


default search action
BibTeX records: Huanhuan Song 0001
@article{DBLP:journals/iotj/ZhangWWMLTSWM25,
author = {Gaoyuan Zhang and
Pengfei Wang and
Weiguang Wang and
Yu Mu and
Yiwei Li and
Jie Tang and
Huanhuan Song and
Hong Wen and
Shahid Mumtaz},
title = {An Information-Theoretic Approach to Distributed Detection for Mobile
Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown
or Complicated Environment: Design, Analysis, and Evaluation of the
Attack Strategy},
journal = {{IEEE} Internet Things J.},
volume = {12},
number = {4},
pages = {3689--3706},
year = {2025},
url = {https://doi.org/10.1109/JIOT.2024.3494035},
doi = {10.1109/JIOT.2024.3494035},
timestamp = {Fri, 07 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/ZhangWWMLTSWM25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuWWSLC25,
author = {Xinchen Xu and
Hong Wen and
Yongfeng Wang and
Huanhuan Song and
Tian Liu and
Shih{-}Yu Chang},
title = {Digital-Twin-Based Satellite Orbit Prediction for Internet of Things
Systems},
journal = {{IEEE} Internet Things J.},
volume = {12},
number = {6},
pages = {6431--6444},
year = {2025},
url = {https://doi.org/10.1109/JIOT.2024.3424672},
doi = {10.1109/JIOT.2024.3424672},
timestamp = {Thu, 17 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/XuWWSLC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ZhaoSWCHF25,
author = {Runhui Zhao and
Huanhuan Song and
Hong Wen and
Zhiwei Chen and
Wenjing Hou and
Xuewei Feng},
title = {Wireless Security Enhancement Framework Based on {AI} and {RIS} in
Industrial IoT Networks},
journal = {{IEEE} Netw.},
volume = {39},
number = {4},
pages = {29--36},
year = {2025},
url = {https://doi.org/10.1109/MNET.2025.3543829},
doi = {10.1109/MNET.2025.3543829},
timestamp = {Sat, 09 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/network/ZhaoSWCHF25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HuFCWSTW25,
author = {Lin Hu and
Jiabing Fan and
Qianbin Chen and
Hong Wen and
Huanhuan Song and
Jie Tang and
Jinsong Wu},
title = {Joint Secure Transmission and Interference Mitigation in Cooperative
{MIMO} Systems: {A} Feasibility Study},
journal = {{IEEE} Trans. Veh. Technol.},
volume = {74},
number = {3},
pages = {4208--4220},
year = {2025},
url = {https://doi.org/10.1109/TVT.2024.3486295},
doi = {10.1109/TVT.2024.3486295},
timestamp = {Tue, 08 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tvt/HuFCWSTW25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RazaqSPH24,
author = {Mian Muaz Razaq and
Huanhuan Song and
Limei Peng and
Pin{-}Han Ho},
title = {Optimizing Secrecy Energy Efficiency in RIS-assisted {MISO} systems
using Deep Reinforcement Learning},
journal = {Comput. Commun.},
volume = {217},
pages = {126--133},
year = {2024},
url = {https://doi.org/10.1016/j.comcom.2024.01.020},
doi = {10.1016/J.COMCOM.2024.01.020},
timestamp = {Mon, 30 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/comcom/RazaqSPH24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ZhangCTSWM24,
author = {Gaoyuan Zhang and
Kai Chen and
Jie Tang and
Huanhuan Song and
Hong Wen and
Shahid Mumtaz},
title = {Distributed Decision Fusion in Wireless Sensor Networks for Contextual
Experience Sensing and Recommendation Forming in E-Commerce},
journal = {{IEEE} Trans. Consumer Electron.},
volume = {70},
number = {4},
pages = {6817--6829},
year = {2024},
url = {https://doi.org/10.1109/TCE.2024.3411625},
doi = {10.1109/TCE.2024.3411625},
timestamp = {Sat, 25 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tce/ZhangCTSWM24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SongWTHZ23,
author = {Huanhuan Song and
Hong Wen and
Jie Tang and
Pin{-}Han Ho and
Runhui Zhao},
title = {Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted
{MISO} Secure Communications},
journal = {{IEEE} Internet Things J.},
volume = {10},
number = {5},
pages = {4462--4474},
year = {2023},
url = {https://doi.org/10.1109/JIOT.2022.3218664},
doi = {10.1109/JIOT.2022.3218664},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/SongWTHZ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/ChenHHSW23,
author = {Yi Chen and
Kadhim Hayawi and
Jianxin He and
Huanhuan Song and
Jiarui Wang},
title = {Impact and Challenges of Intelligent IoT in Meteorological Science},
journal = {{IEEE} Internet Things Mag.},
volume = {6},
number = {2},
pages = {58--63},
year = {2023},
url = {https://doi.org/10.1109/IOTM.001.2300055},
doi = {10.1109/IOTM.001.2300055},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotm/ChenHHSW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/XuWSZ23,
author = {Xinchen Xu and
Hong Wen and
Huanhuan Song and
Yingwei Zhao},
title = {A {DT} Machine Learning-Based Satellite Orbit Prediction for IoT Applications},
journal = {{IEEE} Internet Things Mag.},
volume = {6},
number = {2},
pages = {96--100},
year = {2023},
url = {https://doi.org/10.1109/IOTM.001.2200271},
doi = {10.1109/IOTM.001.2200271},
timestamp = {Mon, 24 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotm/XuWSZ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/YuSWLL23,
author = {Ziyang Yu and
Huanhuan Song and
Hong Wen and
Yonghuang Liu and
Wen Li},
title = {A Hardware Simulation Platform of Artificial Noise-Assisted {MIMO}
Communication System Based on LabVIEW-USRP},
booktitle = {34th {IEEE} Annual International Symposium on Personal, Indoor and
Mobile Radio Communications {PIMRC} 2023, Toronto, ON, Canada, September
5-8, 2023},
pages = {1--6},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/PIMRC56721.2023.10294015},
doi = {10.1109/PIMRC56721.2023.10294015},
timestamp = {Tue, 18 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/pimrc/YuSWLL23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/TangWS22,
author = {Jie Tang and
Hong Wen and
Huanhuan Song},
title = {Physical layer authentication for 5G/6G millimeter wave communications
by using channel sparsity},
journal = {{IET} Commun.},
volume = {16},
number = {3},
pages = {206--217},
year = {2022},
url = {https://doi.org/10.1049/cmu2.12330},
doi = {10.1049/CMU2.12330},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-com/TangWS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TangWSJZ22,
author = {Jie Tang and
Hong Wen and
Huan{-}Huan Song and
Long Jiao and
Kai Zeng},
title = {Sharing Secrets via Wireless Broadcasting: {A} New Efficient Physical
Layer Group Secret Key Generation for Multiple IoT Devices},
journal = {{IEEE} Internet Things J.},
volume = {9},
number = {16},
pages = {15228--15239},
year = {2022},
url = {https://doi.org/10.1109/JIOT.2022.3147598},
doi = {10.1109/JIOT.2022.3147598},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/TangWSJZ22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SongWYTCZXC21,
author = {Huanhuan Song and
Hong Wen and
Qicong Yang and
Jie Tang and
Yi Chen and
Tengyue Zhang and
FeiYi Xie and
Songlin Chen},
title = {Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled
{CPS}},
journal = {{IEEE} Access},
volume = {9},
pages = {27287--27297},
year = {2021},
url = {https://doi.org/10.1109/ACCESS.2021.3058603},
doi = {10.1109/ACCESS.2021.3058603},
timestamp = {Wed, 11 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/SongWYTCZXC21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HouWSLZ21,
author = {Wenjing Hou and
Hong Wen and
Huanhuan Song and
Wenxin Lei and
Wei Zhang},
title = {Multiagent Deep Reinforcement Learning for Task Offloading and Resource
Allocation in Cybertwin-Based Networks},
journal = {{IEEE} Internet Things J.},
volume = {8},
number = {22},
pages = {16256--16268},
year = {2021},
url = {https://doi.org/10.1109/JIOT.2021.3095677},
doi = {10.1109/JIOT.2021.3095677},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/HouWSLZ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangWTSX21,
author = {Tengyue Zhang and
Hong Wen and
Jie Tang and
Huanhuan Song and
FeiYi Xie},
title = {Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided
by Edge Computing Intelligent Node Selection},
journal = {{IEEE} Trans. Ind. Informatics},
volume = {17},
number = {7},
pages = {4999--5009},
year = {2021},
url = {https://doi.org/10.1109/TII.2020.3017767},
doi = {10.1109/TII.2020.3017767},
timestamp = {Wed, 11 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tii/ZhangWTSX21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/0005WSW21,
author = {Jie Tang and
Hong Wen and
Huanhuan Song and
Rui{-}Fei Wang},
title = {On the Design of IRS-assisted Directional Reflection for Physical
Layer Secure Transmission},
booktitle = {21st International Conference on Communication Technology, {ICCT}
2021, Tianjin, China, October 13-16, 2021},
pages = {852--857},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ICCT52962.2021.9657962},
doi = {10.1109/ICCT52962.2021.9657962},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icct/0005WSW21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wfcs/ZhangWPS21,
author = {Tengyue Zhang and
Hong Wen and
Zhibo Pang and
Huanhuan Song},
title = {CSI-Free Physical Layer Security against Eavesdropping Attack based
on Intelligent Surface for Industrial Wireless},
booktitle = {17th {IEEE} International Conference on Factory Communication Systems,
{WFCS} 2021, Linz, Austria, June 9-11, 2021},
pages = {175--182},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/WFCS46889.2021.9483599},
doi = {10.1109/WFCS46889.2021.9483599},
timestamp = {Thu, 12 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wfcs/ZhangWPS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiaoWCXPTS20,
author = {Runfa Liao and
Hong Wen and
Songlin Chen and
FeiYi Xie and
Fei Pan and
Jie Tang and
Huanhuan Song},
title = {Multiuser Physical Layer Authentication in Internet of Things With
Data Augmentation},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {3},
pages = {2077--2088},
year = {2020},
url = {https://doi.org/10.1109/JIOT.2019.2960099},
doi = {10.1109/JIOT.2019.2960099},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/LiaoWCXPTS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/0005WSZQ20,
author = {Jie Tang and
Hong Wen and
Huanhuan Song and
Tengyue Zhang and
Kaiyu Qin},
title = {On the Security-Reliability and Secrecy Throughput of Random Mobile
User in Internet of Things},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {10},
pages = {10635--10649},
year = {2020},
url = {https://doi.org/10.1109/JIOT.2020.3005946},
doi = {10.1109/JIOT.2020.3005946},
timestamp = {Wed, 11 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/0005WSZQ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/XieWWHSZLJ20,
author = {FeiYi Xie and
Hong Wen and
Jinsong Wu and
Wenjing Hou and
Huanhuan Song and
Tengyue Zhang and
Runfa Liao and
Yixin Jiang},
title = {Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random
Integration},
journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
volume = {4},
number = {3},
pages = {276--286},
year = {2020},
url = {https://doi.org/10.1109/TETCI.2019.2907740},
doi = {10.1109/TETCI.2019.2907740},
timestamp = {Thu, 12 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tetci/XieWWHSZLJ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SongW0CXLC20,
author = {Huanhuan Song and
Hong Wen and
Jie Tang and
Yi Chen and
FeiYi Xie and
Runfa Liao and
Songlin Chen},
title = {PLS-Based Secrecy Transmission for VANETs},
journal = {{IEEE} Trans. Veh. Technol.},
volume = {69},
number = {7},
pages = {7596--7608},
year = {2020},
url = {https://doi.org/10.1109/TVT.2020.2994446},
doi = {10.1109/TVT.2020.2994446},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tvt/SongW0CXLC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/TangWSZQ20,
author = {Jie Tang and
Hong Wen and
Huanhuan Song and
Kai Zeng and
Kaiyu Qin},
title = {Secure {MIMO-SVD} Communications Against Eavesdroppers With Any Number
of Antennas},
journal = {{IEEE} Trans. Veh. Technol.},
volume = {69},
number = {10},
pages = {11077--11089},
year = {2020},
url = {https://doi.org/10.1109/TVT.2020.3007430},
doi = {10.1109/TVT.2020.3007430},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tvt/TangWSZQ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiaoWWPXSXJC19,
author = {Runfa Liao and
Hong Wen and
Jinsong Wu and
Fei Pan and
Aidong Xu and
Huanhuan Song and
FeiYi Xie and
Yixin Jiang and
Minggui Cao},
title = {Security Enhancement for Mobile Edge Computing Through Physical Layer
Authentication},
journal = {{IEEE} Access},
volume = {7},
pages = {116390--116401},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2934122},
doi = {10.1109/ACCESS.2019.2934122},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/LiaoWWPXSXJC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ZhangWTSLCJ19,
author = {Tengyue Zhang and
Hong Wen and
Jie Tang and
Huanhuan Song and
Runfa Liao and
Yi Chen and
Yixin Jiang},
title = {Analysis of the physical layer security enhancing of wireless communication
system under the random mobile},
journal = {{IET} Commun.},
volume = {13},
number = {9},
pages = {1164--1170},
year = {2019},
url = {https://doi.org/10.1049/iet-com.2018.6012},
doi = {10.1049/IET-COM.2018.6012},
timestamp = {Thu, 12 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iet-com/ZhangWTSLCJ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChenWWSXJZW19,
author = {Yi Chen and
Hong Wen and
Jinsong Wu and
Huanhuan Song and
Aidong Xu and
Yixin Jiang and
Tengyue Zhang and
Zhen Wang},
title = {Clustering Based Physical-Layer Authentication in Edge Computing Systems
with Asymmetric Resources},
journal = {Sensors},
volume = {19},
number = {8},
pages = {1926},
year = {2019},
url = {https://doi.org/10.3390/s19081926},
doi = {10.3390/S19081926},
timestamp = {Thu, 12 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/sensors/ChenWWSXJZW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChenWWXJSC19,
author = {Songlin Chen and
Hong Wen and
Jinsong Wu and
Aidong Xu and
Yixin Jiang and
Huanhuan Song and
Yi Chen},
title = {Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing
for Internet of Things Authentication},
journal = {Sensors},
volume = {19},
number = {16},
pages = {3610},
year = {2019},
url = {https://doi.org/10.3390/s19163610},
doi = {10.3390/S19163610},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sensors/ChenWWXJSC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/SongWLCC19,
author = {Huanhuan Song and
Hong Wen and
Runfa Liao and
Yi Chen and
Songlin Chen},
title = {Outage Constrained Secrecy Rate Maximization for {MIMOME} Multicast
Wiretap Channels},
journal = {{IEEE} Wirel. Commun. Lett.},
volume = {8},
number = {3},
pages = {657--660},
year = {2019},
url = {https://doi.org/10.1109/LWC.2018.2880439},
doi = {10.1109/LWC.2018.2880439},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/wcl/SongWLCC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ChenWSCXYH18,
author = {Yi Chen and
Hong Wen and
Huanhuan Song and
Songlin Chen and
FeiYi Xie and
Qing Yang and
Lin Hu},
title = {Lightweight one-time password authentication scheme based on radio-frequency
fingerprinting},
journal = {{IET} Commun.},
volume = {12},
number = {12},
pages = {1477--1484},
year = {2018},
url = {https://doi.org/10.1049/iet-com.2018.0023},
doi = {10.1049/IET-COM.2018.0023},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-com/ChenWSCXYH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HuWWPLSTW18,
author = {Lin Hu and
Hong Wen and
Bin Wu and
Fei Pan and
Runfa Liao and
Huanhuan Song and
Jie Tang and
Xiumin Wang},
title = {Cooperative Jamming for Physical Layer Security Enhancement in Internet
of Things},
journal = {{IEEE} Internet Things J.},
volume = {5},
number = {1},
pages = {219--228},
year = {2018},
url = {https://doi.org/10.1109/JIOT.2017.2778185},
doi = {10.1109/JIOT.2017.2778185},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/HuWWPLSTW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XieWLCHCS18,
author = {FeiYi Xie and
Hong Wen and
Yushan Li and
Songlin Chen and
Lin Hu and
Yi Chen and
Huanhuan Song},
title = {Optimized Coherent Integration-Based Radio Frequency Fingerprinting
in Internet of Things},
journal = {{IEEE} Internet Things J.},
volume = {5},
number = {5},
pages = {3967--3977},
year = {2018},
url = {https://doi.org/10.1109/JIOT.2018.2871873},
doi = {10.1109/JIOT.2018.2871873},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/XieWLCHCS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SongWHCZL18,
author = {Huanhuan Song and
Hong Wen and
Lin Hu and
Songlin Chen and
Zhengguang Zhang and
Runfa Liao},
title = {Secure Cooperative Transmission With Imperfect Channel State Information
Based on {BPNN}},
journal = {{IEEE} Trans. Veh. Technol.},
volume = {67},
number = {11},
pages = {10482--10491},
year = {2018},
url = {https://doi.org/10.1109/TVT.2018.2849364},
doi = {10.1109/TVT.2018.2849364},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tvt/SongWHCZL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/SongWHCL18,
author = {Huanhuan Song and
Hong Wen and
Lin Hu and
Yi Chen and
Runfa Liao},
title = {Optimal Power Allocation for Secrecy Rate Maximization in Broadcast
Wiretap Channels},
journal = {{IEEE} Wirel. Commun. Lett.},
volume = {7},
number = {4},
pages = {514--517},
year = {2018},
url = {https://doi.org/10.1109/LWC.2018.2792006},
doi = {10.1109/LWC.2018.2792006},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/wcl/SongWHCL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiaoWWSPD18,
author = {Runfa Liao and
Hong Wen and
Jinsong Wu and
Huanhuan Song and
Fei Pan and
Lian Dong},
title = {The Rayleigh Fading Channel Prediction via Deep Learning},
journal = {Wirel. Commun. Mob. Comput.},
volume = {2018},
pages = {6497340:1--6497340:11},
year = {2018},
url = {https://doi.org/10.1155/2018/6497340},
doi = {10.1155/2018/6497340},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/wicomm/LiaoWWSPD18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiaoWPSJXX17,
author = {Runfa Liao and
Hong Wen and
Fei Pan and
Huanhuan Song and
Yixin Jiang and
FeiYi Xie and
Aidong Xu},
title = {A physical layer secure transmission method based on channel prediction
and QoS},
booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
2017, Las Vegas, NV, USA, October 9-11, 2017},
pages = {366--367},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/CNS.2017.8228661},
doi = {10.1109/CNS.2017.8228661},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/LiaoWPSJXX17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SongZWXJLCC17,
author = {Huanhuan Song and
Luping Zhang and
Hong Wen and
Aidong Xu and
Yixin Jiang and
Runfa Liao and
Songlin Chen and
Yi Chen},
title = {Performance analysis of cooperative secure transmission system},
booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
2017, Las Vegas, NV, USA, October 9-11, 2017},
pages = {368--369},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/CNS.2017.8228662},
doi = {10.1109/CNS.2017.8228662},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/SongZWXJLCC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17,
author = {Wei Cheng and
Aidong Xu and
Yixin Jiang and
Hong Wen and
Huanhuan Song and
Kai Ouyang and
Xiping Zhu},
title = {A method of reconciling the key discrepancy by exploiting unconditional
secure transmission},
booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
2017, Las Vegas, NV, USA, October 9-11, 2017},
pages = {372--373},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/CNS.2017.8228664},
doi = {10.1109/CNS.2017.8228664},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17a,
author = {Wei Cheng and
Aidong Xu and
Yixin Jiang and
Hong Wen and
Huanhuan Song and
Kai Ouyang and
Xiping Zhu},
title = {The realization of key extraction based on {USRP} and {OFDM} channel
response},
booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
2017, Las Vegas, NV, USA, October 9-11, 2017},
pages = {374--375},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/CNS.2017.8228665},
doi = {10.1109/CNS.2017.8228665},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/SongWHZZ17,
author = {Huanhuan Song and
Hong Wen and
Lin Hu and
Zhengguang Zhang and
Luping Zhang},
title = {{MISO} Secure Transmission with Imperfect Channel State Information},
booktitle = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto,
ON, Canada, September 24-27, 2017},
pages = {1--5},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/VTCFall.2017.8288215},
doi = {10.1109/VTCFALL.2017.8288215},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/vtc/SongWHZZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/TangWHSZPL16,
author = {Jie Tang and
Hong Wen and
Lin Hu and
Huanhuan Song and
Gao Yuan Zhang and
Fei Pan and
Hongbin Liang},
title = {Associating {MIMO} beamforming with security codes to achieve unconditional
communication security},
journal = {{IET} Commun.},
volume = {10},
number = {12},
pages = {1522--1531},
year = {2016},
url = {https://doi.org/10.1049/iet-com.2016.0039},
doi = {10.1049/IET-COM.2016.0039},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-com/TangWHSZPL16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSTJDZ16,
author = {Luping Zhang and
Hong Wen and
Huanhuan Song and
Jie Tang and
Yixin Jiang and
Weihua Dong and
Xiping Zhu},
title = {The performance of the {MIMO} physical layer security system with
imperfect {CSI}},
booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
2016, Philadelphia, PA, USA, October 17-19, 2016},
pages = {346--347},
publisher = {{IEEE}},
year = {2016},
url = {https://doi.org/10.1109/CNS.2016.7860504},
doi = {10.1109/CNS.2016.7860504},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/ZhangWSTJDZ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZZ16,
author = {Jinling Zhang and
Hong Wen and
Huanhuan Song and
Yixin Jiang and
Zhengguang Zhang and
Luping Zhang and
Xiping Zhu},
title = {Using Basis Expansion Model for Physical Layer Authentication in Time-Variant
System},
booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
2016, Philadelphia, PA, USA, October 17-19, 2016},
pages = {348--349},
publisher = {{IEEE}},
year = {2016},
url = {https://doi.org/10.1109/CNS.2016.7860505},
doi = {10.1109/CNS.2016.7860505},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZZ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZ16,
author = {Zhengguang Zhang and
Hong Wen and
Huanhuan Song and
Yixin Jiang and
Jinling Zhang and
Xiping Zhu},
title = {A {MIMO} cross-layer secure communication scheme based on spatial
modulation},
booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
2016, Philadelphia, PA, USA, October 17-19, 2016},
pages = {350--351},
publisher = {{IEEE}},
year = {2016},
url = {https://doi.org/10.1109/CNS.2016.7860506},
doi = {10.1109/CNS.2016.7860506},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/WenTWSWWHLS15,
author = {Hong Wen and
Jie Tang and
Jinsong Wu and
Huanhuan Song and
Tingyong Wu and
Bin Wu and
Pin{-}Han Ho and
Shichao Lv and
Li{-}Min Sun},
title = {A Cross-Layer Secure Communication Model Based on Discrete Fractional
Fourier Fransform {(DFRFT)}},
journal = {{IEEE} Trans. Emerg. Top. Comput.},
volume = {3},
number = {1},
pages = {119--126},
year = {2015},
url = {https://doi.org/10.1109/TETC.2014.2367415},
doi = {10.1109/TETC.2014.2367415},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tetc/WenTWSWWHLS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/PanWSJW15,
author = {Fei Pan and
Hong Wen and
Huanhuan Song and
Tang Jie and
Longye Wang},
title = {5G security architecture and light weight security authentication},
booktitle = {2015 {IEEE/CIC} International Conference on Communications in China
- Workshops (CIC/ICCC), Shenzhen, China, November 2-4, 2015},
pages = {94--98},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/ICCChinaW.2015.7961587},
doi = {10.1109/ICCCHINAW.2015.7961587},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iccchina/PanWSJW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/TangWSP15,
author = {Jie Tang and
Hong Wen and
Huanhuan Song and
Fei Pan},
title = {Combining {MIMO} beamforming with security codes to achieve unconditional
communication security},
booktitle = {2015 {IEEE/CIC} International Conference on Communications in China
- Workshops (CIC/ICCC), Shenzhen, China, November 2-4, 2015},
pages = {105--109},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/ICCChinaW.2015.7961589},
doi = {10.1109/ICCCHINAW.2015.7961589},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iccchina/TangWSP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/PanSW15,
author = {Fei Pan and
Huanhuan Song and
Hong Wen},
title = {An {OFDM} cross-layer encryption secure communication scheme},
booktitle = {2015 {IEEE/CIC} International Conference on Communications in China
- Workshops (CIC/ICCC), Shenzhen, China, November 2-4, 2015},
pages = {115--119},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/ICCChinaW.2015.7961591},
doi = {10.1109/ICCCHINAW.2015.7961591},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iccchina/PanSW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TangSPWWJGC14,
author = {Jie Tang and
Huanhuan Song and
Fei Pan and
Hong Wen and
Bin Wu and
Yixin Jiang and
Xiaobin Guo and
Zhen Chen},
title = {A {MIMO} cross-layer precoding security communication system},
booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
San Francisco, CA, USA, October 29-31, 2014},
pages = {500--501},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/CNS.2014.6997524},
doi = {10.1109/CNS.2014.6997524},
timestamp = {Tue, 24 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/TangSPWWJGC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













