Publications

 

Book Chapters


[1]          Houbing Song, Qinghe Du, Pinyi Ren, Wenjia Li, Amjad Mehmood, "Cloud Computing for Transportation Cyber-Physical Systems," Cyber-Physical Systems: A Computational Perspective, CRC Press, Taylor & Francis Group., ISBN : 978-1-4822-5975-9.

[2]          Li Sun and Qinghe Du, “Secure Data Dissemination for Intelligent Transportation Systems,” Chapter 6 of Secure and Trustworthy Transportation Cyber-Physical Systems, Springer, 2017.


Journal Papers

2019

[1]          Qinghe Du, Houbing Song, Xuejie Zhu, "Social-Feature Enabled Communications among Devices towards Smart IoT Community," IEEE Communications Magazine, vol 57, no. 1, pp. 130-137, Jan. 2019.

 

2018

[2]          He Zhang, Zehua Wang, Qinghe Du, “Social-Aware D2D Relay Networks for Stability Enhancement: An Optimal Stopping Approach,” IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8860-8874, Sep. 2018.

[3]          Bilal Hussain, Qinghe Du, Pinyi Ren, “Semi-Supervised Learning Based Big Data-Driven Anomaly Detection in Mobile Wireless Networks,” China Communications, vol. 15, no.4, pp. 41-57, Apr. 2018.

[4]          Qnghe Du, Ying Xu, Wangyu Li, Houbing Song, "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes," Wireless Communications and Mobile Computing, vol. 2018, Article ID 8404219, 11 pages, 2018.

[5]          Nan Lu, Qinghe Du, Pinyi Ren, “Air-Interface Traffic-Load Based Intrusion Detection over mMTC Networks,” ZTE Technology Journal, vol. 24, no. 2, pp. 30-37, Apr. 2018.

[6]          Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, “Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5486-5490, Jun. 2018.

[7]          Li Sun and Qinghe Du, A Review of Physical Layer Security Techniques for Internet-of-Things: Challenges and Solutions, accepted to appear, Entropy, 2018.

 

2017

[8]          Qinghe Du, Nan Lu, Li Sun, Xuelin Zhang, Bo Sun, "Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access," Journal of Sensors, vol. 2017, Article ID 9270907, 2017.

[9]          Qinghe Du, Meng Liu, Qian Xu, Houbing Song, Li Sun, Pinyi Ren, "Interference-constrained routing over P2P-share enabled multi-hop D2D networks," Peer-to-Peer Networking and Applications, vol. 10, no. 6, pp. 1354-1370, Nov. 2017.

[10]       Xiao Tang, Pinyi Ren, Feifei Gao and Qinghe Du, "Interference-aware resource competition toward power-efficient ultra-dense networks," IEEE Transactions on Communications, vol. 65, no. 12, pp. 5415-5428, Dec. 2017.

[11]       Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10732-10747, Dec. 2017.

[12]       Qian Xu, Pinyi Ren, Houbing Song, and Qinghe Du, “Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1924-1933, Dec. 2017.

[13]       Hongliang He, Pinyi Ren, Qinghe Du, and Hai Lin, “Joint feedback and artificial noise design for secure communications over fading channels without eavesdropper's CSI,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 11414-11418, Jul. 2017.

[14]       Dawei Wang, Pinyi Ren, Julian Cheng, Qinghe Du, Yichen Wang, and Li Sun, "Secure transmission for mixed FSO-RF relay networks with physical-layer key encryption and wiretap coding," Optics Express, vol. 25, no. 9, pp. 10078-10089, May 2017.

[15]       Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, and Yichen Wang, "Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks"IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 825-839, Apr. 2017.

[16]       Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Towards win-win: Weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” Science China Information Sciences (Sci. China Inf. Sci.), vol. 60, no. 4, pp.1-17, Apr. 2017.

[17]       Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, and Li Sun “Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks,” IEEE Access, vol. 5, pp. 3763-3776, Mar. 2017.

[18]       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang. “Design in power-domain NOMA: Eavesdropping suppression in the two-user relay network with compensation for the relay user.” Mobile Networks and Applications, published online, pp. 1-12, Nov. 2017.

[19]       Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang, "Traffic-aware overload control scheme in 5G ultra-dense M2M networks," Transactions on Emerging Telecommunications Technologies, vol. 28, no. 9, Article ID: e3146, Sep. 2017.

[20]       Li Sun and Qinghe Du, “Physical Layer Security with Its Applications in 5G Networks: A Review,” China Communications, vol. 14, no. 12, pp. 1-14, Dec. 2017.

[21]       Ya-nan Qiao, Qinghe Du, Di-fangWan, "A study on query terms proximity embedding for information retrieval," International Journal of Distributed Sensor Networks, vol. 13, no. 2, Article ID: 1550147717694891, DOI: 10.1177/1550147717694891, WOS:000394847200024.

[22]       Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang, “Enhancing Physical-Layer Security via Big-Data Aided Hybrid Relay Selection,” Journal of Communications and Information Networks, vol. 2, no. 1, pp. 97-110, Mar. 2017.

 

2016

[23]       Qinghe Du, Weidong Zhao, Weimin Li, Xuelin Zhang, Bo Sun, Houbing Song, Pinyi Ren, Li Sun, Yichen Wang, "Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks," Journal of Medical Systems, vol. 40, no. 7, Article ID: 171, July 2016.

[24]       Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, and Li Sun, "Dynamic RACH Partition for Massive Access of Differentiated M2M Services," Sensors, 2016, vol. 16, no. 4.

[25]       Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345-5357, May 2016. (ESI highly cited paper)

[26]       Xiaoyan Wu, Qinghe Du, "Utility-Function-Based Radio-Access-Technology Selection for Heterogeneous Wireless Network," Computers and Electrical Engineering, vol. 52, pp. 171-182, May 2016.

[27]       Li Sun, Qinghe Du, Pinyi Ren, and Yichen Wang, "Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation,"IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016.

[28]       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, "Active jamming for multi-user information security improvement with the access statuses of users," Security and Communication Networks, vol. 9, no, 16, pp. 3893-3910, Nov. 2016.

[29]       Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, "Hybrid Secure Beamforming and Vehicle Selection Using Hierarchical Agglomerative Clustering for C-RAN based V2I Communications in Vehicular Cyber-Physical Systems," International Journal of Distributed Sensor Networks, vol. 12, no. 8, article ID: 1550147716662783, Aug. 2016.

[30]       Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, "Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks," Sensors, vol. 16, Article ID: 1998, Nov. 2016.

[31]       Qian Xu, Pinyi Ren, Houbing Song, and Qinghe Du, "Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations," IEEE Access, vol. 4, pp. 2840-2853, 2016. DOI: 10.1109/ACCESS.2016.2575863, WOS:000380130400001. (ESI highly cited paper)

[32]       Li Sun, Pinyi Ren, Qinghe Du, and Yichen Wang, “Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, Jan. 2016. DOI: 10.1109/TII.2015.2509442.

 

2015

[33]       Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, and Li Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033-1043, Oct. 2015. DOI: 10.1007/s00779-015-0872-x.

[34]       Hongbin Xu, Li Sun, Pinyi Ren, and Qinghe Du, “Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270-2273, Dec. 2015. DOI: 10.1109/LCOMM.2015.2479231, WOS: 000366613300055.

[35]       Dawei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Reciprocally benefited spectrum access scheme with joint power and subcarrier allocation in a software-defined network,” IEEE Access, vol. 3, pp. 1248-1259, Aug. 2015. DOI: 10.1109/ACCESS.2015.2464081, WOS:000371388200093.

[36]       Yichen Wang, Pinyi Ren, Qinghe Du, Li Sun, "Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning," IEEE Transactions On Wireless Communications, vol. 14, no. 12, pp. 6896-6910, Dec. 2015.

[37]       Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463-466, Mar. 2015.

[38]       Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147-157, Dec. 2015. (Received Best Paper Award of China Communications in 2017)

[39]       Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Downlink and uplink cooperative transmission for primary secrecy based cognitive radio sensor networks,” International Journal of Distributed Sensor Networks, article 152851, 2015. DOI: 10.1155/2015/152851.

[40]       Li Sun, Pinyi Ren, Qinghe Du, "Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks," International Journal of Distributed Sensor Networks, Article ID 657938, 11 pages, 2015. http://dx.doi.org/10.1155/2015/657938.

[41]       Gang Wu, Qinghe Du, and Kun Hua, "Selective Random CDD Enhanced Joint Cooperative Relay and HARQ for Delay-Tolerant Vehicular Communications," International Journal on Distributed Sensor Networks, article ID: 657938, 2015.

 

2014

[42]       Pinyi Ren, Yichen Wang, and Qinghe Du, "CAD-MAC: A channel-aggregation diversity based MAC protocol for spectrum and energy efficient cognitive ad hoc networks", IEEE Journal on Selected Areas in Communications, vol. 32, no. 2, pp. 237-250, Feb. 2014.

[43]       Li Sun, Pinyi Ren, and Qinghe Du, "Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks," EURASIP Journal on Wireless Communications and Networking, article ID: 109, Jul. 2014.

[44]       Hao Niu, Masayuki Iwai, Kaoru Sezaki, Li Sun, Qinghe Du, "Exploiting Fountain Codes for Secure Wireless Delivery," IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, May 2014.

[45]       Qian Xu, Pinyi Ren, Qinghe Du, Gang Wu, Qiang Li, and Li Sun, "Angle-based interference-aware routing algorithm for multicast over wireless D2D networks," ZTE Communications, vol.12, no.4, pp. 30-39, Dec. 2014.

[46]       Guobing Li, Pinyi Ren, Gangming Lv, Qinghe Du, "High-rate relay beamforming for simultaneous wireless information and power transfer," Electronics Letters, vol. 50, no. 23, pp. 1759-1761, Nov. 2014.

 

2013