![]() |
- 31. L. Xu, C. Jiang, Y. Chen, J. Wang, and Y. Ren, "A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining," IEEE Computer, vol.49, no.2, pp.54-62, 2016.
- 32. C. Jiang, X. Wang, J. Wang, H. Chen, and Y. Ren, "Security in space information networks," IEEE Communications Magazine, vol.53, no.8, pp. 82–88, Aug. 2015.
- 33. H. Xu, R. Blum, J. Wang, and J. Yuan, "Collocated MIMO radar waveform design for transmit beampattern formation," IEEE Transactions on Aerospace and Electronic Systems, vol.51, no.2, pp.1558-1568, Apr. 2015.
- 34. J. Wang, J. Mu, S. Wei, C. Jiang, and N. Beaulieu, "Statistical Characterization of Decryption Errors in Block-Ciphered Systems," IEEE Transactions on Communications, vol. 63, no. 11, pp. 4363-4376, Nov. 2015.
- 35. L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information Security in Big Data: Privacy and Data Mining," IEEE Access, vol.2, pp.1149-1176, Oct. 2014.
- 36. S. Wei, J. Wang, R. Yin, and J. Yuan, "Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts," IEEE Transactions on Information Forensics and Security, vol.8, no.4, pp.636-645, Apr. 2013.
- 37. Y. Khiabani, S. Wei, J. Yuan, and J. Wang, "Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise," IEEE Transactions on Information Forensics and Security, vol.7, no.5, pp.1604-1613, Oct. 2012.
- 38. G. Su, J. Jin, Y. Gu, and J. Wang, "Performance Analysis of l0 Norm Constraint Least Mean Square Algorithm," IEEE Transactions on Signal Processing, vol.60, no.5, pp.2223-2235, May 2012.