Hu Yuan
Hu Yuan
Verified email at - Homepage
Cited by
Cited by
Device-to-device meets LTE-unlicensed
Y Wu, W Guo, H Yuan, L Li, S Wang, X Chu, J Zhang
IEEE Communications Magazine 54 (5), 154-159, 2016
Emergency Route Selection for D2D Cellular Communications During an Urban Terrorist Attack
H Yuan, W Guo, S Wang
arXiv preprint arXiv:1403.6923, 2014
Interference‐aware multi‐hop path selection for device‐to‐device communications in a cellular interference environment
H Yuan, W Guo, Y Jin, S Wang, M Ni
Iet Communications 11 (11), 1741-1750, 2017
Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-orthogonal Multiple Access
M Li, H Yuan, X Yue, S Muhaidat, C Maple, M Dianati
IEEE Communications Letters, 1-5, 2020
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, U Atmaca, S Cannizzaro
AeroConf 2020 IEEE Aerospace Conference, 1-20, 2020
Device-to-device communications in LTE-unlicensed heterogeneous network
H Yuan, W Guo, S Wang
2016 IEEE 17th international workshop on signal processing advances in …, 2016
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, U Atmaca
AeroConf 2020 IEEE Aerospace Conference, 1-13, 2020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
D2D multi-hop routing: Collision probability and routing strategy with limited location information
H Yuan, W Guo, S Wang
2015 IEEE International Conference on Communication Workshop (ICCW), 670-674, 2015
Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks
M Li, H Yuan, C Maple, W Cheng, G Epiphaniou
IEEE Systems Journal, 1-11, 2022
Cross‐device tracking through identification of user typing behaviours
H Yuan, C Maple, C Chen, T Watson
Electronics Letters 54 (15), 957-959, 2018
Dynamic route selection for vehicular store-carry-forward networks and misbehaviour vehicles analysis
H Yuan, C Maple, K Ghirardello
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-5, 2018
Digital twins in cyber effects modelling of IoT/CPS points of low resilience
G Epiphaniou, M Hammoudeh, H Yuan, C Maple, U Ani
Simulation Modelling Practice and Theory 125, 102744, 2023
Security Outage Probability Analysis of Cognitive Networks with Multiple Eavesdroppers for Industrial Internet of Things
M Li, H Yuan, C Maple, Y Li, O Alluhaibi
IEEE Transactions on Cognitive Communications and Networking, 1-12, 2022
Peer‐assisted location authentication and access control for wireless networks
H Yuan, C Maple, Y Lu, T Watson
Internet Technology Letters 2 (1), e71, 2019
Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution
H Yuan, DS Fowler, C Maple, G Epiphaniou
IET Quantum Communication, 2023
Cyber security of New Space systems
C Maple, UI Atmaca, G Epiphaniou, G Falco, H Yuan
Space Robotics and Autonomous Systems: Technologies, Advances and …, 2021
IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure
C Maple, M Bradbury, M Elsden, H Cruickshank, H Yuan, C Gu, P Asuquo
Outage performance analysis in cognitive RIS-NOMA system under imperfect CSI
K Xue, M Li, W Chen, Z Han, H Yuan
2023 IEEE International Mediterranean Conference on Communications and …, 2023
Quantum Key Distribution for V2I communications with software‐defined networking
A Stavdas, E Kosmatos, C Maple, E Hugues‐Salas, G Epiphaniou, ...
IET Quantum Communication, 2023
The system can't perform the operation now. Try again later.
Articles 1–20