default search action
Nan Sha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j35]Qiao Su, Xiongwei Zhang, Nan Sha, Kui Xu, Mingxi Guo, Yimin Wei:
The Robust Communication Method Against Dependent Jamming Based on Convex Hull in Communication Countermeasures. Wirel. Pers. Commun. 135(4): 2465-2481 (2024) - 2023
- [j34]Xiaochen Xia, Kui Xu, Wei Xie, Youyun Xu, Nan Sha, Yurong Wang:
Multiple Aerial Base Station Deployment and User Association Based on Binary Radio Map. IEEE Internet Things J. 10(19): 17206-17219 (2023) - [j33]Xiaoyu Wang, Yuanyuan Gao, Xianyu Zhang, Nan Sha, Mingxi Guo, Guozhen Zang, Guangna Zhang:
Performance enhancement in the cell-free massive MIMO SWIPT system with active eavesdropping. Phys. Commun. 56: 101937 (2023) - [j32]Na Li, Yuanyuan Gao, Kui Xu, Mingxi Guo, Nan Sha, Xiaoyu Wang, Guangyu Wang:
Spatial Sparsity-Based Pilot Attack Detection and Transmission Countermeasure for Cell-Free Massive MIMO System. IEEE Syst. J. 17(2): 2065-2076 (2023) - [j31]Xiaoyu Wang, Yuanyuan Gao, Nan Sha, Mingxi Guo, Na Li:
Secrecy Performance Analysis of Mixed-ADC/DAC Cell-Free Massive MIMO in the Presence of Multiple Eavesdroppers. IEEE Trans. Green Commun. Netw. 7(2): 759-771 (2023) - 2022
- [j30]Kui Xu, Mouhua Huang, Dongmei Zhang, Xiaochen Xia, Wei Xie, Nan Sha:
User Rate Optimization for Fronthaul-Constrained Cell-Free Massive MIMO-OFDM Systems: A Quadratic Transform-Based Approach. IEEE Open J. Commun. Soc. 3: 1244-1251 (2022) - [j29]Ruo Jia, Kui Xu, Xiaochen Xia, Wei Xie, Nan Sha, Wei Guo:
Extrinsic Information Aided Fingerprint Localization of Vehicles for Cell-Free Massive MIMO-OFDM System. IEEE Open J. Commun. Soc. 3: 1810-1819 (2022) - [j28]Qiao Su, Xiongwei Zhang, Nan Sha, Kui Xu:
Underdetermined Blind Direction-of-Arrival Estimation Using a Moving Platform. IEEE Signal Process. Lett. 29: 2532-2536 (2022) - [j27]Xiaoyu Wang, Yuanyuan Gao, Xianyu Zhang, Nan Sha, Mingxi Guo, Guozhen Zang, Na Li:
Secure transmission in one-bit cell-free massive MIMO system with multiple non-colluding eavesdroppers. Wirel. Networks 28(7): 2951-2966 (2022) - 2021
- [j26]Guangna Zhang, Yuanyuan Gao, Huadong Luo, Xiaochen Liu, Nan Sha, Kui Xu:
Security-Reliability Tradeoff for Joint Relay-User Pair and Friendly Jammer Selection with Channel Estimation Error in Internet-of-Things. IEICE Trans. Commun. 104-B(6): 686-695 (2021) - [j25]Guangna Zhang, Yuanyuan Gao, Huadong Luo, Xiaochen Liu, Mingxi Guo, Nan Sha, Shijie Wang:
Security-reliability tradeoff analysis of joint relay-user pair and friendly jammer selection for physical layer security against multiple eavesdroppers. IET Commun. 15(5): 664-673 (2021) - [j24]Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Shijie Wang:
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. KSII Trans. Internet Inf. Syst. 15(6): 2204-2224 (2021) - 2020
- [j23]Guangna Zhang, Yuanyuan Gao, Huadong Luo, Shijie Wang, Mingxi Guo, Nan Sha:
Security Performance Analysis for Best Relay Selection in Energy-Harvesting Cooperative Communication Networks. IEEE Access 8: 26-36 (2020) - [j22]Yi Song, Weiwei Yang, Zhongwu Xiang, Nan Sha, Hui Wang, Yucui Yang:
An Analysis on Secure Millimeter Wave NOMA Communications in Cognitive Radio Networks. IEEE Access 8: 78965-78978 (2020) - [j21]Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Kui Xu:
Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 215-220 (2020) - [j20]Chenjing Xi, Yuanyuan Gao, Nan Sha:
物理层安全星座模糊设计方法的性能研究 (Performance Study on Constellation Obfuscation Design Method for Physical Layer Security). 计算机科学 47(3): 304-311 (2020) - [j19]Jue Liu, Nan Sha, Weiwei Yang, Jia Tu, Lianxin Yang:
Hierarchical Q-Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers. Wirel. Commun. Mob. Comput. 2020: 8825120:1-8825120:15 (2020) - 2019
- [j18]Shijie Wang, Yuanyuan Gao, Nan Sha, Guangna Zhang, Guozhen Zang:
Physical Layer Security in K-Tier Heterogeneous Cellular Networks Over Nakagami-m Channel During Uplink and Downlink Phases. IEEE Access 7: 14581-14592 (2019) - [j17]Xiaochen Liu, Yuanyuan Gao, Mingxi Guo, Nan Sha:
Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model. IEEE Access 7: 59477-59490 (2019) - [j16]Xiaochen Liu, Yuanyuan Gao, Guozhen Zang, Nan Sha, Mingxi Guo:
Distributionally Robust Secure Transmission for MISO Downlink Networks With Assisting Jammer. IEEE Access 7: 119981-119995 (2019) - [j15]Kui Xu, Ming Zhang, Jie Liu, Nan Sha, Wei Xie, Lihua Chen:
SWIPT in mMIMO system with non-linear energy-harvesting terminals: protocol design and performance optimization. EURASIP J. Wirel. Commun. Netw. 2019: 72 (2019) - [j14]Xiaochen Liu, Yuanyuan Gao, Lei Wang, Nan Sha, Shijie Wang:
Distributionally Robust Optimization for Secure Transmission With Assisting Jammer in MISO Downlink Networks. IEEE Commun. Lett. 23(2): 338-341 (2019) - [j13]Nan Sha, Mingxi Guo, Yuanyuan Gao, Lihua Chen, Kui Xu:
Design of CPM-PNC Using the Titled-Phase Model over AWGN Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(2): 476-479 (2019) - [j12]Guangna Zhang, Yuanyuan Gao, Huadong Luo, Nan Sha, Shijie Wang, Kui Xu:
Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel. IEICE Trans. Commun. 102-B(3): 603-612 (2019) - [j11]Nan Sha, Lihua Chen, Yuanyuan Gao, Mingxi Guo, Kui Xu:
Serially Concatenated CPM in Two-Way Relay Channels with Physical-Layer Network Coding. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(7): 934-937 (2019) - [j10]Shijie Wang, Yuanyuan Gao, Xiaochen Liu, Guangna Zhang, Nan Sha, Mingxi Guo, Kui Xu:
Enhancing Physical Layer Security Performance in Downlink Cellular Networks through Cooperative Users. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 2008-2014 (2019) - [j9]Guangna Zhang, Yuanyuan Gao, Huadong Luo, Nan Sha, Mingxi Guo, Kui Xu:
Security Performance Analysis of Joint Multi-Relay and Jammer Selection for Physical-Layer Security under Nakagami-m Fading Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 2015-2020 (2019) - [j8]Lei Peng, Guozhen Zang, Yuanyuan Gao, Nan Sha, Chenjing Xi, Xuanyou Jiang:
LMS自适应干扰消除在基于人工干扰的物理层安全通信系统中的应用研究 (Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference). 计算机科学 46(6): 168-173 (2019) - [j7]Ming Zhang, Chengjian Liao, Ningsong Liu, Kui Xu, Jie Liu, Wei Xie, Nan Sha, Lihua Chen, Dongmei Zhang:
Angle-domain secure transmission in air-terrestrial mMIMO system with single antenna ground eavesdropper. Phys. Commun. 36 (2019) - 2018
- [j6]Shijie Wang, Yuanyuan Gao, Chao Dong, Nan Sha, Guozhen Zang:
Secure User Association in Two-Tier Heterogeneous Cellular Networks With In-Band Interference. IEEE Access 6: 38607-38615 (2018) - [j5]Nan Sha, Yuanyuan Gao, Mingxi Guo, Shijie Wang, Kui Xu:
Physical-Layer Network Coding for Fading Bidirectional Relay Channels with M-CPFSK. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 974-977 (2018) - 2015
- [j4]Wei Zhao, Yuehong Shen, Zhi-Gang Yuan, Dawei Liu, Pengcheng Xu, Yimin Wei, Wei Jian, Nan Sha:
A Novel Method for Complex-Valued Signals in Independent Component Analysis Framework. Circuits Syst. Signal Process. 34(6): 1893-1913 (2015) - 2014
- [j3]Nan Sha, Yuanyuan Gao, Xiaoxin Yi, Wenlong Li, Weiwei Yang:
Joint CPFSK Modulation and Physical-Layer Network Coding in Two-Way Relay Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(4): 1021-1023 (2014) - [j2]Nan Sha, Yuanyuan Gao, Xiaoxin Yi, Wei Jian, Weiwei Yang:
MSK Modulation for Physical-Layer Network Coding Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(10): 2086-2089 (2014) - 2013
- [j1]Kun Xu, Yuanyuan Gao, Xiaoxin Yi, Guozhen Zang, Nan Sha:
Performance analysis of time division broadcast protocol with incremental relaying and symmetric users. Int. J. Commun. Syst. 26(11): 1419-1432 (2013)
Conference and Workshop Papers
- 2022
- [c9]Dan Jiang, Yuanyuan Gao, Nan Sha, Xiaoyu Wang, Na Li:
Physical Layer Security of Cooperative NOMA Systems with an Untrusted User. ICCT 2022: 1287-1292 - 2021
- [c8]Guangyu Wang, Yuanyuan Gao, Mingxi Guo, Nan Sha, Xiaoyu Wang, Na Li:
Quantization Analysis of Cell-Free Massive MIMO Uplink Backhaul Based on Zero-Forcing. ICCT 2021: 615-620 - 2019
- [c7]Xiaochen Liu, Yuanyuan Gao, Nan Sha, Sheng Huang:
Secure Transmit Beamforming in the RF Powered Untrusted Relay networks. ComComAP 2019: 444-448 - [c6]Sheng Huang, Yuanyuan Gao, Heping Xi, Nan Sha:
A Physical Layer Encryption Scheme Based on Symbol Convolution for MISO Secure Transmission. ICCT 2019: 290-295 - [c5]Xiaochen Liu, Yuanyuan Gao, Guozhen Zang, Nan Sha:
Artificial-Noise-Aided Robust Beamforming for MISOME Wiretap Channels with Security QoS. ICCT 2019: 795-799 - [c4]Shijie Wang, Yuanyuan Gao, Lei Wu, Nan Sha, Sheng Huang, Xiaoyu Wang:
Cooperative Jamming in Downlink Cellular Networks with Available Eavesdroppers' Location Information. WCSP 2019: 1-6 - 2015
- [c3]Qianqian Zhang, Yuanyuan Gao, Guozhen Zang, Yuyang Zhang, Nan Sha:
Physical layer security for cooperative communication system with untrusted relay based on jamming signals. WCSP 2015: 1-4 - 2011
- [c2]Zhuo Chen, Yueming Cai, Lei Wang, Nan Sha:
Impact of channel estimation errors in amplify-and-forward two-way relaying system. WCSP 2011: 1-5 - [c1]Junchao Shen, Nan Sha, Yueming Cai, Chunxiao Cai, Weiwei Yang:
Outage probability of two-way amplify-and-forward relaying system with interference-limited relay. WCSP 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint