default search action
Qian Xu 0007
Person information
- affiliation: Xi'an Jiaotong University, School of Electronic and Information Engineering, China
Other persons with the same name
- Qian Xu — disambiguation page
- Qian Xu 0001 — Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX, USA
- Qian Xu 0002 — Elon University, School of Communications, NC, USA (and 1 more)
- Qian Xu 0003 — Technicolor, Research and Innovations, Princeton, NJ, USA (and 1 more)
- Qian Xu 0004 — Northeast Normal University, China
- Qian Xu 0005 — WeBank, Shenzhen, China (and 2 more)
- Qian Xu 0006 — University of Huddersfield, CGIV Research Group, UK
- Qian Xu 0008 — Tongji University, Department of Computer Science and Technology, Shanghai, China
- Qian Xu 0009 — Arizona State University, Tempe, USA
- Qian Xu 0010 — City University of Hong Kong, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Yixin He, Fanghui Huang, Qian Xu, Dawei Wang, Amr Tolba, Keping Yu, Neeraj Kumar, Victor C. M. Leung:
Air-to-Ground Integrated Internet of Vehicles Enhanced by LAPSs and RISs: Location, Power, and Phase Shift Optimization. IEEE Internet Things J. 11(10): 18020-18034 (2024) - [j10]Qian Xu, Qian You, Yanyun Gong, Xin Yang, Ling Wang:
RIS-Assisted UAV-Enabled Green Communications for Industrial IoT Exploiting Deep Learning. IEEE Internet Things J. 11(16): 26595-26609 (2024) - 2023
- [c17]Dawei Wang, Jinlong He, Yixin He, Shaoyang Men, Qian Xu, Xin Yang, Wei Liang:
Cooperative Rate Splitting Multiple Access in Cognitive Radio Networks: Power Allocation and Location Optimization. ICC Workshops 2023: 1319-1323 - [c16]Yanyun Gong, Zi-Xiong Yang, Wen-Bin Sun, Qian Xu, Jiansong Huang, Ling Wang:
Intelligent Reflecting Surface-aided Robust Directional Modulation with Hardware Impairments. ICCC 2023: 1-6 - [c15]Qian You, Qian Xu, Xin Yang, Wen-Bin Sun, Ling Wang:
Distributed Deep Learning for RIS Aided UAV-D2D Communications in Space-Air-Ground Networks. ICCC 2023: 1-6 - [c14]Yaqi Mao, Xin Yang, Jian Geng, Qian Xu, Ling Wang:
URV-MAC: A MAC Protocol for UAV-Enhanced RIS-Assisted V2X Architecture in 3D Urban Traffic. ICSPCC 2023: 1-6 - 2022
- [j9]Dawei Wang, Menghan Wu, Yixin He, Linna Pang, Qian Xu, Ruonan Zhang:
An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote. Sens. 14(18): 4501 (2022) - [c13]Jin-Zhe Xu, Qian Xu, Xin Yang, Ling Wang, Wen-Bin Sun:
Relaxation-phase-based Robust Directional Modulation with Angle Estimation Error. GLOBECOM 2022: 5499-5504 - [c12]Zhengxiang Duan, Xin Yang, Qian Xu, Ling Wang:
Covert Communication in Uplink NOMA Systems Against a Two-Phase Detector. GLOBECOM 2022: 5516-5521 - 2021
- [j8]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. IEEE Trans. Inf. Forensics Secur. 16: 585-600 (2021) - 2020
- [j7]Qian Xu, Pinyi Ren:
Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping. IEEE Access 8: 140981-140997 (2020) - [j6]Qian Xu, Pinyi Ren:
Channel-Aware Key Generation Under Wireless Fading Environment. IEEE Commun. Lett. 24(8): 1636-1640 (2020) - [c11]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Secure Symbol-Level Miso Precoding. ICASSP 2020: 8946-8950 - [c10]Qian Xu, Pinyi Ren:
Delay-aware Secure Transmission in MEC-enabled Multicast Network. ICCC 2020: 1262-1267
2010 – 2019
- 2019
- [c9]Qian Xu, Pinyi Ren, Dongyang Xu:
Combating Unknown Eavesdroppers by using Multipath Wireless Receptions. ICC 2019: 1-6 - [i1]Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. CoRR abs/1908.03174 (2019) - 2018
- [j5]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission. IEEE Trans. Veh. Technol. 67(6): 5486-5490 (2018) - [c8]Qian Xu, Pinyi Ren:
Secrecy Energy Efficiency of Massive MIMO AF Relaying System with Low-Resolution ADCs. GLOBECOM 2018: 1-6 - [c7]Dawei Wang, Pinyi Ren, Qian Xu, Qinghe Du:
Secondary Encrypted Secure Transmission in Cognitive Radio Networks. ICC 2018: 1-5 - [c6]Qian Xu, Pinyi Ren, Qinghe Du, Dawei Wang:
Channel-Aware Secure Communication via Hybrid Wiretap Encoding and Secret Key Generation. ICC 2018: 1-6 - [c5]Qian Xu, Pinyi Ren, Hongliang He, Dongyang Xu:
Security-aware routing for artificial-noise-aided multi-hop secondary communications. WCNC 2018: 1-6 - [c4]Dongyang Xu, Pinyi Ren, James A. Ritcey, Hongliang He, Qian Xu:
ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems. WCNC 2018: 1-6 - 2017
- [j4]Qian Xu, Pinyi Ren, Houbing Song, Qinghe Du:
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions. IEEE Internet Things J. 4(6): 1924-1933 (2017) - [j3]Qinghe Du, Meng Liu, Qian Xu, Houbing Song, Li Sun, Pinyi Ren:
Interference-constrained routing over P2P-share enabled multi-hop D2D networks. Peer-to-Peer Netw. Appl. 10(6): 1354-1370 (2017) - [c3]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers. WCNC 2017: 1-6 - 2016
- [j2]Qian Xu, Pinyi Ren, Houbing Song, Qinghe Du:
Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations. IEEE Access 4: 2840-2853 (2016) - [c2]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
On achievable secrecy rate by noise aggregation over wireless fading channels. ICC 2016: 1-6 - [c1]Qian Xu, Pinyi Ren, Qinghe Du, Li Sun:
Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks. VTC Spring 2016: 1-5 - 2015
- [j1]Qinghe Du, Houbing Song, Qian Xu, Pinyi Ren, Li Sun:
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS. Pers. Ubiquitous Comput. 19(7): 1033-1043 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint