default search action
Tongtong Li
Person information
- affiliation: Michigan State University, East Lansing, MI, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Boxin Sun, Jinxian Deng, Norman Scheel, David C. Zhu, Jian Ren, Rong Zhang, Tongtong Li:
Causalized Convergent Cross Mapping and Its Implementation in Causality Analysis. Entropy 26(7): 539 (2024) - [j65]Tongtong Li, Anne Gelb, Yoonsang Lee:
A structurally informed data assimilation approach for nonlinear partial differential equations. J. Comput. Phys. 519: 113396 (2024) - [j64]Ziyang Zhao, Lirong Teng, Tongtong Li, Yin Wang, Lingyu Zhang, Xia Liu, Rui Xie, Jing Yang, Zhijun Yao:
Age Effects on Spatiotemporal Patterns in Functional Brain Networks Over the Human Adult Lifespan. IEEE Trans. Comput. Soc. Syst. 11(2): 2570-2577 (2024) - [j63]Leilei Zhao, Dalin Zhu, Xiaomin Wang, Xia Liu, Tongtong Li, Boyang Wang, Zhijun Yao, Weihao Zheng, Bin Hu:
An Attention-Based Hemispheric Relation Inference Network for Perinatal Brain Age Prediction. IEEE J. Biomed. Health Informatics 28(8): 4483-4493 (2024) - [c85]Jian Ren, Tongtong Li:
Privacy-Preserving Characterization and Data Publishing. ICNC 2024: 549-553 - [c84]Jian Ren, Tongtong Li:
Graph Isomorphism-Characterization and Efficient Algorithms. ICNC 2024: 789-793 - [i12]Tongtong Li, Anne Gelb:
A Bayesian framework for spectral reprojection. CoRR abs/2406.15977 (2024) - 2023
- [j62]Tongtong Li, Jinxian Deng, Jian Ren:
Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design. IEEE Internet Things J. 10(3): 2658-2666 (2023) - [j61]Tongtong Li, Anne Gelb, Yoonsang Lee:
Improving numerical accuracy for the viscous-plastic formulation of sea ice. J. Comput. Phys. 487: 112184 (2023) - [j60]Tao Yang, Fang Xu, Shoujun Zhao, Tongtong Li, Zelin Yang, Yanbo Wang, Yuwang Liu:
A High-Certainty Visual Servo Control Method for a Space Manipulator with Flexible Joints. Sensors 23(15): 6679 (2023) - [j59]Yaofang Zhang, Zibo Wang, Yingzhou Wang, Kuan Lin, Tongtong Li, Hongri Liu, Chao Li, Bailing Wang:
A risk assessment model for similar attack scenarios in industrial control system. J. Supercomput. 79(14): 15955-15979 (2023) - [c83]Yu Zheng, David C. Zhu, Jian Ren, Taosheng Liu, Karl J. Friston, Tongtong Li:
A Mathematical Model for Neuronal Activity and Brain Information Processing Capacity. ICASSP 2023: 1-5 - [c82]Jian Ren, Jian Li, Tongtong Li:
Optimal Codes for Distributed Storage. ICNC 2023: 42-46 - [c81]Tongtong Li, Jinxian Deng, Jian Ren:
Can We Have a Better System than OFDM? ICNC 2023: 383-387 - [c80]Sergio Caucao, Aashi Dalal, Tongtong Li, Ivan Yotov:
Mixed Finite Element Methods for the Navier-Stokes-Biot Model. LSSC 2023: 19-31 - [c79]Tongtong Li, Liang Tao, Xiongfeng Deng, Binzi Xu:
Adaptive Control of PMSM Based on Nonlinear Disturbance Observe. RICAI 2023: 560-564 - [i11]Tongtong Li, Anne Gelb, Yoonsang Lee:
A Structurally Informed Data Assimilation Approach for Nonlinear Partial Differential Equations. CoRR abs/2309.02585 (2023) - 2022
- [j58]Jian Ren, Jian Li, Tongtong Li, Matt W. Mutka:
Feasible Region of Secure and Distributed Data Storage in Adversarial Networks. IEEE Internet Things J. 9(11): 8980-8988 (2022) - [j57]Sergio Caucao, Tongtong Li, Ivan Yotov:
A multipoint stress-flux mixed finite element method for the Stokes-Biot model. Numerische Mathematik 152(2): 411-473 (2022) - [j56]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. IEEE Trans. Serv. Comput. 15(3): 1592-1605 (2022) - [i10]Tongtong Li, Anne Gelb, Yoonsang Lee:
Improving numerical accuracy for the viscous-plastic formulation of sea ice. CoRR abs/2206.10061 (2022) - [i9]Tongtong Li, Sergio Caucao, Ivan Yotov:
An augmented fully-mixed formulation for the quasistatic Navier-Stokes-Biot model. CoRR abs/2209.02894 (2022) - 2021
- [j55]Hao Li, Junyao Hou, Ziyu Chen, Jingyu Zeng, Yu Ni, Yayu Li, Xia Xiao, Yaqi Zhou, Ning Zhang, Deyu Long, Hongfei Liu, Luyu Yang, Xinyue Bai, Qun Li, Tongtong Li, Dongxue Che, Leijie Li, Xiaodan Wang, Peng Zhang, Mingzhi Liao:
FifBase: a comprehensive fertility-associated indicators factor database for domestic animals. Briefings Bioinform. 22(5) (2021) - [j54]Qiang Lin, Chuangui Cao, Tongtong Li, Zhengxing Man, Yongchun Cao, Haijun Wang:
dSPIC: a deep SPECT image classification network for automated multi-disease, multi-lesion diagnosis. BMC Medical Imaging 21(1): 122 (2021) - [j53]Ehab Zaghloul, Tongtong Li, Jian Ren:
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting. IEEE Internet Things J. 8(22): 16585-16597 (2021) - [j52]Qiang Lin, Tongtong Li, P. Mohamed Shakeel, R. Dinesh Jackson Samuel:
Advanced artificial intelligence in heart rate and blood pressure monitoring for stress management. J. Ambient Intell. Humaniz. Comput. 12(3): 3329-3340 (2021) - [j51]Bo Gu, Jianxun Liu, Huiyuan Xiong, Tongtong Li, Yuelong Pan:
ECPC-ICP: A 6D Vehicle Pose Estimation Method by Fusing the Roadside Lidar Point Cloud and Road Feature. Sensors 21(10): 3489 (2021) - 2020
- [j50]Tongtong Li, Wencai Zhao:
Periodic Solution of a Neutral Delay Leslie Predator-Prey Model and the Effect of Random Perturbation on the Smith Growth Model. Complex. 2020: 8428269:1-8428269:15 (2020) - [j49]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J. 7(10): 10288-10313 (2020) - [j48]Yuan Liang, Jian Ren, Tongtong Li:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 15: 738-752 (2020) - [j47]Yuan Liang, Tongtong Li:
On the Discreteness of the Worst Jamming Distribution for SP-OFDM. IEEE Trans. Inf. Forensics Secur. 15: 2884-2897 (2020) - [j46]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. IEEE Trans. Inf. Theory 66(7): 3957-3975 (2020) - [c78]Ehab Zaghloul, Tongtong Li, Jian Ren:
Anonymous and Coercion-Resistant Distributed Electronic Voting. ICNC 2020: 389-393 - [c77]Yuan Liang, Jian Ren, Tongtong Li:
Secure and Efficient OFDM System Design under Disguised Jamming. ICNC 2020: 394-399 - [i8]Tongtong Li, Xing Wang, Ivan Yotov:
Non-Newtonian and poroelastic effects in simulations of arterial flows. CoRR abs/2010.14072 (2020) - [i7]Tongtong Li, Ivan Yotov:
A mixed elasticity formulation for fluid-poroelastic structure interaction. CoRR abs/2011.00132 (2020) - [i6]Sergio Caucao, Tongtong Li, Ivan Yotov:
A multipoint stress-flux mixed finite element method for the Stokes-Biot model. CoRR abs/2011.01396 (2020)
2010 – 2019
- 2019
- [j45]Dongxiao Gu, Tongtong Li, Xiaoyu Wang, Xuejie Yang, Zhangrui Yu:
Visualizing the intellectual structure and evolution of electronic health and telemedicine research. Int. J. Medical Informatics 130 (2019) - [c76]Yuan Liang, Yunhao Liu, Jian Ren, Tongtong Li:
Malicious Link Detection in Multi-Hop Wireless Sensor Networks. GLOBECOM 2019: 1-6 - [c75]Tongtong Li:
Application Experience of Human-Computer Interaction in Educational Management at Colleges and Universities. HCI (20) 2019: 428-443 - [c74]Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. ICNC 2019: 375-379 - [c73]Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. ICNC 2019: 509-514 - [i5]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. CoRR abs/1904.11432 (2019) - [i4]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. CoRR abs/1904.11435 (2019) - 2018
- [b1]Tongtong Li, Tianlong Song, Yuan Liang:
Wireless Communications under Hostile Jamming: Security and Efficiency. Springer 2018, ISBN 978-981-13-0820-8, pp. 1-219 - [j44]Zhe Wang, Yuan Liang, David C. Zhu, Tongtong Li:
The Relationship of Discrete DCM and Directed Information in fMRI-Based Causality Analysis. IEEE Trans. Mol. Biol. Multi Scale Commun. 4(1): 3-13 (2018) - [j43]Yuan Liang, Tongtong Li:
End-to-End Throughput in Multihop Wireless Networks With Random Relay Deployment. IEEE Trans. Signal Inf. Process. over Networks 4(3): 613-625 (2018) - [j42]Jian Li, Tongtong Li, Jian Ren, Han-Chieh Chao:
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks. Wirel. Commun. Mob. Comput. 2018: 3473910:1-3473910:13 (2018) - [c72]M. H. Afifi, Ehab Zaghloul, Tongtong Li, Jian Ren:
UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing. GLOBECOM 2018: 1-6 - [c71]Yuan Liang, Jian Ren, Tongtong Li:
The Worst Jamming Distribution for Securely Precoded OFDM. GLOBECOM 2018: 1-6 - [c70]Zhe Wang, Yu Zheng, Michael Jigo, Taosheng Liu, Jian Ren, Zhi Tian, Tongtong Li:
Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data. GLOBECOM 2018: 1-6 - [c69]Ehab Zaghloul, Tongtong Li, Jian Ren:
An Attribute-Based Distributed Data Sharing Scheme. GLOBECOM 2018: 1-6 - [c68]Kai Zhou, Jian Ren, Tongtong Li:
Security and Privacy Enhancement for Outsourced Biometric Identification. GLOBECOM 2018: 1-5 - [c67]Yuan Liang, Yu Zheng, Jian Ren, Tongtong Li:
End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment. ICNC 2018: 513-517 - [c66]Tongtong Li, Dongxiao Gu, Xiaoyu Wang, Changyong Liang:
Visualizing the Intellectual Structure of Electronic Health Research: A Bibliometric Analysis. ICSH 2018: 315-324 - 2017
- [j41]Run Tian, Yuan Liang, Xuezhi Tan, Tongtong Li:
Overlapping User Grouping in IoT Oriented Massive MIMO Systems. IEEE Access 5: 14177-14186 (2017) - [j40]Di Tang, Tongtong Li, Jian Ren:
Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(3-4): 281-300 (2017) - [j39]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks. IEEE Trans. Inf. Theory 63(7): 4414-4429 (2017) - [j38]Mai Abdelhakim, Yuan Liang, Tongtong Li:
Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis. IEEE Trans. Signal Inf. Process. over Networks 3(1): 172-186 (2017) - [c65]Run Tian, Yuan Liang, Tongtong Li:
Overlapping user grouping in IoT oriented massive MIMO systems. ICNC 2017: 255-259 - [c64]Tianlong Song, Yuan Liang, Tongtong Li:
Physical layer security of multiband communications under hostile jamming. ICNC 2017: 346-350 - [i3]Zhe Wang, Yu Zheng, David C. Zhu, Jian Ren, Tongtong Li:
Discrete Dynamic Causal Modeling and Its Relationship with Directed Information. CoRR abs/1709.06134 (2017) - 2016
- [j37]Yunfei Lv, Tongtong Li, Yongzhen Pei, Rong Yuan:
A complete analysis of the global dynamics of a diffusive predator and toxic prey model. Appl. Math. Comput. 291: 182-196 (2016) - [j36]Mai Abdelhakim, Yuan Liang, Tongtong Li:
Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions. IEEE J. Sel. Areas Commun. 34(5): 1663-1675 (2016) - [j35]Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:
Anonymous communication in overlay networks. Secur. Commun. Networks 9(3): 229-240 (2016) - [j34]Zhe Wang, Ahmed Alahmadi, David C. Zhu, Tongtong Li:
Causality Analysis of fMRI Data Based on the Directed Information Theory Framework. IEEE Trans. Biomed. Eng. 63(5): 1002-1015 (2016) - [j33]Tianlong Song, Wayne E. Stark, Tongtong Li, Jitendra K. Tugnait:
Optimal Multiband Transmission Under Hostile Jamming. IEEE Trans. Commun. 64(9): 4013-4027 (2016) - [j32]Tianlong Song, Kai Zhou, Tongtong Li:
CDMA System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 11(11): 2487-2498 (2016) - [c63]Yuan Liang, Tianlong Song, Tongtong Li:
Energy efficient multi-hop wireless backhaul in heterogeneous cellular networks. GlobalSIP 2016: 625-629 - [c62]Zhe Wang, Tianlong Song, Yuan Liang, Tongtong Li:
Error probability analysis for LDA-Bayesian based classification of Alzheimer's disease and normal control subjects. GlobalSIP 2016: 1156-1160 - [c61]Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li:
Robust CDMA receiver design under disguised jamming. ICASSP 2016: 2179-2183 - 2015
- [j31]Zhaoxi Fang, Tianlong Song, Tongtong Li:
Energy Harvesting for Two-Way OFDM Communications under Hostile Jamming. IEEE Signal Process. Lett. 22(4): 413-416 (2015) - [j30]Ahmed Alahmadi, Zhaoxi Fang, Tianlong Song, Tongtong Li:
Subband PUEA Detection and Mitigation in OFDM-Based Cognitive Radio Networks. IEEE Trans. Inf. Forensics Secur. 10(10): 2131-2142 (2015) - [j29]Di Tang, Tongtong Li, Jian Ren, Jie Wu:
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 960-973 (2015) - [c60]Mai Abdelhakim, Zhaoxi Fang, Jian Ren, Tongtong Li:
Hybrid mobile access coordinated wireless sensor networks - Design and analysis. ChinaSIP 2015: 453-457 - [c59]Zhe Wang, Ahmed Alahmadi, David C. Zhu, Tongtong Li:
Brain functional connectivity analysis using mutual information. GlobalSIP 2015: 542-546 - [c58]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Reliable Communications over Multihop Networks under Routing Attacks. GLOBECOM 2015: 1-6 - [c57]Jian Li, Tongtong Li, Jian Ren:
Rate-matched regenerating code in hostile networks. ICC 2015: 5728-5732 - [i2]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. CoRR abs/1510.01292 (2015) - [i1]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks. CoRR abs/1511.02378 (2015) - 2014
- [j28]Tianlong Song, Tongtong Li, Jitendra K. Tugnait:
Spectrally Efficient Multicarrier Transmission With Message-Driven Subcarrier Selection. IEEE Trans. Commun. 62(7): 2444-2455 (2014) - [j27]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 9(5): 772-781 (2014) - [j26]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE Trans. Parallel Distributed Syst. 25(4): 950-959 (2014) - [j25]Tongtong Li, Mai Abdelhakim, Jian Ren:
N-Hop networks: a general framework for wireless systems. IEEE Wirel. Commun. 21(2): 98-105 (2014) - [c56]Ahmed Alahmadi, Tianlong Song, Tongtong Li:
Sub-band detection of primary user emulation attacks in OFDM-based cognitive radio networks. GlobalSIP 2014: 1165-1169 - [c55]Jian Li, Tongtong Li, Jian Ren:
Secure regenerating code. GLOBECOM 2014: 770-774 - [c54]Tianlong Song, Zhaoxi Fang, Jian Ren, Tongtong Li:
Precoding for OFDM under disguised jamming. GLOBECOM 2014: 3958-3963 - [c53]Mai Abdelhakim, Jian Ren, Tongtong Li:
Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. GLOBECOM 2014: 4616-4621 - [c52]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS bound in distributed cloud storage. INFOCOM 2014: 307-315 - [c51]Tongtong Li, Zhangguo Yu, Juan Chen, Yan Liu, Maoxing Zheng, Libo Meng, Gan Ma, Wen Zhang, Weimin Zhang, Qiang Huang:
