default search action
Guiyang Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Guiyang Xia, Hao Xu, Xiaobo Zhou, Feng Shu, Jiangzhou Wang:
A New Paradigm of Precoder Design for Finite-Alphabet Inputs Based Communications. IEEE Trans. Veh. Technol. 73(7): 10829-10834 (2024) - [j19]Feng Shu, Yan Wang, Xuehui Wang, Guiyang Xia, Lili Yang, Weiping Shi, Chong Shen, Jiangzhou Wang:
Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation. IEEE Trans. Wirel. Commun. 23(9): 11770-11784 (2024) - 2023
- [j18]Hao Xu, Guiyang Xia, Xiaobo Zhou, Yantao Liu, Feng Shu, Jiangzhou Wang:
Outage Probability Oriented Secrecy Rate Optimization for Finite-Alphabet Inputs. IEEE Commun. Lett. 27(8): 1974-1978 (2023) - [j17]Xuehui Wang, Feng Shu, Riqing Chen, Peng Zhang, Qi Zhang, Guiyang Xia, Weiping Shi, Jiangzhou Wang:
Beamforming design for RIS-aided amplify-and-forward relay networks. Frontiers Inf. Technol. Electron. Eng. 24(12): 1728-1738 (2023) - [i7]Xuehui Wang, Feng Shu, Riqing Chen, Peng Zhang, Qi Zhang, Guiyang Xia, Weiping Shi, Jiangzhou Wang:
Beamforming Design for RIS-Aided AF Relay Networks. CoRR abs/2302.14257 (2023) - 2022
- [j16]Yin Teng, Jiayu Li, Mengxing Huang, Lin Liu, Guiyang Xia, Xiaobo Zhou, Feng Shu, Jiangzhou Wang:
Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker. Sci. China Inf. Sci. 65(1) (2022) - [j15]Feng Shu, Lili Yang, Lin Liu, Xinyi Jiang, Guiyang Xia, Yuanyuan Wu, Xianpeng Wang, Jiangzhou Wang, Xiaohu You, Shi Jin:
Spatial Modulation: An Attractive Secure Solution to Future Wireless Networks. IEEE Netw. 36(3): 130-135 (2022) - [j14]Guiyang Xia, Xiaobo Zhou, Lichuan Gu, Feng Shu, Yongpeng Wu, Jiangzhou Wang:
Secure-Reliable Transmission Designs for Full-Duplex Receiver With Finite-Alphabet Inputs. IEEE Trans. Inf. Forensics Secur. 17: 3277-3289 (2022) - [j13]Guiyang Xia, Xiaobo Zhou, Lichuan Gu, Feng Shu, Yongpeng Wu, Jiangzhou Wang:
Joint Precoder and Beamformer Design for Secure Relay Networks With Finite-Alphabet Inputs and Statistical CSI of Eve. IEEE Trans. Wirel. Commun. 21(8): 5814-5827 (2022) - [j12]Guiyang Xia, Yan Lin, Xiaobo Zhou, Lichuan Gu, Feng Shu:
Alleviating Secrecy Outage Events via Power Optimization for Finite-Alphabet Inputs. IEEE Wirel. Commun. Lett. 11(2): 352-356 (2022) - 2021
- [j11]Guiyang Xia, Yan Lin, Xiaobo Zhou, Weibin Zhang, Feng Shu, Jiangzhou Wang:
Hybrid Precoding Design for Secure Generalized Spatial Modulation With Finite-Alphabet Inputs. IEEE Trans. Commun. 69(4): 2570-2584 (2021) - [j10]Feng Shu, Xinyi Jiang, Xiaoyu Liu, Ling Xu, Guiyang Xia, Jiangzhou Wang:
Precoding and Transmit Antenna Subarray Selection for Secure Hybrid Spatial Modulation. IEEE Trans. Wirel. Commun. 20(3): 1903-1917 (2021) - [i6]Feng Shu, Lin Liu, Lili Yang, Xinyi Jiang, Guiyang Xia, Yuanyuan Wu, Xianpeng Wang, Shi Jin, Jiangzhou Wang, Xiaohu You:
Spatial Modulation: an Attractive Secure Solution to Future Wireless Network. CoRR abs/2103.04051 (2021) - 2020
- [j9]Guiyang Xia, Yan Lin, Feng Shu, Yongpeng Wu, Jiangzhou Wang:
An Anti-Eavesdropping Strategy for Precoding-Aided Spatial Modulation With Rough CSI of Eve. IEEE Trans. Veh. Technol. 69(2): 2343-2347 (2020) - [j8]Guiyang Xia, Yan Lin, Tingting Liu, Feng Shu, Lajos Hanzo:
Transmit Antenna Selection and Beamformer Design for Secure Spatial Modulation With Rough CSI of Eve. IEEE Trans. Wirel. Commun. 19(7): 4643-4656 (2020) - [i5]Lin Liu, Guiyang Xia, Jun Zou, Weibin Zhang, Feng Shu, Jiangzhou Wang:
Receive Antenna Selection for Secure Pre-coding Aided Spatial Modulation. CoRR abs/2001.08612 (2020) - [i4]Yin Teng, Jiayu Li, Lin Liu, Guiyang Xia, Xiaobo Zhou, Feng Shu, Jiangzhou Wang, Xiaohu You:
Low-complexity and High-performance Receive Beamforming for Secure Directional Modulation Networks against an Eavesdropping-enabled Full-duplex Attacker. CoRR abs/2012.03169 (2020)
2010 – 2019
- 2019
- [j7]Ling Xu, Linlin Sun, Guiyang Xia, Tingting Liu, Feng Shu, Yijin Zhang, Jiangzhou Wang:
Secure Hybrid Digital and Analog Precoder for mmWave Systems With Low-Resolution DACs and Finite-Quantized Phase Shifters. IEEE Access 7: 109763-109775 (2019) - [j6]Guiyang Xia, Linqiong Jia, Yuwen Qian, Feng Shu, Zhihong Zhuang, Jiangzhou Wang:
Power Allocation Strategies for Secure Spatial Modulation. IEEE Syst. J. 13(4): 3869-3872 (2019) - [j5]Guiyang Xia, Feng Shu, Yijin Zhang, Jianxin Wang, Stephan ten Brink, Joachim Speidel:
Antenna Selection Method of Maximizing Secrecy Rate for Green Secure Spatial Modulation. IEEE Trans. Green Commun. Netw. 3(2): 288-301 (2019) - [j4]Feng Shu, Xiaoyu Liu, Guiyang Xia, Tingzhen Xu, Jun Li, Jiangzhou Wang:
High-Performance Power Allocation Strategies for Secure Spatial Modulation. IEEE Trans. Veh. Technol. 68(5): 5164-5168 (2019) - [i3]Ling Xu, Feng Shu, Guiyang Xia, Yijin Zhang, Zhihong Zhuang, Jiangzhou Wang:
Secure Hybrid Digital and Analog Precoder for mmWave Systems with low-resolution DACs and finite-quantized phase shifters. CoRR abs/1905.04837 (2019) - [i2]Feng Shu, Lin Liu, Yumeng Zhang, Guiyang Xia, Xiaoyu Liu, Jun Li, Shi Jin, Jiangzhou Wang:
A Deep-learning-based Joint Inference for Secure Spatial Modulation Receiver. CoRR abs/1907.02215 (2019) - 2018
- [j3]Siming Wan, Feng Shu, Jinhui Lu, Guan Gui, Jun Wang, Guiyang Xia, Yijin Zhang, Jun Li, Jiangzhou Wang:
Power Allocation Strategy of Maximizing Secrecy Rate for Secure Directional Modulation Networks. IEEE Access 6: 38794-38801 (2018) - [i1]Siming Wan, Feng Shu, Jinhui Lu, Guan Gui, Jun Wang, Guiyang Xia, Yijin Zhang, Jun Li, Jiangzhou Wang:
Power Allocation Strategy of Maximizing Secrecy Rate for Secure Directional Modulation Networks. CoRR abs/1802.01061 (2018) - 2016
- [j2]Guiyang Xia, Yantao Liu, Jing Xu, Yasser Morgan:
一种基于复数域网络编码的双层卫星通信系统 (Double-layer Satellite Communication System Based on Complex Field Network Coding). 计算机科学 43(10): 114-119 (2016) - [j1]Jing Xu, Yantao Liu, Guiyang Xia, Yasser Morgan:
基于网络编码的拓扑推断研究综述 (Network Coding Based Topology Inference: A Survey). 计算机科学 43(Z6): 242-248 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint