关注
Fei Tong
Fei Tong
在 seu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Throughput modeling and analysis of random access in narrowband Internet of Things
Y Sun, F Tong, Z Zhang, S He
IEEE Internet of Things Journal 5 (3), 1485-1493, 2017
662017
A geometrical-based throughput bound analysis for device-to-device communications in cellular networks
M Ni, L Zheng, F Tong, J Pan, L Cai
IEEE Journal on Selected Areas in Communications 33 (1), 100-110, 2014
572014
On positioning performance for the narrow-band Internet of Things: How participating eNBs impact?
F Tong, Y Sun, S He
IEEE Transactions on Industrial Informatics 15 (1), 423-433, 2018
412018
Detecting the dangerous area of toxic gases with wireless sensor networks
L Shu, Y Chen, Z Sun, F Tong, M Mukherjee
IEEE Transactions on Emerging Topics in Computing 8 (1), 137-147, 2017
382017
Enhancing energy efficiency via cooperative MIMO in wireless sensor networks: State of the art and future research directions
Y Peng, F Al-Hazemi, R Boutaba, F Tong, IS Hwang, CH Youn
IEEE Communications Magazine 55 (11), 47-53, 2017
362017
A pipelined-forwarding, routing-integrated and effectively-identifying MAC for large-scale WSN
F Tong, M Ni, L Shu, J Pan
2013 IEEE Global Communications Conference (GLOBECOM), 225-230, 2013
352013
P-MAC: A cross-layer duty cycle MAC protocol towards pipelining for wireless sensor networks
F Tong, W Tang, R Xie, L Shu, YC Kim
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
342011
Disaster management and response for modern cellular networks using flow-based multi-hop device-to-device communications
M Tanha, D Sajjadi, F Tong, J Pan
2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), 1-7, 2016
332016
A node-grade based AODV routing protocol for wireless sensor network
F Tong, W Tang, LM Peng, R Xie, WH Yang, YC Kim
2010 Second International Conference on Networks Security, Wireless …, 2010
332010
A probabilistic distance-based modeling and analysis for cellular networks with underlaying device-to-device communications
F Tong, Y Wan, L Zheng, J Pan, L Cai
IEEE Transactions on Wireless Communications 16 (1), 451-463, 2016
292016
One handshake can achieve more: An energy-efficient, practical pipelined data collection for duty-cycled sensor networks
F Tong, R Zhang, J Pan
IEEE Sensors Journal 16 (9), 3308-3322, 2016
292016
Modeling and analyzing duty-cycling pipelined-scheduling MAC for linear sensor networks
F Tong, L Zheng, M Ahmadi, M Ni, J Pan
IEEE Transactions on Vehicular Technology 65 (4), 2608-2620, 2015
232015
A cross-layer duty cycle MAC protocol supporting a pipeline feature for wireless sensor networks
F Tong, R Xie, L Shu, YC Kim
Sensors 11, 5183-5201, 2011
232011
CCAP: a complete cross-domain authentication based on blockchain for Internet of Things
F Tong, X Chen, K Wang, Y Zhang
IEEE Transactions on Information Forensics and Security 17, 3789-3800, 2022
222022
Resilient privacy-preserving distributed localization against dishonest nodes in Internet of Things
X Shi, F Tong, WA Zhang, L Yu
IEEE Internet of Things Journal 7 (9), 9214-9223, 2020
212020
Random-to-random nodal distance distributions in finite wireless networks
F Tong, J Pan
IEEE Transactions on Vehicular Technology 66 (11), 10070-10083, 2017
192017
An IRS-aided GSSK scheme for wireless communication system
C Zhang, Y Peng, J Li, F Tong
IEEE Communications Letters 26 (6), 1398-1402, 2022
182022
A new approach to the directed connectivity in two-dimensional lattice networks
L Zhang, L Cai, J Pan, F Tong
IEEE Transactions on Mobile Computing 13 (11), 2458-2472, 2014
182014
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT
Y Zhang, Y Luo, X Chen, F Tong, Y Xu, J Tao, G Cheng
Security and Communication Networks 2022, 2022
172022
Performance analysis for two-tier cellular systems based on probabilistic distance models
M Ahmadi, F Tong, L Zheng, J Pan
2015 IEEE Conference on Computer Communications (INFOCOM), 352-360, 2015
162015
系统目前无法执行此操作,请稍后再试。
文章 1–20