[1] |
LI Zineng, HU Zhiqun, XIAO Hailin, ZENG Zhangfan.
UAV security communication algorithm with Intelligent Reflecting Surface and cooperative Jamming
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 69-76.
|
[2] |
.
Physical Layer Security for IRS-based Cognitive NOMA V2V Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 131-137.
|
[3] |
.
RIS Assisted Short Packet Communication System: Delay and Security Performance Analysis
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 70-77.
|
[4] |
DING Qingfeng, YANG Qian, XU Mengyin.
Mapping-Varied Spatial Modulation for Secure Transmission Based on Multi-RIS Optimization
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(5): 91-96.
|
[5] |
LI Meiling, YANG Xiaoxia, CHENG Wenjie, LU Zhaoming.
Physical Layer Security for CR-NOMA System in Vehicle-to-Everything
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 115-120.
|
[6] |
WU Jiang, XU Ke-feng, LI Yun-bo.
Verification of OFEC Code under Open ROADM Standard in 300 Gbit/s FPGA System
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 135-140.
|
[7] |
LUO Yi, WANG Yu-ting, SHI Rong-hua, YAN Meng-chun, ZENG Hao.
Secrecy Outage Probability Analysis of Underlay Cognitive Cooperative Relay Network with Energy Harvesting
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 105-111,124.
|
[8] |
CHEN Pei-pei, LI Tao-shen, GE Zhi-hui, FANG Xing.
Secure Beamforming Design for Full-Duplex Energy-Constrained Relaying Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(2): 59-65,79.
|
[9] |
LEI Wei-jia, LI Huan.
Signal Combining and Self-Interference Cancellation Scheme Based on Linear Neural Network in a Full-Duplex Receiver Cooperative Jamming System
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 61-67.
|
[10] |
REN Pin-yi, TANG Xiao.
A Review on Physical Layer Security Techniques for 5G
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(5): 69-77.
|
[11] |
LIU Zhe, ZHANG Qiao-yu, CHENG Ming-zhi.
A Physical Layer Secure Communication Mechanism Based on Multidimensional Constellation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 9-15.
|
[12] |
CAO Yang, ZHANG Bin, QIU Xue-song, GUO Shao-yong.
Coalitional Hedonic Game for Secure Wireless Transmission with Cooperative Jamming
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 20-23,33.
|
[13] |
LEI Wei-jia, LIN Xiu-zhen, XIE Xian-zhong.
An Optimized Artificial Noise Strategy in Physical Layer Security Transmission Scheme with PSK Modulation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 62-67.
|
[14] |
TAN Yong-mei, WANG Xiao-hui, YANG Yi-xiao.
Grammatical Error Correction Based on Corpus
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 92-97.
|
[15] |
LEI Wei-jia, LAN Shun-fu, CHEN Sheng-nan, XIE Xian-zhong.
The Physical Security Scheme Based on Generalized Space Shift Keying Modulation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 39-44.
|