default search action
Hong Xing
Publications
- 2024
- [i22]Xiaoxia Xu, Yuanwei Liu, Xidong Mu, Hong Xing, Arumugam Nallanathan:
Accelerating Mobile Edge Generation (MEG) by Constrained Learning. CoRR abs/2407.07245 (2024) - 2022
- [j16]Jiechen Chen, Hong Xing, Xiaohui Lin, Arumugam Nallanathan, Suzhi Bi:
Joint Resource Allocation and Cache Placement for Location-Aware Multi-User Mobile-Edge Computing. IEEE Internet Things J. 9(24): 25698-25714 (2022) - 2021
- [j14]Lei Xu, Hong Xing, Yansha Deng, Arumugam Nallanathan, Chenlu Zhuansun:
Fairness-Aware Throughput Maximization for Underlaying Cognitive NOMA Networks. IEEE Syst. J. 15(2): 1881-1892 (2021) - [i16]Jiechen Chen, Hong Xing, Xiaohui Lin, Arumugam Nallanathan, Suzhi Bi:
Joint Resource Allocation and Cache Placement for Location-Aware Multi-User Mobile Edge Computing. CoRR abs/2103.11220 (2021) - 2019
- [j12]Lei Xu, Hong Xing, Arumugam Nallanathan, Yuwang Yang, Tianyou Chai:
Security-Aware Cross-Layer Resource Allocation for Heterogeneous Wireless Networks. IEEE Trans. Commun. 67(2): 1388-1399 (2019) - [j11]Hong Xing, Liang Liu, Jie Xu, Arumugam Nallanathan:
Joint Task Assignment and Resource Allocation for D2D-Enabled Mobile-Edge Computing. IEEE Trans. Commun. 67(6): 4193-4207 (2019) - [c11]Hong Xing, Jingjing Cui, Yansha Deng, Arumugam Nallanathan:
Energy-Efficient Proactive Caching for Fog Computing with Correlated Task Arrivals. SPAWC 2019: 1-5 - [i12]Hong Xing, Liang Liu, Jie Xu, Arumugam Nallanathan:
Joint Task Assignment and Resource Allocation for D2D-Enabled Mobile-Edge Computing. CoRR abs/1902.10017 (2019) - [i11]Hong Xing, Jingjing Cui, Yansha Deng, Arumugam Nallanathan:
Energy-Efficient Proactive Caching for Fog Computing with Correlated Task Arrivals. CoRR abs/1908.06334 (2019) - 2018
- [j10]Hong Xing, Yuanwei Liu, Arumugam Nallanathan, Zhiguo Ding, H. Vincent Poor:
Optimal Throughput Fairness Tradeoffs for Downlink Non-Orthogonal Multiple Access Over Fading Channels. IEEE Trans. Wirel. Commun. 17(6): 3556-3571 (2018) - [j9]Yuanwei Liu, Hong Xing, Cunhua Pan, Arumugam Nallanathan, Maged Elkashlan, Lajos Hanzo:
Multiple-Antenna-Assisted Non-Orthogonal Multiple Access. IEEE Wirel. Commun. 25(2): 17-23 (2018) - [c10]Xiangyu He, Hong Xing, Yue Chen, Arumugam Nallanathan:
Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data. GLOBECOM 2018: 1-6 - [c9]Hong Xing, Liang Liu, Jie Xu, Arumugam Nallanathan:
Joint Task Assignment and Wireless Resource Allocation for Cooperative Mobile-Edge Computing. ICC 2018: 1-6 - [c8]Hong Xing, Yuanwei Liu, Arumugam Nallanathan, Zhiguo Ding:
Sum-rate maximization guaranteeing user fairness for NOMA in fading channels. WCNC 2018: 1-6 - [i9]Yuanwei Liu, Hong Xing, Cunhua Pan, Arumugam Nallanathan, Maged Elkashlan, Lajos Hanzo:
Multiple Antenna Assisted Non-Orthogonal Multiple Access. CoRR abs/1801.08170 (2018) - [i8]Hong Xing, Liang Liu, Jie Xu, Arumugam Nallanathan:
Joint Task Assignment and Wireless Resource Allocation for Cooperative Mobile-Edge Computing. CoRR abs/1802.06862 (2018) - [i7]Xiangyu He, Hong Xing, Yue Chen, Arumugam Nallanathan:
Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data. CoRR abs/1809.00966 (2018) - 2017
- [j8]Panagiotis D. Diamantoulakis, Koralia N. Pappi, George K. Karagiannidis, Hong Xing, Arumugam Nallanathan:
Joint Downlink/Uplink Design for Wireless Powered Networks With Interference. IEEE Access 5: 1534-1547 (2017) - [j7]Kanapathippillai Cumanan, Hong Xing, Peng Xu, Gan Zheng, Xuchu Dai, Arumugam Nallanathan, Zhiguo Ding, George K. Karagiannidis:
Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks. IEEE Access 5: 3603-3611 (2017) - [j6]Hong Xing, Xin Kang, Kai-Kit Wong, Arumugam Nallanathan:
Optimizing DF Cognitive Radio Networks With Full-Duplex-Enabled Energy Access Points. IEEE Trans. Wirel. Commun. 16(7): 4683-4697 (2017) - [i6]Kanapathippillai Cumanan, Hong Xing, Peng Xu, Gan Zheng, Xuchu Dai, Arumugam Nallanathan, Zhiguo Ding, George K. Karagiannidis:
Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks. CoRR abs/1701.05764 (2017) - [i5]Hong Xing, Yuanwei Liu, Arumugam Nallanathan, Zhiguo Ding, H. Vincent Poor:
Optimal Throughput Fairness Trade-offs for Downlink Non-Orthogonal Multiple Access over Fading Channels. CoRR abs/1708.01403 (2017) - 2016
- [j5]Haijun Zhang, Hong Xing, Julian Cheng, Arumugam Nallanathan, Victor C. M. Leung:
Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming. IEEE Trans. Ind. Informatics 12(5): 1714-1725 (2016) - [j2]Hong Xing, Kai-Kit Wong, Arumugam Nallanathan, Rui Zhang:
Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks. IEEE Trans. Wirel. Commun. 15(12): 7971-7984 (2016) - [c7]Hong Xing, Xin Kang, Kai-Kit Wong, Arumugam Nallanathan:
Optimization for DF Relaying Cognitive Radio Networks with Multiple Energy Access Points. GLOBECOM 2016: 1-7 - [c6]Hong Xing, Yansha Deng, Kai-Kit Wong, Arumugam Nallanathan:
Wireless powered large-scale multi-antenna AF relaying for cooperative jamming-aided secrecy. SPAWC 2016: 1-5 - [i4]Hong Xing, Xin Kang, Kai-Kit Wong, Arumugam Nallanathan:
Optimizing DF Cognitive Radio Networks with Full-Duplex-Enabled Energy Access Points. CoRR abs/1611.05352 (2016) - 2015
- [j1]Hong Xing, Kai-Kit Wong, Zheng Chu, Arumugam Nallanathan:
To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying. IEEE Trans. Signal Process. 63(24): 6616-6631 (2015) - [c5]Hong Xing, Kai-Kit Wong, Arumugam Nallanathan:
Secure wireless energy harvesting-enabled AF-relaying SWIPT networks. ICC 2015: 2307-2312 - [i3]Hong Xing, Kai-Kit Wong, Zheng Chu, Arumugam Nallanathan:
Robust MIMO Harvest-and-Jam Helpers and Relaying for Secret Communications. CoRR abs/1502.07066 (2015) - [i2]Hong Xing, Kai-Kit Wong, Arumugam Nallanathan, Rui Zhang:
Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks. CoRR abs/1511.03705 (2015) - 2014
- [c3]Hong Xing, Zheng Chu, Zhiguo Ding, Arumugam Nallanathan:
Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks. GLOBECOM 2014: 3145-3150 - 2012
- [c1]Haijun Zhang, Hong Xing, Xiaoli Chu, Arumugam Nallanathan, Wei Zheng, Xiangming Wen:
Secure resource allocation for OFDMA two-way relay networks. GLOBECOM 2012: 3649-3654
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint