2025
An Information-Theoretic Approach to Distributed Detection for Mobile Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown or Complicated Environment: Design, Analysis, and Evaluation of the Attack Strategy.
IEEE Internet Things J., 2025
2024
Distributed Decision Fusion in Wireless Sensor Networks for Contextual Experience Sensing and Recommendation Forming in E-Commerce.
IEEE Trans. Consumer Electron., November, 2024
Optimized Radio Frequency Footprint Identification Based on UAV Telemetry Radios.
Sensors, August, 2024
Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks.
IEEE Trans. Mob. Comput., May, 2024
Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, March, 2024
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation.
IEEE Trans. Consumer Electron., February, 2024
2023
A DT Machine Learning-Based Satellite Orbit Prediction for IoT Applications.
IEEE Internet Things Mag., June, 2023
Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing.
IEEE Internet Things J., May, 2023
Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications.
IEEE Internet Things J., March, 2023
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract.
Digit. Commun. Networks, February, 2023
IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference.
IEEE Trans. Intell. Transp. Syst., 2023
Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers.
IEEE Trans. Inf. Forensics Secur., 2023
Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing.
Sensors, 2023
Blockchain-Enabled Cross-Layer Radio Frequency Fingerprinting Identification with Machine Learning for IIoT.
IEEE Netw., 2023
Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure.
CoRR, 2023
A Hardware Simulation Platform of Artificial Noise-Assisted MIMO Communication System Based on LabVIEW-USRP.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Edge-enabled Zero Trust Architecture for ICPS with Spatial and Temporal Granularity.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023
2022
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022
Relay Cooperative Transmission Algorithms for IoV Under Aggregated Interference.
IEEE Trans. Intell. Transp. Syst., 2022
Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2022
FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals.
IEEE Trans. Ind. Informatics, 2022
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
Sensors, 2022
A Bilevel Optimization Model Based on Edge Computing for Microgrid.
Sensors, 2022
A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends.
IEEE Netw., 2022
Survey of Secure Communications of Internet of Things with Artificial Intelligence.
IEEE Internet Things Mag., 2022
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices.
IEEE Internet Things J., 2022
Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things.
IEEE Internet Things J., 2022
On Physical-Layer Authentication via Online Transfer Learning.
IEEE Internet Things J., 2022
Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity.
IET Commun., 2022
Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing.
Proceedings of the IEEE INFOCOM 2022, 2022
Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid.
Proceedings of the IEEE INFOCOM 2022, 2022
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
Artificial Noise Assisted Interference Alignment for Physical Layer Security Enhancement.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel.
IEEE Trans. Intell. Transp. Syst., 2021
Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection.
IEEE Trans. Ind. Informatics, 2021
Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2021
A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends.
IEEE Trans. Ind. Informatics, 2021
Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2021
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021
Reverse Calculation-Based Low Memory Turbo Decoder for Power Constrained Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels.
Secur. Commun. Networks, 2021
Multiagent Deep Reinforcement Learning for Task Offloading and Resource Allocation in Cybertwin-Based Networks.
IEEE Internet Things J., 2021
Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS.
IEEE Access, 2021
New Security State Awareness Model for IoT Devices With Edge Intelligence.
IEEE Access, 2021
CSI-Free Physical Layer Security against Eavesdropping Attack based on Intelligent Surface for Industrial Wireless.
Proceedings of the 17th IEEE International Conference on Factory Communication Systems, 2021
On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission.
Proceedings of the 21st International Conference on Communication Technology, 2021
MADDPG-based Task Offloading and Resource Management for Edge System.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
A Situational Awareness Model for Edge Computing Devices.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
Reinforcement Learning-based Multidimensional Resource Management in Edge Cloud Regions.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
Multi-dimensional Resource Management System Based on Blockchain and Cybertwin.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
2020
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas.
IEEE Trans. Veh. Technol., 2020
PLS-Based Secrecy Transmission for VANETs.
IEEE Trans. Veh. Technol., 2020
Convolution Based Feature Extraction for Edge Computing Access Authentication.
IEEE Trans. Netw. Sci. Eng., 2020
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel.
IEEE Trans. Cogn. Commun. Netw., 2020
A P2P network based edge computing smart grid model for efficient resources coordination.
Peer-to-Peer Netw. Appl., 2020
Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing.
