Author of the publication

Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback.

, , , , and . IEEE Trans. Information Forensics and Security, 10 (8): 1617-1629 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tang, Yanqun
add a person with the name Tang, Yanqun
 

Other publications of authors with the same name

Jointly Design of Beamforming and AN in SWIPT-Enabled Secure Cognitive Radio Networks., , , , , and . ICCC, page 520-524. IEEE, (2018)A Robust Design for Aperture-Level Simultaneous Transmit and Receive with Digital Phased Array., , , and . Sensors, 22 (1): 109 (2022)Worst-case robust masked beamforming for secure broadcasting., , , , and . WCNC, page 4186-4191. IEEE, (2013)Passive Location Resource Scheduling Based on an Improved Genetic Algorithm., , , , and . Sensors, 18 (7): 2093 (2018)Low-complexity beamforming designs of sum secrecy rate maximization for the Gaussian MISO multi-receiver wiretap channel., , , , and . ICASSP, page 2174-2178. IEEE, (2016)Low-complexity beamforming designs of sum secrecy rate maximization for the Gaussian MISO multi-receiver wiretap channel., , , , and . ICASSP, page 2174-2178. IEEE, (2016)Performance analysis of gain ratio power allocation strategies for non-orthogonal multiple access in indoor visible light communication networks., , , and . EURASIP J. Wireless Comm. and Networking, (2018)Robust joint beamforming and artificial noise design for amplify-and-forward multi-antenna relay systems., , , , and . ICASSP, page 1732-1736. IEEE, (2015)Secrecy performance analysis of SLNR-based beamforming scheme in MISOME wiretap channels., , , , and . WCSP, page 1-5. IEEE, (2015)Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region., , , , and . IET Communications, 8 (16): 2858-2862 (2014)