default search action
Chunjing Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Ruishuo Mu, Chunjing Hu, Zeyu Hu, Yong Li:
Dynamic Beam Hopping for LEO Satellites with Differentiated Traffic Demands. WCSP 2023: 621-626 - 2022
- [c25]Ning Jiang, Shi Yan, Zhuohan Liu, Chunjing Hu, Mugen Peng:
Communication and Computation Assisted Sensing Information Freshness Performance Analysis in Vehicular Networks. ICC Workshops 2022: 969-974 - [i3]Ning Jiang, Shi Yan, Zhuohan Liu, Chunjing Hu, Mugen Peng:
Communication and Computation Assisted Sensing Information Freshness Performance Analysis in Vehicular Networks. CoRR abs/2204.05995 (2022) - 2020
- [j4]Yue Tan, Chunjing Hu, Kuan Zhang, Kan Zheng, Ethan A. Davis, Jae Sung Park:
LSTM-Based Anomaly Detection for Non-Linear Dynamical System. IEEE Access 8: 103301-103308 (2020) - [j3]Bonan Yin, Mugen Peng, Shi Yan, Chunjing Hu:
Tradeoff Between Ergodic Rate and Delivery Latency in Fog Radio Access Networks. IEEE Trans. Wirel. Commun. 19(4): 2240-2251 (2020) - [c24]Yichen Guo, Chunjing Hu, Tao Peng, Haiming Wang, Xin Guo:
Regression-Based Uplink Interference Identification and SINR Prediction for 5G Ultra-Dense Network. ICC 2020: 1-6 - [i2]Bonan Yin, Mugen Peng, Shi Yan, Chunjing Hu:
Tradeoff between Ergodic Rate and Delivery Latency in Fog Radio Access Networks. CoRR abs/2002.05437 (2020) - [i1]Yue Tan, Chunjing Hu, Kuan Zhang, Kan Zheng, Ethan A. Davis, Jae Sung Park:
LSTM-based Anomaly Detection for Non-linear Dynamical System. CoRR abs/2006.03193 (2020)
2010 – 2019
- 2019
- [c23]Yang Li, Chunjing Hu, Jun Wang, Mingfeng Xu:
Optimization of URLLC and eMBB Multiplexing via Deep Reinforcement Learning. ICCC Workshops 2019: 245-250 - 2018
- [j2]Weiqi Sun, Yong Li, Chunjing Hu, Mugen Peng:
Joint Optimization of Cache Placement and Bandwidth Allocation in Heterogeneous Networks. IEEE Access 6: 37250-37260 (2018) - [c22]Xueyan Cao, Chunjing Hu, Yan Shi:
A Matching Game Approach for Joint Resource Allocation and User Association in Fog Radio Access Networks. ICCC Workshops 2018: 277-281 - [c21]Chunjing Hu, Yueliang Zhang:
5G NR Primary Synchronization Signal Detection with Low Hardware Resource Occupancy. ICCC 2018: 304-308 - [c20]Dongxue Tang, Chunjing Hu, Tian Dang:
Delay-Aware Resource Allocation for Network Slicing in Fog Radio Access Networks. WCSP 2018: 1-6 - 2017
- [c19]Linna Chen, Chunjing Hu, Yong Li, Wenbo Wang:
A Utility-Based Resource Allocation in Virtualized Cloud Radio Access Network. 5GWN 2017: 288-299 - [c18]Yuan Qi, Rongrong Qian, Chunjing Hu:
Identifying the Full-Diversity Solution of MIMO Detection: A Fine-Grained Approach. WCNC 2017: 1-6 - 2015
- [c17]Wentao Fan, Yiran Peng, Zhe Yuan, Pengyu Chen, Chunjing Hu, Xing Zhang:
Sensing and Monitoring for Cellular Networks: A Crowdsourcing Platform from Mobile Smartphones. DSDIS 2015: 472-473 - 2014
- [j1]Feng Jiang, Xiaodong Ji, Chunjing Hu, Shaohui Liu, Debin Zhao:
Compressed Vision Information Restoration Based on Cloud Prior and Local Prior. IEEE Access 2: 1117-1127 (2014) - [c16]Zhonghua He, Chunjing Hu, Tao Peng, Chong Ma:
A compression scheme for LTE baseband signal in C-RAN. ChinaCom 2014: 202-207 - [c15]Yilong Pang, Chunjing Hu, Tao Peng, Deping Lin, Yinxin Wang:
Poster: An optimization based on semi-blind detection for LTE PUCCH format 2. ChinaCom 2014: 656-657 - [c14]Li Zhang, Yang Yang, Chunjing Hu, Tao Peng, Wenbo Wang:
A spectrum reuse scheme based on region division for secondary users in cognitive radio networks. ICCC 2014: 801-806 - 2013
- [c13]Xiaohua Wu, Yuexing Peng, Chunjing Hu, Hui Zhao, Lei Shu:
A secret key generation method based on CSI in OFDM-FDD system. GLOBECOM Workshops 2013: 1297-1302 - [c12]Xiaohua Wu, Chunjing Hu, Yuexing Peng, Hui Zhao, Hongtao Duan:
Secret key extraction based on uplink CFR estimation for OFDM-FDD system. ICCT 2013: 37-41 - [c11]Yuze Zhou, Chunjing Hu, Tao Peng:
An efficient design of FPGA-based sample rate converting filter in Software Defined Radio. ICCT 2013: 634-638 - [c10]Bo Peng, Chunjing Hu, Tao Peng, Yang Yang, Wenbo Wang:
A resource allocation scheme for D2D multicast with QoS protection in OFDMA-based systems. PIMRC 2013: 2383-2387 - [c9]Bo Peng, Tao Peng, Ziyang Liu, Yufeng Yang, Chunjing Hu:
Cluster-Based Multicast Transmission for Device-to-Device (D2D) Communication. VTC Fall 2013: 1-5 - 2012
- [c8]Pei Liu, Chunjing Hu, Tao Peng, Wenbo Wang:
Distributed cooperative admission and power control for Device-to-Device links with QoS protection in cognitive heterogeneous network. CHINACOM 2012: 712-716 - [c7]Wei Fang, Chunjing Hu, Zhuo Sun, Shibo Hou:
Improved joint network-channel coding for the multiple-access relay channel. CHINACOM 2012: 722-726 - [c6]Pei Liu, Chunjing Hu, Tao Peng, Rongrong Qian, Wenbo Wang:
Admission and power control for Device-to-Device links with quality of service protection in spectrum sharing hybrid network. PIMRC 2012: 1192-1197 - 2011
- [c5]Lili Xie, Chunjing Hu, Wenjun Wu, Zhenning Shi:
QoE-aware Power Allocation Algorithm in Multiuser OFDM Systems. MSN 2011: 418-422
2000 – 2009
- 2009
- [c4]Guang Lei, Chunjing Hu, Wei Wang, Tao Peng, Wenbo Wang:
Increase the end-to-end throughput of a cognitive radio chain by considering the primary usage pattern and transmission scheduling. WCNC 2009: 1386-1391 - 2008
- [c3]Yuexin Wang, Chunjing Hu, Hongmei Liu, Mugen Peng, Wenbo Wang:
Network coding in cooperative relay networks. PIMRC 2008: 1-5 - [c2]Wei Hong, Chunjing Hu, Wenbo Wang, Jing Han:
Providing Quality of Service for Voice-over-IP over TD-SCDMA HSDPA. VTC Fall 2008: 1-5 - 2003
- [c1]Mugen Peng, Jinwen Zhang, Chunjing Hu, Wenbo Wang:
Handover performance analysis in TDD-CDMA cellular network. WCNC 2003: 806-811
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint