


default search action
Wenbo Wang 0007
- > Home > Persons > Wenbo Wang 0007
Publications
- 2015
- [j139]Yunchuan Yang, Wenbo Wang, Hui Zhao:
Achievable rate region with secrecy constraints for secure communication in two-way relay networks. Int. J. Commun. Syst. 28(2): 231-249 (2015) - 2014
- [j126]Long Zhao, Kan Zheng
, Hang Long, Hui Zhao, Wenbo Wang:
Performance analysis for downlink massive multiple-input multiple-output system with channel state information delay under maximum ratio transmission precoding. IET Commun. 8(3): 390-398 (2014) - [j117]Yunchuan Yang, Cong Sun, Hui Zhao, Hang Long, Wenbo Wang:
Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks. IEEE Trans. Signal Process. 62(8): 2111-2126 (2014) - [c230]Juwo Yang, Hui Zhao, Wenbo Wang, Chengcheng Zhang:
An effective SINR mapping models for 256QAM in LTE-Advanced system. PIMRC 2014: 343-347 - 2013
- [c208]Hang Long, Wei Xiang
, Jing Wang, Yueying Zhang, Hui Zhao, Wenbo Wang:
Cooperative Jamming and Power Allocation in Two-Way Relaying System with Eavesdropper. VTC Fall 2013: 1-5 - [c202]Yunchuan Yang, Hui Zhao, Cong Sun, Wenbo Wang:
Iterative algorithm for secrecy guarantee with null space beamforming in two-way relay networks. WCNC 2013: 3420-3425 - 2012
- [j83]Yunchuan Yang, Wenbo Wang, Hui Zhao, Long Zhao:
Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation. J. Commun. Networks 14(4): 374-384 (2012) - 2011
- [j67]Xiangyu Lu, Yuyan Zhang, Yuexing Peng, Hui Zhao, Wenbo Wang:
A Real-time Two-way Authentication Method Based on Instantaneous Channel State Information for Wireless Communication Systems. J. Commun. 6(6): 471-476 (2011) - [c176]Bin Zheng, Hui Zhao, Xiaoping Zhou, Wenbo Wang, Bin Wu:
Concatenation-assisted symbol-level combining scheme based on LR for MIMO systems with ARQ. CHINACOM 2011: 629-633 - [c169]Yunchuan Yang, Hui Zhao, Cong Sun, Hua Sun, Wenbo Wang:
Distributed beamforming with relay-aided interference alignment in fully connected interference network. GLOBECOM Workshops 2011: 1347-1352 - [c160]Yang Liu, Hui Zhao, Bin Zheng, Wenbo Wang, Bin Wu:
A Novel Unequal-Error-Protected STBC Design for Multimedia Transmission. VTC Spring 2011: 1-5 - 2010
- [j50]Yang Liu, Hui Zhao, Yunchuan Yang, Wenbo Wang, Kan Zheng
:
Design and Analysis on Macro Diversity Scheme for Broadcast Services in Mobile Cellular Systems. IEICE Trans. Commun. 93-B(11): 3113-3120 (2010) - [j42]Hui Zhao, Xiaoping Zhou, Yunchuan Yang, Wenbo Wang:
Hierarchical Modulation with Vector Rotation for E-MBMS Transmission in LTE Systems. J. Electr. Comput. Eng. 2010: 316749:1-316749:9 (2010) - 2009
- [j21]Yuexing Peng, Muzi Wu, Hui Zhao, Wenbo Wang, Young-Il Kim:
Cooperative Network Coding with Soft Information Relaying in Two-way Relay Cchannels. J. Commun. 4(11): 849-855 (2009) - 2008
- [c77]Hang Long, Wenbo Wang, Hui Zhao, Kan Zheng
:
Precoding Vector Distribution under Spatial Correlated Channel and Nonuniform Codebook Design. ICC 2008: 4506-4510 - 2007
- [c60]Hui Zhao, Hongzhong Yan, Wenbo Wang:
An Adaptive HARQ Scheme Based on Quasi-Othogonal Space-Time Coding for D-STTD System. GLOBECOM 2007: 4000-4004 - [c46]Fanggang Wang, Hui Zhao, Wenbo Wang:
Dual Branch CDMA Receivers for Downlink Data Communications in Mimo-Hsdpa. PIMRC 2007: 1-5 - [c43]Hui Zhao, Hang Long, Wenbo Wang:
Tabu Search Detection for MIMO Systems. PIMRC 2007: 1-5 - 2006
- [c34]Hui Zhao, Hang Long, Wenbo Wang:
PSO Selection of Surviving Nodes in QRM Detection for MIMO Systems. GLOBECOM 2006 - 2005
- [c25]Hui Zhao, Kan Zheng
, Wenbo Wang:
Diversity gain's influence on MIMO's detection. ISCAS (2) 2005: 1714-1717 - [c20]Kan Zheng, Hui Zhao, Wenbo Wang, Lei Lei:
Improved V-BLAST receiver for uplink CDM-OFDMA. PIMRC 2005: 1184-1188 - [c18]En Zhou, Xing Zhang, Hui Zhao, Wenbo Wang:
Synchronization algorithms for MIMO OFDM systems. WCNC 2005: 18-22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-26 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint