近年发表于外刊SCI收录的论文
发布时间: 2017-03-31      访问次数: 110

[1] KunWang, Meng Wu. Cooperative Communications based on Trust Model for Mobile adhoc Networks, IET Information Security, Vol. 4, Issue 2, June. 2010, pp. 68-79

[2] ZhenghuaQ, Geng Y, Xunyi R. Provably secure certificateless ring signcryptionscheme[J]. China Communications, 2011, 8(3): 99-106.

[3] ChenS, Zhang Y, Yang G M. Parameter-estimation based trust model for unstructuredpeer-to-peer networks[J]. Communications, IET, 2011, 5(7): 922-928.

[4] KunWang, Meng Wu. Nash Equilibrium of Node Cooperation Based on Metamodel forMANETs, Journal of Information Science and Engineering, Vol.28, No.2, 2012.3,pp.317-333

[5] HaifengH, Zhen Y, Jianmin B. Wavelet transform-based distributed compressed sensing inwireless sensor networks[J]. China Communications, 2012, 9(2): 1-12.

[6] YanliC, Geng Y. EBS-Based Collusion Resistant Group Key Management UsingAttribute-Based Encryption[J]. China Communications, 2012, 9(1): 92-101.

[7] ZhenghuaQ, Xunyi R, Geng Y. Provably Secure General Aggregate Signcryption Scheme inthe Random Oracle Model[J]. CHINA COMMUNICATIONS, 2012, 9(11): 107-116.

[8] ZhengyuC, Geng Y, Lei C, et al. Data aggregation scheduling with guaranteed lifetimeand efficient latency in wireless sensor networks[J]. China Communications,2012, 9(9): 11-21.

[9] KunWang, Yue Yu. A Query-Matching Mechanism Over Out-of-Order Event Stream in IOT.International Journal of Ad Hoc and Ubiquitous Computing, Vol.13, N0.3/4,2013.7, pp. 197-208

[10] YangG, Li S, Xu X, et al. Precision-enhanced and encryption-mixedprivacy-preserving data aggregation in wireless sensor networks[J].International Journal of Distributed Sensor Networks, 2013, 2013.

[11] ChenL, Yang G, Zhang Y, et al. Asymptotically stable multi-valued many-to-manyassociative memory neural network and its application in image retrieval[J].Neural Network World[J]. Neural Network World, 2013, 2(13): 169-189.

[12] DaiH, Yang G, Qin X. EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN QueryProcessing in Tiered Wireless Sensor Networks[J]. International Journal ofDistributed Sensor Networks, 2013, 2013.

[13] 徐宁, 陈雪莲, 杨庚. 基于改进后多维数据加密系统的多图像光学加密算法的研究[J].物理学报, 2013, 62(8): 84202-084202.

[14] Zhou L, Yang Z, Wang H, et al. Impact ofexecution time on adaptive wireless video scheduling[J]. Selected Areas inCommunications, IEEE Journal on, 2014, 32(4): 760-772.

[15] Zhang Q, Jin S, Wong K K, et al. Powerscaling of uplink massive MIMO systems with arbitrary-rank channel means[J].Selected Topics in Signal Processing, IEEE Journal of, 2014, 8(5): 966-981.

[16] Zhou L, Yang Z, Wen Y, et al. Distributedwireless video scheduling with delayed control information[J]. Circuits andSystems for Video Technology, IEEE Transactions on, 2014, 24(5): 889-901.

[17] Chen Z, Duan Y T, Zhang Y R, et al. A NewEfficient Algorithm for 3-D Laguerre-Based Finite-Difference Time-DomainMethod[J]. Antennas and Propagation, IEEE Transactions on, 2014, 62(4):2158-2164.

[18] Lu W J, Liu G M, Tong K F, et al. Dual-bandloop-dipole composite unidirectional antenna for broadband wirelesscommunications[J]. Antennas and Propagation, IEEE Transactions on, 2014, 62(5):2860-2866.

[19] Lu W J, Zhang W H, Tong K F, et al. Planarwideband loop-dipole composite antenna[J]. Antennas and Propagation, IEEETransactions on, 2014, 62(4): 2275-2279.

[20] Zhou L, Wu D, Zheng B, et al. Jointphysical-application layer security for wireless multimedia delivery[J].Communications Magazine, IEEE, 2014, 52(3): 66-72.

[21] Zou Y, Wang X, Shen W, et al. Securityversus reliability analysis of opportunistic relaying[J]. Vehicular Technology,IEEE Transactions on, 2014, 63(6): 2653-2661.

[22] Sun X, Zhu Q, Zhu H, et al. OptimalPerformance of Cognitive Random Access Networks With Multi-Packet Reception[J].Communications Letters, IEEE, 2014, 18(10): 1807-1810.

[23] Zhou Z, Zhu Q. Joint optimization schemefor power allocation and subcarrier pairing in OFDM-based multi-relaynetworks[J]. Communications Letters, IEEE, 2014, 18(6): 1039-1042.

[24] Wu D, Zhu W P, Swamy M N S. The theory ofcompressive sensing matching pursuit considering time-domain noise withapplication to speech enhancement[J]. Audio, Speech, and Language Processing,IEEE/ACM Transactions on, 2014, 22(3): 682-696.

[25] Xu F, Liu C, Hong W, et al. Fast and AccurateTransient Analysis of Buried Wires and its Applications[J]. ElectromagneticCompatibility, IEEE Transactions on, 2014, 56(1): 188-199.

[26] Chen D, Zhu L, Cheng C. A Novel Dual-BandBandpass Filter With Closely Spaced Passbands[J]. Microwave and WirelessComponents Letters, IEEE, 2014, 24(1): 38-40.

[27] Wang Y, Shi Z, Li X, et al. Circular GaNMembrane Gratings[J]. Photonics Technology Letters, IEEE, 2014, 26(9): 915-918.

[28] Sheng Y B, Ou-Yang Y, Zhou L, et al.Protecting sing-photon multi-mode W state from photon loss[J]. Quantuminformation processing, 2014, 13(7): 1595-1605.

[29] Sheng Y B, Zhao S Y, Liu J, et al. Atomicentanglement purification using photonic Faraday rotation[J]. Quantuminformation processing, 2014, 13(4): 881-893.

[30] Ye X, Zhu W P. Sparse channel estimationof pulse-shaping multiple-input-multiple-output orthogonal frequency divisionmultiplexing systems with an approximate gradient I2-SI0  reconstruction algorithm[J]. Communications,IET, 2014, 8(7): 1124-1131.

[31] Jia X, Yang L, Zhu H. Cognitiveopportunistic relaying systems with mobile nodes: average outage rates andoutage durations[J]. IET Communications, 2014, 8(6): 789-799.

[32] LiuS, Jin S, Zhu H, et al. On impact of relay placement for energy-efficientcooperative networks[J]. Communications, IET, 2014, 8(1): 140-151.

[33] DingX U, Qun L I. Joint Power and Rate Allocation in Cognitive Radio MulticastNetworks for Outage Probability Minimization[J]. IEICE Transactions onFundamentals of Electronics, Communications and Computer Sciences, 2014, 97(3):904-906.

[34] DingX U, Qun L I. On the Outage Capacity of Fading Cognitive Multicast Channel[J].IEICE Transactions on Fundamentals of Electronics, Communications and ComputerSciences, 2014, 97(11): 2272-2275.

[35] ZhouQ. Object-based attention: saliency detection using contrast via backgroundprototypes[J]. Electronics Letters, 2014, 50(14): 997-999.

[36] ShengY B, Qu C C, Yang O Y, et al. Practical entanglement concentration forentangled coherent states[J]. International Journal of Theoretical Physics,2014, 53(6): 2033-2040.

[37] WangY, Tang J, Jin Q, et al. On studying business models in mobile social networksbased on two-sided market (TSM)[J]. The Journal of Supercomputing, 2014, 70(3):1297-1317.

[38] WangY, Vasilakos A V, Jin Q, et al. Survey on mobile social networking in proximity(MSNP): approaches, challenges and architecture[J]. Wireless networks, 2014,20(6): 1295-1311.

[39] ZhouL, Sheng Y B, Wang X F. Arbitrary atomic cluster state concentration forone-way quantum computation[J]. JOSA B, 2014, 31(3): 503-511.

[40] ZhouL, Wang X F, Sheng Y B. Efficient entanglement concentration for arbitraryless-entangled N-atom GHZ state[J]. International Journal of TheoreticalPhysics, 2014, 53(5): 1752-1766.

[41] HuangH, Zhang J, Wang R, et al. Sensor Node Deployment in Wireless Sensor Networksbased on Ionic Bond-Directed Particle Swarm Optimization[J]. Appl. Math, 2014,8(2): 597-605.

[42] WangY, Feng J, Cao Z, et al. Suspended HfO_ {2} photonic crystal slab onIII-nitride/Si platform[J]. Applied Physics A, 2014, 115(4): 1409-1413.

[43] ShiZ, Li X, Zhu G, et al. Characteristics of GaN-based LED fabricated on aGaN-on-silicon platform[J]. Applied Physics Express, 2014, 7(8): 082102.

[44] WangY, Chen J, Shi Z, et al. Suspended membrane GaN gratings for refractive indexsensing[J]. Applied Physics Express, 2014, 7(5): 052201.

[45] Sa T,Cao Z, Wang Y, et al. Enhancement of charge and energy storage in PbZrO3 thinfilms by local field engineering[J]. Applied Physics Letters, 2014, 105(4):043902.

[46] FengJ, Fang X, Cao X, et al. Advanced hyperspectral video imaging system usingAmici prism[J]. Optics express, 2014, 22(16): 19348-19356.

[47] Wang Y, Shi Z, Li X, et al. Surface-normalemission from subwavelength GaN membrane grating[J]. Optics express, 2014,22(1): 667-672.

[48] ShiZ, Li X, Fang X, et al. Experimental observation of lateral emission infreestanding GaN-based membrane devices[J]. Optics letters, 2014, 39(16):4931-4933.

[49] YanJ, Yu K, Wu L. Fuzzy modeling, maximum likelihood estimation, and Kalmanfiltering for target tracking in NLOS scenarios[J]. EURASIP Journal on Advancesin Signal Processing, 2014, 2014(1): 1-16.

[50] QianM, Liu C, Fu Y. Distributed beamforming designs to improve physical layersecurity in wireless relay networks[J]. EURASIP Journal on advances in signalprocessing, 2014, 2014(1): 1-10.

[51] JiaX, Zhou M, Dang X, et al. Adaptive power allocation and outage performance ofcognitive best relay cooperation systems with multiple primary transceiverpairs and direct path between cognitive source and destination[J]. EURASIPJournal on Wireless Communications and Networking, 2014, 2014(1): 1-14.

[52] YingJ I, Xiaofu W U, Jun Y A N, et al. Block-Refined Orthogonal Matching Pursuitfor Sparse Signal Recovery[J]. IEICE Transactions on Fundamentals ofElectronics, Communications and Computer Sciences, 2014, 97(8): 1787-1790.

[53] WangK, Guo H. An improved routing algorithm based on social link awareness in delaytolerant networks[J]. Wireless personal communications, 2014, 75(1): 397-414.

[54] SunX, Zhu Q, Rui Y, et al. Throughput Differentiation and Optimization Via TXOP inIEEE 802.11 e EDCA Networks[J]. Wireless personal communications, 2014, 78(1):543-560.

[55] ZhaoH, Zhu H, Li D, et al. Quality-driven capacity-aware resources optimizationdesign for ubiquitous wireless networks[J]. Wireless personal communications,2014, 77(1): 329-344.

[56] Fu Y,Zhu Q. Resource Allocation for Decode-and-Forward Relaying Assisted Multi-cellOrthogonal Frequency Division Multiplexing Systems with Frequency Planning[J].Wireless Personal Communications, 2014, 79(1): 789-810.

[57] Gu C,Zhu Q. An Energy-Aware Routing Protocol for Mobile Ad Hoc Networks Based onRoute Energy Comprehensive Index[J]. Wireless Personal Communications, 2014,79(2): 1557-1570.

[58] ShiZ, Zhu Q. Throughput Analysis and Optimization Based on Mobility Analysis andMarkov Process for Heterogeneous Wireless Networks[J]. Wireless personalcommunications, 2014, 77(2): 1091-1116.

[59] JiaX, Yang L, Zhu H. Performance Comparison Analyses of the Nth Best RelaySelection Schemes Over Independent and Non-identically Distributed Nakagami-mFading Channels[J]. Wireless personal communications, 2014, 75(2): 1355-1372.

[60] Hu H,Zhu H, Zhu Q. Performance Analysis of the Primary User in the Secondary UserRelay Assisted Spectrum Sharing Networks[J]. Wireless personal communications,2014, 75(4): 2411-2428.

[61] ChengY, Yang L. A Novel Error Detection due to Joint CRC Aided Denoise-and-ForwardNetwork Coding for Two-Way Relay Channels[J]. The Scientific World Journal,2014, 2014.

[62] ZhouQ, Yang G, He L. A Secure-Enhanced Data Aggregation Based on ECC in WirelessSensor Networks[J]. Sensors, 2014, 14(4): 6701-6721.

[63] ChenZ, Li S, Yue W. SOFM Neural Network Based Hierarchical Topology Control forWireless Sensor Networks[J]. Journal of Sensors, 2014, 2014.

[64] LinQ, Yang J, Zhang B, et al. Distributed face recognition in wireless sensornetworks[J]. International Journal of Distributed Sensor Networks, 2014, 2014.

[65] HuangJ, Sun L, Wei X, et al. Redundancy Model and Boundary Effects BasedCoverage-Enhancing Algorithm for 3D Underwater Sensor Networks[J].International Journal of Distributed Sensor Networks, 2014, 2014.

[66] HaipingH, Juan F, Ruchuan W, et al. An Exact Top-Query Algorithm with PrivacyProtection in Wireless Sensor Networks[J]. International Journal of DistributedSensor Networks, 2014, 2014.

[67] ZhouQ, Yang G, He L. An efficient secure data aggregation based on homomorphicprimitives in wireless sensor networks[J]. International Journal of DistributedSensor Networks, 2014, 2014.

[68] Yuan-jianL, Qin-jian S, Xue M, et al. Simulation and Analysis of Indoor Visible LightPropagation Characteristics Based on the Method of SBR/Image[J]. InternationalJournal of Antennas and Propagation, 2014, 2014.

[69] Yu Y,Liu Y, Lu W J, et al. Path loss model with antenna height dependency underindoor stair environment[J]. International Journal of Antennas and Propagation,2014, 2014.

[70] Jin XH, Huang X D, Cheng C H. Microstrip stepped‐impedance ring all‐pass filter andwideband 90°phase shifter[J]. International Journal of RF and MicrowaveComputer‐Aided Engineering, 2014, 24(2): 191-195.

[71] Xu D,Li Q. Ergodic capacity and outage probability optimization for secondary userin cognitive radio networks under interference outage constraint[J]. AEU-InternationalJournal of Electronics and Communications, 2014, 68(8): 747-755.

[72] Yu XY, Zhu H B. An efficient method for loss performance modeling of hierarchicalheterogeneous wireless networks[J]. International Journal of CommunicationSystems, 2014, 27(6): 956-968.

[73] ZhiH, Jia X, Yang L, et al. Comparison of average symbol error rate and optimalpower allocation for two‐way opportunistic relaying with amplify‐and‐forwardprotocol[J]. International journal of communication systems, 2014, 27(3):403-421.

[74] WangW, Yang X, Li N, et al. Transport study of gate and channel engineering on thesurrounding-gate CNTFETs based on NEGF quantum theory[J]. Journal ofComputational Electronics, 2014, 13(1): 192-197.

[75] QianM, Liu C, Fu Y, et al. A Relay Selection and Power Allocation Scheme forCooperative Wireless Sensor Networks[J]. KSII Transactions on Internet andInformation Systems (TIIS), 2014, 8(4): 1390-1405.

[76] LouS, Yang L. Opportunistic multiple relay selection for two-way relay networkswith outdated channel state information[J]. KSII Transactions on Internet andInformation Systems (TIIS), 2014, 8(2): 389-405.

[77] LouS, Yang L. Opportunistic multiple relay selection for two-way relay networkswith outdated channel state information[J]. KSII Transactions on Internet andInformation Systems (TIIS), 2014, 8(2): 389-405.

[78] HuanC, Liu C. The Reliability Research of DF-D2D Underlaying Cellular Networks[J].ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2014, 14(1): 3-8.

[79] Xu Y,Wu C, Ji X, et al. An 8-level 3-bit cell programming technique in NOR-typenano-scaled SONOS memory devices[J]. Microelectronics Reliability, 2014, 54(1):331-334.

[80] WangW, Li N, Xia C, et al. Quantum simulation study of single halo dual-materialgate CNTFETs[J]. Solid-State Electronics, 2014, 91: 147-151.

[81] Xu Y,Yue H, Zhao F F. Study of charge loss mechanisms for nano-sized localizedtrapping SONOS memory devices[J]. Solid-State Electronics, 2014, 91: 118-122.  

[82] WangW, Zhang T, Zhang L, et al. High-frequency and switching performanceinvestigations of novel lightly doped drain and source hetero-material-gateCNTFET[J]. Materials Science in Semiconductor Processing, 2014, 21: 132-139.

[83] SunN, Mao Y, Chen J, et al. Effects of non-synchronized variations of electric andmagnetic properties on transmitted waves at lossy interface[J]. Journal ofQuantitative Spectroscopy and Radiative Transfer, 2014, 138: 50-59.

[84] ZhouQ, Yang G, He L. An efficient secure data aggregation based on homomorphicprimitives in wireless sensor networks[J]. International Journal of DistributedSensor Networks, 2014, 2014.

[85] ZhouQ, Yang G, He L. A Secure-Enhanced Data Aggregation Based on ECC in WirelessSensor Networks[J]. Sensors, 2014, 14(4): 6701-6721.

[86] KunWang, Heng Lu, et al. A Context-aware System Architecture for LeakpointDetection in Large‐scale Petrochemical Industries, IEEE CommunicationsMagazine, Vol. 52, No.6, pp.62-69, 2014.6.

[87] KunWang, Huang Guo. An Improved Routing Algorithm Based on Social Link Awarenessin Delay Tolerant Networks. Wireless Personal Communications. 2014.3, 75(1),pp. 397-414

[88] KunWang, Yun Shao, et al. LDPA: A Local Data Processing Architecture in AmbientAssisted Living Communications, IEEE Communications Magazine, 2015.1.

[89] Yuan F, Zhang Q T, Jin S, et al. OptimalHarvest-Use-Store Strategy for Energy Harvesting Wireless Systems[J]. WirelessCommunications, IEEE Transactions on, 2015, 14(2): 698-710.

[90] Wang Y, Vasilakos A V, Ma J, et al. Onstudying the impact of uncertainty on behavior diffusion in social networks[J].Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 2015, 45(2):185-197.

[91] Wu X T, Lu W J, Xu J, et al. Loop-MonopoleComposite Antenna for Dual-Band Wireless Communications[J]. Antennas andWireless Propagation Letters, IEEE, 2015, 14: 293-296.

[92] Zou, Yulong, Zhu, Jia, Wang, Xianbin, et al.A Survey on Wireless Security: TechnicalChallenges, Recent Advances, and Future Trends[J]. PROCEEDINGS OF THE IEEE, 2016.9.

[93] Zou, Yulong; Wang, Gongpu,et al.Intercept Behavior Analysis of IndustrialWireless Sensor Networks in the Presence of Eavesdropping Attack[J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016.4.

[94] Liang Zhou,et al.On Data-Driven Delay Estimation for Media Cloud[J]. IEEE Transactions on Multimedia, 2016.05.

[95] Liang Zhou,et al.QoE-DrivenDelay Announcement for Cloud Mobile Media[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016.03.