代表文章 [1] D. Yang, J. Xu, W. Xu, N. Wang, N. Sheng, and A. L. Swindlehurst, “Secure communication for spatially correlated massive MIMO with low-resolution DACs,” IEEE Wireless Communications Letters, vol. 10, no. 10, pp. 2120-2124, Oct. 2021. [2] Y. Fan, S. Gao, X. Cheng, L. Yang, and N. Wang, “Wideband generalized beamspace modulation (wGBM) for mmWave massive MIMO over doubly-selective channels,” IEEE Transactions on Vehicular Technology, vol. 70, pp. 6869-6880, Jul. 2021. [3] Z. Zhu, N. Wang, W. Hao, Z. Wang, and I. Lee, “Robust beamforming designs in secure MIMO SWIPT IoT networks with a nonlinear channel model,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1702-1715, Mar. 2021. [4] L. Shen, N. Wang, X. Mu, and L. Cai, “Iterative trajectory optimization for physical layer secure buffer-aided UAV mobile relaying,” Sensors, vol. 19, no. 15, pp. 1–17, Aug. 2019. [5] J. Zhu, W. Xu, and N. Wang, “Secure massive MIMO systems with limited RF chains,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5455–5460, Jun. 2017. [6] N. Wang, E. Hossain, and V. K. Bhargava, “Joint downlink cell association and bandwidth allocation for wireless backhauling in two-tier HetNets with large-scale antenna arrays,” IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp. 3251–3268, May 2016. [7] N. Wang, E. Hossain, and V. K. Bhargava, “Backhauling 5G small cells: A radio resource management perspective,” IEEE Wireless Communications, vol. 22, no. 5, pp. 41–49, Oct. 2015. [8] N. Wang and T. A. Gulliver, “Distributed queue-aware relay node selection for cooperative wireless networks via Vickrey auction game,” IEEE Wireless Communications Letters, vol. 4, no. 3, pp. 257–260, Jun. 2015. [9] N. Wang and T. A. Gulliver, “Queue-aware transmission scheduling for cooperative wireless communications,” IEEE Transactions on Communications, vol. 63, no. 4, pp. 1149–1161, Apr. 2015. [10] N. Wang, N. Zhang, and T. A. Gulliver, “Cooperative secret key agreement for wireless networking: Key rates and practical protocol design,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 272–284, Feb. 2014. |