Aiqun Hu

Orcid: 0000-0002-0398-4899

According to our database1, Aiqun Hu authored at least 170 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-Channel CNN-Based Open-Set RF Fingerprint Identification for LTE Devices.
IEEE Trans. Cogn. Commun. Netw., October, 2024

Wireless Channel Key Generation Based on Multisubcarrier Phase Difference.
IEEE Internet Things J., October, 2024

Hybrid RFF Identification for LTE Using Wavelet Coefficient Graph and Differential Spectrum.
IEEE Trans. Veh. Technol., August, 2024

Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments.
IEEE Trans. Veh. Technol., July, 2024

An Authentication Mechanism Based on Zero Trust With Radio Frequency Fingerprint for Internet of Things Networks.
IEEE Internet Things J., July, 2024

Data-and-Channel-Independent Radio Frequency Fingerprint Extraction for LTE-V2X.
IEEE Trans. Cogn. Commun. Netw., June, 2024

A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS.
IEEE Commun. Lett., April, 2024

Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels.
IEEE Trans. Wirel. Commun., March, 2024

Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation.
IEEE Wirel. Commun. Lett., February, 2024

Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications.
IEEE Wirel. Commun., February, 2024

Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis.
Symmetry, February, 2024

Real-World Aircraft Recognition Based on RF Fingerprinting With Few Labeled ADS-B Signals.
IEEE Trans. Veh. Technol., 2024

Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation.
IEEE Trans. Inf. Forensics Secur., 2024

RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Decentralized Functional Encryption for Inner Product.
IEEE Trans. Dependable Secur. Comput., 2024

Radio frequency fingerprint identification for Internet of Things: A survey.
Secur. Saf., 2024

Securing NextG networks with physical-layer key generation: A survey.
Secur. Saf., 2024

Preface: Security and safety in physical layer systems.
Secur. Saf., 2024

A channel resilient RFF extraction scheme for cyclic prefix contained systems.
Phys. Commun., 2024

A practical scheme for enhancing consistency and independence in wireless key generation for Wi-Fi networks.
Phys. Commun., 2024

A Robust Radio Frequency Fingerprint Extraction Method Based on Channel Reciprocity.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Joint Design of Balance Mechanism and Compensation Strategy in K-means Clustering Assisted Physical Layer Key Generation.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems.
IEEE Trans. Commun., November, 2023

LTE Device Radio Frequency Fingerprints Blind Extraction Based on Temporal-Frequency Domain PRACH Signals.
IEEE Trans. Veh. Technol., October, 2023

Unsupervised Rumor Detection Based on Propagation Tree VAE.
IEEE Trans. Knowl. Data Eng., October, 2023

Location-Invariant Radio Frequency Fingerprint for Base Station Recognition.
IEEE Wirel. Commun. Lett., September, 2023

Disentangled Representation Learning for RF Fingerprint Extraction Under Unknown Channel Statistics.
IEEE Trans. Commun., July, 2023

A Knowledge-Enriched Ensemble Method for Word Embedding and Multi-Sense Embedding.
IEEE Trans. Knowl. Data Eng., June, 2023

ZIGBEE_RFF_DATASET.
Dataset, May, 2023

Toward Novel Time Representations for RFF Identification Using Imperfect Data Sets.
IEEE Internet Things J., February, 2023

Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation.
IEEE Trans. Inf. Forensics Secur., 2023

Anonymous Edge Representation for Inductive Anomaly Detection in Dynamic Bipartite Graphs.
Proc. VLDB Endow., 2023

Deep Learning-Based RF Fingerprint Identification With Channel Effects Mitigation.
IEEE Open J. Commun. Soc., 2023

Design of a Channel Robust Radio Frequency Fingerprint Identification Scheme.
IEEE Internet Things J., 2023

Robust RF Fingerprint Extraction Based on Cyclic Shift Characteristic.
IEEE Internet Things J., 2023

A Novel Radio Frequency Fingerprint Extraction Method Against Variable Channel Characteristics.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

A Channel Robust Radio Frequency Fingerprint Authentication Method Based on Hadamard Product Comparison.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift Optimization.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Angular-domain Secret Key Generation for RIS-aided mmWave MIMO systems.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Joint Estimation of Transmitter IQ Imbalance and Nonlinearity with Multipath in OFDM Systems.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

A Noise-Robust Radio Frequency Fingerprint Identification Scheme for Internet of Things Devices.
Proceedings of the IEEE INFOCOM 2023, 2023

Enhancing RF Fingerprinting with a Simulated Attack Detection Strategy for Few Labeled Signals.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

