[1]Ma H. Y., Niu N., Wu W. L., et al. Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint [J]. International Journal of Distributed Sensor Networks, 2015, 16(6): 1-10(SCI)
[2]Ma H. Y., Niu N. A Novel Framework for Achievable Secrecy Throughput of Distributed Cognitive Radio Wireless Networks [J]. Journal of Communications, 2015, 10(6), 403-409.(EI)
[3]Ma H. Y., Niu N., Wu W. L., et al. Secrecy Transmission Capacity of Primary Network with help of Cognitive Interferences [A]. // International Conference on Telecommunications (ICT), 2015, 2015: 21-25(EI)
[4]Ma H. Y., Niu N., Wu W. L. Rethinking the Achievable Throughput Formulation of Cognitive Radio Ad Hoc Networks [A]. // IEEE PIMRC 2014, Washington DC, America, 2014(9): 1249-1253. (EI)
[5] Fuming Sun, Xu E and Hongyu Ma, “Design and comparison of minimal symmetricmodel-subset for maneuvering target tracking”, Journal of Systems Engineering and Electronics, vol.21, issue 2, Apr.2010,268-272. (SCI 检索)
[6]Fuming Sun, Hongyu Ma, “Extended Symmetric Sampling Strategy for Unscented Kalman Filter”, 2009 IITA International Conference on Control, Automation and Systems Engineering, Jul.2009, 383-386. (EI 检索)
[7]Fuming Sun, Hongyu Ma, “Maneuvering Target Tracking Approaches Based on Turning Rate Estimation”, Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on, Nov.2009, 213-216. (EI 检索)
[8]参编教材一部:模拟电子技术基础学习指导,东北大学出版社,2007 年,(副主编)
|