default search action
Aiqun Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j89]Honghai Tang, Guyue Li, Tao Guo, Aiqun Hu:
A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS. IEEE Commun. Lett. 28(4): 783-787 (2024) - [j88]Wentao Jing, Linning Peng, Hua Fu, Aiqun Hu:
An Authentication Mechanism Based on Zero Trust With Radio Frequency Fingerprint for Internet of Things Networks. IEEE Internet Things J. 11(13): 23683-23698 (2024) - [j87]Xiaowei Yuan, Yu Jiang, Guyue Li, Aiqun Hu:
Wireless Channel Key Generation Based on Multisubcarrier Phase Difference. IEEE Internet Things J. 11(20): 32939-32955 (2024) - [j86]Zhen Zhang, Aiqun Hu, Xinyu Qi, Tianshu Chen:
A channel resilient RFF extraction scheme for cyclic prefix contained systems. Phys. Commun. 66: 102444 (2024) - [j85]Jiangtao Wang, Aiqun Hu, Wanling Tian, Jiabao Yu, Xudong Chen:
A practical scheme for enhancing consistency and independence in wireless key generation for Wi-Fi networks. Phys. Commun. 67: 102508 (2024) - [j84]Qingjiang Xiao, Jinrong Zhao, Sheng Feng, Guyue Li, Aiqun Hu:
Securing NextG networks with physical-layer key generation: A survey. Secur. Saf. 3: 2023021 (2024) - [j83]Lingnan Xie, Linning Peng, Junqing Zhang, Aiqun Hu:
Radio frequency fingerprint identification for Internet of Things: A survey. Secur. Saf. 3: 2023022 (2024) - [j82]Aiqun Hu, Liang Jin, Xiangyun Zhou, Feng Shu, Xiangwei Zhou:
Preface: Security and safety in physical layer systems. Secur. Saf. 3: 2024001 (2024) - [j81]Shuai Wang, Aiqun Hu, Tao Li, Shaofan Lin:
Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis. Symmetry 16(2): 249 (2024) - [j80]Xinyu Qi, Aiqun Hu, Zhen Zhang:
Data-and-Channel-Independent Radio Frequency Fingerprint Extraction for LTE-V2X. IEEE Trans. Cogn. Commun. Netw. 10(3): 905-919 (2024) - [j79]Pengcheng Yin, Linning Peng, Guanxiong Shen, Junqing Zhang, Ming Liu, Hua Fu, Aiqun Hu, Xianbin Wang:
Multi-Channel CNN-Based Open-Set RF Fingerprint Identification for LTE Devices. IEEE Trans. Cogn. Commun. Netw. 10(5): 1788-1800 (2024) - [j78]Jinguang Han, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. IEEE Trans. Dependable Secur. Comput. 21(4): 1680-1694 (2024) - [j77]Xinyu Qi, Aiqun Hu, Tianshu Chen:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. IEEE Trans. Inf. Forensics Secur. 19: 1056-1070 (2024) - [j76]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. IEEE Trans. Inf. Forensics Secur. 19: 5090-5105 (2024) - [j75]Zechen Zhang, Guyue Li, Jitong Shi, Haobo Li, Aiqun Hu:
Real-World Aircraft Recognition Based on RF Fingerprinting With Few Labeled ADS-B Signals. IEEE Trans. Veh. Technol. 73(2): 2866-2871 (2024) - [j74]Xinwei Zhang, Guyue Li, Junqing Zhang, Linning Peng, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. IEEE Trans. Veh. Technol. 73(7): 10135-10149 (2024) - [j73]Linning Peng, Zhenni Wu, Junqing Zhang, Ming Liu, Hua Fu, Aiqun Hu:
Hybrid RFF Identification for LTE Using Wavelet Coefficient Graph and Differential Spectrum. IEEE Trans. Veh. Technol. 73(8): 11621-11636 (2024) - [j72]Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. IEEE Trans. Wirel. Commun. 23(3): 2153-2166 (2024) - [j71]Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang:
