Li Sun

Orcid: 0000-0002-9471-0235

Affiliations:
  • Xi'an Jiaotong University, Department of Information and Communications Engineering, China (PhD 2011)


According to our database1, Li Sun authored at least 129 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Distributed Physical Layer Key Generation Algorithm Based on Deep Learning.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

2022
Physical Layer Key Generation from Wireless Channels with Non-ideal Channel Reciprocity: A Deep Learning Based Approach.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Signal Detection for IoT Networks with Unknown Channel Models: A Knowledge-Driven Approach.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results.
IEEE Wirel. Commun. Lett., 2021

Alternate-Jamming-Aided Wireless Physical-Layer Surveillance: Protocol Design and Performance Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Generative-Adversarial-Network Enabled Signal Detection for Communication Systems With Unknown Channel Models.
IEEE J. Sel. Areas Commun., 2021

Self-Attention-Based Real-Time Signal Detector for Communication Systems With Unknown Channel Models.
IEEE Commun. Lett., 2021

Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Network-Load Estimation for K-Repetition Grant-Free Access Enabling Adaptive Resource Allocation Towards QoS Enhancement.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

2020
Fountain-Coding Aided Secure Transmission With Delay and Content Awareness.
IEEE Trans. Veh. Technol., 2020

CTBRNN: A Novel Deep-Learning Based Signal Sequence Detector for Communications Systems.
IEEE Signal Process. Lett., 2020

Private Blockchain in Industrial IoT.
IEEE Netw., 2020

Big Data Driven Anomaly Detection for Cellular Networks.
IEEE Access, 2020

2019
Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming.
IEEE Trans. Veh. Technol., 2019

Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback.
IEEE Trans. Veh. Technol., 2019

Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Safeguarding 5G Networks through Physical Layer Security Technologies.
Wirel. Commun. Mob. Comput., 2018

Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping.
IEEE Trans. Wirel. Commun., 2018

Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission.
IEEE Trans. Veh. Technol., 2018

Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation.
IEEE Trans. Veh. Technol., 2018

Secure Cooperative Communication With Nondedicated Relays.
IEEE Trans. Veh. Technol., 2018

Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User.
Mob. Networks Appl., 2018

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions.
Entropy, 2018

Development of 3D Exhibition System for IoT-Oriented Simulation Platform.
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018

Security Enhancement for IoT Video Streaming via Joint Network Coding and Retransmission Design.
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018

Traffic-driven intrusion detection for massive MTC towards 5G networks.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Enhanced Security for Two-Way Untrusted Relaying Systems: A Constellation Overlapping Scheme.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Queue-Aware Joint ACB Control and Resource Allocation for mMTC Networks.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.
IEEE Trans. Veh. Technol., 2017

Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.
IEEE Trans. Inf. Forensics Secur., 2017

Interference-constrained routing over P2P-share enabled multi-hop D2D networks.
Peer-to-Peer Netw. Appl., 2017

Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access.
J. Sensors, 2017

Enhancing physical-layer security via big-data-aided hybrid relay selection.
J. Commun. Inf. Networks, 2017

Anti-Eavesdropping Scheme Based on Quadrature Spatial Modulation.
IEEE Commun. Lett., 2017

Traffic-aware overload control scheme in 5G ultra-dense M2M networks.
Trans. Emerg. Telecommun. Technol., 2017

Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback.
Sci. China Inf. Sci., 2017

Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks.
IEEE Access, 2017

Physical Layer Security Improvement by Constellation Selection and Artificial Interference.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Weighted-Voronoi-Diagram Based Codebook Design against Passive Eavesdropping for MISO Systems.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack.
Proceedings of the IEEE International Conference on Communications, 2017

Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission.
Proceedings of the IEEE International Conference on Communications, 2017

Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fountain-Coding Aided Symmetrical Encryption for Secure Wireless Transmission.
Proceedings of the Communications and Networking, 2017

2016
Security-embedded opportunistic user cooperation with full diversity.
Wirel. Networks, 2016

Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation.
IEEE Trans. Veh. Technol., 2016

Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2016

Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks.
Sensors, 2016

Dynamic RACH Partition for Massive Access of Differentiated M2M Services.
Sensors, 2016

Active jamming for multi-user information security improvement with the access statuses of users.
Secur. Commun. Networks, 2016

Security enhancement for video transmission via noise aggregation in immersive systems.
Multim. Tools Appl., 2016

Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.
J. Medical Syst., 2016

Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems.
Int. J. Distributed Sens. Networks, 2016

Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems.
IET Commun., 2016

Two-path successive relaying and jamming for securing the primary system.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Security protection over wireless fading channels by exploiting frequency selectivity.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Security enhanced via dynamic fountain code design for wireless delivery.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

A hybrid channel estimation strategy against pilot spoofing attack in MISO system.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

On achievable secrecy rate by noise aggregation over wireless fading channels.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels.
Proceedings of the IEEE International Conference on Communication, 2016

Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Secure Communication Using Noisy Feedback.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Optimal Power Allocation for Underlay-Based Cognitive Radio Networks With Primary User's Statistical Delay QoS Provisioning.
IEEE Trans. Wirel. Commun., 2015

Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS.
Pers. Ubiquitous Comput., 2015

Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells.
Int. J. Commun. Syst., 2015

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach.
IEEE Commun. Lett., 2015

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes.
IEEE Commun. Lett., 2015

Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network.
IEEE Access, 2015

Statistical security model and power adaptation over wireless fading channels.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Prediction based interference management and distributed trajectory regulation in amorphous cells.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference Workshops, 2015

Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Estimation Based Adaptive ACB Scheme for M2M Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Robust Precoder-and-Receiver Design for Interference Suppression and Channel Uncertainty Restraint in Multi-User CoMP System.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Cooperative jamming with untrusted SUs for secure communication of two-hop primary system.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks.
Proceedings of the International Conference on Identification, 2015

Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs.
Proceedings of the IEEE International Conference on Communication, 2015

Power allocation for cognitive radio networks with statistical QoS provisioning of primary users.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

User association as a stochastic game for enhanced performance in heterogeneous networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Antenna Tilt Assignment for Three-Dimensional Beamforming in Multiuser Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Joint Battery-Buffer Sustainable Guarantees in Energy-Harvesting Enabled Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

AF-Based CSI Feedback for User Selection in Multi-User MIMO Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Cyclic-Shifting Based Sequential Cooperative Spectrum Sensing Strategy for Multi-Channel Cognitive Radio Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Exploiting Fountain Codes for Secure Wireless Delivery.
IEEE Commun. Lett., 2014

Double Differential Transmission for Amplify-and-Forward Two-Way Relay Systems.
IEEE Commun. Lett., 2014

Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks.
EURASIP J. Wirel. Commun. Netw., 2014

Energy management scheme for mobile terminals in energy efficient heterogeneous network.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Interference Mitigation via CECRS Precoding in a Two-Tier Heterogeneous Network with Cooperative Femtocells.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

User cooperation analysis under eavesdropping attack: A game theory perspective.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Load-Aware Relay Selection in LTE - A System via Global Differentiated-Fairness Control.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

On P2P-Share Oriented Routing over Interference-Constrained D2D Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Adaptive generalized space shift keying and downlink multi-user transmission in MIMO fading channels.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Adaptive analog network coding strategy with variable slot numbers in two-way relay systems.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Buffering-aided resource allocation for Type I relay in LTE-Advanced cellular networks.
Proceedings of the IEEE Global Communications Conference, 2014

Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation.
Proceedings of the IEEE Global Communications Conference, 2014

Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Secure transmission through multihop relaying in wireless body area networks.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Sustainability-Driven Power Control for Energy Harvesting Enhanced Wireless Transmission.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Adaptive protocol for cooperative communication systems with a single semi-blind amplify-and-forward relay.
Telecommun. Syst., 2013

Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks.
Int. J. Distributed Sens. Networks, 2013

Robust Detection with Stable Throughput over Ill-Conditioned Channels for High-Order MIMO Systems.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

A joint optimization of transmission mode selection and resource allocation for cognitive relay networks.
Proceedings of IEEE International Conference on Communications, 2013

Combating time-duration uncertainty of spectrum resources: A risk-reduced auction approach.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes.
IEEE Trans. Veh. Technol., 2012

A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Inter-Relay Interference in Two-Path Digital Relaying Systems: Detrimental or Beneficial?
IEEE Trans. Wirel. Commun., 2011

Exploiting Multiuser Diversity in Wireless Cooperative Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

2010
Opportunistic cooperation and optimal power allocation for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

Effect of Multiple Antennas at the Destination on the Diversity Performance of Amplify-and-Forward Systems With Partial Relay Selection.
IEEE Signal Process. Lett., 2010

On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks.
IEEE Signal Process. Lett., 2010

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks.
Commun. Netw., 2010

2009
Cooperative communications with relay selection in wireless sensor networks.
IEEE Trans. Consumer Electron., 2009

Comments on "Spectrally-Efficient Relay Selection with Limited Feedback".
IEEE J. Sel. Areas Commun., 2009


  Loading...