Wei Li

Orcid: 0000-0003-4133-2215

Affiliations:
  • National University of Defense Technology, School of Electronic Science and Engineering, Changsha, China (PhD 2012)


According to our database1, Wei Li authored at least 42 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Physical-Layer Authentication Based on Channel Phase Responses for Multi-Carriers Transmission.
IEEE Trans. Inf. Forensics Secur., 2023

Edge AI as a Service: Configurable Model Deployment and Delay-Energy Optimization With Result Quality Constraints.
IEEE Trans. Cloud Comput., 2023

Waveform Design of DFRC System for Target Detection in Clutter Environment.
IEEE Signal Process. Lett., 2023

2022
Improved Physical Layer Authentication Scheme Based on Wireless Channel Phase.
IEEE Wirel. Commun. Lett., 2022

Secret key generation based on signal power allocation optimisation.
IET Commun., 2022

A Physical Encryption Scheme for OTFS System.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Analytical Method of Physical Layer Authentication for Performance Evaluation.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

2021
Intelligent Reflecting Surface Assisted Secret Key Generation.
IEEE Signal Process. Lett., 2021

2020
Encrypted subblock design aided OFDM with all index modulation.
IET Commun., 2020

Encryption scheme against eavesdropper collusion in wireless multi-user network.
IET Commun., 2020

Design of a Physical Layer Encryption Scheme for Rate Compatible Modulation.
IEEE Access, 2020

A Joint Scheme for PAPR Reduction of OFDM Signals based on 3-D Constellation Rotation Encryption.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Energy-Efficient Transmit Power And Straight Trajectory Optimization In Uav-Aided Wireless Sensor Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Physical Layer Encryption Algorithm Based on Length-Compatible Polar Codes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Design of Mapping Matrix for Arithmetic Bit-Interleaved Coded Modulation.
IEEE Access, 2019

A Joint Physical Layer Encryption and PAPR Reduction Scheme Based on Polar Codes and Chaotic Sequences in OFDM System.
IEEE Access, 2019

Physical Layer Encryption Algorithm Based on Polar Codes and Chaotic Sequences.
IEEE Access, 2019

Asymmetric Physical Layer Encryption for Wireless Communications.
IEEE Access, 2019

Cryptographic Primitives and Design Frameworks of Physical Layer Encryption for Wireless Communications.
IEEE Access, 2019

Design of an Energy-Efficient Multidimensional Secure Constellation for 5G Communications.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

2018
Concatenated physical layer encryption scheme based on rateless codes.
IET Commun., 2018

Multi-dimensional encryption scheme based on physical layer for fading channel.
IET Commun., 2018

Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System.
IEEE Access, 2018

Mathematical Model and Framework of Physical Layer Encryption for Wireless Communications.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application.
Wirel. Pers. Commun., 2017

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase.
Mob. Inf. Syst., 2017

Energy-efficient power allocation and mode selection in hybrid multi-cell architecture with limited backhaul capacity.
IET Commun., 2017

Adaptable Hybrid Filter Bank Analog-to-Digital Converters for Simplifying Wideband Receivers.
IEEE Commun. Lett., 2017

Increasing secret key capacity of OFDM systems: a geometric program approach.
Concurr. Comput. Pract. Exp., 2017

2016
Dynamic Optimization for Resource Allocation in Relay-Aided OFDMA Systems Under Multiservice.
IEEE Trans. Veh. Technol., 2016

Moving window scheme for extracting secret keys in stationary environments.
IET Commun., 2016

Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper.
IEEE Access, 2016

Power Allocation for AN-Aided Beamforming Design in MISO Wiretap Channels with Finite-Alphabet Signaling.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
On the performance indexes of physical layer security for multi-beam satellite networks.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Secret key generation via random beamforming in stationary environment.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

2014
Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region.
IET Commun., 2014

2013
Worst-case robust masked beamforming for secure broadcasting.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis.
IEEE Commun. Lett., 2012

2008
An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Evolutionary Topology Unaware TDMA MAC Protocol for Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
An Evolutionary-Dynamic TDMA Slot Assignment Protocol for Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007


  Loading...