Kai Zeng
Orcid: 0000-0003-3279-0695Affiliations:
- George Mason University, Department of Electrical and Computer Engineering, Fairfax, VA, USA
- University of Michigan-Dearborn, Department of Computer and Information Science, MI, USA (2011 - 2014)
- University of California, Davis, Department of Computer Science, CA, USA (2008 - 2011)
- Worcester Polytechnic Institute, MA, USA (PhD 2008)
According to our database1,
Kai Zeng
authored at least 159 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ece.gmu.edu
On csauthors.net:
Bibliography
2024
IEEE Wirel. Commun., June, 2024
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Wireless-Powered Multi-Channel Backscatter Communications Under Jamming: A Cooperative Reinforcement Learning Approach.
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the 25th International Symposium on Quality Electronic Design, 2024
Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
2023
IEEE Trans. Cogn. Commun. Netw., December, 2023
IEEE Trans. Neural Networks Learn. Syst., June, 2023
FedUR: Federated Learning Optimization Through Adaptive Centralized Learning Optimizers.
IEEE Trans. Signal Process., 2023
Federated Graph Neural Network for Fast Anomaly Detection in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2023
Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers.
IEEE Trans. Inf. Forensics Secur., 2023
Realizing Uplink MU-MIMO Communication in mmWave WLANs: Bayesian Optimization and Asynchronous Transmission.
Proceedings of the IEEE INFOCOM 2023, 2023
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network.
Proceedings of the IEEE International Conference on Communications, 2023
2022
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022
IEEE Trans. Wirel. Commun., 2022
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2022
Multiuser Scheduling in Centralized Cognitive Radio Networks: A Multi-Armed Bandit Approach.
IEEE Trans. Cogn. Commun. Netw., 2022
IEEE Internet Things J., 2022
AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices.
IEEE Internet Things J., 2022
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the IEEE Globecom 2022 Workshops, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks.
IEEE Trans. Wirel. Commun., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Cybern., 2021
IEEE Internet Things J., 2021
IEEE Access, 2021
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic.
IEEE Trans. Inf. Forensics Secur., 2020
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020
Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics With Unreliable Conditions.
IEEE Trans. Cogn. Commun. Netw., 2020
IEEE Netw., 2020
Compressed-Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications.
IEEE Internet Things J., 2020
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
IEEE Netw., 2019
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.
IEEE Internet Things J., 2019
Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
IEEE Trans. Wirel. Commun., 2018
Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Cogn. Commun. Netw., 2018
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
CoRR, 2018
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018
Robust Spectrum Monitoring in Cognitive Radio Networks With Uncertain Traffic Information.
IEEE Access, 2018
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios.
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks.
IEEE Trans. Veh. Technol., 2017
EAI Endorsed Trans. Security Safety, 2017
Platoon Stability and Safety Analysis of Cooperative Adaptive Cruise Control under Wireless Rician Fading Channels and Jamming Attacks.
CoRR, 2017
Optimal Online Learning with Randomized Feedback Graphs with Application in PUE Attacks in CRN.
CoRR, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017
Proceedings of the 2017 International Conference on Computing, 2017
String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
2016
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Online learning-based optimal primary user emulation attacks in cognitive radio networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
A smartphone-based driver fatigue detection using fusion of multiple real-time facial features.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Commun. Mag., 2015
Online learning for unreliable passive monitoring in multi-channel wireless networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications.
Veh. Commun., 2014
IEEE/ACM Trans. Netw., 2014
Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise.
EAI Endorsed Trans. Cogn. Commun., 2014
Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Delay analysis of physical layer key generation in multi-user dynamic wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
IEEE Trans. Mob. Comput., 2013
Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space.
IEEE Trans. Mob. Comput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks.
IEEE J. Sel. Areas Commun., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
iSens: Detecting hidden busy channels in WM systems with interactive sensing for CRN.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Detecting multi-channel wireless microphone user emulation attacks in white space with noise.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013
2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wirel. Networks, 2012
Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Fast rendezvous for cognitive radios by exploiting power leakage at adjacent channels.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
IEEE Trans. Wirel. Commun., 2011
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011
Opportunistic spectrum scheduling for mobile cognitive radio networks in white space.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
IEEE Wirel. Commun., 2010
IEEE Trans. Wirel. Commun., 2010
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009
IEEE Trans. Veh. Technol., 2009
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Wirel. Commun., 2008
On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEEE Trans. Wirel. Commun., 2007
On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
Mob. Networks Appl., 2007
2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006