top of page

PUBLICATIONS

Book Chapter
  1. S. Yan, N. Yang, R. Malaney, and J. Yuan, “Antenna selection strategies for wiretap channels,” in Trusted Communications with Physical Layer Security for 5G and Beyond, T. Q. Duong, X. Zhou, and H. V. Poor, Eds. London, IET Publisher, 2016.

  2. J. Hu, S. Yan, F. Shu, and D. W. K. Ng, “Secure transmission with directional modulation based on random frequency diverse arrays,” in Physical Layer Security, Khoa N. Le, Eds. Springer International Publishing, 2021.

Journal Articles [75]
  1. X. Lu, Y. Huang, S. Yan, W. Yang, and P. Haskell-Dowland, “Energy-efficient covert wireless communication through probabilistic jamming,” IEEE Wireless Commun. Letter, accepted.

  2. J. Hu, M. Guo, S. Yan, Y. Chen, X. Zhou, Xiaobo and Z. Chen, “Deep reinforcement learning enabled covert transmission with UAV,”  IEEE Wireless Commun. Letter, accepted.

  3. Y. Ding, S. Yan, X. Zhou, F. Shu, and S. Feng, “Radar-communication waveform design with detection probability constraints,” IEEE Wireless Commun. Letter, vol. 12, no. 1, pp. 168-172, Jan. 2023.

  4. X. Lu, S. Yan, W. Yang, M. Li, and D. W. K. Ng, “Covert communication with time uncertainty in time-critical wireless networks,” IEEE Trans. Wireless Commun., vol. 22, no. 2, pp. 1116-1129, Feb. 2023.

  5. X. Lu, S. Yan, W. Yang, C. Liu, and D. W. K. Ng, “Short-packet covert communication in interweave cognitive radio networks,” IEEE Trans. Veh. Technol., vol. 72, no. 2, pp. 2649-2654, Feb. 2023.

  6. H. Rao, S. Xiao, S. Yan, J. Wang, and W. Tang, “Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios,” IEEE Trans. Wireless Commun., vol. 21, no. 12, pp. 10633-10647, Dec. 2022.

  7. Y. Wang, S. Yan, W. Yang, C. Zhong, and D. W. K. Ng, “Probabilistic accumulate-then-transmit in wireless-powered covert communications,” IEEE Trans. Wireless Commun.,vol. 21, no. 12, pp. 10393-10406, Dec. 2022 [PDF].

  8. Y. Wang, S. Yan, X. Zhou, Y. Huang, and D. W. K. Ng, “Covert communication with energy replenishment constraints in UAV networks,” IEEE Trans. Veh. Technol., vol. 71, no. 9, pp. 10143-10148, Sep 2022.

  9. X. Lu, W. Yang, S. Yan, Z. Li, and D. W. K. Ng, “Covertness and timeliness of data collection in UAV-aided wireless-powered IoT,” IEEE Internet Things J., vol. 9, no. 14, pp. 12573-12587, Jul. 2022.

  10. R. Li, J. Cui, T. Huang, L. Yang, and S. Yan, “Optimal pulse-position modulation order and transmit power in covert communications,” IEEE Trans. Veh. Technol., vol. 71, no. 5, pp. 5770-5575, May 2022.

  11. Y. Feng, S. Yan, Z. Yang, N. Yang, and J. Yuan, “Safeguarding non-orthogonal multiple access with physical-layer techniques,” IEEE Netw., vol. 36, no. 3, pp. 145-151, May 2022.

  12. C. Li, S. Yan, N. Yang, and X. Zhou, “Truncated channel inversion power control to enable one-way URLLC with imperfect channel reciprocity,” IEEE Trans. Commun., vol. 70, no. 4, pp. 2313-2327, Apr. 2022. [PDF]

  13. T. Cai, J. Zhang, S. Yan, L. Meng, J. Sun, and N. Al-Dhahir, “Reconfigurable intelligent surface aided non-orthogonal unicast-multicast secure transmission,” IEEE Wireless Commun. Letter, vol. 11, no. 3, pp. 578-582, Mar. 2022.