RelativeRFF: Multi-Antenna Device Identification in Multipath Propagation Scenarios.
Proceedings of the IEEE International Conference on Communications, 2023

A Low-cost ESP32-driven Wireless Key Generation System Based on Response Mechanism.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?
IEEE Wirel. Commun., 2022

Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN.
IEEE Trans. Netw. Serv. Manag., 2022

On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Secure transmission technology based on direct modulation with random channel characteristics.
Secur. Saf., 2022

A practical radio frequency fingerprinting scheme for mobile phones identification.
Phys. Commun., 2022

Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems.
IEEE Internet Things J., 2022

An Artificial Radio Frequency Fingerprint Embedding Scheme for Device Identification.
IEEE Commun. Lett., 2022

Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments.
IEEE Commun. Lett., 2022

Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments.
CoRR, 2022

Towards a privacy protection-capable noise fingerprinting for numerically aggregated data.
Comput. Secur., 2022

Authorized and Rogue LTE Terminal Identification Using Wavelet Coefficient Graph with Auto-encoder.
Proceedings of the 96th Vehicular Technology Conference, 2022

Embrace Imperfect Datasets: New Time Representation for RFF Identification.
Proceedings of the 96th Vehicular Technology Conference, 2022

Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation.
Proceedings of the 96th Vehicular Technology Conference, 2022

Radio Frequency Fingerprints Extraction for LTE-V2X: A Channel Estimation Based Methodology.
Proceedings of the 96th Vehicular Technology Conference, 2022

Subframes Discrimination and Time Synchronization Methods in LTE-V2X System.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments.
Proceedings of the IEEE INFOCOM 2022, 2022

Recognizing Automotive Ethernet Device by Extracting Fingerprint from Power Spectrum.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Research on Terminal Fingerprint Extraction and Temperature Adaptability Based on CAN Bus.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet Card.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Wireless Channel Key Generation for Multi-User Access Scenarios.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Signal-independent RFF Identification for LTE Mobile Devices via Ensemble Deep Learning.
Proceedings of the IEEE Global Communications Conference, 2022

Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation.
Proceedings of the IEEE Global Communications Conference, 2022

2021
A Data-Independent Radio Frequency Fingerprint Extraction Scheme.
IEEE Wirel. Commun. Lett., 2021

EVAL Cane: Nonintrusive Monitoring Platform With a Novel Gait-Based User-Identification Scheme.
IEEE Trans. Instrum. Meas., 2021

A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Robust Key Generation With Hardware Mismatch for Secure MIMO Communications.
IEEE Trans. Inf. Forensics Secur., 2021

Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2021

A LoRa-Based Lightweight Secure Access Enhancement System.
Secur. Commun. Networks, 2021

Radio frequency fingerprint identification based on stream differential constellation trace figures.
Phys. Commun., 2021

Trading off data resource availability and privacy preservation in multi-layer network transaction.
Phys. Commun., 2021

A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition.
IEEE Internet Things J., 2021

Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation.
IEEE Internet Things J., 2021

Generative adversarial network-based rogue device identification using differential constellation trace figure.
EURASIP J. Wirel. Commun. Netw., 2021

Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network.
CoRR, 2021

Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

CSI Measurement and Reciprocity Evaluation Method Based on Embedded Platform.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Data desensitization mechanism of Android application based on differential privacy.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Neural Control Based Research of Endogenous Security Model.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

LOBBY: A Novel Physical-layer Key Generation Method.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording.
Proceedings of the ICC 2021, 2021

LTE Device Identification Based on RF Fingerprint with Multi-Channel Convolutional Neural Network.
Proceedings of the IEEE Global Communications Conference, 2021

Authenticating Mobile Wireless Device Through Per-packet Channel State Information.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure.
IEEE Trans. Veh. Technol., 2020

Detection and Mitigation of DoS Attacks in Software Defined Networks.
IEEE/ACM Trans. Netw., 2020

Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar.
IEEE Internet Things J., 2020

Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice.
IET Inf. Secur., 2020

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels.
IEEE Access, 2020

A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

LoRa Devices Identification Based on Differential Constellation Trace Figure.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN.
Proceedings of the IEEE Global Communications Conference, 2020

2019
An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation.
IEEE Trans. Mob. Comput., 2019

A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network.
IEEE Internet Things J., 2019

Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme.
IEEE Internet Things J., 2019

Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems.
IEEE Commun. Lett., 2019

A Hybrid Information Reconciliation Method for Physical Layer Key Generation.
Entropy, 2019

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
Entropy, 2019

Physical layer identification of LoRa devices using constellation trace figure.
EURASIP J. Wirel. Commun. Netw., 2019

A lightweight physical-layer based security strategy for Internet of things.
Clust. Comput., 2019

Importance-based entropy measures of complex networks' robustness to attacks.
Clust. Comput., 2019

Location-Invariant Physical Layer Identification Approach for WiFi Devices.
IEEE Access, 2019

Knowledge-Enhanced Ensemble Learning for Word Embeddings.
Proceedings of the World Wide Web Conference, 2019

Radio Frequency Fingerprint Identification Based on Denoising Autoencoders.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

A Design of Deep Learning Based Optical Fiber Ethernet Device Fingerprint Identification System.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

IoT device fingerprinting for relieving pressure in the access control.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Abnormal traffic detection of IoT terminals based on Bloom filter.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge.
IEEE Trans. Veh. Technol., 2018

High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing.
IEEE Trans. Commun., 2018

On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios.
IEEE Commun. Lett., 2018

Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems.
IEEE Commun. Lett., 2018

Energy Selected Transmitter RF Fingerprint Estimation in Multi-Antenna OFDM Systems.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018

Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels.
Proceedings of the IEEE Globecom Workshops, 2018

A Method of Android Application Forensics Based on Heap Memory Analysis.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2017
An ESPRIT-Based Approach for RF Fingerprint Estimation in Multi-Antenna OFDM Systems.
IEEE Wirel. Commun. Lett., 2017

A subband excitation substitute based scheme for narrowband speech watermarking.
Frontiers Inf. Technol. Electron. Eng., 2017

Throughput and BER of wireless powered DF relaying in Nakagami-<i>m</i> fading.
Sci. China Inf. Sci., 2017

WebLogger: Stealing your personal PINs via mobile web application.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Feasibility Analysis of Lattice-based Proxy Re-Encryption.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Information Hiding Capacities in Different Multiple Antennas Systems.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Secret Key Generation Method in OFDM System for Physical Layer Security.
Int. J. Interdiscip. Telecommun. Netw., 2016

Blind DCTF-based estimation of carrier frequency offset for RF fingerprint extraction.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

A differential constellation trace figure based device identification method for ZigBee nodes.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Special issue on recent advances in network and information security - security and communication networks journal.
Secur. Commun. Networks, 2015

Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015

Trusted mobile model based on DTE technology.
Int. J. Inf. Sec., 2015

SESS: A security-enhanced secret storage scheme for password managers.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

A Novel Transform for Secret Key Generation in Time-Varying TDD Channel under Hardware Fingerprint Deviation.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems.
IEEE Trans. Veh. Technol., 2014

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique.
IEICE Trans. Inf. Syst., 2014

2013
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents.
Quantum Inf. Process., 2013

Trust relationships in secure mobile systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Extension of DTFT-Based Sinusoidal Signal Time Delay Estimation Algorithm for Linear Time-Varying Situation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion.
KSII Trans. Internet Inf. Syst., 2012

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy.
IEICE Trans. Inf. Syst., 2012

Efficient transitive trust model for mobile terminal.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

A private-data protection mechanism for trusted mobile platform.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Finding the Most Vital Link with Respect to the Characteristic of Network Communication.
J. Networks, 2011

Two-piecewise companding transform for PAPR reduction of OFDM signals.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
A Novel Authentication Protocol for Wireless Access Security.
J. Convergence Inf. Technol., 2010

Steady-state performance analyses for sliding window max-correlation matching adaptive algorithms.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

2009
Managing Handover Authentication in Big-domain Wireless Environment.
J. Convergence Inf. Technol., 2009

2008
Formal Protocol Design of ESIKE Based on Authentication Tests.
Int. J. Netw. Secur., 2008

The Performance Analysis of Fast EAP Re-authentication Protocol.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Maximum Utility-Based Resource Allocation Algorithm in the IEEE 802.16 OFDMA System.
Proceedings of IEEE International Conference on Communications, 2008

2007
Advanced robust e-mail protocols with perfect forward secrecy.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

A Dynamic Network Access Identifier Used for Location Privacy.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Advanced remote password authentication and key agreement using smart card.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

The Design of Anti-collision Mechanism of UHF RFID System based on CDMA.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

A Combined Residual Frequency and Sampling Clock Offset Estimation for OFDM Systems.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

1998
Solving a kind of nonlinear programming problems via analog neural networks.
Neurocomputing, 1998


  Loading...