[1] |
Zheng YANG, Yun ZHENG, Yuehao YU, Yi WU, Zhicheng DONG, Song XING.
Performance analysis for cooperative NOMA networks based SWIPT with adaptive power splitting
[J]. Journal on Communications, 2023, 44(1): 177-188.
|
[2] |
Junyi YANG, Bo LI, Qinyu ZHANG.
Resource optimization for UAV relay networks based on physical-layer network coding
[J]. Journal on Communications, 2021, 42(9): 12-20.
|
[3] |
Xuanli WU, Zhicong XU, Yuchen WANG, Yong LI.
Performance analysis of physical layer security based on channel correlation
[J]. Journal on Communications, 2021, 42(3): 65-74.
|
[4] |
Shenghai CHEN, Xiaoqin YAN, Sai LI, Liang YANG.
Performance analysis of dual-hop PLC-FSO communication system
[J]. Journal on Communications, 2021, 42(10): 243-250.
|
[5] |
Taoshen LI,Qianli NING,Zhe WANG.
Optimization scheme for the SWIPT-NOMA opportunity cooperative system
[J]. Journal on Communications, 2020, 41(8): 141-154.
|
[6] |
Zhou ZHONG,Bo ZHANG,Xiaohui QI,Kaizhi HUANG.
Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network
[J]. Journal on Communications, 2019, 40(5): 24-31.
|
[7] |
Keming MA,Yajun CHEN,Xin HU,Kaizhi HUANG,Xinsheng JI.
Opportunistic secure transmission scheme for simultaneous wireless information and power transfer
[J]. Journal on Communications, 2019, 40(2): 70-81.
|
[8] |
Jisheng XU,Fanzi ZENG,Kang LI,Yongfeng LI.
Performance analysis of two-way relay cooperation underlay cognitive radio networks based on WIPT
[J]. Journal on Communications, 2019, 40(2): 129-136.
|
[9] |
Rui ZHAO,Xing TAN,Yuanjian LI,Yucheng HE,Chunguo LI.
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
[J]. Journal on Communications, 2018, 39(9): 20-30.
|
[10] |
Meiling LI,Ying LI,Muhaidat SAMI,Zengshou DONG,Anhong WANG,Jie LIANG,Liping DING.
Research on the NOMA performance in cognitive cooperation network
[J]. Journal on Communications, 2018, 39(9): 57-66.
|
[11] |
Xizheng KE,Chenhao WANG,Dan CHEN.
Effects of phase noise on subcarrier modulation performance over Malaga turbulence channel
[J]. Journal on Communications, 2018, 39(11): 80-86.
|
[12] |
Yajun CHEN,Xinsheng JI,Kaizhi HUANG,Jing YANG,Ming YI.
Secure opportunistic access control in D2D-enabled cellular network
[J]. Journal on Communications, 2018, 39(1): 126-136.
|
[13] |
Rui-feng GAO,Xiao-dong JI,Zhi-hua BAO,Shi-bing ZHANG,Chen XU.
Denoise-and-forward based adaptive diversity scheme for physical-layer network coding with multiple relay node
[J]. Journal on Communications, 2017, 38(2): 81-93.
|
[14] |
Mei-ling LI,Zeng-shou DONG,Gang-fei WANG,Zhao-ming LU.
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
[J]. Journal on Communications, 2017, 38(10): 71-80.
|
[15] |
Ya-jun CHEN,Xin-sheng JI,Kai-zhi HUANG,Xiao-lei KANG.
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
[J]. Journal on Communications, 2016, 37(8): 86-94.
|