Advanced Search



index Title
16On modeling of electrical cyber-physical systems considering cyber security
Author(s):Yi-nan Wang, Zhi-yun Lin, Xiao Liang, Wen-yuan Xu, Qiang Yang, Gang-feng Yan  Clicked:9734  Download:4571  Cited:3  <Full Text>  <PPT> 2994
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.465-478  DOI:10.1631/FITEE.1500446
17A novel resource optimization scheme for multi-cell OFDMA relay network
Author(s):Ning Du, Fa-sheng Liu  Clicked:9520  Download:3895  Cited:1  <Full Text>  <PPT> 2326
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.825-833  DOI:10.1631/FITEE.1500294
18Spatial channel pairing based coherent combining for relay networks
Author(s):Feng Shu, Xiao-hui Huang, Jin-song Hu, Ting-ting Liu, Ri-qing Chen, Xiao-hu You, Jun Li, Jin Wang  Clicked:8162  Download:4055  Cited:0  <Full Text>  <PPT> 2831
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.9 P.938-945  DOI:10.1631/FITEE.1500436
19Joint throughput and transmission range optimization for triple-hop networks with cognitive relay
Author(s):Cheng Zhao, Wan-liang Wang, Xin-wei Yao, Shuang-hua Yang  Clicked:7898  Download:3796  Cited:0  <Full Text>  <PPT> 2384
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.2 P.253-261  DOI:10.1631/FITEE.1601414
20DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks
Author(s):Mei-juan Jia, Hui-qiang Wang, Jun-yu Lin, Guang-sheng Feng, Hai-tao Yu  Clicked:8994  Download:4006  Cited:0  <Full Text>  <PPT> 2436
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.559-569  DOI:10.1631/FITEE.1601535
21Efficient detection methods for amplify-and-forward relay-aided device-to-device systems with full-rate space-time block code
Author(s):Kang-li Zhang, Cong Zhang, Fang-lin Gu, Jian Wang  Clicked:10338  Download:3938  Cited:1  <Full Text>  <PPT> 2695
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.788-795  DOI:10.1631/FITEE.1700018
22Correlated channel model-based secure communications in dual-hop wireless communication networks
Author(s):Zhen-hua Yuan, Chen Chen, Xiang Cheng, Guo-cheng Lv, Liu-qing Yang, Ye Jin  Clicked:9701  Download:4362  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.796-807  DOI:10.1631/FITEE.1700023
23Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
Author(s):He-hao Niu, Bang-ning Zhang, Dao-xing Guo, Yu-zhen Huang, Ming-yue Lu  Clicked:9303  Download:4327  Cited:1  <Full Text>  <PPT> 2654
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.850-862  DOI:10.1631/FITEE.1601832
24Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output
Author(s):Shang Liu, Ishtiaq Ahmad, Ping Zhang, Zhi Zhang  Clicked:11064  Download:3737  Cited:0  <Full Text>  <PPT> 2330
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.674-684  DOI:10.1631/FITEE.1700081
25query error!