Остановите войну!
for scientists:
default search action
Tiejun Lv
Publications
- 2016
- [j43]Ruohan Cao, Tan F. Wong, Tiejun Lv, Hui Gao, Shaoshi Yang:
Detecting Byzantine Attacks Without Clean Reference. IEEE Trans. Inf. Forensics Secur. 11(12): 2717-2731 (2016) - [j41]Ruohan Cao, Hui Gao, Tiejun Lv, Shaoshi Yang, Shanguo Huang:
Phase-Rotation-Aided Relay Selection in Two-Way Decode-and-Forward Relay Networks. IEEE Trans. Veh. Technol. 65(5): 2922-2935 (2016) - [j38]Tiejun Lv, Hui Gao, Ruohan Cao, Jian Zhou:
Co-Ordinated Secure Beamforming in K-User Interference Channel With Multiple Eavesdroppers. IEEE Wirel. Commun. Lett. 5(2): 212-215 (2016) - [c121]Weichen Wang, Ruohan Cao, Hui Gao, Jian Zhou, Tiejun Lv:
Secure beamforming and artificial noise design for simultaneous wireless information and power transfer in interference networks. EUSIPCO 2016: 1168-1172 - [c115]Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv:
Robust beamforming and power allocation for secrecy in multi-pair decode-and-forward relay networks. MILCOM 2016: 551-556 - [c114]Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv:
Secure beamforming and power allocation for multi-pair decode-and-forward relay networks. MILCOM 2016: 1184-1189 - [i17]Ruohan Cao, Tan F. Wong, Tiejun Lv, Hui Gao, Shaoshi Yang:
Detecting Byzantine Attacks Without Clean Reference. CoRR abs/1607.05332 (2016) - 2015
- [c110]Jian Zhou, Ruohan Cao, Hui Gao, Cong Zhang, Tiejun Lv:
Secure beamforming and artificial noise design in interference networks with imperfect ECSI. ICC Workshops 2015: 423-428 - [c108]Jian Zhou, Ruohan Cao, Hui Gao, Haijing Liu, Tiejun Lv:
Secrecy communication of wireless information and power transfer system with green relay. ICC Workshops 2015: 2040-2045 - [c105]Jian Zhou, Hui Gao, Ruohan Cao, Tiejun Lv:
Secure beamforming design in wiretap MISO interference channels. ICCC 2015: 1-6 - [c102]Zhaohui Yue, Hui Gao, Ruohan Cao, Tiejun Lv:
The Sum-Rate Maximization Precoding for Multiuser MIMO SWIPT Systems. VTC Spring 2015: 1-5 - [c100]Jian Zhou, Ruohan Cao, Hui Gao, Cong Zhang, Tiejun Lv:
Secure Beamforming Design in Wiretap MISO Interference Channels. VTC Spring 2015: 1-5 - [i12]Ruohan Cao, Hui Gao, Tiejun Lv, Shaoshi Yang, Shanguo Huang:
Phase Rotation Aided Relay Selection in Two-Way Decode-and-Forward Relay Networks. CoRR abs/1506.06271 (2015) - 2014
- [c78]Cong Zhang, Tiejun Lv, Ruohan Cao, Hui Gao:
Improving Secrecy Outage Probability with Symbol Extension. VTC Spring 2014: 1-5 - 2013
- [j19]Ruohan Cao, Tiejun Lv, Hui Gao, Shaoshi Yang, John M. Cioffi:
Achieving Full Diversity in Multi-Antenna Two-Way Relay Networks via Symbol-Based Physical-Layer Network Coding. IEEE Trans. Wirel. Commun. 12(7): 3445-3457 (2013) - [c73]Ruohan Cao, Eric Graves, Tan F. Wong, Tiejun Lv:
Detecting substitution attacks against non-colluding relays. GLOBECOM 2013: 1856-1861 - 2012
- [j18]Ruohan Cao, Tiejun Lv, Hui Gao, Yueming Lu, Yongmei Sun:
A Specific Physical-Layer Network Coding for MPSK Modulation in Multi-Antenna Relay Networks. IEICE Trans. Commun. 95-B(12): 3768-3771 (2012) - [c57]Weiyan Geng, Tiejun Lv, Ruohan Cao, Yueming Lu:
An efficient decoding algorithm based on orthogonal projection method for asynchronous physical-layer network coding. ICT 2012: 1-5 - [c52]Renju Wu, Ruohan Cao, Tiejun Lv:
Multi-group multiuser two-way relay with superposition coding. MILCOM 2012: 1-5 - 2011
- [j11]Hui Gao, Xin Su, Tiejun Lv, Ruohan Cao, Taotao Wang:
Achieving Diversity for Physical-Layer Network Coding Based Two-Way Multiple-Antenna Relay: A Two-Phase Diversity Scheme. IEICE Trans. Commun. 94-B(12): 3382-3386 (2011) - [c46]Ruohan Cao, Tiejun Lv, Feichi Long, Hui Gao:
Symbol-Based Physical-Layer Network Coding with MPSK Modulation. GLOBECOM 2011: 1-5 - [c38]Ruohan Cao, Tiejun Lv, Hui Gao, Pengfei Chang:
A novel detection strategy based on ant colony optimization for MIMO systems. ICT 2011: 67-71 - [c34]Ruohan Cao, Tiejun Lv, Hui Gao:
Symbol-based physical-layer network coding for two-way relay channel. MILCOM 2011: 287-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint