Algorithms and arithmetic operators for computing the ηT pairing in characteristic three JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi IEEE Transactions on Computers 57 (11), 1454-1468, 2008 | 78 | 2008 |
On the throughput capacity study for aloha mobile ad hoc networks Y Chen, Y Shen, J Zhu, X Jiang, H Tokuda IEEE Transactions on Communications 64 (4), 1646-1659, 2016 | 25 | 2016 |
Secrecy transmission capacity in noisy wireless ad hoc networks J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang, N Shiratori Ad hoc networks 21, 123-133, 2014 | 18 | 2014 |
Average secrecy capacity of free-space optical communication systems with on-off keying modulation and threshold detection J Zhu, Y Chen, M Sasaki 2016 International Symposium on Information Theory and Its Applications …, 2016 | 14 | 2016 |
Outage secrecy capacity over correlated fading channels at high SNR J Zhu, O Takahashi, X Jiang, Y Nakamura, Y Shiraishi Proc. 2012 International Conference on Mobile Computing and Ubiquitous …, 2012 | 13 | 2012 |
End-to-end physical layer authentication for dual-hop wireless networks P Zhang, J Zhu, Y Chen, X Jiang IEEE Access 7, 38322-38336, 2019 | 11 | 2019 |
Effects of channel correlation on outage secrecy capacity J Zhu, X Jiang, O Takahashi, N Shiratori Information and Media Technologies 8 (4), 1224-1233, 2013 | 11 | 2013 |
Fractal dimension of dsss frame preamble: Radiometric feature for wireless device identification X Li, Y Chen, J Zhu, S Zeng, Y Shen, X Jiang, D Zhang IEEE Transactions on Mobile Computing, 2023 | 6 | 2023 |
Visibility graph entropy based radiometric feature for physical layer identification S Zeng, Y Chen, X Li, J Zhu, Y Shen, N Shiratori Ad Hoc Networks 127, 102780, 2022 | 6 | 2022 |
On the rate of successful transmissions in finite slotted Aloha MANETs Y Chen, J Zhu, Y Shen, X Jiang, H Tokuda Ad Hoc Networks 62, 76-87, 2017 | 6 | 2017 |
Secrecy capacity of correlated Rayleigh fading channels J Zhu, X Jiang, O Takahashi, N Shiratori 2012 18th Asia-Pacific Conference on Communications (APCC), 333-337, 2012 | 6 | 2012 |
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process Y Chen, Y Shen, J Zhu, X Jiang Wireless Networks 21, 2453-2466, 2015 | 4 | 2015 |
Secrecy capacity and outage performance of correlated fading wire-tap channel J Zhu, Y Shen, X Jiang, O Takahashi, N Shiratori IEICE Transactions on Communications 97 (2), 396-407, 2014 | 4 | 2014 |
Outage performance for secure communication over correlated fading channels with partial CSI J Zhu, X Jiang, Y Zhou, Y Zhang, O Takahashi, N Shiratori 2012 IEEE Asia-Pacific Services Computing Conference, 257-262, 2012 | 4 | 2012 |
Eavesdropper-Tolerance Capability in Two-HopWireless Networks via Cooperative Jamming. Y Zhang, Y Shen, J Zhu, X Jiang Adhoc & Sensor Wireless Networks 29, 2015 | 3 | 2015 |
Modeling the success transmission rate in Aloha MANETs with Binomial point process Y Chen, J Zhu, Y Shen, X Jiang 2015 Eighth International Conference on Mobile Computing and Ubiquitous …, 2015 | 2 | 2015 |
A Review on Feature, Problem Formulation and Application of Radio Frequency Fingerprinting Y Chen, Z Jia, Z Guo, J Zhu, X Jiang Proceedings of the 13th International Conference on the Internet of Things …, 2023 | | 2023 |
Time–frequency fusion for enhancement of deep learning-based physical layer identification S Zeng, Y Chen, X Li, J Zhu, Y Shen, N Shiratori Ad Hoc Networks 142, 103099, 2023 | | 2023 |
On the Performance Supremum of CFO Based Physical Layer Identification S Zeng, Y Chen, X Li, Y Shen, D Zhao, J Zhu, N Shiratori Wireless Communications and Mobile Computing 2022, 2022 | | 2022 |
Performance of physical layer security under correlated fading wire-tap channel J Zhu Future University Hakodate, 2014 | | 2014 |