Selected Publications
- [31] 31. L. Xu, C. Jiang, Y. Chen, J. Wang, and Y. Ren, "A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining," IEEE Computer, vol.49, no.2, pp.54-62, 2016.
- [32] 32. C. Jiang, X. Wang, J. Wang, H. Chen, and Y. Ren, "Security in space information networks," IEEE Communications Magazine, vol.53, no.8, pp. 82–88, Aug. 2015.
- [33] 33. H. Xu, R. Blum, J. Wang, and J. Yuan, "Collocated MIMO radar waveform design for transmit beampattern formation," IEEE Transactions on Aerospace and Electronic Systems, vol.51, no.2, pp.1558-1568, Apr. 2015.
- [34] 34. J. Wang, J. Mu, S. Wei, C. Jiang, and N. Beaulieu, "Statistical Characterization of Decryption Errors in Block-Ciphered Systems," IEEE Transactions on Communications, vol. 63, no. 11, pp. 4363-4376, Nov. 2015.
- [35] 35. L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information Security in Big Data: Privacy and Data Mining," IEEE Access, vol.2, pp.1149-1176, Oct. 2014.
- [36] 36. S. Wei, J. Wang, R. Yin, and J. Yuan, "Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts," IEEE Transactions on Information Forensics and Security, vol.8, no.4, pp.636-645, Apr. 2013.
- [37] 37. Y. Khiabani, S. Wei, J. Yuan, and J. Wang, "Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise," IEEE Transactions on Information Forensics and Security, vol.7, no.5, pp.1604-1613, Oct. 2012.
- [38] 38. G. Su, J. Jin, Y. Gu, and J. Wang, "Performance Analysis of l0 Norm Constraint Least Mean Square Algorithm," IEEE Transactions on Signal Processing, vol.60, no.5, pp.2223-2235, May 2012.