Cooperative spectrum sensing optimization in energy-harvesting cognitive radio networks

X Liu, K Zheng, K Chi, YH Zhu - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
This article focuses on the issue of cooperative spectrum sensing (CSS) in a mobile energy-
harvesting cognitive radio network (EH-CRN), where secondary transmitters (STs) are …

Throughput maximization of wireless-powered communication networks: An energy threshold approach

K Zheng, X Liu, B Wang, H Zheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we consider a wireless-powered communication network (WPCN) where one
mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes …

Hierarchical cooperation improves delay in cognitive radio networks with heterogeneous mobile secondary nodes

X Liu, K Zheng, XY Liu, X Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper characterizes the throughput and delay performance of Cognitive Radio
Networks (CRNs), where both primary and secondary networks coexist in a unit torus …

Impact of battery charging on spectrum sensing of CRN with energy harvesting

K Zheng, X Liu, Y Zhu, K Chi, Y Li - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates the impact of battery charging on a cognitive radio network (CRN),
where a hybrid overlay-underlay strategy enables mobile secondary nodes to access the …

Towards secure and energy-efficient CRNs via embracing interference: A stochastic geometry approach

X Liu, K Zheng, XY Liu, X Wang, G Dai - IEEE Access, 2018 - ieeexplore.ieee.org
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is
conventionally regarded as an obstacle to the throughput of the primary network. However …

Probabilistic key predistribution in mobile networks resilient to node-capture attacks

J Zhao - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
We present a comprehensive analysis on connectivity and resilience of secure sensor
networks under the widely studied q-composite key predistribution scheme. For network …