Ismail, M., Gamage, A. T., Zhuang, W., Shen, X., Serpedin, E., & Qaraqe, K. (2015). Uplink decentralized joint bandwidth and power allocation for energy-efficient operation in a heterogeneous wireless medium IEEE Transactions on Communications, 63, 1483-1495.
Reference author: Xuemin Shen
First name
Xuemin
Last name
Shen
Lu, N., Luan, T. H., Wang, M., Shen, X., & Bai, F. (2014). Bounds of asymptotic performance limits of social-proximity vehicular networks IEEE/ACM/Transactions/on/Networking, 22, 812-825.
Lu, N., Cheng, N., Zhang, N., Shen, X., & Mark, J. W. (2014). Connected vehicles: Solutions and challenges IEEE Internet of Things Journal, 1, 289-299.
Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., & Shen, X. (2014). CPAL: A conditional privacy-preserving authentication with access linkability for roaming service IEEE Internet of Things Journal, 1, 46-57.
Zhou, X., Xie, L.-L., & Shen, X. (2014). Design of low-density parity-check codes for half-duplex three-phase two-way relay channels IEEE Transactions on Wireless Communications, 13, 1668-1677.
Gamage, A. T., Liang, H., Zhang, R., & Shen, X. (2014). Device-to-device communication underlaying converged heterogeneous networks IEEE Wireless Communications, 21, 98-107.
Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid IEEE Systems Journal, 8, 655-663.
Zhang, K., Liang, X., Lu, R., & Shen, X. (2015). PIF: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks IEEE Transactions on Computational Social Systems, 2, 41-52.
Li, H., Lin, X., Yang, H., Liang, X., Lu, R., & Shen, X. (2014). EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid IEEE Transactions on Parallel and Distributed Systems, 25, 2053-2064.
Zhang, K., Liang, X., Ni, J., Yang, K., & Shen, X. (2016). Exploiting social network to enhance human-to-human infection analysis without privacy leakage IEEE Transactions on Dependable and Secure Computing.
- Previous page
- Currently on page 48 48
- Next page