default search action
Yichen Wang 0002
Person information
- affiliation (PhD 2013): Xi'an Jiaotong University, Department of Information and Communications Engineering, China
Other persons with the same name
- Yichen Wang — disambiguation page
- Yichen Wang 0001 — Georgia Institute of Technology, Atlanta, GA, USA
- Yichen Wang 0003 — Beihang University, Beijing, China
- Yichen Wang 0004 — University of California, Davis, CA, USA
- Yichen Wang 0005 — University of Pennsylvania, PA, USA
- Yichen Wang 0006 — North Minzu University, Yinchuan, China
- Yichen Wang 0007 — University of Toronto, ON, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Tao Wang, Yichen Wang, Yixin Wang, Julian Cheng:
A Resource-Efficient Coexistence Scheme for Massive Machine-Type and Human-to-Human Communications. IEEE Trans. Commun. 72(3): 1862-1877 (2024) - [j43]Haotian Liu, Yichen Wang, Peixuan Li, Julian Cheng:
A Multi-Agent Deep Reinforcement Learning-Based Handover Scheme for Mega-Constellation Under Dynamic Propagation Conditions. IEEE Trans. Wirel. Commun. 23(10): 13579-13596 (2024) - [j42]Dichen Jiu, Yichen Wang, Moqi Liu, Julian Cheng:
Deep Deterministic Policy Gradient-Based Physical Layer Authentication Scheme Under Unknown Attacking Environment. IEEE Wirel. Commun. Lett. 13(11): 3247-3251 (2024) - [c67]Yixin Wang, Yichen Wang, Tao Wang, Julian Cheng:
Joint Channel Estimation and User Activity Detection for mmWave Grant-Free Massive MTC Networks Under Pilot Contamination Attack. VTC Spring 2024: 1-7 - 2023
- [j41]Yixin Wang, Yichen Wang, Tao Wang, Julian Cheng:
Multi-Service Oriented Joint Channel Estimation and Multi-User Detection Scheme for Grant-Free Massive MTC Networks. IEEE Trans. Commun. 71(11): 6416-6434 (2023) - [c66]Meng Li, Li Sun, Yichen Wang:
A Deep Learning Based Receiver for Wireless Communications Systems With Unknown Channel Models. ICCCS 2023: 588-596 - [c65]Zhangnan Wang, Yichen Wang, Shuai Sun:
Two-Layer Game Based Covert Communication Strategy Against Jamming Attack Oriented Warden. VTC Fall 2023: 1-5 - 2022
- [j40]Zhangnan Wang, Yichen Wang:
An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach. Mob. Networks Appl. 27(5): 2163-2169 (2022) - [c64]Peixuan Li, Yichen Wang, Zhangnan Wang:
A Game-Based Joint Task Offloading and Computation Resource Allocation Strategy for Hybrid Edgy-Cloud and Cloudy-Edge Enabled LEO Satellite Networks. ICCC 2022: 868-873 - [c63]Haotian Liu, Yichen Wang, Yixin Wang:
A Successive Deep Q-Learning Based Distributed Handover Scheme for Large-Scale LEO Satellite Networks. VTC Spring 2022: 1-6 - [c62]Zhangnan Wang, Yichen Wang:
A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game. VTC Spring 2022: 1-5 - [c61]Yixin Wang, Yichen Wang, Tao Wang, Julian Cheng:
Diverse Traffic Demands Oriented Multi-User Detection for Grant-Free Massive MTC Networks. WCNC 2022: 2094-2099 - [c60]Xiaofen Jiao, Yichen Wang, Haotian Liu, Tao Wang:
Dynamic Beam Assignment-based Secure Beamforming Scheme in Large-scale Multi-beam LEO Satellite Constellation. WCSP 2022: 842-847 - 2021
- [j39]Tao Wang, Yichen Wang, Chunfeng Wang, Zihuan Yang, Julian Cheng:
Group-Based Random Access and Data Transmission Scheme for Massive MTC Networks. IEEE Trans. Commun. 69(12): 8287-8303 (2021) - [c59]Xiaofen Jiao, Yichen Wang, Zhangnan Wang, Tao Wang:
Joint Opportunistic Satellite Scheduling and Beamforming for Secure Transmission in Cognitive LEO Satellite Terrestrial Networks. ChinaCom 2021: 65-79 - [c58]Shuyu Zhao, Yichen Wang, Tao Wang, Zhangnan Wang:
A Reservation-Based Hybrid Multiple Access Scheme for URLLC Coexisting with eMBB. ICCC 2021: 916-921 - 2020
- [j38]Yichen Wang, Tao Wang, Zihuan Yang, Dawei Wang, Julian Cheng:
Throughput-Oriented Non-Orthogonal Random Access Scheme for Massive MTC Networks. IEEE Trans. Commun. 68(3): 1777-1793 (2020) - [c57]Zhangnan Wang, Yichen Wang, Lu Wang, Tao Wang, Dongyang Xu:
A Delay-Driven Early Caching and Sharing Strategy for D2D Transmission Network. VTC Spring 2020: 1-5 - [c56]Tao Wang, Yichen Wang, Dongyang Xu, Zhangnan Wang:
Resource Allocation for mMTC/H2H Coexistence with H2H's Success Probability of Data Transmission. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j37]Wei Li, Meng-Lin Ku, Yan Chen, Yichen Wang, Zhonghua Liang:
Transmission Policy of Two-Way Relay Networks With Multiple Stochastic Energy Harvesting Nodes. IEEE Access 7: 76967-76984 (2019) - [j36]Wei Li, Meng-Lin Ku, Yichen Wang, Zhonghua Liang:
Stochastic Energy Harvesting and Relay Selection for Two-Way Dual-Relay Networks. IEEE Access 7: 125323-125332 (2019) - [j35]Yichen Wang, Lu Wang:
Matching Theory-Based Cooperative Secure Transmission Strategy for Social-Aware D2D Communications. IEEE Trans. Veh. Technol. 68(10): 10289-10294 (2019) - [j34]Yichen Wang, Xiao Tang, Tao Wang:
A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach. IEEE Trans. Wirel. Commun. 18(3): 1548-1565 (2019) - [c55]Zihuan Yang, Yichen Wang, Zhangnan Wang, Dongyang Xu:
Power Back-Off Based Non-Orthogonal Random Access Scheme for Massive MTC Networks. GLOBECOM 2019: 1-6 - [c54]Yuncong Xie, Pinyi Ren, Yichen Wang, Dongyang Xu, Qiang Li, Qinghe Du:
Power-Efficient Uplink Resource Allocation for Ultra-Reliable and Low-Latency Communication. VTC Fall 2019: 1-5 - [c53]Yuncong Xie, Pinyi Ren, Yichen Wang, Jiuchao Li:
Power Consumption-Oriented Resource Allocation Strategy for Ultra-Reliable Low-Latency Communication. WCNC 2019: 1-6 - [c52]Zhuang Li, Yichen Wang, Tao Wang, Zhangnan Wang:
Joint Access Control and Resource Allocation for mMTC based on Tagged Preamble. WCSP 2019: 1-6 - [c51]Tao Wang, Yichen Wang, Zhuang Li, Zhangnan Wang:
Resource Allocation in Opportunistic Cooperative Cognitive Radio Network with PU's Statistical Delay QoS Provisioning. WCSP 2019: 1-6 - [c50]Zihuan Yang, Yichen Wang, Zhangnan Wang, Tao Wang:
Relaying Threshold Based Random Access and Data Transmission Scheme for Grouped Massive MTC Networks. WCSP 2019: 1-6 - [c49]Shuyu Zhao, Yichen Wang, Yuncong Xie, Dongyang Xu:
Joint Time-Frequency Diversity Based Uplink Grant-Free Transmission Scheme for URLLC. WCSP 2019: 1-6 - [i4]Dongyang Xu, Pinyi Ren, Yichen Wang, James A. Ritcey:
Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI. CoRR abs/1909.01521 (2019) - 2018
- [j33]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User. Mob. Networks Appl. 23(4): 1068-1079 (2018) - [j32]Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. IEEE Trans. Inf. Forensics Secur. 13(7): 1778-1793 (2018) - [c48]Wenwen Xu, Yichen Wang, Tao Wang:
QoS-Driven Subchannel and Power Allocation for Security-Aware D2D Underlaying Cellular Networks. GLOBECOM 2018: 1-7 - [c47]Yichen Wang, Tao Wang, Xiao Tang, Pinyi Ren:
QoS and Security Aware Power Allocation Scheme for Wiretap Cognitive Radio Networks. VTC Fall 2018: 1-6 - [i3]Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. CoRR abs/1801.07356 (2018) - 2017
- [j31]Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun:
Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks. IEEE Access 5: 3763-3776 (2017) - [j30]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60(4): 040303:1-040303:17 (2017) - [j29]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Traffic-aware overload control scheme in 5G ultra-dense M2M networks. Trans. Emerg. Telecommun. Technol. 28(9) (2017) - [j28]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Enhancing physical-layer security via big-data-aided hybrid relay selection. J. Commun. Inf. Networks 2(1): 97-110 (2017) - [j27]Xiao Tang, Pinyi Ren, Yichen Wang, Zhu Han:
Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective. IEEE Trans. Commun. 65(3): 1379-1395 (2017) - [j26]Dawei Wang, Pinyi Ren, Julian Cheng, Yichen Wang:
Achieving Full Secrecy Rate With Energy-Efficient Transmission Control. IEEE Trans. Commun. 65(12): 5386-5400 (2017) - [j25]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. IEEE Trans. Inf. Forensics Secur. 12(4): 825-839 (2017) - [j24]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition. IEEE Trans. Veh. Technol. 66(12): 10732-10747 (2017) - [c46]Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks. GLOBECOM 2017: 1-6 - [c45]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network. GLOBECOM 2017: 1-6 - [c44]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. ICC 2017: 1-6 - [c43]Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack. ICC 2017: 1-6 - [c42]Dawei Wang, Pinyi Ren, Julian Cheng, Yichen Wang, Li Sun, Qinghe Du:
Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback. VTC Fall 2017: 1-5 - [c41]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement. VTC Spring 2017: 1-5 - [c40]Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Weighted-Voronoi-Diagram Based Codebook Design against Passive Eavesdropping for MISO Systems. VTC Spring 2017: 1-5 - [c39]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers. WCNC 2017: 1-6 - [c38]Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Physical Layer Security Improvement by Constellation Selection and Artificial Interference. WCNC 2017: 1-6 - 2016
- [j23]Qinghe Du, Weidong Zhao, Weimin Li, Xuelin Zhang, Bo Sun, Houbing Song, Pinyi Ren, Li Sun, Yichen Wang:
Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks. J. Medical Syst. 40(7): 171:1-171:8 (2016) - [j22]Yichen Wang, Wenwen Xu:
Statistical Delay QoS Provisioning for Energy-Efficient Spectrum-Sharing Based Wireless Ad Hoc Sensor Networks. J. Sensors 2016: 6545791:1-6545791:13 (2016) - [j21]Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic RACH Partition for Massive Access of Differentiated M2M Services. Sensors 16(4): 455 (2016) - [j20]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks. Sensors 16(12): 1998 (2016) - [j19]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 12(1): 291-300 (2016) - [j18]Li Sun, Qinghe Du, Pinyi Ren, Yichen Wang:
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation. IEEE Trans. Veh. Technol. 65(10): 8767-8774 (2016) - [j17]Hao Lu, Yichen Wang, Yan Chen, K. J. Ray Liu:
Stable Throughput Region and Admission Control for Device-to-Device Cellular Coexisting Networks. IEEE Trans. Wirel. Commun. 15(4): 2809-2824 (2016) - [c37]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security. GLOBECOM Workshops 2016: 1-6 - [c36]Hongliang He, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Secure Communication Using Noisy Feedback. GLOBECOM 2016: 1-6 - [c35]Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks. GLOBECOM 2016: 1-7 - [c34]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
On achievable secrecy rate by noise aggregation over wireless fading channels. ICC 2016: 1-6 - [c33]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint. ICCS 2016: 1-5 - [c32]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks. VTC Fall 2016: 1-5 - [c31]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks. VTC Spring 2016: 1-5 - [c30]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System. VTC Fall 2016: 1-5 - [c29]Wanyu Li, Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Security enhanced via dynamic fountain code design for wireless delivery. WCNC 2016: 1-6 - [c28]Dawei Wang, Pinyi Ren, Yichen Wang, Li Sun, Qinghe Du:
Two-path successive relaying and jamming for securing the primary system. WPMC 2016: 166-171 - 2015
- [j16]Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, Zhenzhen Gao:
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes. IEEE Commun. Lett. 19(3): 463-466 (2015) - [j15]Yichen Wang, K. J. Ray Liu:
Statistical Delay QoS Protection for Primary Users in Cooperative Cognitive Radio Networks. IEEE Commun. Lett. 19(5): 835-838 (2015) - [j14]Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks. Int. J. Distributed Sens. Networks 11: 152851:1-152851:14 (2015) - [j13]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning. IEEE Trans. Wirel. Commun. 14(12): 6896-6910 (2015) - [c27]Hao Lu, Yichen Wang, Yan Chen, K. J. Ray Liu:
Interference model and analysis on device-to-device cellular coexist networks. GlobalSIP 2015: 1086-1090 - [c26]Pinyi Ren, Yichen Wang, Bei Qi, Qinghe Du, Li Sun:
Cyclic-Shifting Based Sequential Cooperative Spectrum Sensing Strategy for Multi-Channel Cognitive Radio Networks. GLOBECOM 2015: 1-5 - [c25]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework. GLOBECOM 2015: 1-6 - [c24]Yiyan Zhang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Antenna Tilt Assignment for Three-Dimensional Beamforming in Multiuser Systems. GLOBECOM 2015: 1-6 - [c23]Hongliang He, Qinghe Du, Houbing Song, Wanyu Li, Yichen Wang, Pinyi Ren:
Traffic-aware ACB scheme for massive access in machine-to-machine networks. ICC 2015: 617-622 - [c22]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs. ICC Workshops 2015: 1003-1008 - [c21]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
User association as a stochastic game for enhanced performance in heterogeneous networks. ICC 2015: 3417-3422 - [c20]Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun:
Power allocation for cognitive radio networks with statistical QoS provisioning of primary users. ICC 2015: 7719-7724 - [c19]Wanyu Li, Qinghe Du, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks. IIKI 2015: 140-145 - [c18]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system. IWCMC 2015: 90-95 - [c17]Qian Yang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang, Gangming Lv:
Prediction based interference management and distributed trajectory regulation in amorphous cells. WCNC Workshops 2015: 299-304 - [c16]Qinghe Du, Li Sun, Pinyi Ren, Yichen Wang:
Statistical security model and power adaptation over wireless fading channels. WCSP 2015: 1-6 - 2014
- [j12]Zhenzhen Gao, Li Sun, Yichen Wang, Xuewen Liao:
Double Differential Transmission for Amplify-and-Forward Two-Way Relay Systems. IEEE Commun. Lett. 18(10): 1839-1842 (2014) - [j11]Pinyi Ren, Yichen Wang, Qinghe Du:
CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks. IEEE J. Sel. Areas Commun. 32(2): 237-250 (2014) - [j10]Yichen Wang, Pinyi Ren, Feifei Gao, Zhou Su:
A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning. IEEE Trans. Wirel. Commun. 13(3): 1482-1498 (2014) - [c15]Qinghe Du, Pinyi Ren, Yichen Wang, Li Sun:
Sustainability-Driven Power Control for Energy Harvesting Enhanced Wireless Transmission. CIT 2014: 812-817 - [c14]Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks. GlobalSIP 2014: 1320-1324 - [c13]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation. GLOBECOM 2014: 2479-2484 - [c12]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Buffering-aided resource allocation for Type I relay in LTE-Advanced cellular networks. GLOBECOM 2014: 4484-4489 - [c11]Dong Liang, Pinyi Ren, Li Sun, Qinghe Du, Yichen Wang:
Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels. ICCS 2014: 467-471 - [c10]Qinghe Du, Pinyi Ren, Houbing Song, Yichen Wang, Li Sun:
On P2P-Share Oriented Routing over Interference-Constrained D2D Networks. MSN 2014: 138-143 - [c9]Long Wang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang:
Load-Aware Relay Selection in LTE - A System via Global Differentiated-Fairness Control. MSN 2014: 308-314 - [c8]Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks. VTC Fall 2014: 1-5 - [c7]Dawei Wang, Pinyi Ren, Yichen Wang:
Joint subcarrier and power allocation for reciprocally-benefited spectrum sharing in cognitive radio networks. WCNC 2014: 1809-1814 - [c6]Di Zhang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun:
Energy management scheme for mobile terminals in energy efficient heterogeneous network. WCSP 2014: 1-5 - 2013
- [j9]Yichen Wang, Pinyi Ren, Feifei Gao:
Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks. IEEE Signal Process. Lett. 20(1): 43-46 (2013) - 2012
- [j8]Pinyi Ren, Jia Feng, Yichen Wang:
A directional MAC protocol with long-range communication ability in ad hoc networks. Sci. China Inf. Sci. 55(4): 765-777 (2012) - [j7]Yichen Wang, Pinyi Ren, Fan Li, Zhou Su:
Cross-layer based power allocation over cognitive wireless relay link with statistical delay QoS guarantees. Concurr. Comput. Pract. Exp. 24(11): 1239-1251 (2012) - [j6]Pinyi Ren, Yichen Wang, Qinghe Du, Jing Xu:
A survey on dynamic spectrum access protocols for distributed cognitive wireless networks. EURASIP J. Wirel. Commun. Netw. 2012: 60 (2012) - [j5]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
Optimal Resource Allocation for Spectrum Sensing Based Cognitive Radio Networks with Statistical QoS Guarantees. Mob. Networks Appl. 17(6): 711-720 (2012) - [j4]Wenshan Yin, Pinyi Ren, Qinghe Du, Yichen Wang:
Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 11(6): 2148-2159 (2012) - [c5]Yichen Wang, Pinyi Ren, Qinghe Du, Zhou Su:
Resource allocation and access strategy selection for QoS provisioning in cognitive networks. ICC 2012: 4637-4641 - [c4]Yichen Wang, Pinyi Ren, Qinghe Du:
Statistical QoS driven power allocation for cognitive networks under primary user's outage probability constraint. PIMRC 2012: 167-172 - [c3]Chao Zhang, Qinghe Du, Yichen Wang, Guo Wei:
Optimal relay power allocation for Amplify-and-Forward OFDM relay networks with deliberate clipping. WCNC 2012: 381-386 - 2011
- [j3]Yichen Wang, Pinyi Ren, Zhou Su:
Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 94-B(5): 1265-1275 (2011) - [j2]Yichen Wang, Pinyi Ren, Zhou Su:
A POMDP Based Distributed Adaptive Opportunistic Spectrum Access Strategy for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 94-B(6): 1621-1624 (2011) - [c2]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
A Channel-Aggregation Diversity Based MAC Protocol in Power-Constrained Cognitive Ad Hoc Networks. GLOBECOM 2011: 1-6 - [c1]Yichen Wang, Pinyi Ren, Qinghe Du:
Statistical QoS Driven Power and Rate Allocation over Rayleigh Fading Cognitive Radio Links. WICON 2011: 33-44 - [i2]Yichen Wang, Pinyi Ren, Qinghe Du, Chao Zhang:
A Multi-Channel Diversity Based MAC Protocol for Power-Constrained Cognitive Ad Hoc Networks. CoRR abs/1105.0101 (2011) - [i1]Chao Zhang, Pinyi Ren, Jingbo Peng, Guo Wei, Qinghe Du, Yichen Wang:
Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers. CoRR abs/1105.0116 (2011) - 2010
- [j1]Yichen Wang, Pinyi Ren, Guangen Wu:
A Throughput-Aimed MAC Protocol with QoS Provision for Cognitive Ad Hoc Networks. IEICE Trans. Commun. 93-B(6): 1426-1429 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint