Follow
Hu Yuan
Hu Yuan
Verified email at kingston.ac.uk - Homepage
Title
Cited by
Cited by
Year
Device-to-device meets LTE-unlicensed
Y Wu, W Guo, H Yuan, L Li, S Wang, X Chu, J Zhang
IEEE Communications Magazine 54 (5), 154-159, 2016
802016
Emergency Route Selection for D2D Cellular Communications During an Urban Terrorist Attack
H Yuan, W Guo, S Wang
arXiv preprint arXiv:1403.6923, 2014
432014
Interference‐aware multi‐hop path selection for device‐to‐device communications in a cellular interference environment
H Yuan, W Guo, Y Jin, S Wang, M Ni
Iet Communications 11 (11), 1741-1750, 2017
192017
Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-orthogonal Multiple Access
M Li, H Yuan, X Yue, S Muhaidat, C Maple, M Dianati
IEEE Communications Letters, 1-5, 2020
132020
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, U Atmaca, S Cannizzaro
AeroConf 2020 IEEE Aerospace Conference, 1-20, 2020
122020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
102019
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, U Atmaca
AeroConf 2020 IEEE Aerospace Conference, 1-13, 2020
92020
D2D multi-hop routing: Collision probability and routing strategy with limited location information
H Yuan, W Guo, S Wang
2015 IEEE International Conference on Communication Workshop (ICCW), 670-674, 2015
92015
Device-to-device communications in LTE-unlicensed heterogeneous network
H Yuan, W Guo, S Wang
2016 IEEE 17th international workshop on signal processing advances in …, 2016
82016
Cross‐device tracking through identification of user typing behaviours
H Yuan, C Maple, C Chen, T Watson
Electronics Letters 54 (15), 957-959, 2018
62018
Dynamic route selection for vehicular store-carry-forward networks and misbehaviour vehicles analysis
H Yuan, C Maple, K Ghirardello
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-5, 2018
52018
Peer‐assisted location authentication and access control for wireless networks
H Yuan, C Maple, Y Lu, T Watson
Internet Technology Letters 2 (1), e71, 2019
32019
Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks
M Li, H Yuan, C Maple, W Cheng, G Epiphaniou
IEEE Systems Journal, 1-11, 2022
22022
Digital twins in cyber effects modelling of IoT/CPS points of low resilience
G Epiphaniou, M Hammoudeh, H Yuan, C Maple, U Ani
Simulation Modelling Practice and Theory 125, 102744, 2023
12023
Security Outage Probability Analysis of Cognitive Networks with Multiple Eavesdroppers for Industrial Internet of Things
M Li, H Yuan, C Maple, Y Li, O Alluhaibi
IEEE Transactions on Cognitive Communications and Networking, 1-12, 2022
12022
Cyber security of New Space systems
C Maple, UI Atmaca, G Epiphaniou, G Falco, H Yuan
Space Robotics and Autonomous Systems: Technologies, Advances and …, 2021
12021
IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure
C Maple, M Bradbury, M Elsden, H Cruickshank, H Yuan, C Gu, P Asuquo
12019
Error performance of RIS-assisted NOMA networks with imperfect channel state information
H Yuan
2023
Throughput Aware Authentication Prioritisation for Vehicular Communication Networks
H Yuan, M Bradbury, C Maple, C Gu
2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-5, 2019
2019
Device-to-device Communication in Cellular Networks: Multi-hop Path Selection and Performance
H Yuan
University of Warwick, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20