Hong Wen
Orcid: 0000-0002-0073-6101Affiliations:
- University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, Chengdu, China
According to our database1,
Hong Wen
authored at least 187 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sensors, August, 2024
Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks.
IEEE Trans. Mob. Comput., May, 2024
Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, March, 2024
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation.
IEEE Trans. Consumer Electron., February, 2024
2023
IEEE Internet Things Mag., June, 2023
Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing.
IEEE Internet Things J., May, 2023
Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications.
IEEE Internet Things J., March, 2023
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract.
Digit. Commun. Networks, February, 2023
IEEE Trans. Netw. Sci. Eng., 2023
Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference.
IEEE Trans. Intell. Transp. Syst., 2023
Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers.
IEEE Trans. Inf. Forensics Secur., 2023
Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing.
Sensors, 2023
Blockchain-Enabled Cross-Layer Radio Frequency Fingerprinting Identification with Machine Learning for IIoT.
IEEE Netw., 2023
Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure.
CoRR, 2023
A Hardware Simulation Platform of Artificial Noise-Assisted MIMO Communication System Based on LabVIEW-USRP.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023
2022
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2022
FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals.
IEEE Trans. Ind. Informatics, 2022
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
Sensors, 2022
A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends.
IEEE Netw., 2022
IEEE Internet Things Mag., 2022
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices.
IEEE Internet Things J., 2022
Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity.
IET Commun., 2022
Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing.
Proceedings of the IEEE INFOCOM 2022, 2022
Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid.
Proceedings of the IEEE INFOCOM 2022, 2022
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
Artificial Noise Assisted Interference Alignment for Physical Layer Security Enhancement.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel.
IEEE Trans. Intell. Transp. Syst., 2021
Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection.
IEEE Trans. Ind. Informatics, 2021
Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2021
A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends.
IEEE Trans. Ind. Informatics, 2021
Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2021
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021
Reverse Calculation-Based Low Memory Turbo Decoder for Power Constrained Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels.
Secur. Commun. Networks, 2021
Multiagent Deep Reinforcement Learning for Task Offloading and Resource Allocation in Cybertwin-Based Networks.
IEEE Internet Things J., 2021
IEEE Access, 2021
IEEE Access, 2021
CSI-Free Physical Layer Security against Eavesdropping Attack based on Intelligent Surface for Industrial Wireless.
Proceedings of the 17th IEEE International Conference on Factory Communication Systems, 2021
On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission.
Proceedings of the 21st International Conference on Communication Technology, 2021
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
Reinforcement Learning-based Multidimensional Resource Management in Edge Cloud Regions.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel.
IEEE Trans. Cogn. Commun. Netw., 2020
A P2P network based edge computing smart grid model for efficient resources coordination.
Peer-to-Peer Netw. Appl., 2020
Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing.
IEEE Netw., 2020
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation.
IEEE Internet Things J., 2020
On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things.
IEEE Internet Things J., 2020
IEEE Commun. Stand. Mag., 2020
Proceedings of the IEEE Globecom Workshops, 2020
2019
IEEE Wirel. Commun. Lett., 2019
Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2019
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2019
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks.
Sensors, 2019
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
Sensors, 2019
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources.
Sensors, 2019
IEEE Netw., 2019
Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers.
IET Commun., 2019
Analysis of the physical layer security enhancing of wireless communication system under the random mobile.
IET Commun., 2019
EURASIP J. Wirel. Commun. Netw., 2019
IEEE Access, 2019
Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication.
IEEE Access, 2019
The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT.
IEEE Access, 2019
Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting.
IEEE Access, 2019
IEEE Access, 2019
Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels.
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels.
IEEE Wirel. Commun. Lett., 2018
IEEE Trans. Wirel. Commun., 2018
Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN.
IEEE Trans. Veh. Technol., 2018
Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers.
IEEE Trans. Veh. Technol., 2018
Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming.
IEEE Trans. Veh. Technol., 2018
Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.
Sensors, 2018
Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Lightweight one-time password authentication scheme based on radio-frequency fingerprinting.
IET Commun., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
EURASIP J. Wirel. Commun. Netw., 2018
Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels.
EURASIP J. Wirel. Commun. Netw., 2018
Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects.
IEEE Commun. Mag., 2018
An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length.
Adv. Math. Commun., 2018
Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms.
Ad Hoc Sens. Wirel. Networks, 2018
A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building.
IEEE Access, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Performance Analysis of Multi-Hop Relaying Cooperation for Internet-of-Things System.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018
Authentication Based on Channel State Information for Industrial Wireless Communications.
Proceedings of the IECON 2018, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism.
IEEE Syst. J., 2017
IET Commun., 2017
Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Asymmetric ZCZ Sequence Sets with Inter-Subset Uncorrelated Sequences via Interleaved Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks.
IEEE Commun. Lett., 2017
IEEE Access, 2017
Novel Asymmetric Zero Correlation Zone Sequence Sets for Code Division Multiple Access.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
An Optimized Resource Efficient Approximation of max* Operator for Recalculation in Turbo Code Decoder.
Proceedings of the 5th International Conference on Enterprise Systems, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
A method of reconciling the key discrepancy by exploiting unconditional secure transmission.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2016
Cloud service provisioning in two types of DCN with awareness of delay and link failure probability.
Photonic Netw. Commun., 2016
Families of asymmetric sequence pair set with zero-correlation zone via interleaved technique.
IET Commun., 2016
Associating MIMO beamforming with security codes to achieve unconditional communication security.
IET Commun., 2016
Designs of Inter-Group Complementary Sequence Set from Interleaving Z-Periodic Complementary Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks.
IEEE Access, 2016
The cross-network energy efficient tradeoff: From wavelength division multiplexing wired networks to 5G wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerg. Top. Comput., 2015
A topological potential weighted community-based recommendation trust model for P2P networks.
Peer-to-Peer Netw. Appl., 2015
Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead.
Comput. Networks, 2015
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Combining MIMO beamforming with security codes to achieve unconditional communication security.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Joint cooperative jamming and beamforming for secure transmission in two-cell networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Computational Social Networks - 4th International Conference, 2015
2014
Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions.
IEEE Wirel. Commun. Lett., 2014
Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP.
IEEE Trans. Wirel. Commun., 2014
Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks.
IEEE Trans. Commun., 2014
Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks.
IEEE J. Sel. Areas Commun., 2014
Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks.
JOCN, 2014
Modified channel-independent weighted bit flipping decoding algorithm for low-density-parity-check codes.
IET Commun., 2014
Reduced memory decoding schemes for turbo decoding based on storing the index of the state metric.
IET Commun., 2014
IET Commun., 2014
A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
New families of asymmetric zero-correlation zone sequence sets based on interleaved perfect sequence.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
P2P networks monitoring based on the social network analysis and the topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
On Managing Interferences under Heterogeneous CSIT Feedback for Multi-User Transmission.
IEEE Trans. Wirel. Commun., 2013
Telecommun. Syst., 2013
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks.
IEEE Netw., 2013
Int. J. Distributed Sens. Networks, 2013
IET Commun., 2013
Fast and efficient parallel-shift water-filling algorithm for power allocation in orthogonal frequency division multiplexing-based underlay cognitive radios.
IET Commun., 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC).
IEEE Wirel. Commun. Lett., 2012
Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios.
IEEE Wirel. Commun. Lett., 2012
2011
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks.
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the Communication and Networking, 2011
Proceedings of the Communication and Networking, 2011
2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010
A framework of physical layer technique assisted authentication for vehicular communication networks.
Sci. China Inf. Sci., 2010
Proceedings of the Global Communications Conference, 2010
2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007