default search action
Yida Wang 0004
Person information
- affiliation: Army Engineering University of PLA, College of Communications Engineering, Nanjing, China
Other persons with the same name
- Yida Wang — disambiguation page
- Yida Wang 0001 — Technical University of Munich, CAMP, Germany (and 1 more)
- Yida Wang 0002 — Nanyang Technological University, School of Computer Engineering, Centre for Advanced Information Systems, Singapore
- Yida Wang 0003 — Amazon Web Services, Inc., East Palo Alto, CA, USA (and 2 more)
- Yida Wang 0005 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Yida Wang 0006 — Jilin University, Key Laboratory of Geophysical Exploration Equipment, Changchun, China
- Yida Wang 0007 — Shanghai Jiao Tong University, Shanghai, China
- Yida Wang 0008 — Chinese Academy of Sciences, CSSAR, China (and 1 more)
- Yida Wang 0009 — Tsinghua University, Tsinghua-Berkeley Shenzhen Institute, CoAI group, DCST, Institute for Artificial Intelligence, China
- Yida Wang 0010 — East China Normal University, Shanghai Key Laboratory of Magnetic Resonance, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Jiaxin Ge, Yida Wang, Xiaoling Hu, Yuzhen Huang, Shihao Yan:
Toward Covert Communications via a Wireless-Powered Jammer Fueled by a Receiver. IEEE Wirel. Commun. Lett. 13(3): 681-685 (2024) - 2022
- [j10]Yida Wang, Shihao Yan, Xiaobo Zhou, Yuzhen Huang, Derrick Wing Kwan Ng:
Covert Communication With Energy Replenishment Constraints in UAV Networks. IEEE Trans. Veh. Technol. 71(9): 10143-10148 (2022) - [j9]Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, Derrick Wing Kwan Ng:
Probabilistic Accumulate-Then-Transmit in Wireless-Powered Covert Communications. IEEE Trans. Wirel. Commun. 21(12): 10393-10406 (2022) - [c5]Yida Wang, Shihao Yan, Caijun Zhong, Derrick Wing Kwan Ng:
Probabilistic Accumulate-then-Transmit in Covert Communications with Energy Harvesting. ICC 2022: 685-691 - 2021
- [j8]Xiaohui Shang, Hao Yin, Yida Wang, Mu Li, Yong Wang:
Secure Multiuser Scheduling for Hybrid Relay-Assisted Wireless Powered Cooperative Communication Networks With Full-Duplex Destination-Based Jamming. IEEE Access 9: 49774-49787 (2021) - [j7]Yida Wang, Shihao Yan, Weiwei Yang, Yuzhen Huang, Chunshan Liu:
Energy-Efficient Covert Communications for Bistatic Backscatter Systems. IEEE Trans. Veh. Technol. 70(3): 2906-2911 (2021) - [j6]Yida Wang, Shihao Yan, Weiwei Yang, Yueming Cai:
Covert Communications With Constrained Age of Information. IEEE Wirel. Commun. Lett. 10(2): 368-372 (2021) - [i2]Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, Derrick Wing Kwan Ng:
Probabilistic Accumulate-then-Transmit in Wireless-Powered Covert Communications. CoRR abs/2104.06160 (2021) - 2020
- [j5]Xiaohui Shang, Hao Yin, Yida Wang, Mu Li, Yong Wang:
Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold. Sensors 20(6): 1632 (2020) - [j4]Xiaohui Shang, Hao Yin, Aijun Liu, Mu Li, Yida Wang, Yong Wang:
Secure Green-Oriented Multiuser Scheduling for Wireless-Powered Internet of Things. Wirel. Commun. Mob. Comput. 2020: 7845107:1-7845107:11 (2020) - [c4]Jiawei Li, Meng Wang, Yida Wang, Xin Shi, Cheng Wan:
Covert Communications in D2D Underlaying Cellular Networks with Multiple Wardens. WCSP 2020: 847-852 - [i1]Yida Wang, Shihao Yan, Weiwei Yang, Yueming Cai:
Covert Communications with Constrained Age of Information. CoRR abs/2006.12159 (2020)
2010 – 2019
- 2018
- [j3]Yida Wang, Weiwei Yang, Xiaohui Shang, Jianwei Hu, Yuzhen Huang, Yueming Cai:
Energy-Efficient Secure Transmission for Wireless Powered Internet of Things With Multiple Power Beacons. IEEE Access 6: 75086-75098 (2018) - [j2]Xiaohui Shang, Aijun Liu, Yida Wang, Qing Xie, Yong Wang:
Energy-Efficient Transmission Based on Direct Links: Toward Secure Cooperative Internet of Things. Wirel. Commun. Mob. Comput. 2018: 5012096:1-5012096:8 (2018) - [c3]Yida Wang, Weiwei Yang, Xiaohui Shang, Yueming Cai:
Energy-Efficient Secure Transmission for UAV-enabled Wireless Powered Communication. WCSP 2018: 1-5 - 2017
- [j1]Yida Wang, Xinrong Guan, Weiwei Yang, Yueming Cai:
Performance Analysis of RSS-AoA-Based Key Generation Scheme for Mobile Wireless Nodes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(10): 2167-2171 (2017) - [c2]Xinsong Dong, Jianchao Zheng, Yueming Cai, Jihao Yang, Yida Wang:
Share communication and energy resources for mobile cloud computing: An optimal cooperative contract approach. WCSP 2017: 1-6 - 2016
- [c1]Yida Wang, Xinrong Guan, Yueming Cai:
The impacts of mobility on performance of physical layer secret key based on angle of arrival. WCSP 2016: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint