1. J. Du, C. Jiang, H. Zhang, X. Wang, and M. Debbah, “Secure satellite-terrestrial transmission over incumbent terrestrial networks via cooperative beamforming,” IEEE Journal on Selected Areas in Communications, vol. PP, no. 99, pp. 1–1, 2018.
2. C.-H. Tsang, S. Kwong, and H. Wang, “Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection,” Pattern Recognition, vol. 40, no. 9, pp. 2373–2391, 2007. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0031320306005218
3. J. Wang, C. Jiang, H. Zhu, R. Yong, and L. Hanzo, “Internet of vehicles: Sensing aided transportation information collection and diffusion,” IEEE Transactions on Vehicular Technology, vol. 67, no. 5, pp. 3813–3825, 2018.
4. J. Wang, C. Jiang, H. Zhang, Z. Xin, V. C. M. Leung, and L. Hanzo, “Learning-aided network association for hybrid indoor lifi-wifi systems,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2017.
5. J. Du, C. Jiang, K. C. Chen, R. Yong, H. V. Poor, J. Du, C. Jiang, K. C. Chen, R. Yong, and H. V. Poor, “Community-structured evolutionary game for privacy protection in social networks,” IEEE Transactions on Information Forensics & Security, vol. 13, no. 3, pp. 574–589, 2018.