Welcome

 

Li SUN  Ph.D./Associate Professor/Ph.D. Advisor

 

Deputy Director, Wireless Communications Institute

School of Information and Communications Engineering

Xi’an Jiaotong University (XJTU)

No.28 West Xianning Road, Xi’an 710049, Shaanxi Province, China

Email: lisun@mail.xjtu.edu.cn

 

Education                                                                   

Ø  Sep. 2006 -- Dec. 2011  Ph.D. in Information and Communications Engineering, Xi’an Jiaotong University

Ø  Sep. 2002 -- Jul. 2006    B.S. in Information Engineering, Xi’an Jiaotong University

Working Experience                                                  

Ø  Jan. 2016 -- Present        Associate Professor,   Xi’an Jiaotong University

Ø  Jan. 2012 -- Dec. 2015    Assistant Professor,    Xi’an Jiaotong University

Research Interests                                                     

Ø  Wireless Physical Layer Security

Ø  The 5th Generation Cellular Systems (5G)

Ø  Internet-of-Things (IoT)

Ø  Machine Learning for Communications Systems

Ø  Secure Transmission Techniques for Multimedia

Research Grants                                                        

Ø  “Research on Content-Aware Physical-Layer Anti-Eavesdropping Techniques for Wireless Networks”, National Natural Science Foundation of China (Grant No. 61671369), Solo Principle Investigator, 01/2017 -- 12/2020

Ø  “Research on Low-Complexity Cooperative Transmission Technologies towards Security-Guaranteed Relay Networks”, National Natural Science Foundation of China (Grant No. 61201207), Solo Principle Investigator, 01/2013 -- 12/2015

Ø  “Research and Evaluation for 5G Low-Power Massive Access Techniques”, National Science and Technology Major Project of China (Grant No. 2016ZX03001012-004), Sub-Project Solo Principle Investigator, 01/2016 -- 12/2017

Ø  “Research and Evaluation for 3D MIMO Techniques,” National Science and Technology Major Project of China (Grant No. 2013ZX03003007-003), Sub-Project Solo Principle Investigator, 01/2013 -- 12/2014

Ø  “Research of Anti-Eavesdropping Signal Design and Secure Transmission Techniques towards 5G Networks”, Key Research and Development Program of Shaanxi Province (Grant No. 2018KW-019), Solo Principle Investigator, 01/2018 -- 12/2019

Ø  “Physical-Layer Information Driven Security Provisioning Techniques for 5G Networks”, Open Research Fund of The State Key Laboratory of Integrated Services Networks (Grant No. ISN18-02), Solo Principle Investigator, 01/2017 -- 12/2018

Ø  “Cooperative Transmission Schemes for Wireless Relay Networks based on PHY-Security Theory,” Open Research Fund of National Mobile Communications Research Laboratory (Grant No. 2012D04), Solo Principle Investigator, 09/2012 -- 08/2015

Ø  “Wireless Networking Solutions for Tunnel Engineering”, Collaborative Project with China Railway First Group Co., Ltd, Solo Principle Investigator, 04/2018 -- 12/2018

Ø  “Physical-Layer Security Transmission Techniques for 5G with Multi-Scenario Multi-Service Features”, Fundamental Research Funds for the Central Universities of China, Solo Principle Investigator, 01/2017 -- 12/2019

Ø  “Physical Layer Techniques for Cooperative Communication Systems: Theory, Algorithms, and Performance Evaluation,” Scientific Research Fund for New Faculties of Xi’an Jiaotong University, Solo Principle Investigator, 01/2012 -- 12/2014

Ø  Research on Theory of Physical-Layer Security for Information Transmissions in Wireless Communications”, Key Program of National Natural Science Foundation of China (Grant No. 61431011), Major Participant, 01/2015 -- 12/2019

Ø  Innovation of Transmission Technologies towards 5G Networks”, International Collaboration and Interaction Project of National Natural Science Foundation of China (Grant No. 61461136001), Major Participant, 01/2015 -- 12/2017

Selected Publications                                                  

Google Scholar Citations: 1173, H-index: 19 (as of Oct. 15, 2019)

Ø     Book Chapters

1.       Li Sun and Qinghe Du, “Secure Data Dissemination for Intelligent Transportation Systems,” Chapter 6 of Secure and Trustworthy Transportation Cyber-Physical Systems, Springer, 2017.

Ø     Journal Papers

1.       Li Sun and Yuwei Wang, “CTBRNN: a novel deep-learning based signal sequence detector for communications systems,” accepted by IEEE Signal Processing Letters, Oct. 2019.

2.       Hongbin Xu and Li Sun (Corresponding Author), “Wireless surveillance via proactive eavesdropping and rotated jamming,” IEEE Transactions on Vehicular Technology, published online, DOI: 10.1109/TVT.2019.2936870, Aug. 2019.

3.       Li Sun and Hongbin Xu, “Fountain-coding based secure communications exploiting outage prediction and limited feedback,” IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, Jan. 2019.

4.       Hongbin Xu and Li Sun (Corresponding Author), “Encryption over the air: securing two-way untrusted relaying systems through constellation overlapping,” IEEE Transactions on Wireless Communications, vol. 17, no. 12, pp. 8268-8282, Dec. 2018.

5.       Li Sun and Hongbin Xu, “Unequal secrecy protection for untrusted two-way relaying systems: constellation overlapping and noise aggregation,” IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9681-9695, Oct. 2018.

6.       Li Sun and Qinghe Du, “A review of physical layer security techniques for Internet of Things: challenges and solutions,” Entropy, vol. 20, no. 10, DOI: 10.3390/e20100730, Oct. 2018.

7.       Zhenzhen Gao, Zhijie Huang, and Li Sun, “Secure cooperative communication with nondedicated relays,” IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7811-7815, Aug. 2018.

8.       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design in power-domain NOMA: Eavesdropping suppression in the two-user relay network with compensation for the relay user,” Mobile Networks and Applications, vol. 23, no. 4, pp. 1068-1079, Aug. 2018.

9.       Qian Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Security-aware waveform and artificial noise design for time-reversal-based transmission,” IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5486-5490, Jun. 2018.

10.     Li Sun and Qinghe Du, “Physical Layer Security with Its Applications in 5G Networks: A Review,” China Communications, vol. 14, no. 12, pp. 1-14, Dec. 2017.

11.     Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10732-10747, Dec. 2017.

12.     Qinghe Du, Nan Lu, Li Sun, Xuelin Zhang, and Bo Sun, “Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access,” Journal of Sensors, Volume 2017, DOI: 10.1155/2017/9270907, 2017.

13.    Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Traffic-aware overload control scheme in 5G ultra-dense M2M networks”, Transactions on Emerging Telecommunications Technologies, vol. 28, no. 9, Sep. 2017.

14.    Dawei Wang, Pinyi Ren, Qinghe Du, Yichen Wang, Li Sun, “Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks,” IEEE Access, vol. 5, pp. 3763-3776, 2017.

15.     Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, Qinghe Du, and Yichen Wang, “Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 825-839, Apr. 2017.

16.    Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback,” SCIENCE CHINA Information Sciences, vol. 60, no. 4, DOI: 10.1007/s11432-016-9013-0, Apr. 2017.

17.    Zhijie Huang, Zhenzhen Gao, and Li Sun, “Anti-eavesdropping scheme based on quadrature spatial modulation,” IEEE Communications Letters, vol. 21, no. 3, pp. 532-535, Mar. 2017.

18.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Reciprocally-benefited secure transmission for spectrum sensing-based cognitive radio sensor networks,” Sensors, vol. 16, no. 12, DOI: 10.3390/s16121998, Dec. 2016.

19.    Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Active jamming for multi-user information security improvement with the access statuses of users,” (Wiley) Security and Communication Networks, vol. 9, no. 16, pp. 3893-3910, Nov. 2016.

20.     Li Sun, Qinghe Du, Pinyi Ren, and Yichen Wang, “Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016.

21.    Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN based V2I communications in vehicular cyber-physical systems,” International Journal of Distributed Sensor Networks, vol. 12, no. 8, DOI: 10.1177/1550147716662783, Aug. 2016.

22.    Hao Niu, Nanhao Zhu, Li Sun, Athanasios V. Vasilakos, and Kaoru Sezaki, “Security-embedded opportunistic user cooperation with full diversity,” (Springer) Wireless Networks, vol. 22, no. 5, pp. 1513-1522, Jul. 2016.

23.    Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345-5357, May 2016.

24.    Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang, and Li Sun, “Dynamic RACH partition for massive access of differentiated M2M services,” Sensors, vol. 16, no. 4, DOI: 10.3390/s16040455, Apr. 2016.

25.    Datong Xu, Pinyi Ren, Li Sun, and Houbing Song, “Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems,” IET Communications, vol. 10, no. 3, pp. 292-299, Mar. 2016.

26.     Li Sun, Pinyi Ren, Qinghe Du, and Yichen Wang, “Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, Feb. 2016.

27.    Yichen Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Optimal power allocation for underlay-based cognitive radio networks with primary user’s statistical delay QoS provisioning,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6896-6910, Dec. 2015.

28.    Hongbin Xu, Li Sun (Corresponding Author), Pinyi Ren, and Qinghe Du, “Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270-2273, Dec. 2015. (The first author is an undergraduate student under my supervision)

29.    Dongyang Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback,” China Communications, vol. 12, no. 12, pp. 147-157, Dec. 2015.

30.     Li Sun and Hongbin Xu, “A scheme to avoid interference via constellation rotation for cooperative device-to-device systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 49, no. 12, pp. 6-11, Dec. 2015.

31.     Datong Xu, Pinyi Ren, and Li Sun, “ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells,” International Journal of Communication Systems, vol. 28, no. 17, pp. 2214-2238, Nov. 2015.

32.    Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, and Li Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033-1043, Oct. 2015.

33.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Downlink and uplink cooperative transmission for primary secrecy based cognitive radio sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, DOI:10.1155/2015/152851, Sep. 2015.

34.    Dawei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Reciprocally benefited spectrum access scheme with joint power and subcarrier allocation in a software-defined network,” IEEE Access, vol. 3, pp. 1248-1259, Aug. 2015.

35.     Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463-466, Mar. 2015. (ranked No.3 in the Top Accessed Articles from March 2015 to August 2015 for the IEEE Communications Letters)

36.    Zhenzhen Gao, Li Sun, Yichen Wang, and Xuewen Liao, “Double differential transmission for amplify-and-forward two-way relay systems,” IEEE Communications Letters, vol. 18, no. 10, pp. 1839-1842, Oct. 2014.

37.    Li Sun, Pinyi Ren, and Qinghe Du, “Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks,” EURASIP Journal on Wireless Communications and Networking, DOI: 10.1186/1687-1499-2014-109, Jul. 2014.

38.    Hao Niu, Masayuki Iwai, Kaoru Sezaki, Li Sun, and Qinghe Du, “Exploiting fountain codes for secure wireless delivery,” IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, May 2014.

39.    Li Sun, Qinghe Du, and Pinyi Ren, “Secrecy-enhanced data dissemination using cooperative relaying in vehicular networks,” International Journal of Distributed Sensor Networks, vol. 2013, DOI: 10.1155/2013/505831, Nov. 2013.

40.    Hao Niu, Li Sun, Masayuki Iwai, and Kaoru Sezaki, “Secrecy-enhanced cooperation scheme with multiuser diversity in wireless relay networks,” IEICE Communications Express, vol. 2, no. 10, pp. 409-414, Oct. 2013.

41.    Li Sun and Fan Li, “Adaptive protocol for cooperative communication systems with a single semi-blind amplify-and-forward relay,” (Springer) Telecommunication Systems, vol. 53, no. 1, pp. 85-90, May 2013.

42.     Li Sun, Taiyi Zhang, Yubo Li, and Hao Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3801-3807, Oct. 2012.

43.    Yubo Li, Qinye Yin, Li Sun, Hongyang Chen, and Huiming Wang, “A channel quality metric in opportunistic selection with outdated CSI over Nakagami-m fading channels,” IEEE Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1427-1432, Mar. 2012.

44.    Li Sun, Taiyi Zhang, and Hao Niu, “Inter-relay interference in two-path digital relaying systems: detrimental or beneficial?” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2468-2473, Aug. 2011.

45.    Runping Yuan, Taiyi Zhang, Jianxiong Huang, and Li Sun, “Opportunistic cooperation and optimal power allocation for wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 56, no. 3, pp. 1898-1904, Aug. 2010.

46.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Spectrally-efficient decode-and-forward scheme based on constellation rotation,” ETRI Journal, vol. 32, no. 4, pp. 607-609, Aug. 2010.

