Zhou Zhong

According to our database1, Zhou Zhong authored at least 27 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels.
Frontiers Inf. Technol. Electron. Eng., December, 2023

GaussTS: Towards Time Series Data Management in OpenGauss.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
CSI-Based Physical Layer Authentication via Deep Learning.
IEEE Wirel. Commun. Lett., 2022

Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel.
IEEE Wirel. Commun. Lett., 2022

DOA Estimation Algorithm for Reconfigurable Intelligent Surface Co-Prime Linear Array Based on Multiple Signal Classification Approach.
Inf., 2022

Multi-path separation and parameter estimation by single DMA in fading channel.
IET Commun., 2022

2021
Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

2020
Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks.
Sci. China Inf. Sci., 2020

Separating Multi-Stream Signals Based on Space-Time Isomerism.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

2019
Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks.
KSII Trans. Internet Inf. Syst., 2019

Robust Secrecy Energy Efficiency Optimization for Wireless Powered Heterogeneous Networks Using Distributed ADMM Algorithm.
IEEE Access, 2019

Secret Key Generation With Cross Multiplication of Two-Way Random Signals.
IEEE Access, 2019

2018
Overview of 5G security technology.
Sci. China Inf. Sci., 2018

Resource Allocation for Secure Communication in K -Tier Heterogeneous Cellular Networks: A Spatial-Temporal Perspective.
IEEE Access, 2018

Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

High-Rate Secret Key Generation Method Using Two-Way Random Signal.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Secret key generation based on private pilot under man-in-the-middle attack.
Sci. China Inf. Sci., 2017

Physical layer security in IoT: A spatial-temporal perspective.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

2016
Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Analysis on Physical-Layer Security for Internet of Things in Ultra Dense Heterogeneous Networks.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
Robust Artificial Noise Aided Transmit Method for Multicast MISO Wiretap Channels with Imperfect Covariance-Based CSI.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2013
A Classified Normalized BP-Based Algorithm with 2-Dimensional Correction for LDPC Codes.
J. Commun., 2013

Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2013

Enhancing applications interoperability in context management for practice tasks.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

2012
Metadata Management of Context Resources in Context-Aware Middleware System.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

SOCOM: Multi-sensor Oriented Context Model Based on Ontologies.
Proceedings of the 2012 Eighth International Conference on Intelligent Environments, 2012

2011
Dynamic Context Modeling based FCA in Context-aware Middleware.
Proceedings of the ICEIS 2011, 2011


  Loading...