Stability control for biped walking based on phase modification during double support period. ROBIO 2014: 1290-1295 - 2013
- [j24]Lei Zhang, Huahui Wang, Tongtong Li:
Anti-Jamming Message-Driven Frequency Hopping - Part I: System Design. IEEE Trans. Wirel. Commun. 12(1): 70-79 (2013) - [j23]Lei Zhang, Tongtong Li:
Anti-Jamming Message-Driven Frequency Hopping - Part II: Capacity Analysis Under Disguised Jamming. IEEE Trans. Wirel. Commun. 12(1): 80-88 (2013) - [c50]Jian Li, Tongtong Li, Jian Ren:
Combating network pollution attacks: A cascaded error-control coding approach. GLOBECOM 2013: 844-848 - [c49]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. GLOBECOM 2013: 3229-3234 - [c48]Tianlong Song, Tongtong Li:
A highly efficient multi-carrier transmission scheme with message-driven idle subcarriers. GLOBECOM 2013: 3608-3613 - [c47]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - [c46]Zhangguo Yu, Yan Liu, Qiang Huang, Xuechao Chen, Wen Zhang, Jing Li, Gan Ma, Libo Meng, Tongtong Li, Weimin Zhang:
Design of a humanoid ping-pong player robot with redundant joints. ROBIO 2013: 911-916 - 2012
- [j22]Lei Zhang, Jian Ren, Tongtong Li:
Time-Varying Jamming Modeling and Classification. IEEE Trans. Signal Process. 60(7): 3902-3907 (2012) - [j21]Tongtong Li, Jian Ren, Xiaochen Tang:
Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wirel. Commun. 19(3): 66-73 (2012) - [j20]Tingting Jiang, Tongtong Li, Jian Ren:
Toward secure cognitive communications in wireless networks. IEEE Wirel. Commun. 19(4): 82-88 (2012) - [c45]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071 - [c44]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable OFDM system design under hostile multi-tone jamming. GLOBECOM 2012: 4290-4295 - [c43]Di Tang, Tongtong Li, Jian Ren:
Quantitative security and efficiency analysis of SEAR in wireless sensor networks. ICC 2012: 944-948 - [c42]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper). WASA 2012: 206-217 - 2011
- [j19]Huahui Wang, Lei Zhang, Tongtong Li, Jitendra K. Tugnait:
Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping. IEEE Trans. Wirel. Commun. 10(3): 728-732 (2011) - [c41]Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li:
Cooperative sensing in cognitive networks under malicious attack. ICASSP 2011: 3004-3007 - [c40]Mai Abdelhakim, Leonard E. Lightfoot, Tongtong Li:
Reliable data fusion in wireless sensor networks under Byzantine attacks. MILCOM 2011: 810-815 - 2010
- [j18]Jian Ren, Yun Li, Tongtong Li:
SPM: Source Privacy for Mobile Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j17]Huahui Wang, Tongtong Li:
Stability Analysis of Hybrid ALOHA. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c39]Leonard E. Lightfoot, Lei Zhang, Tongtong Li:
Performance of QO-STBC-OFDM in partial-band noise jamming. CISS 2010: 1-6 - [c38]Huahui Wang, Leonard E. Lightfoot, Tongtong Li:
On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks. CISS 2010: 1-6 - [c37]Huahui Wang, Jian Ren, Tongtong Li:
Resource Allocation with Load Balancing for Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c36]Huahui Wang, Tongtong Li:
Code-controlled 3D frequency hopping for jamming mitigation. ICASSP 2010: 3466-3469 - [c35]Lei Zhang, Huahui Wang, Tongtong Li:
Jamming resistance reinforcement of message-driven frequency hopping. ICASSP 2010: 3974-3977 - [c34]Lei Zhang, Jian Ren, Tongtong Li:
A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping. WASA 2010: 235-244
2000 – 2009
- 2009
- [j16]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j15]Qi Ling, Tongtong Li:
Message-driven frequency hopping: Design and analysis. IEEE Trans. Wirel. Commun. 8(4): 1773-1782 (2009) - [c33]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. EIT 2009: 260-265 - [c32]Lei Zhang, Jian Ren, Tongtong Li:
Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping. GLOBECOM 2009: 1-6 - [c31]Leonard E. Lightfoot, Tongtong Li:
Jamming mitigation using space-time coded collision-free frequency hopping. ICASSP 2009: 2717-2720 - [c30]Jian Ren, Yun Li, Tongtong Li:
Routing-Based Source-Location Privacy in Wireless Sensor Networks. ICC 2009: 1-5 - [c29]Lei Zhang, Jian Ren, Tongtong Li:
Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping. ICC 2009: 1-5 - [c28]Jian Ren, Yun Li, Tongtong Li:
Providing Source Privacy in Mobile Ad Hoc Networks. MASS 2009: 332-341 - [c27]Lei Zhang, Tongtong Li:
Spectrally Efficient Frequency Hopping System Design under Hostile Jamming. WASA 2009: 408-417 - 2008
- [j14]Qi Ling, Tongtong Li:
Blind-Channel Estimation for MIMO Systems With Structured Transmit Delay Scheme. IEEE Trans. Circuits Syst. I Regul. Pap. 55-I(8): 2344-2355 (2008) - [c26]Jian Ren, Tongtong Li, Keesook Han:
Anonymous Communication Protocol in Overlay Networks. ICC 2008: 1648-1652 - [c25]Qi Ling, Jian Ren, Tongtong Li:
Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping. ICC 2008: 4775-4779 - [c24]Qi Ling, Jian Ren, Tongtong Li:
Message-Driven Frequency Hopping - Design and Analysis. WASA 2008: 373-384 - 2007
- [j13]Tongtong Li, Qi Ling, Jian Ren:
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [j12]Tongtong Li, Ling Qi, Zhi Ding:
Transmit Delay Structure Design for Blind Channel Estimation over Multipath Channels. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [j11]Tongtong Li, Huahui Wang, Qi Ling:
Source-Aware Nonuniform Information Transmission for Minimum Distortion. IEEE Signal Process. Lett. 14(2): 85-88 (2007) - [j10]Huahui Wang, Tongtong Li:
Hybrid ALOHA: A Novel MAC Protocol. IEEE Trans. Signal Process. 55(12): 5821-5832 (2007) - [j9]Huahui Wang, Tongtong Li:
Channel Tracking and Signal Detection for MC-CDMA in a Time-Varying Environment. IEEE Trans. Veh. Technol. 56(6): 3613-3620 (2007) - [c23]Qi Ling, Tongtong Li:
A Spectrally Efficient Frequency Hopping Scheme. CISS 2007: 190-195 - [c22]Huahui Wang, Tongtong Li:
On the Stability of Hybrid ALOHA. CISS 2007: 570-575 - [c21]Tongtong Li, Qi Ling, Jian Ren:
A Spectrally Efficient Frequency Hopping System. GLOBECOM 2007: 2997-3001 - [c20]Qi Ling, Tongtong Li, Zhi Ding:
A Novel Concept: Message Driven Frequency Hopping (MDFH). ICC 2007: 5496-5501 - 2006
- [c19]Qi Ling, Tongtong Li:
Efficiency Improvement for Alamouti Codes. CISS 2006: 569-572 - [c18]Huahui Wang, Tongtong Li:
Source-Aware Non-Uniform Transmission for Minimum Distortion. CISS 2006: 1440-1445 - [c17]Gokul Swamy, Qi Ling, Tongtong Li, Ramakrishna Mukkamala:
Blind Identification of the Central Aortic Pressure Waveform from Multiple Peripheral Arterial Pressure Waveforms. EMBC 2006: 1822-1825 - [c16]Huahui Wang, Tongtong Li:
Signal Detection and Abrupt-Channel Tracking for MC-CDMA. ICASSP (4) 2006: 21-24 - [c15]Tongtong Li, Huahui Wang, Lang Tong:
Hybrid Aloha: A Novel Medium Access Control Protocol. ICASSP (4) 2006: 257-260 - [c14]Qi Ling, Tongtong Li:
Blind MIMO Channel Estimation Based on Structured Transmit Delay. ICASSP (4) 2006: 761-764 - [c13]Huahui Wang, Tongtong Li:
Channel Tracking and Signal Detection for MC-CDMA in Time-Varying Environment. ICC 2006: 5564-5569 - [c12]Tongtong Li, Huahui Wang, Jian Ren:
Non-uniform Information Transmission for Minimum Distortion in Wireless Networks. WASA 2006: 394-403 - 2005
- [j8]Tongtong Li, Weiguo Liang, Zhi Ding, Jitendra K. Tugnait:
Blind Multiuser Detection for Long-Code CDMA Systems with Transmission-Induced Cyclostationarity. EURASIP J. Wirel. Commun. Netw. 2005(2): 206-215 (2005) - [j7]Weiguo Liang, Tongtong Li, Jitendra K. Tugnait:
Blind detection of multirate asynchronous CDMA signals using super-exponential methods. IEEE Signal Process. Lett. 12(3): 218-221 (2005) - [c11]Qi Ling, Tongtong Li:
Blind channel estimation for MIMO systems with structured transmit delay diversity. GLOBECOM 2005: 5 - [c10]Qi Ling, Tongtong Li, Jian Ren:
Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. GLOBECOM 2005: 5 - [c9]Tongtong Li, Qi Ling, Zhi Ding:
Space-time diversity design for blind estimation and equalization over frequency selective channels. ICASSP (3) 2005: 441-444 - 2004
- [j6]Jitendra K. Tugnait, Hui Liu, Guang Gong, Tongtong Li:
Editorial. EURASIP J. Wirel. Commun. Netw. 2004(1): 1-3 (2004) - [j5]Tongtong Li, Jitendra K. Tugnait:
Super-exponential methods for blind detection of asynchronous CDMA signals over multipath channels. IEEE Trans. Wirel. Commun. 3(5): 1379-1385 (2004) - [c8]Jian Ren, Tongtong Li:
Design of pseudo-random spreading sequences for CDMA systems. GLOBECOM 2004: 775-779 - [c7]Tongtong Li, Zhi Ding, Jitendra K. Tugnait, Weiguo Liang:
Channel identification and signal separation for long-code CDMA systems using multistep linear prediction method. ICC 2004: 2437-2441 - 2003
- [c6]Tongtong Li, Jitendra K. Tugnait, Zhi Ding:
Channel estimation of long-code CDMA systems utilizing transmission induced cyclostationarity. ICASSP (4) 2003: 105-108 - 2002
- [c5]Tongtong Li, Jitendra K. Tugnait:
Further results on blind detection of asynchronous CDMA signals using code-constrained super-exponential algorithm. ICASSP 2002: 2229-2232 - 2001
- [j4]Jitendra K. Tugnait, Tongtong Li:
A multistep linear prediction approach to blind asynchronous CDMA channel estimation and equalization. IEEE J. Sel. Areas Commun. 19(6): 1090-1102 (2001) - [j3]Jitendra K. Tugnait, Tongtong Li:
Blind asynchronous multiuser CDMA receivers for ISI channels using code-aided CMA. IEEE J. Sel. Areas Commun. 19(8): 1520-1530 (2001) - [j2]Jitendra K. Tugnait, Tongtong Li:
Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion. IEEE Trans. Signal Process. 49(7): 1300-1309 (2001) - [c4]Tongtong Li, Jitendra K. Tugnait:
Further results on blind asynchronous CDMA receivers using code-constrained inverse filter criterion. ICASSP 2001: 2293-2296 - [c3]Tongtong Li, Jitendra K. Tugnait:
Super-exponential methods for blind detection of asynchronous CDMA signals over multipath channels. ICC 2001: 816-820 - 2000
- [c2]Jitendra K. Tugnait, Tongtong Li:
Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criteria. ICASSP 2000: 2461-2464 - [c1]Tongtong Li, Jitendra K. Tugnait:
A multistep linear prediction approach to blind asynchronous CDMA channel estimation and equalization. ICASSP 2000: 2925-2928
1990 – 1999
- 1999
- [j1]Tongtong Li, Zhi Ding:
Joint transmitter-receiver optimization for partial response channels based on nonmaximally decimated filterbank precoding technique. IEEE Trans. Signal Process. 47(9): 2407-2414 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint