​
Login / Signup
Li Sun
ORCID
Publication Activity (10 Years)
Years Active: 2009-2024
Publications (10 Years): 75
Top Topics
Wireless Networks
Relay Selection
Cooperative
Cognitive Radio
Top Venues
GLOBECOM
ICC
IEEE Trans. Veh. Technol.
VTC Spring
</>
Publications
</>
Yuwei Wang
,
Li Sun
,
A. Lee Swindlehurst
Knowledge-Driven Signal Detector for Uplink Transmission in IoT Networks With Unknown Channel Models.
IEEE Internet Things J.
11 (15) (2024)
Yuwei Wang
,
Li Sun
,
Qinghe Du
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Wanting Geng
,
Li Sun
,
Qinghe Du
Distributed Physical Layer Key Generation Algorithm Based on Deep Learning.
VTC Fall
(2023)
Yuwei Wang
,
Li Sun
Signal Detection for IoT Networks with Unknown Channel Models: A Knowledge-Driven Approach.
ICC
(2022)
Zixiao Zhao
,
Qinghe Du
,
Li Sun
Network-Load Estimation for K-Repetition Grant-Free Access Enabling Adaptive Resource Allocation Towards QoS Enhancement.
PIMRC
(2021)
Li Sun
,
Yong Zhang
,
A. Lee Swindlehurst
Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming.
WCNC
(2021)
Li Sun
,
Yuwei Wang
,
A. Lee Swindlehurst
,
Xiao Tang
Generative-Adversarial-Network Enabled Signal Detection for Communication Systems With Unknown Channel Models.
IEEE J. Sel. Areas Commun.
39 (1) (2021)
Li Sun
,
Hongbin Xu
,
Yong Zhang
Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results.
IEEE Wirel. Commun. Lett.
10 (1) (2021)
Lei Chen
,
Li Sun
Self-Attention-Based Real-Time Signal Detector for Communication Systems With Unknown Channel Models.
IEEE Commun. Lett.
25 (8) (2021)
Li Sun
,
Yong Zhang
,
A. Lee Swindlehurst
Alternate-Jamming-Aided Wireless Physical-Layer Surveillance: Protocol Design and Performance Analysis.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Li Sun
,
Yuwei Wang
CTBRNN: A Novel Deep-Learning Based Signal Sequence Detector for Communications Systems.
IEEE Signal Process. Lett.
27 (2020)
Li Sun
,
Dantong Huang
,
A. Lee Swindlehurst
Fountain-Coding Aided Secure Transmission With Delay and Content Awareness.
IEEE Trans. Veh. Technol.
69 (7) (2020)
Minho Jo
,
Kai Hu
,
Richard Yu
,
Li Sun
,
Mauro Conti
,
Qinghe Du
Private Blockchain in Industrial IoT.
IEEE Netw.
34 (5) (2020)
Qiqi Zhu
,
Li Sun
Big Data Driven Anomaly Detection for Cellular Networks.
IEEE Access
8 (2020)
Hongbin Xu
,
Li Sun
Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming.
IEEE Trans. Veh. Technol.
68 (11) (2019)
Li Sun
,
Hongbin Xu
Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback.
IEEE Trans. Veh. Technol.
68 (1) (2019)
Hongbin Xu
,
Li Sun
Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach.
GLOBECOM
(2019)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User.
Mob. Networks Appl.
23 (4) (2018)
Nan Lu
,
Qinghe Du
,
Li Sun
,
Pinyi Ren
Traffic-driven intrusion detection for massive MTC towards 5G networks.
INFOCOM Workshops
(2018)
Wenjun Yang
,
Qinghe Du
,
Xinlei Xiong
,
Li Sun
,
Pinyi Ren
Development of 3D Exhibition System for IoT-Oriented Simulation Platform.
IoTaaS
(2018)
Li Sun
,
Hongbin Xu
,
Fan Li
Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks.
ICC
(2018)
Li Sun
,
Kamel Tourki
,
Yafei Hou
,
Lu Wei
Safeguarding 5G Networks through Physical Layer Security Technologies.
Wirel. Commun. Mob. Comput.
2018 (2018)
Zhenzhen Gao
,
Zhijie Huang
,
Li Sun
Secure Cooperative Communication With Nondedicated Relays.
IEEE Trans. Veh. Technol.
67 (8) (2018)
Li Sun
,
Hongbin Xu
Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation.
IEEE Trans. Veh. Technol.
67 (10) (2018)
Hongbin Xu
,
Li Sun
,
Fan Li
Towards Enhanced Security for Two-Way Untrusted Relaying Systems: A Constellation Overlapping Scheme.
ICC
(2018)
Pengxiang Qin
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design.
IoTaaS
(2018)
Hongbin Xu
,
Li Sun
Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping.
IEEE Trans. Wirel. Commun.
17 (12) (2018)
Qian Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission.
IEEE Trans. Veh. Technol.
67 (6) (2018)
Li Sun
,
Qinghe Du
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions.
Entropy
20 (10) (2018)
Jun Li
,
Qinghe Du
,
Li Sun
,
Pinyi Ren
Queue-Aware Joint ACB Control and Resource Allocation for mMTC Networks.
GLOBECOM Workshops
(2018)
Dongyang Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Weighted-Voronoi-Diagram Based Codebook Design against Passive Eavesdropping for MISO Systems.
VTC Spring
(2017)
Chao Lyu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission.
ChinaCom (1)
(2017)
Hongbin Xu
,
Li Sun
,
Pinyi Ren
,
Qinghe Du
,
Yichen Wang
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.
IEEE Trans. Inf. Forensics Secur.
12 (4) (2017)
Chen Tian
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks.
GLOBECOM
(2017)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network.
GLOBECOM
(2017)
Zhijie Huang
,
Zhenzhen Gao
,
Li Sun
Anti-Eavesdropping Scheme Based on Quadrature Spatial Modulation.
IEEE Commun. Lett.
21 (3) (2017)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.
IEEE Trans. Veh. Technol.
66 (12) (2017)
Qinghe Du
,
Nan Lu
,
Li Sun
,
Xuelin Zhang
,
Bo Sun
Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access.
J. Sensors
2017 (2017)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement.
VTC Spring
(2017)
Dongyang Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback.
Sci. China Inf. Sci.
60 (4) (2017)
Qinghe Du
,
Meng Liu
,
Qian Xu
,
Houbing Song
,
Li Sun
,
Pinyi Ren
Interference-constrained routing over P2P-share enabled multi-hop D2D networks.
Peer-to-Peer Netw. Appl.
10 (6) (2017)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Enhancing physical-layer security via big-data-aided hybrid relay selection.
J. Commun. Inf. Networks
2 (1) (2017)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Physical Layer Security Improvement by Constellation Selection and Artificial Interference.
WCNC
(2017)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission.
ICC
(2017)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Traffic-aware overload control scheme in 5G ultra-dense M2M networks.
Trans. Emerg. Telecommun. Technol.
28 (9) (2017)
Qian Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers.
WCNC
(2017)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Yichen Wang
,
Li Sun
Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks.
IEEE Access
5 (2017)
Dawei Wang
,
Pinyi Ren
,
Julian Cheng
,
Yichen Wang
,
Li Sun
,
Qinghe Du
Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback.
VTC Fall
(2017)
Dongyang Xu
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack.
ICC
(2017)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint.
ICCS
(2016)
Hongliang He
,
Pinyi Ren
,
Li Sun
,
Qinghe Du
,
Yichen Wang
Secure Communication Using Noisy Feedback.
GLOBECOM
(2016)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy.
VTC Spring
(2016)
Caihong Han
,
Li Sun
,
Qinghe Du
Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation.
VTC Spring
(2016)
Qinghe Du
,
Wanyu Li
,
Lingjia Liu
,
Pinyi Ren
,
Yichen Wang
,
Li Sun
Dynamic RACH Partition for Massive Access of Differentiated M2M Services.
Sensors
16 (4) (2016)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks.
VTC Spring
(2016)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security.
GLOBECOM Workshops
(2016)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System.
VTC Fall
(2016)
Dawei Wang
,
Pinyi Ren
,
Yichen Wang
,
Li Sun
,
Qinghe Du
Two-path successive relaying and jamming for securing the primary system.
WPMC
(2016)
Qinghe Du
,
Weidong Zhao
,
Weimin Li
,
Xuelin Zhang
,
Bo Sun
,
Houbing Song
,
Pinyi Ren
,
Li Sun
,
Yichen Wang
Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.
J. Medical Syst.
40 (7) (2016)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Active jamming for multi-user information security improvement with the access statuses of users.
Secur. Commun. Networks
9 (16) (2016)
Mukhtar Hussain
,
Qinghe Du
,
Li Sun
,
Pinyi Ren
Security protection over wireless fading channels by exploiting frequency selectivity.
WCSP
(2016)
Wanyu Li
,
Qinghe Du
,
Li Sun
,
Pinyi Ren
,
Yichen Wang
Security enhanced via dynamic fountain code design for wireless delivery.
WCNC
(2016)
Hao Niu
,
Nanhao Zhu
,
Li Sun
,
Athanasios V. Vasilakos
,
Kaoru Sezaki
Security-embedded opportunistic user cooperation with full diversity.
Wirel. Networks
22 (5) (2016)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks.
Sensors
16 (12) (2016)
Datong Xu
,
Pinyi Ren
,
Li Sun
,
Houbing Song
Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems.
IET Commun.
10 (3) (2016)
Mukhtar Hussain
,
Qinghe Du
,
Li Sun
,
Pinyi Ren
Security enhancement for video transmission via noise aggregation in immersive systems.
Multim. Tools Appl.
75 (9) (2016)
Hongbin Xu
,
Li Sun
,
Pinyi Ren
,
Qinghe Du
,
Yichen Wang
,
Zhenzhen Gao
Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks.
GLOBECOM
(2016)
Ye Fan
,
Xuewen Liao
,
Zhenzhen Gao
,
Li Sun
Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels.
ICC Workshops
(2016)
Li Sun
,
Qinghe Du
,
Pinyi Ren
,
Yichen Wang
Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation.
IEEE Trans. Veh. Technol.
65 (10) (2016)
Fengyi Bai
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
A hybrid channel estimation strategy against pilot spoofing attack in MISO system.
PIMRC
(2016)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks.
VTC Fall
(2016)
Dongyang Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems.
Int. J. Distributed Sens. Networks
12 (8) (2016)
Qian Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
On achievable secrecy rate by noise aggregation over wireless fading channels.
ICC
(2016)
Li Sun
,
Pinyi Ren
,
Qinghe Du
,
Yichen Wang
Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics
12 (1) (2016)
Qian Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks.
VTC Spring
(2016)
Qinghe Du
,
Houbing Song
,
Qian Xu
,
Pinyi Ren
,
Li Sun
Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS.
Pers. Ubiquitous Comput.
19 (7) (2015)
Xiao Tang
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
User association as a stochastic game for enhanced performance in heterogeneous networks.
ICC
(2015)
Dawei Wang
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs.
ICC Workshops
(2015)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Robust Precoder-and-Receiver Design for Interference Suppression and Channel Uncertainty Restraint in Multi-User CoMP System.
VTC Spring
(2015)
Datong Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System.
WASA
(2015)
Qian Yang
,
Qinghe Du
,
Pinyi Ren
,
Li Sun
,
Yichen Wang
,
Gangming Lv
Prediction based interference management and distributed trajectory regulation in amorphous cells.
WCNC Workshops
(2015)
Dongyang Xu
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages.
WASA
(2015)
Li Sun
,
Pinyi Ren
,
Qinghe Du
,
Yichen Wang
,
Zhenzhen Gao
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes.
IEEE Commun. Lett.
19 (3) (2015)
Xiao Tang
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework.
GLOBECOM
(2015)
Yichen Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning.
IEEE Trans. Wirel. Commun.
14 (12) (2015)
Wanyu Li
,
Qinghe Du
,
Lingjia Liu
,
Pinyi Ren
,
Yichen Wang
,
Li Sun
Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks.
IIKI
(2015)
Hongliang He
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Estimation Based Adaptive ACB Scheme for M2M Communications.
WASA
(2015)
Yichen Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Power allocation for cognitive radio networks with statistical QoS provisioning of primary users.
ICC
(2015)
Dawei Wang
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system.
IWCMC
(2015)
Xiao Tang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework.
WASA
(2015)
Pinyi Ren
,
Yichen Wang
,
Bei Qi
,
Qinghe Du
,
Li Sun
Cyclic-Shifting Based Sequential Cooperative Spectrum Sensing Strategy for Multi-Channel Cognitive Radio Networks.
GLOBECOM
(2015)
Datong Xu
,
Pinyi Ren
,
Li Sun
ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells.
Int. J. Commun. Syst.
28 (17) (2015)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
,
Yichen Wang
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks.
Int. J. Distributed Sens. Networks
11 (2015)
Hongbin Xu
,
Li Sun
,
Pinyi Ren
,
Qinghe Du
Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach.
IEEE Commun. Lett.
19 (12) (2015)
He Zhang
,
Qinghe Du
,
Pinyi Ren
,
Li Sun
Joint Battery-Buffer Sustainable Guarantees in Energy-Harvesting Enabled Wireless Networks.
GLOBECOM
(2015)
Dawei Wang
,
Pinyi Ren
,
Qinghe Du
,
Li Sun
Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network.
IEEE Access
3 (2015)
Dongyang Xu
,
Qinghe Du
,
Pinyi Ren
,
Li Sun
,
Weidong Zhao
,
Zunhe Hu
AF-Based CSI Feedback for User Selection in Multi-User MIMO Systems.
GLOBECOM
(2015)
Yiyan Zhang
,
Pinyi Ren
,
Li Sun
,
Qinghe Du
,
Yichen Wang
Antenna Tilt Assignment for Three-Dimensional Beamforming in Multiuser Systems.
GLOBECOM
(2015)
Qinghe Du
,
Li Sun
,
Pinyi Ren
,
Yichen Wang
Statistical security model and power adaptation over wireless fading channels.
WCSP
(2015)
Xiao Tang
,
Pinyi Ren
,
Yichen Wang
,
Qinghe Du
,
Li Sun
Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation.
GLOBECOM
(2014)