Volgen
Hu Yuan
Hu Yuan
Geverifieerd e-mailadres voor kingston.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Device-to-device meets LTE-unlicensed
Y Wu, W Guo, H Yuan, L Li, S Wang, X Chu, J Zhang
IEEE Communications Magazine 54 (5), 154-159, 2016
872016
Emergency Route Selection for D2D Cellular Communications During an Urban Terrorist Attack
H Yuan, W Guo, S Wang
arXiv preprint arXiv:1403.6923, 2014
452014
Interference‐aware multi‐hop path selection for device‐to‐device communications in a cellular interference environment
H Yuan, W Guo, Y Jin, S Wang, M Ni
Iet Communications 11 (11), 1741-1750, 2017
222017
Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-orthogonal Multiple Access
M Li, H Yuan, X Yue, S Muhaidat, C Maple, M Dianati
IEEE Communications Letters, 1-5, 2020
192020
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, U Atmaca, S Cannizzaro
AeroConf 2020 IEEE Aerospace Conference, 1-20, 2020
182020
Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks
M Li, H Yuan, C Maple, W Cheng, G Epiphaniou
IEEE Systems Journal, 1-11, 2022
152022
Digital twins in cyber effects modelling of IoT/CPS points of low resilience
G Epiphaniou, M Hammoudeh, H Yuan, C Maple, U Ani
Simulation Modelling Practice and Theory 125, 102744, 2023
132023
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, U Atmaca
AeroConf 2020 IEEE Aerospace Conference, 1-13, 2020
132020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
132019
Device-to-device communications in LTE-unlicensed heterogeneous network
H Yuan, W Guo, S Wang
2016 IEEE 17th international workshop on signal processing advances in …, 2016
122016
D2D multi-hop routing: Collision probability and routing strategy with limited location information
H Yuan, W Guo, S Wang
2015 IEEE International Conference on Communication Workshop (ICCW), 670-674, 2015
102015
Security Outage Probability Analysis of Cognitive Networks with Multiple Eavesdroppers for Industrial Internet of Things
M Li, H Yuan, C Maple, Y Li, O Alluhaibi
IEEE Transactions on Cognitive Communications and Networking, 1-12, 2022
92022
Cross‐device tracking through identification of user typing behaviours
H Yuan, C Maple, C Chen, T Watson
Electronics Letters 54 (15), 957-959, 2018
72018
Dynamic route selection for vehicular store-carry-forward networks and misbehaviour vehicles analysis
H Yuan, C Maple, K Ghirardello
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-5, 2018
62018
Peer‐assisted location authentication and access control for wireless networks
H Yuan, C Maple, Y Lu, T Watson
Internet Technology Letters 2 (1), e71, 2019
32019
Quantum Key Distribution for V2I communications with software‐defined networking
A Stavdas, E Kosmatos, C Maple, E Hugues‐Salas, G Epiphaniou, ...
IET Quantum Communication, 2023
22023
IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure
C Maple, M Bradbury, M Elsden, H Cruickshank, H Yuan, C Gu, P Asuquo
Univ. Warwick, UK, Tech. Rep, 2019
22019
Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution
H Yuan, DS Fowler, C Maple, G Epiphaniou
IET Quantum Communication 4 (4), 191-199, 2023
12023
Cyber security of New Space systems
C Maple, UI Atmaca, G Epiphaniou, G Falco, H Yuan
Space Robotics and Autonomous Systems: Technologies, Advances and …, 2021
12021
Security-minded verification of cooperative awareness messages
M Farrell, M Bradbury, RC Cardoso, M Fisher, LA Dennis, C Dixon, ...
IEEE Transactions on Dependable and Secure Computing, 2023
2023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20