  14. S. Yan, I. Ullah, R. Malaney, L. Sun, and S. Tomasin, “Location verification for future wireless vehicular networks: Research directions and challenges,” IEEE Netw., vol. 36, no. 6, pp. 60-66, Dec. 2022.

  15. X. Lu, W. Yang, S. Yan, L. Tao, and D. W. K. Ng, “Joint packet generation and covert communication in delay-intolerant status update systems,” IEEE Trans. Veh. Technol., vol. 71, no. 2, pp. 2170--2175, Feb. 2022.

  16. X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communication with delay constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532-547, Jan. 2022.  [PDF]

  17. X. Zhou, S. Yan, D. W. K. Ng, and R. Schober, “Three-Dimensional Placement and Transmit Power Design for UAV Covert Communications,” IEEE Trans. Veh. Technol., vol. 70, no. 12, pp. 13424-13429, Dec. 2021.  [PDF]

  18. W. Yang, X. Lu, S. Yan, F. Shu, and Z. Li, “Age of information for short-packet covert communication,'' IEEE Wireless Commun. Letter, vol. 10, no. 9, pp. 1890-1894, Sep. 2021. [PDF]

  19. S. Yan, S. Hanly, and I. Collings, “Optimal transmit power and flying location for UAV covert wireless communications,” IEEE J. Sel. Areas Commun., vol. 39, no. 11, pp. 3321-3333, Nov. 2021. [PDF]

  20. X. Zhou, S. Yan, F. Shu, R. Chen, and J. Li, “UAV-enabled covert wireless data collection,” IEEE J. Sel. Areas Commun., avol. 39, no. 11, pp. 3348-3362, Nov. 2021. [PDF]

  21. C. Wu, S. Yan, X. Zhou, R. Chen, and J. Sun, “Intelligent reflecting surface (IRS)-aided covert communication with Warden’s statistical CSI,” IEEE Wireless Commun. Letter, vol. 10, no. 7, pp. 1449-1453, Jul. 2021. [PDF]

  22. Y. Wang, S. Yan, W. Yang, Y. Huang, and C. Liu, “Energy-efficient covert communications for bistatic backscatter systems,” IEEE Trans. Veh. Technol., vol. 70, no. 3, pp. 2906–2911, Mar. 2021. [PDF]

  23. S. Wang, S. Yan, J. Zhang, N. Yang, R. Chen, and F. Shu, “Secrecy zone achieved by directional modulation with random frequency diverse array,” IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 2001–2006, Feb. 2021. [PDF]

  24. J. Zhang, M. Li, S. Yan, C. Liu, X. Chen, M. Zhao and P. Whiting, “Joint beam training and data transmission design for covert millimeter-wave communication,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 2232–2245, Jan. 2021. [PDF]

  25. J. Cui, S. Yan, J. Hu, N. Li, R. Chen, and J. Li, “How does repetition coding enable reliable and covert communications?,” IEEE Wireless Commun. Letter, vol. 10, no. 3, pp. 639–643, Mar. 2021. [PDF]

  26. Y. Wang, S. Yan, W. Yang, and Y. Cai, “Covert Communications with Constrained Age of Information,” IEEE Wireless Commun. Letter, vol. 10, no. 2, pp. 368–372, Feb. 2021. [PDF]

  27. M. Gao, R. Shen, J. Li, S. Yan, Y. Li, J. Shi, Z. Han, and L. Zhuo, “Computation offloading with instantaneous load billing for mobile edge computing,” IEEE Transactions on Services Computing, accepted to appear, May 2020. [PDF]

  28. L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, and D. Chen, “Covert communication in downlink NOMA systems with random transmit power,” IEEE Wireless Commun. Letter, vol. 9, no. 11, pp. 2000-2004, Nov. 2020. [PDF]

  29. J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communications without channel state information at receiver in IoT systems,” IEEE Internet Things J., vol. 7, no. 11, pp. 11103-11114, Nov. 2020. [PDF]

  30. L. Sun, T. Xu, S. Yan, X. Yu, J. Hu, and F. Shu, “On resource allocation in covert wireless communication with channel estimation,” IEEE Trans. Commun., vol. 68, no. 10, pp. 6456-6469, Oct. 2020.  [PDF]

  31. H. Lu, C. Guo, Y. Hu, W. Zhou, and S. Yan “Improved distributed event-triggered control for networked control system under random cyber-attacks via Bessel-Legendre inequalities,” Complexity, vol. 2020, pp. 1–14, Mar. 2020. [PDF]

  32. N. Akbar, S. Yan, A. M. Khattak, and N. Yang, On the pilot contamination attack in multi-cell multiuser massive MIMO networks,” IEEE Trans. Commun., vol. 68, no. 4, pp. 2264–2276, Apr. 2020.  [PDF]

  33. J. Hu, S. Yan, X. Zhou, F. Shu, and J. Li, Covert wireless communications with channel inversion power control in Rayleigh fading,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12135–12149, Dec. 2019. [PDF]

  34. K. Shahzad, X. Zhou, and S. Yan, Covert wireless communication in presence of a multi-antenna adversary and delay constraints,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12432–12436, Dec.2019. [PDF]

  35. I. Ullah, S. Yan, and R. Malaney, Location verification for emerging wireless vehicular networks,” IEEE Internet Things J., vol. 6, no. 6, pp. 10261–10272, Dec. 2019. [PDF]

  36. M. Gao, R. Shen, S. Yan, J. Li, H. Guan, Y. Li, J. Shi, and Z. Han, “Heterogeneous computational resource allocation for C-RAN: A contract-theoretic approach,” IEEE Transactions on Network and Service Management, Early Access. [PDF]

  37. S. Yan, X. Zhou, J. Hu, and Stephen V. Hanly, Low probability of detection communication: Opportunities and challenges,” IEEE Wireless Commun., vol. 26, no. 5, pp. 19-25, Oct. 2019.  [PDF]

  38. R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan, Physical layer security for ultra-reliable and low-latency communications,” IEEE Wireless Commun., vol. 26, no. 5, pp. 6-11, Oct. 2019. [PDF]

  39. J. Hu, S. Yan, F. Shu, and J. Wang, “Covert transmission with a self-sustained relay,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 4089-4102, Aug. 2019. [PDF]

  40. X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, F. Shu, “Joint optimization of a UAV's trajectory and transmit power for covert communications,” IEEE Trans. Signal Process., vol. 67, no. 16, pp. 4276-4290, Aug. 2019. [PDF]

  41. C. Li, N. Yang, and S. Yan, “Optimal transmission of short-packet communications in multiple-input single-output systems,” IEEE Trans. Veh. Technol., vol. 68, no. 7, pp. 7199-7203, Jul. 2019. [PDF]

  42. S. Yan, Y. Cong, S. Hanly, and X. Zhou, “Gaussian signalling for covert communications,” IEEE Trans. Wireless Commun., vol. 18, no. 7, pp. 3542-3553, Jul. 2019. [PDF]

  43. F. Shu, T. Xu, J. Hu, and S. YanDelay-constrained covert communications with a full-duplex receiver,”  IEEE Wireless Commun. Letter, vol. 8, no. 3, pp. 813-816, Jun. 2019. [PDF]

  44. Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, “Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 6, pp. 1670-1683, Jun. 2019. [PDF]

  45. Y. Feng, S. Yan, Z. Yang, N. Yang, and J. Yuan, “Beamforming design and power allocation for secure transmission with NOMA,” IEEE Trans. Wireless Commun., vol. 18, no. 5, pp. 2639-2651, May 2019. [PDF]

  46. X. Zhou, Q. Wu, S. Yan, F. Shu, and J. Li, “UAV-enabled secure communications: Joint trajectory and transmit power optimization,” IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 4069-4073, Apr. 2019. [PDF]

  47. S. Yan, B. He, X. Zhou, Y. Cong, and A. L. Swindlehurst, “Delay-intolerant covert communications with either fixed or random transmit power,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 1, pp. 129-140, Jan. 2019. [PDF]

  48. X. Zhou, S. Yan, Q. Wu, F. Shu, and J. Li,  Robust beamforming design for secure DM-based relay networks with self-sustained jammers,” IEEE Access,  vol. 7, pp. 969-983, Dec. 2018.  [PDF]

  49. Y. Feng, S. Yan, and Z. Yang, “Secure transmission to the strong user in non-orthogonal multiple access,” IEEE Commun. Lett., vol. 22, no. 12, pp. 2623-2626, Dec. 2018. [PDF]

  50. K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li, Achieving covert wireless communications using a full-duplex receiver, IEEE Trans. Wireless Commun., vol. 17, no. 12, pp. 8517-8530, Dec. 2018. [PDF]

  51. Y. Feng, S. Yan, Z. Yang, N. Yang, and J. Yuan, User and relay selection with artificial noise to enhance physical layer security,” IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 10906-10920, Nov. 2018. [PDF]

  52. S. Yan, X. Zhou, N. Yang, T. D. Abhayapala, A. L. Swindlehurst, “Secret channel training to enhance physical layer security with a full-duplex receiver,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 11, pp. 2788-2800, Nov. 2018. [PDF]

  53. B. He, S. Yan, X. Zhou, H. Jafarkhani, “Covert wireless communication with a Poisson field of interferers,”  IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6005-6017, Sep. 2018. [PDF]

  54. Y. Zhang, Z. Yang, Y. Feng, and S. Yan, “Performance analysis of a novel uplink cooperative NOMA system with full-duplex relaying,” IET Communications, Aug. 2018. [PDF]

  55. X. Sun, N. Yang, S. Yan, Z. Ding, D. W. K. Ng, C. Shen, and Z. Zhong, “Joint beamforming and power allocation in downlink NOMA multiuser MIMO networks,” IEEE Trans. Wireless Commun., vol. 17, no. 8, pp. 5367-5381, Aug. 2018. [PDF]

  56. N. Akbar, S. Yan, N. Yang, and J. Yuan, “Location-aware pilot allocation in multicell multiuser massive MIMO networks,” IEEE Trans. Veh. Technol., vol. 67, no. 8, pp. 7774-7778, Aug. 2018. [PDF]

  57. Y. Zhang, Z. Yang, Y. Feng, and S. Yan, Performance analysis of cooperative relaying systems with power-domain non-orthogonal multiple access,”  IEEE Access, vol. 6, pp. 39839-39848, Jul. 2018. [PDF]

  58. J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4766-4779, Jul. 2018. [PDF]

  59. X. Sun, S. Yan, N. Yang, Z. Ding, C. Shen, and Z. Zhong, “Short-packet downlink transmission with non-orthogonal multiple access,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4550-4564, Jul. 2018. [PDF]

  60. T. Liu, J. Li, F. Shu, H. Guan, S. Yan, and D. N. K. Jayakody, On the incentive mechanisms for commercial edge caching in 5G wireless networks,IEEE Wireless Commun., vol. 25, no. 3, pp. 72-78, Jun. 2018. [PDF]

  61. S. Yan, G. Peters, I. Nevat, and R. Malaney, “Location verification systems based on received signal strength with unknown transmit power,” IEEE Commun. Lett., vol. 22, no. 3, pp. 650–653,  Mar. 2018. [PDF]

  62. S. Yan, N. Yang, Ingmar Land, R. Malaney, and J. Yuan, “Three artificial-noise-aided secure transmission schemes in wiretap channels,” IEEE Trans. Veh. Technol., vol. 67, no. 4, pp. 3669–3673,  Apr. 2018. [PDF]

  63. Y. Feng, S. Yan, Z. Yang, N. Yang, W. Zhu, “TAS-based incremental hybrid decode-amplify-forward relaying for physical layer security enhancement,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3876–3891, Jun. 2017. [PDF]

  64. B. He, S. Yan, X. Zhou, and V. Lau, “On covert communication with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941-944, Jan. 2017. [PDF]

  65. J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, “Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays,” IEEE Access, vol. 5, pp. 1658–1667, Jan. 2017. [PDF]

  66. S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8286–8297, Dec. 2016. [PDF]

  67. B. He, N. Yang, S. Yan, and X. Zhou, “Linear precoding for simultaneous confidential broadcasting and power transfer,” IEEE J. Sel. Topics Signal Process.,, vol. 10, no. 8, pp. 1404–1416, Dec. 2016. [PDF]

  68. S. Yan, R. Malaney, I. Nevat, and G. Peters, “Location verification systems for VANETs in Rician fading channels,” IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5652–5664, Jul. 2016. [PDF]

  69. S. Yan, I. Nevat, G. Peters, and R. Malaney, “Location verification systems under spatially correlated shadowing,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4132–4144, Jun. 2016. [PDF]

  70. S. Yan and R. Malaney,“Location-based beamforming for enhancing secrecy in Rician wiretap channels,” IEEE Trans.  wireless Commun., vol. 15, no. 4, pp. 2780–2791, Apr. 2016. [PDF]

  71. S. Yan, N. Yang, G. Geraci, R. Malaney, and J. Yuan, “Optimization of code rates in SISOME wiretap channels,” IEEE Trans. Wireless Commun., vol. 14, no. 11, pp. 6377–6388, Nov. 2015. [PDF]

  72. N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land, “Artificial noise: Transmission optimization in Multi-Input Single-Output wiretap channels,” IEEE Trans. Commun., vol. 63, no. 5, pp. 1771–1783, May 2015. [PDF]

  73. S. Yan, R. Malaney, I. Nevat, and G. Peters, “Optimal information-theoretic wireless location verification,” IEEE Trans. Veh. Technol., vol. 63, no. 7, pp. 3410–3422, Sep. 2014. [PDF]

  74. S. Yan, N. Yang, R. Malaney, and J. Yuan, “Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels,” IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656–1667, Mar. 2014. [PDF]

  75. S. Yan and R. Malaney, “Location verification systems in emerging wireless networks,” ZTE Communications (invited paper), vol. 11, no. 3, pp. 03–10, Sep. 2013. [PDF]

Conference Papers [42]
  1. Q. Zhang, S. Yan, Y. Cong, F. Shu and D. W. K. Ng, “Signalling for covert passive sensing,” in Proc. IEEE ICC, May 2023, pp. 1-6.

  2. X. Lu, W. Yang, and S. Yan, “Short-packet covert communication with transmission time uncertainty,” in Proc. IEEE ICCCS, Apr. 2022, pp. 1--6.

  3. Y. Wang, S. Yan, C. Zhong, and D. W. K. Ng, “Probabilistic accumulate-and-then transmit in covert communications with energy harvesting,” in Proc. IEEE ICC, Jun. 2022, pp. 1–6.

  4. X. Yu, S. Yan, J. Hu, P. Haskell-Dowland, Y. Han, and D. W. K. Ng, “On relaying strategies in multi-hop covert wireless communications,” in Proc. IEEE ICC, Jun. 2022, pp. 1–6.

  5. X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Joint transmit power and reflection beamforming design for IRS-aided covert communications,” in Proc. IEEE GlobeCOM, Dec. 2021, pp. 1–6. [PDF]

  6. T. Cai, J. Zhang, S. Yan, L. Meng, J. Sun, and N. Al-Dhahir, “Resource allocation for secure rate-splitting multiple access with adaptive beamforming,” in Proc. IEEE ICC Workshop, Jun. 2021, pp. 1–6. [PDF]

  7. U. Ihsan, R. Malaney and S. Yan, “Neural network architectures for location estimation in the Internet of Things,” in Proc. IEEE ICC, Jun. 2021, pp. 1–6. [PDF]

  8. L. Sun, S. Yan, R. Chen, and F. Shu “On likelihood functions to minimize KL divergence in binary hypothesis testing,” in Proc. ICSPCS, Oct. 2020, pp. 1-5. [PDF​]

  9. W. Jabbar, R. Malaney, and S. Yan, “Location information verification in future vehicular networks,” in Proc. IEEE CAVS, Oct. 2020, pp. 1-6. [PDF​]

  10. W. Jabbar, R. Malaney, and S. Yan, “Location verification based hybrid routing protocol for VANETs,” in Proc. IEEE VTC Fall, May 2020, pp. 1-6. [PDF​]

  11. C. Li, S. Yan, N. Yang, X. Zhou, and R. Chen, One-way URLLC with truncated channel inversion power control,” in Proc. IEEE GlobeCOM 2019 Workshop on Future Wireless Access for Industrial IoT, Dec. 2019, pp. 1-6. [PDF​]

  12. X. Zhou, S. Yan, F. Shu, R. Chen, and J. Li, Covert wireless data collection based on unmanned aerial vehicles,” in Proc. IEEE GlobeCOM 2019 Workshop on Security and Privacy in Smart, Cooperative IoT and CPS, Dec. 2019, pp. 1-6. [PDF​]

  13. U. Ihsan, Z. Wang, R. Malaney, S. Yan, and A. Dempster, “Artificial intelligence and location verification in vehicular networks,” in Proc. IEEE GlobeCOM, Dec. 2019, pp. 1-6. [PDF​]

  14. U. Ihsan, R. Malaney and S. Yan, “Machine learning and location verification in vehicular networks,” in Proc. IEEE ICCC, Jun. 2019, pp.1-6. [PDF​]

  15. S. Yan, Y. Cong, S. Hanly, and X. Zhou, “Is Gaussian signalling optimal for covert communications,” in Proc. IEEE ICC, May 2019, pp.1-6. [PDF​]

  16. S. Yan, S. Hanly, I. Collings, and D. Goeckel, “Hiding unmanned aerial vehicles for wireless transmissions by covert communications,” in Proc. IEEE ICC, May 2019, pp. 1-6. [PDF​]

  17. S. Yan, R. Malaney, and J. Yuan, “Generalized and differential likelihood ratio tests with quantum signal processing,” in Proc. IEEE ICASSP, May 2019, pp. 1-6. [PDF]

  18. C. Li, S. Yan, and N. Yang, “On channel reciprocity to activate uplink channel training for downlink wireless transmission in Tactile Internet applications,” in Proc. IEEE ICC 2018 Workshop on 5G & Beyond--Enabling Technologies and Applications focus on the Tactile Internet, May 2018, pp. 1-6. [PDF]

  19. X. Sun, S. Yan, N. Yang, Z. Ding, C. Shen, and Z. Zhong, “Downlink NOMA transmission for low-latency short-packet communications,” in Proc. IEEE ICC 2018 Workshop on Non-Orthogonal Multiple Access Techniques for 5G, May 2018, pp. 1-6. [PDF]

  20. S. Xu, N. Yang, and S. Yan, “Impact of load balancing on rate coverage performance in millimeter wave cellular heterogeneous networks,” in Proc. IEEE ICC 2018 Workshop on Evolutional Technologies & Ecosystems for 5G Phase II, May 2018, pp. 1-6. [PDF]

  21. J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert communications with a full-duplex receiver over wireless fading channels,” in Proc. IEEE ICC, May 2018. [PDF]

  22. U. Ihsan, Z. Wang, R. Malaney, A. Dempster, and S. Yan, “Location verification performance in the presence of verifier location error,” in Proc. International Global Navigation Satellite Systems Association, Feb. 2018, pp. 1-8. [PDF]

  23. N. Akbar and S. Yan, “Active attack on user load achieving pilot design for multi-cell multi-user massive MIMO networks,” in Proc. IEEE GlobeCOM Workshop on Trusted Communications with Physical Layer Security, pp. 1-6, Dec. 2017. [PDF]

  24. Y. Feng, S. Yan, and Z. Yang, “Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks,” in Proc. IEEE GlobeCOM Workshop on Trusted Communications with Physical Layer Security, pp. 1-6, Dec. 2017. [PDF]

  25. J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J.Wang, “Covert communications in wireless relay networks,” in Proc. IEEE GlobeCOM, pp. 1-6, Dec. 2017. [PDF]

  26. K. Shahzad, X. Zhou, and S. Yan, “Covert communication in fading channels under channel uncertainty,” in Proc. IEEE VTC Spring, Jun. 2017, pp. 1–5. [PDF]

  27. S. Yan, B. He, Y. Cong, and X. Zhou, “Covert communication with finite blocklength in AWGN channels,” in Proc. IEEE ICC, May 2017, pp. 1–6. [PDF]

  28. S. Yan, X. Zhou, N. Yang, T. D. Abhayapala, A. L. Swindlehurst, “Channel training design in full-duplex wiretap channels to enhance physical layer security,” in Proc. IEEE ICC, May 2017, pp. 1–6.[PDF]

  29. Y. Feng, Z. Yang, S. Yan, N. Yang, and B. Lv, “Physical layer security enhancement in multi-user multi-full-duplex-relay networks,” in Proc. IEEE ICC, May 2017, pp. 1–7.[PDF]

  30. S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Correlation-based power allocation for secure transmission with artificial noise,” in Proc. IEEE GlobeCOM, Dec. 2016, pp. 1–6. [PDF]

  31. N. Akbar, S. Yan, N. Yang, and J. Yuan, “Mitigating pilot contamination through location-aware pilot assignment in massive MIMO networks,” in Proc. IEEE GlobeCOM Workshop on Emerging Technologies for 5G Wireless Cellular Networks, Dec. 2016, pp. 1–6. [PDF]

  32. S. Yan, N. Yang, and J. Yuan, “Fundamental properties of on-off transmission scheme for wiretap channels,” in Proc. IEEE WCSP, Oct. 2015, pp. 1–5. [PDF]

  33. S. Yan, R. Malaney, I. Nevat, and G. Peters, “Location spoofing detection systems for VANETs by a single base station in Rician fading channels,” in Proc. IEEE VTC Spring, May 2015, pp. 1–6. [PDF]

  34. S. Yan, N. Yang, R. Malaney, and J. Yuan, “Antenna switching for security enhancement in full-duplex wiretap channels,” in Proc. IEEE GlobeCOM TCPLS Workshop, Dec. 2014, pp. 1412–1417. [PDF]

  35. S. Yan and R. Malaney, “Line-of-sight based beamforming for security enhancements in wiretap channels,” in Proc. ICITCS IEEE, Oct. 2014, pp. 218–221. [PDF]

  36. C. Liu, N. Yang, S. Yan, J. Yuan, and R. Malaney, “Secure adaptive transmission in two-way relay wiretap channels,” in Proc. IEEE ICCC, Oct. 2014, pp. 664–669. [PDF]

  37. S. Yan, G. Geraci, N. Yang, R. Malaney, and J. Yuan, “On the target secrecy rate for SISOME wiretap channels,” in Proc. IEEE ICC, Jun. 2014, pp. 987–992. [PDF]

  38. S. Yan, R. Malaney, I. Nevat, and G. Peters, “Signal strength based wireless location verification under spatially correlated shadowing,” in Proc. IEEE ICC, Jun. 2014, pp. 2617–2623. [PDF]

  39. S. Yan, R. Malaney, I. Nevat, and G. Peters, “Timing information in wireless communications and optimal location verification frameworks,” in Proc. AusCTW, Feb. 2014, pp. 144–149. [PDF]

  40. S. Yan, N. Yang, R. Malaney, and J. Yuan, “Transmit antenna selection with Alamouti scheme in MIMO wiretap channels,” in Proc. IEEE GlobeCOM, Dec. 2013, pp. 687–692. [PDF]

  41. S. Yan, R. Malaney, I. Nevat, and G. Peters, “An information theoretic location verification system for wireless networks,” in Proc. IEEE GlobeCOM, Dec. 2012, pp. 5415–5420. [PDF]

  42. S. Yan, J. Xing, and D. Wang, “Correlation between estimation error and possible region in localization algorithms,” in Proc. ICISCI, Dec. 2010, pp. 1514–1520.[PDF]

Personal use of the following material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE or other publishers of the work concerned.

bottom of page