47.    Li Sun, Taiyi Zhang, Hao Niu, and Junsong Wang, “Effect of multiple antennas at the destination on the diversity performance of amplify-and-forward systems with partial relay selection,” IEEE Signal Processing Letters, vol. 17, no. 7, pp. 631-634, Jul. 2010. (ranked No.3 in the Top Accessed Articles in May 2010 for the IEEE Signal Processing Letters)

48.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 535-538, Jun. 2010. (ranked No.3 in the Top Accessed Articles in April 2010 for the IEEE Signal Processing Letters)

49.    Li Sun and Taiyi Zhang, “Semi-distributed user selection scheme in decode-and-forward systems,” Journal of Xi’an Jiaotong University (in Chinese), vol. 43, no. 12, pp. 115-119, Dec. 2009.

50.    Li Sun, Taiyi Zhang, Long Lu, and Hao Niu, “Cooperative communications with relay selection in wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 513-517, May 2009.

Ø     Conference Papers

1.       Hongbin Xu and Li Sun, “Proactive eavesdropping scheme for wireless surveillance systems: a rotated-jamming aided approach,” accepted by the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, Dec. 2019.

2.       Dantong Huang and Li Sun, “Secure communication based on fountain code and channel feedback,” accepted by the International Conference on Wireless Communications & Signal Processing (WCSP), Xi’an, China, Oct. 2019.

3.       Jun Li, Qinghe Du, Li Sun, and Pinyi Ren, “Queue-aware joint ACB control and resource allocation for mMTC networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM) Workshop on Communication, Computing, and Networking in Cyber Physical Systems, Abu Dhabi, UAE, Dec. 2018, pp. 1-6.

4.       Li Sun, Hongbin Xu, and Fan Li, “Message-prioritization based unequal secrecy protection for untrusted two-way relaying networks,” in Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018, pp. 1-6.

5.       Hongbin Xu, Li Sun, and Fan Li, “Towards enhanced security for two-way untrusted relaying systems: a constellation overlapping scheme,” in Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, USA, May 2018, pp. 1-7.

6.       Nan Lu, Qinghe Du, Li Sun, and Pinyi Ren, “Traffic-driven intrusion detection for massive MTC towards 5G networks,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM’18) Workshop on MobiSec, Honolulu, USA, Apr. 2018, pp. 426-431.

7.       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017, pp. 1-6.

8.       Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, Dec. 2017, pp. 1-6.

9.       Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Signal conversion: combat eavesdropping for physical layer security improvement,” in Proceedings of the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017, pp. 1-5.

10.    Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Weighted-voronoi-diagram based codebook design against passive eavesdropping for MISO systems,” in Proceedings of the 85th IEEE Vehicular Technology Conference (VTC-Spring), Sydney, Australia, Jun. 2017, pp. 1-5.

11.    Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission,” in Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, May 2017, pp. 1-6.

12.    Dongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “ICA-SBDC: a channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack,” in Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, May 2017, pp. 1-6.

13.    Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Physical layer security improvement by constellation selection and artificial interference,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, USA, Mar. 2017, pp. 1-6.

14.    Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Outage constrained secrecy rate maximization for relay networks against unknown eavesdroppers,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, USA, Mar. 2017, pp. 1-6.

15.    Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang, and Zhenzhen Gao, “Cooperative physical-layer approach for downlink privacy preserving in multiuser relay networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington D. C., USA, Dec. 2016, pp. 1-7.

16.    Hongliang He, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Secure communication using noisy feedback,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington D. C., USA, Dec. 2016, pp. 1-6.

17.    Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Jamming or forwarding? full-duplex relaying for physical layer security,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM) Workshop on Full Duplex Wireless Communications, Washington D. C., USA, Dec. 2016, pp. 1-6.

18.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint,” in Proceedings of the 15th IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, Dec. 2016, pp. 1-5.

19.    Mukhtar Hussain, Qinghe Du, Li Sun, and Pinyi Ren, “Security protection over wireless fading channels by exploiting frequency selectivity,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, Oct. 2016, pp. 1-5.

20.    Xin Wang, Xia Wang, and Li Sun, “Spatial modulation aided physical layer security enhancement for fading wiretap channel,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, Oct. 2016, pp. 1-5.

21.    Fengyi Bai, Pinyi Ren, Qinghe Du, and Li Sun, “A hybrid channel estimation strategy against pilot spoofing attack in MISO system,” in Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, Sep. 2016, pp. 1-6.

22.    Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Secure and energy efficient transmission in multiuser uplink wireless networks,” in Proceedings of the 84th IEEE Vehicular Technology Conference (VTC-Fall), Montréal, Canada, Sep. 2016, pp. 1-5.

23.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Primary secure communication with the cooperation of energy harvesting secondary system,” in Proceedings of the 84th IEEE Vehicular Technology Conference (VTC-Fall), Montréal, Canada, Sep. 2016, pp. 1-5.

24.    Caihong Han, Li Sun, Pinyi Ren, and Yichen Wang, “Toward secure Internet of Things via hybrid forwarding and opportunistic relaying,” in Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC) Workshop on Wireless Communications for Internet of Things Networking, Chengdu, China, Jul. 2016, pp. 1-6.

25.    Caihong Han, Li Sun, and Qinghe Du, “Securing image transmissions via fountain coding and adaptive resource allocation,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

26.    Qian Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Secure secondary communications with curious primary users in cognitive underlay networks,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

27.    Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “Cooperative relaying and jamming for primary secure communication in cognitive two-way networks,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

28.    Hongliang He, Pinyi Ren, Qinghe Du, and Li Sun, “Full-duplex or half-duplex? Hybrid relay selection for physical layer secrecy,” in Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC-Spring), Nanjing, China, May 2016, pp. 1-5.

29.    Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang, “On achievable secrecy rate by noise aggregation over wireless fading channels,” in Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 1-6.

30.    Ye Fan, Xuewen Liao, Zhenzhen Gao, and Li Sun, “Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels,” in Proceedings of the IEEE International Conference on Communications (ICC) Workshop on Wireless Physical Layer Security, Kuala Lumpur, Malaysia, May 2016, pp. 1-6.

31.    Wanyu Li, Qinghe Du, Li Sun, Pinyi Ren, and Yichen Wang, “Security enhanced via dynamic fountain code design for wireless delivery,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, Apr. 2016, pp. 1-6.

32.    Yiyan Zhang, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Antenna tilt assignment for three-dimensional beamforming in multiuser systems,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

33.    Dongyang Xu, Qinghe Du, Pinyi Ren, Li Sun, Weidong Zhao, and Zunhe Hu, “AF-based CSI feedback for user selection in multi-user MIMO systems,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

34.    He Zhang, Qinghe Du, Pinyi Ren, and Li Sun, “Joint battery-buffer sustainable guarantees in energy-harvesting enabled wireless networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

35.    Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Securing wireless transmission against reactive jamming: a stackelberg game framework,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

36.    Pinyi Ren, Yichen Wang, Bei Qi, Qinghe Du, and Li Sun, “Cyclic-shifting based sequential cooperative spectrum sensing strategy for multi-channel cognitive radio networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015, pp. 1-6.

37.    Qinghe Du, Li Sun, Pinyi Ren, and Yichen Wang, “Statistical security model and power adaptation over wireless fading channels,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China, Oct. 2015, pp. 1-6.

38.    Jun Shi, Xia Wang, and Li Sun, “Dynamic configuration of the almost blank subframes in heterogeneous networks,” in Proceedings of the IEEE 82nd Vehicular Technology Conference (VTC-Fall), Boston, USA, Sep. 2015, pp. 1-6.

39.    Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Cooperative jamming with untrusted SUs for secure communication of two-hop primary system,” in Proceedings of the 11th IEEE International Wireless Communications & Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, Aug. 2015, pp. 90-95.

40.    Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs,” in Proceedings of the IEEE International Conference on Communications (ICC) Workshop on Cooperative and Cognitive Networks, London, UK, Jun. 2015, pp. 1003-1008.

41.    Yichen Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Power allocation for cognitive radio networks with statistical QoS provisioning of primary users,” in Proceedings of the IEEE International Conference on Communications (ICC), London, UK, Jun. 2015, pp. 7719-7724.

42.    Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “User association as a stochastic game for enhanced performance in heterogeneous networks,” in Proceedings of the IEEE International Conference on Communications (ICC), London, UK, Jun. 2015, pp. 3417-3422.

43.    Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Robust precoder-and-receiver design for interference suppression and channel uncertainty restraint in multi-user CoMP system,” in Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC-Spring), Glasgow, Scotland, May 2015, pp. 1-5.

44.    Jun Shi, Xia Wang, and Li Sun, “Gray-model based SINR estimation for enhanced intercell interference coordination,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, USA, Mar. 2015, pp. 631-635.

45.    Qian Yang, Qinghe Du, Pinyi Ren, Li Sun, Yichen Wang, and Gangming Lv, “Prediction based interference management and distributed trajectory regulation in amorphous cells,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) Workshop on Self-Organizing Heterogeneous Networks, New Orleans, USA, Mar. 2015, pp. 299-304.

46.    Long Wang, Qinghe Du, Pinyi Ren, Li Sun, and Yichen Wang, “Buffering-aided resource allocation for type I relay in LTE-Advanced cellular networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Austin, USA, Dec. 2014, pp. 4484-4489.

47.    Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Austin, USA, Dec. 2014, pp. 2479-2484.

48.    Dawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks,” in Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Atlanta, Georgia, USA, Dec. 2014, pp. 1320-1324.

49.    Qinghe Du, Pinyi Ren, Houbing Song, Yichen Wang, and Li Sun, “On P2P-share oriented routing over interference-constrained D2D networks,” in Proceedings of the IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, USA, Dec. 2014, pp. 138-143.

50.    Long Wang, Qinghe Du, Pinyi Ren, Li Sun, and Yichen Wang, “Load-aware relay selection in LTE-A system via global differentiated-fairness control,” in Proceedings of the IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, USA, Dec. 2014, pp. 308-314.

51.    Fengyi Bai, Li Sun, and Pinyi Ren, “Adaptive analog network coding strategy with variable slot numbers in two-way relay systems,” in Proceedings of the 14th IEEE International Conference on Communication Systems (ICCS), Macau, China, Nov. 2014, pp. 409-413.

52.    Dong Liang, Pinyi Ren, Li Sun, Qinghe Du, and Yichen Wang, “Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels,” in Proceedings of the 14th IEEE International Conference on Communication Systems (ICCS), Macau, China, Nov. 2014, pp. 467-471.

53.    Hao Niu, Li Sun, Masaki Ito, and Kaoru Sezaki, “Secure transmission through multihop relaying in wireless body area networks,” in Proceedings of the 3rd IEEE Global Conference on Consumer Electronics (GCCE), Tokyo, Japan, Oct. 2014, pp. 395-396.

54.    Di Zhang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Energy management scheme for mobile terminals in energy efficient heterogeneous network,” in Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP), Heifei, China, Oct. 2014, pp. 1-5.

55.    Hao Niu, Li Sun, Masaki Ito, and Kaoru Sezaki, “User cooperation analysis under eavesdropping attack: a game theory perspective,” in Proceedings of the 25th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Washington D.C, USA, Sep. 2014, pp. 139-144.

56.    Datong Xu, Pinyi Ren, Qinghe Du, and Li Sun, “Interference mitigation via CECRS precoding in a two-tier heterogeneous network with cooperative femtocells,” in Proceedings of the 80th IEEE Vehicular Technology Conference (VTC-Fall), Vancouver, Canada, Sep. 2014, pp. 1-5.

57.    Xiao Tang, Pinyi Ren, Yichen Wang, Qinghe Du, and Li Sun, “Efficient power control via non-cooperative target SINR competition in distributed wireless networks,” in Proceedings of the 80th IEEE Vehicular Technology Conference (VTC-Fall), Vancouver, Canada, Sep. 2014, pp. 1-5.

58.    Qinghe Du, Pinyi Ren, Yichen Wang, and Li Sun, “Sustainability-driven power control for energy harvesting enhanced wireless transmission,” in Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), Xi’an, China, Sep. 2014, pp. 812-817. (Invited Paper)

59.    Guangen Wu, Pinyi Ren, Li Sun, and Qinghe Du, “Combating time-duration uncertainty of spectrum resources: a risk-reduced auction approach,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Atlanta, USA, Dec. 2013, pp. 941-946.

60.    Weilei Wang, Pinyi Ren, Qinghe Du, and Li Sun, “Robust detection with stable throughput over ill-conditioned channels for high-order MIMO Systems,” in Proceedings of the 78th IEEE Vehicular Technology Conference (VTC-Fall), Las Vegas, USA, Sept. 2013, pp. 1-5.

61.    Pinyi Ren, Qinghe Du, and Li Sun, “Interference-aware routing for hop-count minimization in wireless D2D networks,” in Proceedings of the 1st International Workshop on Internet of Things (IOT), Xi’an, China, Aug. 2013, pp. 65-70. (Invited Paper)

62.    Fei Zhang, Pinyi Ren, Li Sun, and Qinghe Du, “An iterative screening strategy based on detection performance for multi-channel cooperative spectrum sensing,” in Proceedings of the 8th ICST Conference on Communications and Networking in China (CHINACOM), Guilin, China, Aug. 2013, pp. 628-632.

63.    Cui Zeng, Pinyi Ren, Ruiping Qiao, Qinghe Du, and Li Sun, “Random-backoff enabled distributed scheduling in CoMP systems,” in Proceedings of the 8th ICST Conference on Communications and Networking in China (CHINACOM), Guilin, China, Aug. 2013, pp. 80-84.

64.    Jie Xiao, Pinyi Ren, Qinghe Du, and Li Sun, “Adaptive grouping-modulation aided transceiver design for high-order MIMO systems,” in Proceedings of the 8th ICST Conference on Communications and Networking in China (CHINACOM), Guilin, China, Aug. 2013, pp. 658-662.

65.    Hao Chen, Pinyi Ren, Li Sun, and Qinghe Du, “A Joint optimization of transmission mode selection and resource allocation for cognitive relay networks,” in Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, Jun. 2013, pp. 2852-2856.

66.    Hao Chen, Pinyi Ren, Li Sun, and Qinghe Du, “A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection,” in Proceedings of the 7th ICST Conference on Communications and Networking in China (CHINACOM), Kunming, China, Aug. 2012, pp. 470-474.

67.     Li Sun, Taiyi Zhang, Hao Niu, and Bin Li, “Exploiting multiuser diversity in wireless cooperative networks,” in Proceedings of the 74th IEEE Vehicular Technology Conference (VTC-Fall), San Francisco, USA, Sept. 2011, pp. 1-5.

Ø     Book Translation

1.      Pinyi Ren, Li Sun, and Zhenzhen Gao, A First Course in Digital Communications (written by Ha H. Nguyen and Ed Shwedyk), translation from English to Chinese, Publisher: Xi’an Jiaotong University Press, China, 2014.

Courses Taught                                                      

Ø     Signals and Systems, Spring 2019

Ø     Matrix Analysis and Its Applications, Spring 2019

Ø     Digital Communications Theory, Fall 2018

Ø     Matrix Analysis and Its Applications, Spring 2018

Ø     Digital Communications Theory, Fall 2017

Ø     Signals and Systems, Spring 2016

Ø     Digital Communications Theory, Fall 2015

Ø     Digital Communications Theory, Fall 2014

Ø     Signals and Systems, Spring 2014

Ø     Digital Communications Theory, Fall 2013

Ø     Digital Communications Theory, Fall 2012

Ø     Signals and Systems, Spring 2012

Awards and Honors                                                  

Ø  First Price of the Teaching Achievement Award of Shaanxi Province, 2018

Ø  Teaching Achievement Outstanding Award of Xi’an Jiaotong University, 2017

Ø  First Prize of the National Young Faculty Teaching Competition for Electronics and Information Related Specialties, 2017

Ø  Outstanding Scientific Paper Award of Shaanxi Province, 2017

Ø  Best Paper Award of China Communications, 2017

Ø  Outstanding Supervisor for Undergraduate Graduation Project of Xi’an Jiaotong University  (Top 1%), 2016, 2019

Ø  Exemplary Reviewers for IEEE Communications Letters (less than 3% of all the reviewers), 2013, 2016

Ø  Provincial Outstanding Graduates (Highest Honor for Graduates), 2011

Ø  Outstanding Award of Baosteel Scholarship (1 from the entire university), 2011

Ø  Teleepoch Outstanding Paper Award for Graduate Students of Xi’an Jiaotong University, 2011, 2012

Ø   Panwenyuan Scholarship (1 from the entire department), 2009

Ø  The team led by me won the Second Prize of TI DSP National Contest, 2008

Ø  Outstanding Graduates of Xi’an Jiaotong University, 2006

Academic Activities and Services                                     

Ø  Editor, KSII Transactions on Internet and Information Systems, Dec.2014~present

Ø  Guest Editor, IEEE Network, Special Issue on Private Blockchain in Industrial IoT

Ø  Leading Guest Editor, Wireless Communications and Mobile Computing, Special Issue on Safeguarding 5G Networks through Physical Layer Security Technologies

Ø  TPC Co-chair: IEEE GLOBECOM’17 Workshop on PHY and Cross-Layer Security Solutions for 5G Networks, 2017

Ø  TPC Co-chair: IEEE ICC’16 Workshop on Novel Medium Access and Resource Allocation for 5G Networks, 2016

Ø  Symposium Co-chair: Wireless Communications Symposium of the 11th International Conference on Wireless Communications and Signal Processing (WCSP), 2019

Ø  Track Co-chair: Cognitive Radio and Networks Symposium of the 12th International Conference on Communications and Networking in China (CHINACOM), 2017

Ø  TPC Member: IEEE Global Communications Conference (GLOBECOM), 2015-2019

Ø  TPC Member: IEEE International Conference on Communications (ICC), 2015-2020

Ø  TPC Member: IEEE Wireless Communications and Networking Conference (WCNC), 2016, 2019, 2020

Ø  TPC Member: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2015-2019

Ø   TPC Member: IEEE 82nd Vehicular Technology Conference (VTC-Fall), 2015

Ø  TPC Member: IEEE International Conference on Computing, Networking and Communications (ICNC), 2018, 2020

Ø  TPC Member: IEEE ICC’18 Workshop on 5G and Cooperative Autonomous Driving, 2018

Ø  TPC Member: IEEE VTC’16-Spring Workshop on User-Centric Networking for 5G and Beyond, 2016

Ø  TPC Member: IEEE Wireless Communications and Networking Conference (WCNC) Workshop on E2IoT, 2015

Ø  TPC Member: International Conference on Wireless Communications and Signal Processing (WCSP), 2013-2019

Ø  TPC Member: IEEE ICCC International Workshop on Wireless Communications for Internet of Things Networking (ICCC-WIN), 2016

Ø  TPC Member: IEEE ICCC International Workshop on Internet of Things (ICCC-IOT), 2013-2015

Ø  Reviewer: IEEE Communications Surveys and Tutorials

Ø  Reviewer: IEEE Wireless Communications

Ø  Reviewer: IEEE Vehicular Technology Magazine

Ø  Reviewer: IEEE Transactions on Communications

Ø  Reviewer: IEEE Transactions on Wireless Communications

Ø  Reviewer: IEEE Transactions on Vehicular Technology

Ø  Reviewer: IEEE Transactions on Information Forensics and Security

Ø  Reviewer: IEEE Transactions on Industrial Informatics

Ø  Reviewer: IEEE Transactions on Circuits and Systems II: Express Briefs

Ø  Reviewer: IEEE Transactions on Emerging Topics in Computing

Ø  Reviewer: IEEE Transactions on Cognitive Communications and Networking

Ø  Reviewer: IEEE Internet of Things Journal

Ø  Reviewer: IEEE Systems Journal

Ø  Reviewer: IEEE Signal Processing Letters

Ø  Reviewer: IEEE Communications Letters

Ø  Reviewer: IEEE Wireless Communications Letters

Ø  Reviewer: IEEE Access

Ø  Reviewer: IET Communications

Ø  Reviewer: Electronics Letters

Ø  Reviewer: Computer Networks

Ø  Reviewer: Computer Communications

Ø  Reviewer: EURASIP Journal on Wireless Communications and Networking

Ø  Reviewer: Wireless Communications and Mobile Computing

Ø  Reviewer: Telecommunication Systems

Ø  Reviewer: International Journal of Communication Systems

Ø  Reviewer: Ad Hoc Networks

Ø  Reviewer: Entropy

Ø  Reviewer: Concurrency and Computation: Practice and Experience

Ø  Reviewer: KSII Transactions on Internet and Information Systems

Ø  Reviewer: IEICE Transactions on Communications

Ø  Reviewer: Physical Communications

Ø  Reviewer: Science China-Information Sciences

Ø  Reviewer: China Communications

Ø  Reviewer: Chinese Journal of Electronics

Ø  Reviewer: Journal of Electronics and Information Technology (in Chinese)

Ø  Reviewer: Journal of Xi’an Jiaotong University (in Chinese)

Ø  Reviewer: International Conferences, including IEEE ICC, GLOBECOM, VTC, WCNC, PIMRC, etc.