Pu Wang

Orcid: 0000-0001-8144-9755

Affiliations:
  • George Mason University, Fairfax, USA
  • Xidian University, State Key Lab on Integrated Services Networks, School of Cyber Engineering, Xian, China


According to our database1, Pu Wang authored at least 23 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physical Layer Authentication in Backscatter Communication: A Review.
IEEE Wirel. Commun., June, 2024

BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices.
IEEE Trans. Inf. Forensics Secur., 2024

2023
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution.
J. Netw. Comput. Appl., July, 2023

Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022

Enabling Efficient Blockage-Aware Handover in RIS-Assisted mmWave Cellular Networks.
IEEE Trans. Wirel. Commun., 2022

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2022

2021
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks.
IEEE Trans. Wirel. Commun., 2021

Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications.
IEEE Commun. Stand. Mag., 2021

Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic.
IEEE Trans. Inf. Forensics Secur., 2020

Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead.
IEEE Netw., 2020

AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking.
Proceedings of the Security and Privacy in Digital Economy, 2020

Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Efficient Physical Layer Group Key Generation in 5G Wireless Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Physical Layer Key Generation in 5G Wireless Networks.
IEEE Wirel. Commun., 2019

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.
IEEE Internet Things J., 2019

Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A novel scheme of anonymous authentication on trust in Pervasive Social Networking.
Inf. Sci., 2018

Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

2015
Anonymous Authentication for Trustworthy Pervasive Social Networking.
IEEE Trans. Comput. Soc. Syst., 2015


  Loading...