Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers J Tang, G Chen, JP Coon IEEE Transactions on Information Forensics and Security 14 (11), 3026-3041, 2019 | 125 | 2019 |
Optimal routing for multihop social-based D2D communications in the Internet of Things G Chen, J Tang, JP Coon IEEE Internet of Things Journal 5 (3), 1880-1889, 2018 | 98 | 2018 |
Distance distributions for Matérn cluster processes with application to network performance analysis J Tang, G Chen, JP Coon, DE Simmons 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 28 | 2017 |
Meta distribution of the secrecy rate in the presence of randomly located eavesdroppers J Tang, G Chen, JP Coon IEEE Wireless Communications Letters 7 (4), 630-633, 2018 | 25 | 2018 |
Machine-learning-empowered passive beamforming and routing design for multi-RIS-assisted multihop networks C Huang, G Chen, J Tang, P Xiao, Z Han IEEE Internet of Things Journal 9 (24), 25673-25684, 2022 | 24 | 2022 |
Route selection based on connectivity-delay-trust in public safety networks J Tang, G Chen, JP Coon IEEE Systems Journal 13 (2), 1558-1567, 2018 | 22 | 2018 |
A novel local differential privacy federated learning under multi-privacy regimes C Liu, Y Tian, J Tang, S Dang, G Chen Expert Systems with Applications 227, 120266, 2023 | 13 | 2023 |
Joint coverage enhancement by power allocation in Poisson clustered out-of-band D2D networks J Tang, G Chen, JP Coon IEEE Transactions on Vehicular Technology 67 (12), 11537-11548, 2018 | 13 | 2018 |
Multi-distribution mixture generative adversarial networks for fitting diverse data sets M Yang, J Tang, S Dang, G Chen, JA Chambers Expert Systems with Applications 248, 123450, 2024 | 4 | 2024 |
Blockchain-Assisted Reputation Mechanism for Distributed Cloud Storage Q Dong, J Tang, S Dang, G Chen, JA Chambers IEEE Systems Journal 17 (4), 6334-6345, 2023 | 4 | 2023 |
Data privacy and utility trade-off based on mutual information neural estimator Q Wu, J Tang, S Dang, G Chen Expert Systems with Applications 207, 118012, 2022 | 4 | 2022 |
Optimal cross-tier power allocation for D2D multi-cell networks J Tang, JP Coon, G Chen 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 3 | 2016 |
Privacy Protection and Utility Trade-Off for Social Graph Embedding L Cai, J Tang, S Dang, G Chen Information Sciences, 120866, 2024 | 1 | 2024 |
Distributed cyclic delay diversity for cooperative infrastructure-to-vehicle systems KJ Kim, J Guo, J Tang, PV Orlik 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 1 | 2019 |
Weight decay regularized adversarial training for attacking angle imbalance G Wang, J Tang, Z Ding, S Dang, G Chen Expert Systems with Applications 265, 125858, 2025 | | 2025 |
Priority-Based Blockchain Packing for Dependent Industrial IoT Transactions C Lin, J Tang, S Dang, G Chen IEEE Transactions on Network and Service Management, 2025 | | 2025 |
Membership inference attacks via spatial projection-based relative information loss in MLaaS Z Ding, Y Tian, G Wang, J Xiong, J Tang, J Ma Information Processing & Management 62 (1), 103947, 2025 | | 2025 |
Privacy and distribution preserving generative adversarial networks with sample balancing H Sun, J Tang, S Dang, G Chen Expert Systems with Applications 258, 125181, 2024 | | 2024 |
A Lightweight Trust Mechanism with Attack Detection for IoT X Zhou, J Tang, S Dang, G Chen Entropy 25 (8), 1198, 2023 | | 2023 |
System-level analysis and design for reliability and security in wireless networks J Tang University of Oxford, 2019 | | 2019 |