


default search action
Kan Yu 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, Key Laboratory of Universal Wireless Communications, Ministry of Education, China
- affiliation: Macau University of Science and Technology, School of Computer Science and Engineering, China
- affiliation: Qufu Normal University, School of Computer Science, Rizhao, China
- affiliation (PhD 2019): Shandong University of Science and Technology, China
Other persons with the same name
- Kan Yu (aka: Yu Kan) — disambiguation page
- Kan Yu 0002
— La Trobe University, School of Computing Engineering and Mathematical Sciences, Melbourne, Australia
- Kan Yu 0003 — Mälardalen University College, School of Innovation, Design and Engineering, Västerås, Eskilstuna, Sweden
- Kan Yu 0004 — University of Michigan, School of Information, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Jing Qiu
, Jiguo Yu
, Anming Dong
, Kan Yu
, Honglong Chen
:
Weighted Sum-Rate Maximization With Transceiver and Passive Beamforming Design for IRS-Aided MIMO-BC Communications via Matrix Fractional Programming. IEEE Trans. Commun. 73(2): 1383-1398 (2025) - [j29]Fuze Zhu
, Xiaowu Liu
, Kan Yu
, Qixun Zhang
, Zhiyong Feng
, Dong Li
:
Delay-Effective Task Offloading Technology in Internet of Vehicles: From the Perspective of the Vehicle Platooning. IEEE Trans. Commun. 73(6): 3833-3848 (2025) - [j28]Kan Yu
, Xiao Zhao, Zhiyong Feng
, Dianxia Chen
, Xiaowu Liu
, Xiaoshan Ma
, Dong Li
:
SuRLLC: Secure Ultra-Reliable and Low Latency Communication in NOMA-UAV Intelligent Transportation Systems. IEEE Trans. Veh. Technol. 74(1): 556-570 (2025) - [j27]Ruotong Li
, Qixun Zhang
, Dingyou Ma
, Kan Yu
, Yuzhen Huang
:
Joint Target Assignment and Resource Allocation for Multi-Base Station Cooperative ISAC in AAV Detection. IEEE Trans. Veh. Technol. 74(5): 7700-7714 (2025) - [j26]Ruinian Wang
, Kan Yu
, Kaixuan Li, Xiaowu Liu
, Zhiyong Feng
, Dingyou Ma
, Dong Li
:
A Glimpse of Physical Layer Security in Internet of Vehicles: Joint Design of the Transmission Power and Sensing Power. IEEE Trans. Veh. Technol. 74(7): 10702-10718 (2025) - [i7]Kaixuan Li, Kan Yu, Xiaowu Liu, Qixun Zhang, Zhiyong Feng, Dong Li:
First Glimpse on Physical Layer Security in Internet of Vehicles: Transformed from Communication Interference to Sensing Interference. CoRR abs/2502.13634 (2025) - [i6]Kaixuan Li, Kan Yu, Dingyou Ma, Yujia Zhao, Xiaowu Liu, Qixun Zhang, Zhiyong Feng:
Can Movable Antenna-enabled Micro-Mobility Replace UAV-enabled Macro-Mobility? A Physical Layer Security Perspective. CoRR abs/2506.19456 (2025) - [i5]Kan Yu, Wenxu Wang, Xiaowu Liu, Yujia Zhao, Qixun Zhang, Zhiyong Feng, Dong Li:
Does Movable Antenna Present A Dual-edged Nature? From the Perspective of Physical Layer Security: A Joint Design of Fixed-position Antenna and Movable Antenna. CoRR abs/2507.05784 (2025) - [i4]Yujia Zhao, Zhiyong Feng, Kan Yu, Qixun Zhang, Dong Li:
An Effective Equivalence Model of Analyzing PLS of Multiple Eavesdroppers Facing Low-altitude Communication Systems. CoRR abs/2507.05878 (2025) - 2024
- [j25]Wenshuo Ma
, Xiaowu Liu
, Jiguo Yu
, Kan Yu
, Xinyu Wang
:
A Collusion Attack Resistance Data Aggregation Scheme in Internet of Things. IEEE Trans. Ind. Informatics 20(11): 13352-13362 (2024) - [j24]Kan Yu
, Jiguo Yu
, Zhiyong Feng
, Honglong Chen:
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling. IEEE/ACM Trans. Netw. 32(1): 238-252 (2024) - [j23]Kan Yu
, Zhiyong Feng
, Jiguo Yu
, Ting Chen
, Jinlin Peng
, Dong Li
:
Secure Ultra-Reliable and Low Latency Communication in UAV-Enabled NOMA Wireless Networks. IEEE Trans. Veh. Technol. 73(10): 14908-14922 (2024) - [j22]Jiashuo He
, Sai Huang
, Zheng Yang
, Kan Yu
, Hao Huan
, Zhiyong Feng
:
Channel-Agnostic Radio Frequency Fingerprint Identification Using Spectral Quotient Constellation Errors. IEEE Trans. Wirel. Commun. 23(1): 158-170 (2024) - [j21]Kan Yu
, Dong Li
, Jiguo Yu
, Qixun Zhang
, Zhiyong Feng
:
WNV-RA: Wireless Network Virtualization Empowered Resource Allocation in Delay-Sensitivity Airborne Tactical Networks. IEEE Trans. Wirel. Commun. 23(12): 18855-18869 (2024) - [j20]Hao Xie
, Dong Li
, Kan Yu
, Guangchi Zhang
:
Coverage Characterization and Number Configuration for RIS-Aided Systems With Phase Delivery: How Far Is the Coverage Distance? IEEE Wirel. Commun. Lett. 13(11): 3114-3118 (2024) - [c13]Wenhao Zhang, Wenshuo Ma, Chunmei Yang, Kan Yu, Chuanwen Luo, Guangsheng Feng:
Mobile Crowd Sensing Online Quality Awareness Incentive Mechanism Based on Taxation and Data Aggregation. MSN 2024: 24-31 - [c12]Wenshuo Ma, Xinru Liu, Kan Yu, Chuanwen Luo, Guopeng Wang, Xiaowu Liu:
A Secure and Efficient Privacy Data Aggregation Mechanism. WASA (2) 2024: 15-26 - [c11]Qianyi Hao, Qixun Zhang, Yanpeng Cui, Fan Liu, Kan Yu, Dingyou Ma:
Sensing-Assisted Multi-Beam Control for Dense Connected Automated Vehicles: A Clustering Approach. WCNC 2024: 1-6 - [c10]Bowen Wang, Chao Jiao, Qixun Zhang, Kan Yu, Dingyou Ma:
Hardware Verification and Performance Evaluation of MmWave Beam Tracking for Integrated Sensing and Communication. WCNC 2024: 1-6 - [i3]Kan Yu, Fuze Zhu, Xiaowu Liu, Zhiyong Feng, Dong Li:
Delay-Effective Task Offloading Technology in Internet of Vehicles: From the Perspective of the Vehicle Platooning. CoRR abs/2405.16060 (2024) - [i2]Zhiyong Feng, Yujia Zhao, Kan Yu, Dong Li:
Movable Antenna Empowered Physical Layer Security Without Eve's CSI: Joint Optimization of Beamforming and Antenna Positions. CoRR abs/2405.16062 (2024) - 2023
- [j19]Kan Yu
, Jiguo Yu, Zhiyong Feng, Min Guo:
Cooperative jamming aided securing wireless communications without CSI of eavesdroppers. Comput. Networks 234: 109906 (2023) - [j18]Kan Yu
, Jiguo Yu
, Chuanwen Luo
:
The Impact of Mobility on Physical Layer Security of 5G IoT Networks. IEEE/ACM Trans. Netw. 31(3): 1042-1055 (2023) - [j17]Yahui Ji
, Kan Yu
, Jing Qiu
, Jiguo Yu
:
Massive MIMO and Secrecy Guard Zone Based Improving Physical Layer Security in UAV-Enabled uRLLC Networks. IEEE Trans. Veh. Technol. 72(4): 4553-4567 (2023) - [c9]Shijie Li, Xiaowu Liu, Wenshuo Ma, Kan Yu, Yangyang Liu:
Blockchain-based Reputation Management Scheme for the Internet of Vehicles. ICDM (Workshops) 2023: 1040-1049 - [c8]Kan Yu, Kaixuan Li, Zhiyong Feng, Xiao Zhao, Chuanwen Luo, Ting Chen, Dong Li:
Secure URLLC Empowered by UAV in 6G: An Interference Engineering Perspective. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 795-802 - [c7]Xiao Zhao, Kan Yu, Dong Li, Xiaowu Liu, Chuanwen Luo:
Secure Ultra-reliable and Low Latency Communication in NOMA-UAV Networks. MSN 2023: 127-134 - [i1]Kan Yu, Zhiyong Feng, Dong Li, Jiguo Yu:
Secure-ISAC: Secure V2X Communication: An Integrated Sensing and Communication Perspective. CoRR abs/2312.01720 (2023) - 2022
- [j16]Xiaowu Liu
, Xue Yang, Jiguo Yu, Kan Yu
:
Cooperative communication design of physical layer security enhancement with social ties in random networks. Ad Hoc Networks 130: 102822 (2022) - [j15]Xiaowu Liu
, Jiguo Yu
, Kan Yu, Guijuan Wang, Xingjian Feng:
Trust secure data aggregation in WSN-based IIoT with single mobile sink. Ad Hoc Networks 136: 102956 (2022) - [j14]Kan Yu, Shanchao Zheng, Guangshun Li, Xiaowu Liu, Xue Yang, Xiao Zhao:
The impact of mobility on physical layer security in 5G uRLLC. Int. J. Intell. Syst. 37(12): 10751-10782 (2022) - [j13]Junhua Wu
, Tiantian Wang
, Guangshun Li, Kan Yu, Chuanwen Luo:
Secure storage scheme of trajectory data for digital tracking mechanism. Int. J. Intell. Syst. 37(12): 12490-12510 (2022) - [j12]Yahui Ji, Jiguo Yu
, Yan Yao
, Kan Yu, Honglong Chen
, Shanchao Zheng:
Securing wireless communications from the perspective of physical layer: A survey. Internet Things 19: 100524 (2022) - [j11]Guangshun Li, Guopeng Liang, Junhua Wu
, Zhenyu Jin, Wenzhen Feng, Kan Yu:
A New Secure Crowdfunding Transaction Scheme Based on Blockchain. J. Circuits Syst. Comput. 31(16): 2250282:1-2250282:26 (2022) - [j10]Kan Yu
, Jiguo Yu
, Anming Dong
:
Cooperative Communication and Mobility for Securing URLLC of Future Wireless Networks. IEEE Trans. Veh. Technol. 71(5): 5331-5342 (2022) - [j9]Jing Qiu
, Jiguo Yu
, Anming Dong
, Kan Yu:
Joint Beamforming for IRS-Aided Multi-Cell MISO System: Sum Rate Maximization and SINR Balancing. IEEE Trans. Wirel. Commun. 21(9): 7536-7549 (2022) - [c6]Shanchao Zheng, Kan Yu, Guangshun Li, Xiaowu Liu:
Securing uRLLC in UAV-assisted NOMA Wireless Network. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 264-271 - [c5]Junhua Wu, Huiru Zhang, Guangshun Li, Kan Yu:
Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things. WASA (1) 2022: 40-51 - 2021
- [j8]Kan Yu
, Biwei Yan, Jiguo Yu
, Honglong Chen, Anming Dong
:
Methods of improving Secrecy Transmission Capacity in wireless random networks. Ad Hoc Networks 117: 102492 (2021) - [j7]Kan Yu
, Jiguo Yu
, Xiuzhen Cheng
, Dongxiao Yu
, Anming Dong
:
Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading. IEEE/ACM Trans. Netw. 29(6): 2508-2521 (2021) - [c4]Xiaowu Liu, Wenshuo Ma, Jiguo Yu, Kan Yu, Jiaqi Xiang:
A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks. WASA (2) 2021: 303-313 - 2020
- [j6]Kan Yu, Jiguo Yu
, Anming Dong, Guangshun Li
:
Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading. IEEE Access 8: 103245-103255 (2020) - [j5]Jiguo Yu
, Kan Yu, Dongxiao Yu
, Weifeng Lv
, Xiuzhen Cheng
, Honglong Chen, Wei Cheng:
Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference. IEEE Trans. Wirel. Commun. 19(8): 5621-5634 (2020)
2010 – 2019
- 2019
- [j4]Kan Yu, Yinglong Wang, Jiguo Yu
, Dongxiao Yu, Xiuzhen Cheng, Zhiguang Shan:
Localized and distributed link scheduling algorithms in IoT under rayleigh fading. Comput. Networks 151: 232-244 (2019) - 2018
- [j3]Kan Yu, Guangshun Li, Jiguo Yu, Lina Ni:
Methods of increasing two-way transmission capacity of wireless ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018: 301 (2018) - 2017
- [j2]Kan Yu, Meng Gao, Honglu Jiang
, Guangshun Li:
Multi-leader election in dynamic sensor networks. EURASIP J. Wirel. Commun. Netw. 2017: 187 (2017) - [j1]Lina Ni, Jinquan Zhang
, Changjun Jiang, Chungang Yan, Kan Yu:
Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets. IEEE Internet Things J. 4(5): 1216-1228 (2017) - [c3]Kan Yu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song:
Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks. WCNC 2017: 1-6 - 2016
- [c2]Meng Gao, Jiguo Yu, Kan Yu:
Multi-leader Election in Dynamic Sensor Networks. IIKI 2016: 144-149 - 2015
- [c1]Kan Yu, Zhi Li, Qiang Li, Jiguo Yu
:
A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model. WASA 2015: 706-714
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-16 02:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint