messages,” in Proc. the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA), Qufu, China, Aug. 2015, pp. 644-653.

19.    Xiaojing Shi, Pinyi Ren, Dongyang Xu, “A Flexible Iterative Log-MPA Detector for Uplink SCMA Systems,” in Proc. International Conference on Internet of Things as a Service, Xi’an, China, 17-18, Nov. 2018, pp. 292-302.

20.    Qian Xu, Pinyi Ren, Hongliang He, and Dongyang Xu, “Security-aware routing for artificial-noise-aided multihop secondary communications,” in Proc. IEEE Wireless Communications and Netwokring Conference (WCNC), Barcelona, Spain, 15-18 Apr. 2018, pp. 1-5.

21.    Xiao Tang, Pinyi Ren, Datong Xu and Dongyang Xu, “Robust secrecy competition in wireless networks,” in Proc. IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 Oct. 2017, pp. 1-5.

22.    Zhangnan Wang, Yichen Wang, Lu Wang, Tao Wang, and Dongyang Xu, "A delay-driven early caching and sharing strategy for D2D transmission network," in Proc. IEEE Vehicular Technology Conference (VTC-Spring), Antwerp, Belgium, 25-28 May 2020.

23.    Tao Wang, Yichen Wang, Dongyang Xu, and Zhangnan Wang, "Resource allocation for mMTC/H2H coexistence with H2H's success probability of data transmission," in Proc. IEEE Wireless Communications and Netwokring Conference (WCNC), Seoul, South Korea, 6-9 Apr. 2020, pp. 1-5.

24.    Zihuan Yang, Yichen Wang, Zhangnan Wang, and Dongyang Xu, "Power back-off based non-orthogonal random access scheme for massive MTC networks," in Proc. IEEE Global Communications Conference (GLOBECOM) 2019, Waikoloa, USA, 9-13 Dec. 2019, pp. 1-6.

25.    Shuyu Zhao, Yichen Wang, Yuncong Xie, and Dongyang Xu, "Joint time-frequency diversity based uplink grant-free transmission scheme for URLLC," in Proc. International Conference on Wireless Communications and Signal Processing (WCSP) 2019, Xi'an, China, 23-25 Oct. 2019, pp. 1-6.

26.    Qiang Li, Pinyi Ren, Qinghe Du, Dongyang Xu and Yuncong Xie “Safeguarding NOMA enhanced cooperative D2D communications via friendly jamming,” in Proc. IEEE 90th Vehicular Technology Conference (VTC-Fall), Honolulu, USA, 22-25 Sept. 2019, pp. 1-5.

27.    Yuncong Xie, Pinyi Ren, Yichen Wang, Dongyang Xu, Qiang Li and Qinghe Du “Power-efficient uplink resource allocation for ultra-reliable and low-latency communication,” in Proc. IEEE 90th Vehicular Technology Conference (VTC-Fall), Honolulu, USA, 22-25 Sept. 2019, pp. 1-5.

28.    Qiang Li, Pinyi Ren, Qinghe Du, Dongyang Xu, and Yuncong Xie, “Optimal full-duplex jamming for safeguarding two-hop relay networks,” in Proc. IEEE 90th Vehicular Technology Conference (VTC-Fall), Honolulu, USA, 22-25 Sept. 2019, pp. 1-5.

29.    Qian Xu, Pinyi Ren and Dongyang Xu, “Combating unknown eavesdroppers by using multipath wireless receptions,” in Proc. IEEE International Conference on Communications (ICC), Shanghai, China, 20-24 May 2019, pp. 1-6.