OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels
Zongmian Li, Pengcheng Mu, Bo Wang, et al.
IEEE Transactions on Vehicular Technology (2015) Vol. 65, Iss. 9, pp. 7021-7035
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Securing Internet of Medical Things with Friendly-jamming schemes
Xuran Li, Hong‐Ning Dai, Qubeijian Wang, et al.
Computer Communications (2020) Vol. 160, pp. 431-442
Open Access | Times Cited: 66

NOMA: An Information-Theoretic Perspective
Mojtaba Vaezi, H. Vincent Poor
Springer eBooks (2018), pp. 167-193
Closed Access | Times Cited: 61

Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels
Wei Wang, Kah Chan Teh, Kwok Hung Li
IEEE Transactions on Information Forensics and Security (2016) Vol. 12, Iss. 3, pp. 505-515
Closed Access | Times Cited: 40

On the Secrecy Rate Maximization with Uncoordinated Cooperative Jamming by Single-Antenna Helpers
Xiaoyan Hu, Pengcheng Mu, Bo Wang, et al.
IEEE Transactions on Vehicular Technology (2016), pp. 1-1
Closed Access | Times Cited: 34

On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers
Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, et al.
IEEE Transactions on Communications (2021) Vol. 70, Iss. 2, pp. 1125-1139
Closed Access | Times Cited: 20

Performance Analysis of Short Packet Communications With Multiple Eavesdroppers
Nihan Ari, Nikolaos Thomos, Leila Musavian
IEEE Transactions on Communications (2022) Vol. 70, Iss. 10, pp. 6778-6789
Open Access | Times Cited: 14

On the Secrecy Rate and Optimal Power Allocation for Artificial Noise Assisted MIMOME Channels
Sangseok Yun, Sanghun Im, Il‐Min Kim, et al.
IEEE Transactions on Vehicular Technology (2017) Vol. 67, Iss. 4, pp. 3098-3113
Closed Access | Times Cited: 27

Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint
Bo Wang, Pengcheng Mu, Zongze Li
IEEE Transactions on Wireless Communications (2017) Vol. 16, Iss. 11, pp. 7207-7220
Closed Access | Times Cited: 26

Channel-Correlation-Enabled Transmission Optimization for MISO Wiretap Channels
Shuai Han, Sai Xu, Weixiao Meng, et al.
IEEE Transactions on Wireless Communications (2020) Vol. 20, Iss. 2, pp. 858-870
Closed Access | Times Cited: 22

Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication
Xiaolong Lan, Ziheng Xu, Junjiang He, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 15940-15956
Closed Access | Times Cited: 2

Artificial Noise-Aided Secure Multicasting Design Under Secrecy Outage Constraint
Bo Wang, Pengcheng Mu
IEEE Transactions on Communications (2017) Vol. 65, Iss. 12, pp. 5401-5414
Closed Access | Times Cited: 24

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications
Xuran Li, Hong‐Ning Dai, Mahendra K. Shukla, et al.
Computer Standards & Interfaces (2021) Vol. 78, pp. 103540-103540
Closed Access | Times Cited: 16

Secure On–Off Transmission in Slow Fading Wiretap Channel With Imperfect CSI
Pengcheng Mu, Zongze Li, Bo Wang
IEEE Transactions on Vehicular Technology (2017) Vol. 66, Iss. 10, pp. 9582-9586
Closed Access | Times Cited: 18

Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems
Xiaolong Lan, Juanjuan Ren, Qingchun Chen, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3311-3324
Closed Access | Times Cited: 13

Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized CSIT: A Comprehensive Design and Analysis
Liang Sun, Lu Cao, Zhiyao Tang, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3734-3748
Closed Access | Times Cited: 12

Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems
Bo Wang, Pengcheng Mu
IEEE Transactions on Vehicular Technology (2016) Vol. 66, Iss. 7, pp. 5947-5960
Closed Access | Times Cited: 11

Improving physical layer security jointly using full‐duplex jamming receiver and multi‐antenna jammer in wireless networks
Rui Ma, Shizhong Yang, Min Du, et al.
IET Communications (2019) Vol. 13, Iss. 10, pp. 1530-1536
Closed Access | Times Cited: 11

An Adaptive Transmission Scheme for Slow Fading Wiretap Channel with Channel Estimation Errors
Zongze Li, Pengcheng Mu, Zongmian Li, et al.
2015 IEEE Global Communications Conference (GLOBECOM) (2016), pp. 1-6
Closed Access | Times Cited: 6

Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraint
Bo Wang, Pengcheng Mu, Zongze Li, et al.
(2017), pp. 1-6
Closed Access | Times Cited: 3

Artificial Noise Aided Secure Multicasting Design under the Secrecy Outage Probability Constraint
Bo Wang, Pengcheng Mu, Weile Zhang, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2017), pp. 1-6
Closed Access | Times Cited: 3

Nonadaptive Transmission for Slow Fading MISOSE Wiretap Channel with Adjustable Power Allocation
Zongze Li, Pengcheng Mu, Zongmian Li, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2017), pp. 1-6
Closed Access | Times Cited: 3

Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint
Xiaoyan Hu, Pengcheng Mu, Bo Wang, et al.
IEEE Wireless Communications and Networking Conference (2016), pp. 1-6
Closed Access | Times Cited: 2

Securing Small Cell Networks Under Interference Constraint: A Quasi-Variational Inequality Approach
Xiao Tang, Pinyi Ren, Zhu Han
2015 IEEE Global Communications Conference (GLOBECOM) (2018), pp. 1-6
Closed Access | Times Cited: 2

Secure transmission in AF satellite system based on FH‐MWFRFT and null space beamforming
Ruiyang Xu, Xinyu Da, Yuan Liang, et al.
IET Communications (2019) Vol. 13, Iss. 10, pp. 1506-1513
Closed Access | Times Cited: 2

Hierarchical power competition for security enhancement in wireless networks
Xiao Tang, Pinyi Ren, Zhu Han
(2017), pp. 1-6
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top