IEEE Netw., 2020
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation.
IEEE Internet Things J., 2020
On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things.
IEEE Internet Things J., 2020
Survey on the Internet of Vehicles: Network Architectures and Applications.
IEEE Commun. Stand. Mag., 2020
On Physical-Layer Authentication via Triple Pool Convolutional Neural Network.
Proceedings of the IEEE Globecom Workshops, 2020
2019
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels.
IEEE Wirel. Commun. Lett., 2019
Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2019
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2019
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks.
Sensors, 2019
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
Sensors, 2019
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources.
Sensors, 2019
Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks.
IEEE Netw., 2019
Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers.
IET Commun., 2019
Analysis of the physical layer security enhancing of wireless communication system under the random mobile.
IET Commun., 2019
Energy harvesting and information transmission scheme with UAV relay cooperation.
EURASIP J. Wirel. Commun. Netw., 2019
Clone Detection Based on Physical Layer Reputation for Proximity Service.
IEEE Access, 2019
Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication.
IEEE Access, 2019
The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT.
IEEE Access, 2019
Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting.
IEEE Access, 2019
Internet of Things Based Smart Grids Supported by Intelligent Edge Computing.
IEEE Access, 2019
Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Edge Intelligence based Co-training of CNN.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Efficiency and Security for Edge Computing Assisted Smart Grids.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
The Rayleigh Fading Channel Prediction via Deep Learning.
Wirel. Commun. Mob. Comput., 2018
Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels.
Wirel. Commun. Mob. Comput., 2018
Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm.
Wirel. Commun. Mob. Comput., 2018
Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels.
IEEE Wirel. Commun. Lett., 2018
Impact of Mobility on Physical Layer Security Over Wireless Fading Channels.
IEEE Trans. Wirel. Commun., 2018
Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN.
IEEE Trans. Veh. Technol., 2018
Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers.
IEEE Trans. Veh. Technol., 2018
Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming.
IEEE Trans. Veh. Technol., 2018
Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.
Sensors, 2018
Rumor spreading in interdependent social networks.
Peer-to-Peer Netw. Appl., 2018
Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things.
IEEE Internet Things J., 2018
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things.
IEEE Internet Things J., 2018
Lightweight one-time password authentication scheme based on radio-frequency fingerprinting.
IET Commun., 2018
Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
A state metrics compressed decoding technique for energy-efficient turbo decoder.
EURASIP J. Wirel. Commun. Netw., 2018
Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels.
EURASIP J. Wirel. Commun. Netw., 2018
Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects.
IEEE Commun. Mag., 2018
An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length.
Adv. Math. Commun., 2018
Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms.
Ad Hoc Sens. Wirel. Networks, 2018
A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building.
IEEE Access, 2018
A Novel Terminal Security Access Method Based on Edge Computing for IoT.
Proceedings of the International Conference on Networking and Network Applications, 2018
Performance Analysis of Multi-Hop Relaying Cooperation for Internet-of-Things System.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018
Authentication Based on Channel State Information for Industrial Wireless Communications.
Proceedings of the IECON 2018, 2018
Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018
A Low Complexity Feature Extraction for the RF Fingerprinting Process.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Block Chain Based Secure Scheme For Mobile Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism.
IEEE Syst. J., 2017
Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding.
IET Commun., 2017
Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Asymmetric ZCZ Sequence Sets with Inter-Subset Uncorrelated Sequences via Interleaved Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks.
IEEE Commun. Lett., 2017
Cross-Networks Energy Efficiency Tradeoff: From Wired Networks to Wireless Networks.
IEEE Access, 2017
Novel Asymmetric Zero Correlation Zone Sequence Sets for Code Division Multiple Access.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
MISO Secure Transmission with Imperfect Channel State Information.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Physical Layer Security Assisted 5G Network Security.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Dot-product based preference preserved hashing for fast collaborative filtering.
Proceedings of the IEEE International Conference on Communications, 2017
An Optimized Resource Efficient Approximation of max* Operator for Recalculation in Turbo Code Decoder.
Proceedings of the 5th International Conference on Enterprise Systems, 2017
A model divides the mobile security level based on SVM.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Performance analysis of cooperative secure transmission system.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Physical layer authentication based on channel information and machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
A physical layer secure transmission method based on channel prediction and QoS.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
The realization of key extraction based on USRP and OFDM channel response.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
A method of reconciling the key discrepancy by exploiting unconditional secure transmission.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2016
Cloud service provisioning in two types of DCN with awareness of delay and link failure probability.
