Lipeng Zhu

According to our database1, Lipeng Zhu authored at least 25 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Optimal and Sub-Optimal Uplink NOMA: Joint User Grouping, Decoding Order, and Power Control.
IEEE Wirel. Commun. Lett., 2020

Spatial-Temporal Feature Learning in Smart Grids: A Case Study on Short-Term Voltage Stability Assessment.
IEEE Trans. Ind. Informatics, 2020

Millimeter-Wave Full-Duplex UAV Relay: Joint Positioning, Beamforming, and Power Control.
IEEE J. Sel. Areas Commun., 2020

Cost-Effective Bad Synchrophasor Data Detection Based on Unsupervised Time Series Data Analytics.
CoRR, 2020

How Price-Based Frequency Regulation Impacts Stability in Power Grids: A Complex Network Perspective.
Complexity, 2020

2019
3-D Beamforming for Flexible Coverage in Millimeter-Wave UAV Communications.
IEEE Wirel. Commun. Lett., 2019

Optimal User Pairing for Downlink Non-Orthogonal Multiple Access (NOMA).
IEEE Wirel. Commun. Lett., 2019

Millimeter-Wave NOMA With User Grouping, Power Allocation and Hybrid Beamforming.
IEEE Trans. Wirel. Commun., 2019

User Fairness Non-Orthogonal Multiple Access (NOMA) for Millimeter-Wave Communications With Analog Beamforming.
IEEE Trans. Wirel. Commun., 2019

Joint Tx-Rx Beamforming and Power Allocation for 5G Millimeter-Wave Non-Orthogonal Multiple Access Networks.
IEEE Trans. Commun., 2019

Millimeter-Wave Communications With Non-Orthogonal Multiple Access for B5G/6G.
IEEE Access, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Millimeter-Wave NOMA with Hybrid Beamforming.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Joint Power Control and Beamforming for Uplink Non-Orthogonal Multiple Access in 5G Millimeter-Wave Communications.
IEEE Trans. Wirel. Commun., 2018

Joint Power Allocation and Beamforming for Non-Orthogonal Multiple Access (NOMA) in 5G Millimeter Wave Communications.
IEEE Trans. Wirel. Commun., 2018

Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

User Fairness Non-orthogonal Multiple Access (NOMA) for 5G Millimeter-Wave Communications with Analog Beamforming.
CoRR, 2018

Joint Tx-Rx Beamforming and Power Allocation for 5G Millimeter-Wave Non-Orthogonal Multiple Access (MmWave-NOMA) Networks.
CoRR, 2018

User Fairness Non-orthogonal Multiple Access (NOMA) in Millimeter-Wave Communications.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Real-time Detection of Passive Backdoor Behaviors on Android System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Imbalance Learning Machine-Based Power System Short-Term Voltage Stability Assessment.
IEEE Trans. Ind. Informatics, 2017

2015
Named Service Networking.
Proceedings of the 10th IEEE International Conference on Networking, 2015

NDSS: A Named Data Storage System.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015


  Loading...