Kai Zeng

Orcid: 0000-0003-3279-0695

Affiliations:
  • George Mason University, Department of Electrical and Computer Engineering, Fairfax, VA, USA
  • University of Michigan-Dearborn, Department of Computer and Information Science, MI, USA (2011 - 2014)
  • University of California, Davis, Department of Computer Science, CA, USA (2008 - 2011)
  • Worcester Polytechnic Institute, MA, USA (PhD 2008)


According to our database1, Kai Zeng authored at least 159 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physical Layer Authentication in Backscatter Communication: A Review.
IEEE Wirel. Commun., June, 2024

BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024

BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices.
IEEE Trans. Inf. Forensics Secur., 2024

Multi-Bit Distortion-Free Watermarking for Large Language Models.
CoRR, 2024

Wireless-Powered Multi-Channel Backscatter Communications Under Jamming: A Cooperative Reinforcement Learning Approach.
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024

Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Learning-Based Secure Spectrum Sharing for Intelligent IoT Networks.
Proceedings of the 25th International Symposium on Quality Electronic Design, 2024

Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Location Privacy and Spectrum Efficiency Enhancement in Spectrum Sharing Systems.
IEEE Trans. Cogn. Commun. Netw., December, 2023

Self-Unaware Adversarial Multi-Armed Bandits With Switching Costs.
IEEE Trans. Neural Networks Learn. Syst., June, 2023

FedUR: Federated Learning Optimization Through Adaptive Centralized Learning Optimizers.
IEEE Trans. Signal Process., 2023

Federated Graph Neural Network for Fast Anomaly Detection in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers.
IEEE Trans. Inf. Forensics Secur., 2023

Realizing Uplink MU-MIMO Communication in mmWave WLANs: Bayesian Optimization and Asynchronous Transmission.
Proceedings of the IEEE INFOCOM 2023, 2023

BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Friendly spectrum jamming against MIMO eavesdropping.
Wirel. Networks, 2022

Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022

Enabling Efficient Blockage-Aware Handover in RIS-Assisted mmWave Cellular Networks.
IEEE Trans. Wirel. Commun., 2022

Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2022

Multiuser Scheduling in Centralized Cognitive Radio Networks: A Multi-Armed Bandit Approach.
IEEE Trans. Cogn. Commun. Netw., 2022

Communication-Aware Secret Share Placement in Hierarchical Edge Computing.
IEEE Internet Things J., 2022

AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface.
IEEE Internet Things J., 2022

Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices.
IEEE Internet Things J., 2022

Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices.
IEEE Internet Things J., 2022

Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

Characterization of AES Implementations on Microprocessor-based IoT Devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Secure and Energy-Efficient Proximity-Based Pairing for IoT Devices.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Securing Wireless Channels: Reliable Shared Secret Extraction through OTFS.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks.
IEEE Trans. Wirel. Commun., 2021

A Reassessment on Friendly Jamming Efficiency.
IEEE Trans. Mob. Comput., 2021

Large-scale Cost-Aware Classification Using Feature Computational Dependency Graph.
IEEE Trans. Knowl. Data Eng., 2021

Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021

Manipulative Attack Against Physical Layer Key Agreement and Countermeasure.
IEEE Trans. Dependable Secur. Comput., 2021

Federated Continuous Learning With Broad Network Architecture.
IEEE Trans. Cybern., 2021

Online-Learning-Based Defense Against Jamming Attacks in Multichannel Wireless CPS.
IEEE Internet Things J., 2021

Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks.
IEEE Access, 2021

Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas.
IEEE Trans. Veh. Technol., 2020

Impact of Jamming Attacks on Vehicular Cooperative Adaptive Cruise Control Systems.
IEEE Trans. Veh. Technol., 2020

Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic.
IEEE Trans. Inf. Forensics Secur., 2020

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020

Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics With Unreliable Conditions.
IEEE Trans. Cogn. Commun. Netw., 2020

Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead.
IEEE Netw., 2020

Compressed-Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications.
IEEE Internet Things J., 2020

Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Efficient Physical Layer Group Key Generation in 5G Wireless Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Physical Layer Key Generation in 5G Wireless Networks.
IEEE Wirel. Commun., 2019

Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks.
IEEE Netw., 2019

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.
IEEE Internet Things J., 2019

Intelligent Policing Strategy for Traffic Violation Prevention.
CoRR, 2019

Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Multi-stage Deep Classifier Cascades for Open World Recognition.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Physical layer multi-user key generation in wireless networks.
Wirel. Networks, 2018

Impact of Mobility on Physical Layer Security Over Wireless Fading Channels.
IEEE Trans. Wirel. Commun., 2018

Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2018

Secure Inductive-Coupled Near Field Communication at Physical Layer.
IEEE Trans. Inf. Forensics Secur., 2018

Introduction to the Special Section From the IEEE ICC 2018 Conference.
IEEE Trans. Cogn. Commun. Netw., 2018

Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing.
IEEE Internet Things J., 2018

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study.
CoRR, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018

Robust Spectrum Monitoring in Cognitive Radio Networks With Uncertain Traffic Information.
IEEE Access, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018

Prediction-time Efficient Classification Using Feature Computational Dependencies.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios.
Proceedings of the IEEE International Smart Cities Conference, 2018

Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models.
Proceedings of the IEEE International Smart Cities Conference, 2018

Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks.
IEEE Trans. Veh. Technol., 2017

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs.
EAI Endorsed Trans. Security Safety, 2017

Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios.
CoRR, 2017

Platoon Stability and Safety Analysis of Cooperative Adaptive Cruise Control under Wireless Rician Fading Channels and Jamming Attacks.
CoRR, 2017

Optimal Online Learning with Randomized Feedback Graphs with Application in PUE Attacks in CRN.
CoRR, 2017

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis.
Proceedings of the Computer Network Security, 2017

Hardware module-based message authentication in intra-vehicle networks.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Throughput optimization in multi-hop wireless networks with reconfigurable antennas.
Proceedings of the 2017 International Conference on Computing, 2017

String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2016

Practical Secret Key Agreement for Full-Duplex Near Field Communications.
IEEE Trans. Mob. Comput., 2016

MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers.
IEEE Trans. Inf. Forensics Secur., 2016

Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

TPC Chair's welcome.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Intelligence Measure of Cognitive Radios with Learning Capabilities.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Online learning-based optimal primary user emulation attacks in cognitive radio networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A smartphone-based driver fatigue detection using fusion of multiple real-time facial features.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Live Video Forensics: Source Identification in Lossy Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Physical layer key generation in wireless networks: challenges and opportunities.
IEEE Commun. Mag., 2015

Online learning for unreliable passive monitoring in multi-channel wireless networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Physical layer key agreement under signal injection attacks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SecNFC: Securing inductively-coupled Near Field Communication at physical layer.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications.
Veh. Commun., 2014

Efficient Data Capturing for Network Forensics in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise.
EAI Endorsed Trans. Cogn. Commun., 2014

Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Physical layer challenge-response authentication in wireless networks with relay.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Delay analysis of physical layer key generation in multi-user dynamic wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014

MagPairing: Exploiting magnetometers for pairing smartphones in close proximity.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller.
IEEE Trans. Mob. Comput., 2013

Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space.
IEEE Trans. Mob. Comput., 2013

Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
IEEE Trans. Inf. Forensics Secur., 2013

PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks.
IEEE J. Sel. Areas Commun., 2013

Video source identification in lossy wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

iSens: Detecting hidden busy channels in WM systems with interactive sensing for CRN.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Detecting multi-channel wireless microphone user emulation attacks in white space with noise.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wirel. Networks, 2012

Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Improving crowd-sourced Wi-Fi localization systems using Bluetooth beacons.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Transmit power estimation with a single monitor in multi-band networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Fast rendezvous for cognitive radios by exploiting power leakage at adjacent channels.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Chaining for securing data provenance in distributed information networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Detecting spectrum misuse in wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Trusted collaborative spectrum sensing for mobile cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Probability Density of the Received Power in Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011

Opportunistic spectrum scheduling for mobile cognitive radio networks in white space.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

PRONET: Network trust assessment based on incomplete provenance.
Proceedings of the MILCOM 2011, 2011

Identity-based attack detection in mobile wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Adaptive wireless channel probing for shared key generation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Hearing is believing: Detecting mobile primary user emulation attack in white space.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Non-cryptographic authentication and identification in wireless networks.
IEEE Wirel. Commun., 2010

Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2010

Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Jamming-Resistant Communication: Channel Surfing without Negotiation.
Proceedings of IEEE International Conference on Communications, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009

Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

FSA: A Fast Coordination Scheme for Opportunistic Routing.
Proceedings of IEEE International Conference on Communications, 2009

2008
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks.
IEEE Trans. Wirel. Commun., 2008

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2008

On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
Mob. Networks Appl., 2007

2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006


  Loading...