Photonic Netw. Commun., 2016
Families of asymmetric sequence pair set with zero-correlation zone via interleaved technique.
IET Commun., 2016
Associating MIMO beamforming with security codes to achieve unconditional communication security.
IET Commun., 2016
Designs of Inter-Group Complementary Sequence Set from Interleaving Z-Periodic Complementary Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks.
IEEE Access, 2016
The cross-network energy efficient tradeoff: From wavelength division multiplexing wired networks to 5G wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Constraint Free Preference Preserving Hashing for Fast Recommendation.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
The performance of the MIMO physical layer security system with imperfect CSI.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
A MIMO cross-layer secure communication scheme based on spatial modulation.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerg. Top. Comput., 2015
A topological potential weighted community-based recommendation trust model for P2P networks.
Peer-to-Peer Netw. Appl., 2015
Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead.
Comput. Networks, 2015
Three-Layers Secure Access Control for Cloud-Based Smart Grids.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
A hierarchical key management system applied in cloud-based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
User privacy protection for cloud computing based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Combining MIMO beamforming with security codes to achieve unconditional communication security.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
5G security architecture and light weight security authentication.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
An OFDM cross-layer encryption secure communication scheme.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Joint cooperative jamming and beamforming for secure transmission in two-cell networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Secure Interdependent Networks for Peer-to-Peer and Online Social Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Rumor Spreading and Security Monitoring in Complex Networks.
Proceedings of the Computational Social Networks - 4th International Conference, 2015
2014
Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions.
IEEE Wirel. Commun. Lett., 2014
Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP.
IEEE Trans. Wirel. Commun., 2014
Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks.
IEEE Trans. Commun., 2014
Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks.
IEEE J. Sel. Areas Commun., 2014
Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks.
JOCN, 2014
Modified channel-independent weighted bit flipping decoding algorithm for low-density-parity-check codes.
IET Commun., 2014
Reduced memory decoding schemes for turbo decoding based on storing the index of the state metric.
IET Commun., 2014
Achieving strong security based on fountain code with coset pre-coding.
IET Commun., 2014
A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
A Novel Construction of Asymmetric Sequence Pairs Set with Zero-Correlation Zone.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
New families of asymmetric zero-correlation zone sequence sets based on interleaved perfect sequence.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
A MIMO cross-layer precoding security communication system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
P2P networks monitoring based on the social network analysis and the topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Physical Layer Assist Mutual Authentication scheme for smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
On Managing Interferences under Heterogeneous CSIT Feedback for Multi-User Transmission.
IEEE Trans. Wirel. Commun., 2013
Framework for MIMO cross-layer secure communication based on STBC.
Telecommun. Syst., 2013
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks.
IEEE Netw., 2013
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems.
Int. J. Distributed Sens. Networks, 2013
Physical layer assist authentication technique for smart meter system.
IET Commun., 2013
Fast and efficient parallel-shift water-filling algorithm for power allocation in orthogonal frequency division multiplexing-based underlay cognitive radios.
IET Commun., 2013
The security issue of WSNs based on cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
A novel detection scheme for malicious nodes in smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
An efficient and secure search database scheme for cloud computing in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
A P2P recommended trust nodes selection algorithm based on topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC).
IEEE Wirel. Commun. Lett., 2012
Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios.
IEEE Wirel. Commun. Lett., 2012
2011
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks.
KSII Trans. Internet Inf. Syst., 2011
The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes.
Proceedings of the Communication and Networking, 2011
The Performance Analysis of LT Codes.
Proceedings of the Communication and Networking, 2011
2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010
A framework of physical layer technique assisted authentication for vehicular communication networks.
Sci. China Inf. Sci., 2010
MIMO Cross-Layer Secure Communication Architecture Based on STBC.
Proceedings of the Global Communications Conference, 2010
2009
Build-in wiretap channel I with feedback and LDPC codes.
J. Commun. Networks, 2009
A Novel Framework for Message Authentication in Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2007
The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes.
Proceedings of the Future Generation Communication and Networking, 2007
An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC code.
Proceedings of the Future Generation Communication and Networking, 2007