default search action
Yunpeng Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j17]Jingjing Bai, Liwen Mei, Yiwen Wu, Xingming Feng, Yunpeng Cheng, Zhihong Yu, Yunpeng Ma:
Reconstruction error-assisted anomaly detection method for underground pipelines. J. Electronic Imaging 32(6) (2023) - 2020
- [j16]Yunpeng Cheng, Shuo Tang, Shi Lyu, Manqiao Wu, Hao Qiao:
Aerodynamic Statistics-Based Trajectory Estimation of Hypersonic Maneuvering Target. IEEE Access 8: 227642-227656 (2020) - 2019
- [j15]Wen Li, Yuhua Xu, Yunpeng Cheng, Yang Yang, Xueqiang Chen, Meng Wang, Dianxiong Liu:
Distributed Multichannel Access in High-Frequency Diversity Networks: A Multi-Agent Learning Approach With Correlated Equilibrium. IEEE Access 7: 85581-85593 (2019) - [j14]Dechuan Chen, Yunpeng Cheng, Weiwei Yang, Jianwei Hu, Yueming Cai, Junquan Hu, Meng Wang:
Secure Multiuser Communications with Multiple Untrusted Relays over Nakagami-m Fading Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(8): 978-981 (2019) - [j13]Dechuan Chen, Yunpeng Cheng, Xiangdong Wang, Weiwei Yang, Jianwei Hu, Yueming Cai:
Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks. J. Commun. Networks 21(4): 365-375 (2019) - 2018
- [j12]Dechuan Chen, Yunpeng Cheng, Weiwei Yang, Jianwei Hu, Yueming Cai:
Physical Layer Security in Cognitive Untrusted Relay Networks. IEEE Access 6: 7055-7065 (2018) - [j11]Zhongwu Xiang, Weiwei Yang, Yueming Cai, Yunpeng Cheng, Heng Wu, Meng Wang:
Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks. Wirel. Commun. Mob. Comput. 2018: 9637610:1-9637610:15 (2018) - 2016
- [j10]Cong Li, Jinlong Wang, Yunpeng Cheng, Yuzhen Huang:
Low-complexity soft-decision aided detectors for coded spatial modulation MIMO systems. EURASIP J. Wirel. Commun. Netw. 2016: 34 (2016) - 2015
- [j9]Yuzhen Huang, Qihui Wu, Jinlong Wang, Yunpeng Cheng, Yuming Zhang:
Unified performance analysis of maximal-ratio combining for spectrum sharing systems with antenna correlation. Int. J. Commun. Syst. 28(2): 201-212 (2015) - [j8]Cong Li, Yuzhen Huang, Marco Di Renzo, Jinlong Wang, Yunpeng Cheng:
Low-Complexity ML Detection for Spatial Modulation MIMO With APSK Constellation. IEEE Trans. Veh. Technol. 64(9): 4315-4321 (2015) - 2014
- [j7]Yumeng Wang, Yuhua Xu, Liang Shen, Chenglong Xu, Yunpeng Cheng:
Two-dimensional POMDP-based opportunistic spectrum access in time-varying environment with fading channels. J. Commun. Networks 16(2): 217-226 (2014) - 2013
- [j6]Yuzhen Huang, Qihui Wu, Jinlong Wang, Yunpeng Cheng:
Protocol design and performance analysis for cognitive cooperative networks with multiple antennas. EURASIP J. Wirel. Commun. Netw. 2013: 70 (2013) - [j5]An Wang, Jin Chen, Yueming Cai, Chunxiao Cai, Wendong Yang, Yunpeng Cheng:
Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks. EURASIP J. Wirel. Commun. Netw. 2013: 193 (2013) - [j4]Jinlong Wang, Yuzhen Huang, Caijun Zhong, Fawaz S. Al-Qahtani, Qihui Wu, Yunpeng Cheng:
Performance analysis of interference-limited dual-hop multiple antenna AF relaying systems with feedback delay. EURASIP J. Wirel. Commun. Netw. 2013: 284 (2013) - [j3]Yuzhen Huang, Cong Li, Caijun Zhong, Jinlong Wang, Yunpeng Cheng, Qihui Wu:
On the Capacity of Dual-Hop Multiple Antenna AF Relaying Systems with Feedback Delay and CCI. IEEE Commun. Lett. 17(6): 1200-1203 (2013) - 2012
- [j2]Qihui Wu, Yuzhen Huang, Jinlong Wang, Yunpeng Cheng:
Effective Capacity of Cognitive Radio Systems with GSC Diversity under Imperfect Channel Knowledge. IEEE Commun. Lett. 16(11): 1792-1795 (2012) - [j1]Xinrong Guan, Yueming Cai, Weiwei Yang, Yunpeng Cheng, Junquan Hu:
Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming. KSII Trans. Internet Inf. Syst. 6(4): 1041-1062 (2012)
Conference and Workshop Papers
- 2018
- [c11]Chujie Wu, Yunpeng Cheng, Yuping Gong, Yuming Zhang, Fei Huang, Guoru Ding:
Multi-user ALE for Future HF Radio Communication by Leveraging Wideband Spectrum Sensing and Channel Prediction. ADHIP 2018: 47-56 - [c10]Zhongwu Xiang, Weiwei Yang, Yueming Cai, Yunpeng Cheng, Heng Wu, Meng Wang:
Secrecy Performance Analysis of Uplink NOMA in IoT Networks. ICCC 2018: 506-510 - [c9]Chen Pan, Yunpeng Cheng, Ducheng Wu, Lei Zhao, Yuli Zhang:
Distributed Channel Allocation for Wireless Mesh Networks Based on Hypergraph Interference Model. MLICOM 2018: 181-189 - [c8]Chen Pan, Yunpeng Cheng, Zhengju Yang, Yuli Zhang:
Dynamic Opportunistic Spectrum Access with Channel Bonding in Mesh Networks: A Game-Theoretic Approach. MLICOM 2018: 381-390 - 2017
- [c7]Dechuan Chen, Yunpeng Cheng, Weiwei Yang, Jianwei Hu, Yueming Cai, Yingbo Hu:
Secure transmission of cognitive untrusted relay networks with selection diversity. WCSP 2017: 1-5 - 2016
- [c6]Cong Li, Jinlong Wang, Wenlong Liu, Yunpeng Cheng, Yuzhen Huang:
Low-Complexity Detection for GSM-MIMO Systems via Spatial Constraint. VTC Spring 2016: 1-5 - [c5]Pan Yuan, Yunpeng Cheng, Weiwei Yang, Kaihua Wang, Heng Wang:
Physical layer security enhancement for cooperative SC-FDE systems. WCSP 2016: 1-6 - 2015
- [c4]Cong Li, Yunpeng Cheng, Yuming Zhang, Yuzhen Huang:
Low-complexity soft-output detectors for LDPC coded spatial modulation systems. WCSP 2015: 1-6 - 2013
- [c3]Yuzhen Huang, Yunpeng Cheng, Xueqiang Zheng, Jinlong Wang:
Performance Analysis of MRC Diversity for Spectrum Sharing Systems with Imperfect Channel Estimation. CyberC 2013: 427-432 - [c2]Yuzhen Huang, Qihui Wu, Jinlong Wang, Yunpeng Cheng, Yuming Zhang:
Performance analysis of uplink cognitive cellular networks in Nakagami-m fading channels. WCNC 2013: 3392-3396 - 2010
- [c1]Yuzhen Huang, Yunpeng Cheng, Yuming Zhang, Guo-hai Yu, Jin Chen:
Combine non-binary LDPC codes with M-ary orthogonal spread spectrum modulation. WCSP 2010: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint