Hong Wen

Orcid: 0000-0002-0073-6101

Affiliations:
  • University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, Chengdu, China


According to our database1, Hong Wen authored at least 187 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimized Radio Frequency Footprint Identification Based on UAV Telemetry Radios.
Sensors, August, 2024

Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks.
IEEE Trans. Mob. Comput., May, 2024

Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, March, 2024

Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation.
IEEE Trans. Consumer Electron., February, 2024

2023
A DT Machine Learning-Based Satellite Orbit Prediction for IoT Applications.
IEEE Internet Things Mag., June, 2023

Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing.
IEEE Internet Things J., May, 2023

Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications.
IEEE Internet Things J., March, 2023

Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract.
Digit. Commun. Networks, February, 2023

IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference.
IEEE Trans. Intell. Transp. Syst., 2023

Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers.
IEEE Trans. Inf. Forensics Secur., 2023

Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing.
Sensors, 2023

Blockchain-Enabled Cross-Layer Radio Frequency Fingerprinting Identification with Machine Learning for IIoT.
IEEE Netw., 2023

Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure.
CoRR, 2023

A Hardware Simulation Platform of Artificial Noise-Assisted MIMO Communication System Based on LabVIEW-USRP.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Edge-enabled Zero Trust Architecture for ICPS with Spatial and Temporal Granularity.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023

2022
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022

Relay Cooperative Transmission Algorithms for IoV Under Aggregated Interference.
IEEE Trans. Intell. Transp. Syst., 2022

Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2022

FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals.
IEEE Trans. Ind. Informatics, 2022

Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
Sensors, 2022

A Bilevel Optimization Model Based on Edge Computing for Microgrid.
Sensors, 2022

A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends.
IEEE Netw., 2022

Survey of Secure Communications of Internet of Things with Artificial Intelligence.
IEEE Internet Things Mag., 2022

Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices.
IEEE Internet Things J., 2022

Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things.
IEEE Internet Things J., 2022

On Physical-Layer Authentication via Online Transfer Learning.
IEEE Internet Things J., 2022

Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity.
IET Commun., 2022

Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing.
Proceedings of the IEEE INFOCOM 2022, 2022

Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid.
Proceedings of the IEEE INFOCOM 2022, 2022

Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Artificial Noise Assisted Interference Alignment for Physical Layer Security Enhancement.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel.
IEEE Trans. Intell. Transp. Syst., 2021

Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection.
IEEE Trans. Ind. Informatics, 2021

Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2021

A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends.
IEEE Trans. Ind. Informatics, 2021

Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2021

Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021

Reverse Calculation-Based Low Memory Turbo Decoder for Power Constrained Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels.
Secur. Commun. Networks, 2021

Multiagent Deep Reinforcement Learning for Task Offloading and Resource Allocation in Cybertwin-Based Networks.
IEEE Internet Things J., 2021

Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS.
IEEE Access, 2021

New Security State Awareness Model for IoT Devices With Edge Intelligence.
IEEE Access, 2021

CSI-Free Physical Layer Security against Eavesdropping Attack based on Intelligent Surface for Industrial Wireless.
Proceedings of the 17th IEEE International Conference on Factory Communication Systems, 2021

On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission.
Proceedings of the 21st International Conference on Communication Technology, 2021

MADDPG-based Task Offloading and Resource Management for Edge System.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

A Situational Awareness Model for Edge Computing Devices.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

Reinforcement Learning-based Multidimensional Resource Management in Edge Cloud Regions.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

Multi-dimensional Resource Management System Based on Blockchain and Cybertwin.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas.
IEEE Trans. Veh. Technol., 2020

PLS-Based Secrecy Transmission for VANETs.
IEEE Trans. Veh. Technol., 2020

Convolution Based Feature Extraction for Edge Computing Access Authentication.
IEEE Trans. Netw. Sci. Eng., 2020

Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel.
IEEE Trans. Cogn. Commun. Netw., 2020

A P2P network based edge computing smart grid model for efficient resources coordination.
Peer-to-Peer Netw. Appl., 2020

Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing.
IEEE Netw., 2020

Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation.
IEEE Internet Things J., 2020

On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things.
IEEE Internet Things J., 2020

Survey on the Internet of Vehicles: Network Architectures and Applications.
IEEE Commun. Stand. Mag., 2020

On Physical-Layer Authentication via Triple Pool Convolutional Neural Network.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels.
IEEE Wirel. Commun. Lett., 2019

Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS.
IEEE Trans. Ind. Informatics, 2019

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2019

Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks.
Sensors, 2019

Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
Sensors, 2019

Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources.
Sensors, 2019

Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks.
IEEE Netw., 2019

Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers.
IET Commun., 2019

Analysis of the physical layer security enhancing of wireless communication system under the random mobile.
IET Commun., 2019

Energy harvesting and information transmission scheme with UAV relay cooperation.
EURASIP J. Wirel. Commun. Netw., 2019

Clone Detection Based on Physical Layer Reputation for Proximity Service.
IEEE Access, 2019

Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication.
IEEE Access, 2019

The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT.
IEEE Access, 2019

Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting.
IEEE Access, 2019

Internet of Things Based Smart Grids Supported by Intelligent Edge Computing.
IEEE Access, 2019

Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Edge Intelligence based Co-training of CNN.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Efficiency and Security for Edge Computing Assisted Smart Grids.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
The Rayleigh Fading Channel Prediction via Deep Learning.
Wirel. Commun. Mob. Comput., 2018

Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels.
Wirel. Commun. Mob. Comput., 2018

Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm.
Wirel. Commun. Mob. Comput., 2018

Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels.
IEEE Wirel. Commun. Lett., 2018

Impact of Mobility on Physical Layer Security Over Wireless Fading Channels.
IEEE Trans. Wirel. Commun., 2018

Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN.
IEEE Trans. Veh. Technol., 2018

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers.
IEEE Trans. Veh. Technol., 2018

Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming.
IEEE Trans. Veh. Technol., 2018

Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.
Sensors, 2018

Rumor spreading in interdependent social networks.
Peer-to-Peer Netw. Appl., 2018

Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things.
IEEE Internet Things J., 2018

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things.
IEEE Internet Things J., 2018

Lightweight one-time password authentication scheme based on radio-frequency fingerprinting.
IET Commun., 2018

Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A state metrics compressed decoding technique for energy-efficient turbo decoder.
EURASIP J. Wirel. Commun. Netw., 2018

Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels.
EURASIP J. Wirel. Commun. Netw., 2018

Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects.
IEEE Commun. Mag., 2018

An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length.
Adv. Math. Commun., 2018

Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms.
Ad Hoc Sens. Wirel. Networks, 2018

A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building.
IEEE Access, 2018

A Novel Terminal Security Access Method Based on Edge Computing for IoT.
Proceedings of the International Conference on Networking and Network Applications, 2018

Performance Analysis of Multi-Hop Relaying Cooperation for Internet-of-Things System.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Authentication Based on Channel State Information for Industrial Wireless Communications.
Proceedings of the IECON 2018, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

A Low Complexity Feature Extraction for the RF Fingerprinting Process.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Block Chain Based Secure Scheme For Mobile Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism.
IEEE Syst. J., 2017

Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding.
IET Commun., 2017

Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Asymmetric ZCZ Sequence Sets with Inter-Subset Uncorrelated Sequences via Interleaved Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks.
IEEE Commun. Lett., 2017

Cross-Networks Energy Efficiency Tradeoff: From Wired Networks to Wireless Networks.
IEEE Access, 2017

Novel Asymmetric Zero Correlation Zone Sequence Sets for Code Division Multiple Access.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

MISO Secure Transmission with Imperfect Channel State Information.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Physical Layer Security Assisted 5G Network Security.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Dot-product based preference preserved hashing for fast collaborative filtering.
Proceedings of the IEEE International Conference on Communications, 2017

An Optimized Resource Efficient Approximation of max* Operator for Recalculation in Turbo Code Decoder.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

A model divides the mobile security level based on SVM.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Performance analysis of cooperative secure transmission system.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Physical layer authentication based on channel information and machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A physical layer secure transmission method based on channel prediction and QoS.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

The realization of key extraction based on USRP and OFDM channel response.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A method of reconciling the key discrepancy by exploiting unconditional secure transmission.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2016

Cloud service provisioning in two types of DCN with awareness of delay and link failure probability.
Photonic Netw. Commun., 2016

Families of asymmetric sequence pair set with zero-correlation zone via interleaved technique.
IET Commun., 2016

Associating MIMO beamforming with security codes to achieve unconditional communication security.
IET Commun., 2016

Designs of Inter-Group Complementary Sequence Set from Interleaving Z-Periodic Complementary Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks.
IEEE Access, 2016

The cross-network energy efficient tradeoff: From wavelength division multiplexing wired networks to 5G wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Constraint Free Preference Preserving Hashing for Fast Recommendation.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

The performance of the MIMO physical layer security system with imperfect CSI.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A MIMO cross-layer secure communication scheme based on spatial modulation.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerg. Top. Comput., 2015

A topological potential weighted community-based recommendation trust model for P2P networks.
Peer-to-Peer Netw. Appl., 2015

Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead.
Comput. Networks, 2015

Three-Layers Secure Access Control for Cloud-Based Smart Grids.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

A hierarchical key management system applied in cloud-based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

User privacy protection for cloud computing based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Combining MIMO beamforming with security codes to achieve unconditional communication security.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

5G security architecture and light weight security authentication.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

An OFDM cross-layer encryption secure communication scheme.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Joint cooperative jamming and beamforming for secure transmission in two-cell networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Secure Interdependent Networks for Peer-to-Peer and Online Social Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Rumor Spreading and Security Monitoring in Complex Networks.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions.
IEEE Wirel. Commun. Lett., 2014

Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP.
IEEE Trans. Wirel. Commun., 2014

Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks.
IEEE Trans. Commun., 2014

Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks.
IEEE J. Sel. Areas Commun., 2014

Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks.
JOCN, 2014

Modified channel-independent weighted bit flipping decoding algorithm for low-density-parity-check codes.
IET Commun., 2014

Reduced memory decoding schemes for turbo decoding based on storing the index of the state metric.
IET Commun., 2014

Achieving strong security based on fountain code with coset pre-coding.
IET Commun., 2014

A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Novel Construction of Asymmetric Sequence Pairs Set with Zero-Correlation Zone.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

New families of asymmetric zero-correlation zone sequence sets based on interleaved perfect sequence.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A MIMO cross-layer precoding security communication system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

P2P networks monitoring based on the social network analysis and the topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Physical Layer Assist Mutual Authentication scheme for smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
On Managing Interferences under Heterogeneous CSIT Feedback for Multi-User Transmission.
IEEE Trans. Wirel. Commun., 2013

Framework for MIMO cross-layer secure communication based on STBC.
Telecommun. Syst., 2013

A framework of the PHY-layer approach to defense against security threats in cognitive radio networks.
IEEE Netw., 2013

A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems.
Int. J. Distributed Sens. Networks, 2013

Physical layer assist authentication technique for smart meter system.
IET Commun., 2013

Fast and efficient parallel-shift water-filling algorithm for power allocation in orthogonal frequency division multiplexing-based underlay cognitive radios.
IET Commun., 2013

The security issue of WSNs based on cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A novel detection scheme for malicious nodes in smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An efficient and secure search database scheme for cloud computing in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A P2P recommended trust nodes selection algorithm based on topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC).
IEEE Wirel. Commun. Lett., 2012

Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios.
IEEE Wirel. Commun. Lett., 2012

2011
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks.
KSII Trans. Internet Inf. Syst., 2011

The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes.
Proceedings of the Communication and Networking, 2011

The Performance Analysis of LT Codes.
Proceedings of the Communication and Networking, 2011

2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010

A framework of physical layer technique assisted authentication for vehicular communication networks.
Sci. China Inf. Sci., 2010

MIMO Cross-Layer Secure Communication Architecture Based on STBC.
Proceedings of the Global Communications Conference, 2010

2009
Build-in wiretap channel I with feedback and LDPC codes.
J. Commun. Networks, 2009

A Novel Framework for Message Authentication in Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2007
The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes.
Proceedings of the Future Generation Communication and Networking, 2007

An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC code.
Proceedings of the Future Generation Communication and Networking, 2007


  Loading...