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. IEEE Wirel. Commun. 31(1): 118-124 (2024) - [j70]Lei Hu, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation. IEEE Wirel. Commun. Lett. 13(2): 417-421 (2024) - [c78]Yufan Song, Liquan Chen, Tianyu Lu, Peng Zhang, Aiqun Hu:
Joint Design of Balance Mechanism and Compensation Strategy in K-means Clustering Assisted Physical Layer Key Generation. INFOCOM (Workshops) 2024: 1-6 - [c77]Bingshu Dong, Aiqun Hu, Jiabao Yu, Hongxia Chen, Zhiyi Shi:
A Robust Radio Frequency Fingerprint Extraction Method Based on Channel Reciprocity. WCNC 2024: 1-6 - 2023
- [j69]Xinyu Qi, Aiqun Hu:
Toward Novel Time Representations for RFF Identification Using Imperfect Data Sets. IEEE Internet Things J. 10(3): 2743-2753 (2023) - [j68]Yuexiu Xing, Aiqun Hu, Junqing Zhang, Linning Peng, Xianbin Wang:
Design of a Channel Robust Radio Frequency Fingerprint Identification Scheme. IEEE Internet Things J. 10(8, April 15): 6946-6959 (2023) - [j67]Junxian Shi, Linning Peng, Hua Fu, Aiqun Hu:
Robust RF Fingerprint Extraction Based on Cyclic Shift Characteristic. IEEE Internet Things J. 10(21): 19218-19233 (2023) - [j66]Hua Fu, Linning Peng, Ming Liu, Aiqun Hu:
Deep Learning-Based RF Fingerprint Identification With Channel Effects Mitigation. IEEE Open J. Commun. Soc. 4: 1668-1681 (2023) - [j65]Lanting Fang, Kaiyu Feng, Jie Gui, Shanshan Feng, Aiqun Hu:
Anonymous Edge Representation for Inductive Anomaly Detection in Dynamic Bipartite Graphs. Proc. VLDB Endow. 16(5): 1154-1167 (2023) - [j64]Renjie Xie, Wei Xu, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
Disentangled Representation Learning for RF Fingerprint Extraction Under Unknown Channel Statistics. IEEE Trans. Commun. 71(7): 3946-3962 (2023) - [j63]Lei Hu, Chen Sun, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems. IEEE Trans. Commun. 71(11): 6499-6513 (2023) - [j62]Tianyu Lu, Liquan Chen, Junqing Zhang, Chen Chen, Aiqun Hu:
Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation. IEEE Trans. Inf. Forensics Secur. 18: 3251-3266 (2023) - [j61]Lanting Fang, Yong Luo, Kaiyu Feng, Kaiqi Zhao, Aiqun Hu:
A Knowledge-Enriched Ensemble Method for Word Embedding and Multi-Sense Embedding. IEEE Trans. Knowl. Data Eng. 35(6): 5534-5549 (2023) - [j60]Lanting Fang, Kaiyu Feng, Kaiqi Zhao, Aiqun Hu, Tao Li:
Unsupervised Rumor Detection Based on Propagation Tree VAE. IEEE Trans. Knowl. Data Eng. 35(10): 10309-10323 (2023) - [j59]Dongming Li, Xuan Yang, Aiqun Hu, Fuhui Zhou, Octavia A. Dobre:
LTE Device Radio Frequency Fingerprints Blind Extraction Based on Temporal-Frequency Domain PRACH Signals. IEEE Trans. Veh. Technol. 72(10): 13229-13242 (2023) - [j58]Yilun Sun, Guyue Li, Hongyi Luo, Yuexiu Xing, Shuping Dang, Aiqun Hu:
Location-Invariant Radio Frequency Fingerprint for Base Station Recognition. IEEE Wirel. Commun. Lett. 12(9): 1583-1587 (2023) - [c76]Huaicong Zhang, Jiabao Yu, Xudong Chen, Ye Tian, Wangdong Qi, Aiqun Hu:
A Low-cost ESP32-driven Wireless Key Generation System Based on Response Mechanism. ICCCS 2023: 708-713 - [c75]Hongyi Luo, Guyue Li, Yuexiu Xing, Junqing Zhang, Aiqun Hu, Xianbin Wang:
RelativeRFF: Multi-Antenna Device Identification in Multipath Propagation Scenarios. ICC 2023: 3708-3713 - [c74]Haixi Sun, Guyue Li, Haoyu Li, Aiqun Hu, Yexia Cheng, Ye Tian, Shen He:
A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI. ICCC 2023: 1-6 - [c73]Qingchun Meng, Guyue Li, Jitong Shi, Aiqun Hu:
Enhancing RF Fingerprinting with a Simulated Attack Detection Strategy for Few Labeled Signals. ICCT 2023: 281-285 - [c72]Yuexiu Xing, Xiaoxing Chen, Junqing Zhang, Aiqun Hu, Dengyin Zhang:
A Noise-Robust Radio Frequency Fingerprint Identification Scheme for Internet of Things Devices. INFOCOM Workshops 2023: 1-6 - [c71]Yi Huang, Aiqun Hu, Jiayi Fan, Huifeng Tian:
Joint Estimation of Transmitter IQ Imbalance and Nonlinearity with Multipath in OFDM Systems. VTC Fall 2023: 1-6 - [c70]Hongyuan Li, Liquan Chen, Tianyu Lu, Aiqun Hu:
Angular-domain Secret Key Generation for RIS-aided mmWave MIMO systems. VTC Fall 2023: 1-6 - [c69]Haoyu Li, Guyue Li, Lei Hu, Aiqun Hu, Derrick Wing Kwan Ng:
RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift Optimization. VTC Fall 2023: 1-5 - [c68]Zhiyi Shi, Aiqun Hu, Jiabao Yu, Hongxia Chen, Bingshu Dong, Xudong Chen:
A Novel Radio Frequency Fingerprint Extraction Method Against Variable Channel Characteristics. WCSP 2023: 719-724 - [c67]Yan Chen, Jiabao Yu, Hongxia Chen, Bingshu Dong, Siya Mi, Aiqun Hu:
A Channel Robust Radio Frequency Fingerprint Authentication Method Based on Hadamard Product Comparison. WCSP 2023: 779-784 - [d1]Junxian Shi, Linning Peng, Hua Fu, Aiqun Hu:
ZIGBEE_RFF_DATASET. IEEE DataPort, 2023 - [i17]Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang:
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. CoRR abs/2301.01453 (2023) - [i16]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation. CoRR abs/2303.07015 (2023) - [i15]Lei Hu, Chen Sun, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems. CoRR abs/2303.12455 (2023) - 2022
- [j57]Yun Hu, Aiqun Hu, Chunguo Li, Peng Li, Chunyu Zhang:
Towards a privacy protection-capable noise fingerprinting for numerically aggregated data. Comput. Secur. 119: 102755 (2022) - [j56]Tianyu Lu, Liquan Chen, Junqing Zhang, Kailin Cao, Aiqun Hu:
Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments. IEEE Commun. Lett. 26(2): 244-248 (2022) - [j55]Zhen Zhang, Aiqun Hu, Wei Xu, Jiabao Yu, Yang Yang:
An Artificial Radio Frequency Fingerprint Embedding Scheme for Device Identification. IEEE Commun. Lett. 26(5): 974-978 (2022) - [j54]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 9(8): 6081-6094 (2022) - [j53]Yang Yang, Aiqun Hu, Jiabao Yu:
A practical radio frequency fingerprinting scheme for mobile phones identification. Phys. Commun. 55: 101876 (2022) - [j52]Rong Yang, Aiqun Hu:
Secure transmission technology based on direct modulation with random channel characteristics. Secur. Saf. 1: 2022006 (2022) - [j51]Guyue Li, Chen Sun, Wei Xu, Marco Di Renzo, Aiqun Hu:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. IEEE Trans. Inf. Forensics Secur. 17: 211-225 (2022) - [j50]Liyan Yang, Yubo Song, Shang Gao, Aiqun Hu, Bin Xiao:
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN. IEEE Trans. Netw. Serv. Manag. 19(3): 2269-2281 (2022) - [j49]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? IEEE Wirel. Commun. 29(4): 146-153 (2022) - [c66]Yanjin Qiu, Linning Peng, Junqing Zhang, Ming Liu, Hua Fu, Aiqun Hu:
Signal-independent RFF Identification for LTE Mobile Devices via Ensemble Deep Learning. GLOBECOM 2022: 37-42 - [c65]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. GLOBECOM 2022: 2352-2357 - [c64]Xiaowei Yuan, Yu Jiang, Aiqun Hu, Cheng Guo:
Wireless Channel Key Generation for Multi-User Access Scenarios. ICCC 2022: 179-184 - [c63]Jiaqi Liu, Aiqun Hu, Sheng Li:
Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet Card. CSP 2022: 102-107 - [c62]Zhichao Huang, Guyue Li, Aiqun Hu, Jiabao Yu, Siyun Wu:
Recognizing Automotive Ethernet Device by Extracting Fingerprint from Power Spectrum. ICCT 2022: 1442-1446 - [c61]Wei Fang, Jiabao Yu, Yanjun Ding, Xiaozhong Hu, Sheng Li, Aiqun Hu:
Research on Terminal Fingerprint Extraction and Temperature Adaptability Based on CAN Bus. ICCT 2022: 1506-1511 - [c60]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. INFOCOM 2022: 1-10 - [c59]Jie Xu, Aiqun Hu:
Subframes Discrimination and Time Synchronization Methods in LTE-V2X System. M&N 2022: 1-6 - [c58]Tianshu Chen, Hong Shen, Aiqun Hu, Weihang He, Jie Xu, Hongxing Hu:
Radio Frequency Fingerprints Extraction for LTE-V2X: A Channel Estimation Based Methodology. VTC Fall 2022: 1-6 - [c57]Yujie Hou, Guyue Li, Shuping Dang, Lei Hu, Aiqun Hu:
Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation. VTC Fall 2022: 1-5 - [c56]Xinyu Qi, Aiqun Hu:
Embrace Imperfect Datasets: New Time Representation for RFF Identification. VTC Fall 2022: 1-6 - [c55]Zhenni Wu, Linning Peng, Junqing Zhang, Ming Liu, Hua Fu, Aiqun Hu:
Authorized and Rogue LTE Terminal Identification Using Wavelet Coefficient Graph with Auto-encoder. VTC Fall 2022: 1-5 - [i14]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. CoRR abs/2207.11752 (2022) - [i13]Tianyu Lu, Liquan Chen, Junqing Zhang, Chen Chen, Aiqun Hu:
Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation. CoRR abs/2208.00218 (2022) - [i12]Renjie Xie, Wei Xu, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics. CoRR abs/2208.02724 (2022) - [i11]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. CoRR abs/2211.03065 (2022) - [i10]Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. CoRR abs/2211.03132 (2022) - 2021
- [j48]Zekun Chen, Linning Peng, Aiqun Hu, Hua Fu:
Generative adversarial network-based rogue device identification using differential constellation trace figure. EURASIP J. Wirel. Commun. Netw. 2021(1): 72 (2021) - [j47]Guyue Li, Zheying Zhang, Junqing Zhang, Aiqun Hu:
Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet Things J. 8(1): 357-369 (2021) - [j46]Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu:
A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition. IEEE Internet Things J. 8(14): 11276-11289 (2021) - [j45]Yun Hu, Chunguo Li, Aiqun Hu, Aoting Hu, Jiangbo Zhao:
Trading off data resource availability and privacy preservation in multi-layer network transaction. Phys. Commun. 46: 101317 (2021) - [j44]Yang Yang, Aiqun Hu, Jiabao Yu, Guyue Li, Zhen Zhang:
Radio frequency fingerprint identification based on stream differential constellation trace figures. Phys. Commun. 49: 101458 (2021) - [j43]Yu Jiang, Hua Fu, Aiqun Hu, Wen Sun:
A LoRa-Based Lightweight Secure Access Enhancement System. Secur. Commun. Networks 2021: 3530509:1-3530509:16 (2021) - [j42]Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. IEEE Trans. Inf. Forensics Secur. 16: 968-982 (2021) - [j41]Renjie Xie, Wei Xu, Yanzhi Chen, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication. IEEE Trans. Inf. Forensics Secur. 16: 4435-4450 (2021) - [j40]Guyue Li, Yinghao Xu, Wei Xu, Eduard A. Jorswieck, Aiqun Hu:
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications. IEEE Trans. Inf. Forensics Secur. 16: 5264-5278 (2021) - [j39]Yuexiu Xing, Ting Wang, Fen Zhou, Aiqun Hu, Guyue Li, Linning Peng:
EVAL Cane: Nonintrusive Monitoring Platform With a Novel Gait-Based User-Identification Scheme. IEEE Trans. Instrum. Meas. 70: 1-15 (2021) - [j38]Yang Yang, Aiqun Hu, Yuexiu Xing, Jiabao Yu, Zhen Zhang:
A Data-Independent Radio Frequency Fingerprint Extraction Scheme. IEEE Wirel. Commun. Lett. 10(11): 2524-2527 (2021) - [c54]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CCS 2021: 2096-2112 - [c53]Bing Chen, Yubo Song, Zhenchao Zhu, Shang Gao, Junbo Wang, Aiqun Hu:
Authenticating Mobile Wireless Device Through Per-packet Channel State Information. DSN Workshops 2021: 78-84 - [c52]Pengcheng Yin, Linning Peng, Junqing Zhang, Ming Liu, Hua Fu, Aiqun Hu:
LTE Device Identification Based on RF Fingerprint with Multi-Channel Convolutional Neural Network. GLOBECOM 2021: 1-6 - [c51]Xiaosong Ma, Yubo Song, Zhongwei Wang, Shang Gao, Bin Xiao, Aiqun Hu:
You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording. ICC 2021: 1-6 - [c50]Yinghao Xu, Aiqun Hu, Guyue Li:
LOBBY: A Novel Physical-layer Key Generation Method. ICCBN 2021: 295-299 - [c49]Tao Li, Xu Hu, Aiqun Hu:
Neural Control Based Research of Endogenous Security Model. ICAIS (2) 2021: 242-252 - [c48]Lei Hu, Guyue Li, Hongyi Luo, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. VTC Fall 2021: 1-5 - [c47]Xinzao Jiang, Yubo Song, Rui Song, Aiqun Hu:
Data desensitization mechanism of Android application based on differential privacy. VTC Fall 2021: 1-5 - [c46]Chenlu Li, Yu Jiang, Aiqun Hu:
CSI Measurement and Reciprocity Evaluation Method Based on Embedded Platform. VTC Fall 2021: 1-6 - [c45]Xinwei Zhang, Guyue Li, Zongyue Hou, Aiqun Hu:
Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network. VTC Fall 2021: 1-6 - [i9]You Chen, Guyue Li, Cunhua Pan, Lei Hu, Aiqun Hu:
Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network. CoRR abs/2105.00511 (2021) - [i8]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems. CoRR abs/2105.08364 (2021) - [i7]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CoRR abs/2107.13190 (2021) - [i6]Renjie Xie, Wei Xu, Yanzhi Chen, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication. CoRR abs/2108.04436 (2021) - [i5]Lei Hu, Guyue Li, Hongyi Luo, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. CoRR abs/2108.05497 (2021) - [i4]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. CoRR abs/2112.02273 (2021) - [i3]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? CoRR abs/2112.10043 (2021) - 2020
- [j37]Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo:
A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels. IEEE Access 8: 138406-138446 (2020) - [j36]Xuyang Wang, Aiqun Hu, Hao Fang:
Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice. IET Inf. Secur. 14(3): 342-351 (2020) - [j35]Yuexiu Xing, Aiqun Hu, Junqing Zhang, Jiabao Yu, Guyue Li, Ting Wang:
Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar. IEEE Internet Things J. 7(10): 10581-10593 (2020) - [j34]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Yubo Song, Kui Ren:
Detection and Mitigation of DoS Attacks in Software Defined Networks. IEEE/ACM Trans. Netw. 28(3): 1419-1433 (2020) - [j33]Linning Peng, Junqing Zhang, Ming Liu, Aiqun Hu:
Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure. IEEE Trans. Veh. Technol. 69(1): 1091-1095 (2020) - [c44]Liyan Yang, Yubo Song, Shang Gao, Bin Xiao, Aiqun Hu:
Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN. GLOBECOM 2020: 1-6 - [c43]Xiuting Wu, Yu Jiang, Aiqun Hu:
LoRa Devices Identification Based on Differential Constellation Trace Figure. ICAIS (1) 2020: 658-669 - [c42]Sheng Wang, Linning Peng, Hua Fu, Aiqun Hu, Xinyu Zhou:
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. INFOCOM Workshops 2020: 115-120 - [i2]Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. CoRR abs/2009.09142 (2020)
2010 – 2019
- 2019
- [j32]Guyue Li, Jiabao Yu, Yuexiu Xing, Aiqun Hu:
Location-Invariant Physical Layer Identification Approach for WiFi Devices. IEEE Access 7: 106974-106986 (2019) - [j31]Yu Jiang, Aiqun Hu, Jie Huang:
A lightweight physical-layer based security strategy for Internet of things. Clust. Comput. 22(5): 12971-12983 (2019) - [j30]Yu Jiang, Aiqun Hu, Jie Huang:
Importance-based entropy measures of complex networks' robustness to attacks. Clust. Comput. 22(Supplement): 3981-3988 (2019) - [j29]Yu Jiang, Linning Peng, Aiqun Hu, Sheng Wang, Yi Huang, Lu Zhang:
Physical layer identification of LoRa devices using constellation trace figure. EURASIP J. Wirel. Commun. Netw. 2019: 223 (2019) - [j28]Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao, Aiqun Hu:
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 21(5): 497 (2019) - [j27]Guyue Li, Zheying Zhang, Yi Yu, Aiqun Hu:
A Hybrid Information Reconciliation Method for Physical Layer Key Generation. Entropy 21(7): 688 (2019) - [j26]Boqian Liu, Aiqun Hu, Guyue Li:
Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems. IEEE Commun. Lett. 23(9): 1493-1496 (2019) - [j25]Linning Peng, Aiqun Hu, Junqing Zhang, Yu Jiang, Jiabao Yu, Yan Yan:
Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme. IEEE Internet Things J. 6(1): 349-360 (2019) - [j24]Jiabao Yu, Aiqun Hu, Guyue Li, Linning Peng:
A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network. IEEE Internet Things J. 6(4): 6786-6799 (2019) - [j23]Linning Peng, Guyue Li, Junqing Zhang, Roger F. Woods, Ming Liu, Aiqun Hu:
An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation. IEEE Trans. Mob. Comput. 18(3): 507-519 (2019) - [c41]Fengjie Deng, Yubo Song, Aiqun Hu, Min Fan, Yu Jiang:
Abnormal traffic detection of IoT terminals based on Bloom filter. ACM TUR-C 2019: 126:1-126:7 - [c40]Yubo Song, Qiang Huang, Junjie Yang, Ming Fan, Aiqun Hu, Yu Jiang:
IoT device fingerprinting for relieving pressure in the access control. ACM TUR-C 2019: 143:1-143:8 - [c39]Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu:
Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification. CNS 2019: 196-204 - [c38]Guyue Li, Liangjun Hu, Aiqun Hu:
Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks. ICC Workshops 2019: 1-6 - [c37]Linning Peng, Aiqun Hu:
A Design of Deep Learning Based Optical Fiber Ethernet Device Fingerprint Identification System. ICC 2019: 1-6 - [c36]Li Yao, Linning Peng, Guyue Li, Hua Fu, Aiqun Hu:
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels. ICCT 2019: 113-117 - [c35]Yufan Wang, Linning Peng, Hua Fu, Guyue Li, Aiqun Hu:
Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System. ICCT 2019: 270-275 - [c34]Zheying Zhang, Guyue Li, Aiqun Hu:
An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation. VTC Spring 2019: 1-5 - [c33]Yuexiu Xing, Aiqun Hu, Jiabao Yu, Guyue Li, Linning Peng, Fen Zhou:
A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars. WiMob 2019: 1-6 - [c32]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. WiMob 2019: 1-6 - [c31]Lanting Fang, Yong Luo, Kaiyu Feng, Kaiqi Zhao, Aiqun Hu:
Knowledge-Enhanced Ensemble Learning for Word Embeddings. WWW 2019: 427-437 - [i1]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. CoRR abs/1907.08809 (2019) - 2018
- [j22]Yuexiu Xing, Aiqun Hu, Junqing Zhang, Linning Peng, Guyue Li:
On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios. IEEE Commun. Lett. 22(11): 2326-2329 (2018) - [j21]Guyue Li, Aiqun Hu, Chen Sun, Junqing Zhang:
Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems. IEEE Commun. Lett. 22(12): 2487-2490 (2018) - [j20]Guyue Li, Aiqun Hu, Junqing Zhang, Linning Peng, Chen Sun, Daming Cao:
High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing. IEEE Trans. Commun. 66(7): 3022-3034 (2018) - [j19]Changsheng Wan, Vir Virander Phoha, Yuzhe Tang, Aiqun Hu:
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge. IEEE Trans. Veh. Technol. 67(2): 1726-1739 (2018) - [c30]Junfu Zhang, E. Chengyuan, Aiqun Hu:
A Method of Android Application Forensics Based on Heap Memory Analysis. CSAE 2018: 186:1-186:5 - [c29]Linning Peng, Guyue Li, Junqing Zhang, Aiqun Hu:
Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels. GLOBECOM Workshops 2018: 1-6 - [c28]Rui Song, Yubo Song, Shang Gao, Bin Xiao, Aiqun Hu:
I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks. GLOBECOM 2018: 1-6 - [c27]Dong Wang, Aiqun Hu, Linning Peng:
Energy Selected Transmitter RF Fingerprint Estimation in Multi-Antenna OFDM Systems. WCSP 2018: 1-6 - 2017
- [j18]Yan Gao, Yunfei Chen, Aiqun Hu:
Throughput and BER of wireless powered DF relaying in Nakagami-m fading. Sci. China Inf. Sci. 60(10): 102306:1-102306:13 (2017) - [j17]Wei Liu, Aiqun Hu:
A subband excitation substitute based scheme for narrowband speech watermarking. Frontiers Inf. Technol. Electron. Eng. 18(5): 627-643 (2017) - [j16]Dong Wang, Aiqun Hu, Yunfei Chen, Yan Wang, Xiaohu You:
An ESPRIT-Based Approach for RF Fingerprint Estimation in Multi-Antenna OFDM Systems. IEEE Wirel. Commun. Lett. 6(6): 702-705 (2017) - [c26]Guyue Li, Aiqun Hu, Junqing Zhang, Bin Xiao:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. GLOBECOM 2017: 1-6 - [c25]Yubo Song, Shang Gao, Aiqun Hu, Bin Xiao:
Novel attacks in OSPF networks to poison routing table. ICC 2017: 1-6 - [c24]Xuyang Wang, Aiqun Hu, Hao Fang:
Feasibility Analysis of Lattice-based Proxy Re-Encryption. ICCSP 2017: 12-16 - [c23]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. INFOCOM 2017: 1-9 - [c22]Rui Song, Yubo Song, Qihong Dong, Aiqun Hu, Shang Gao:
WebLogger: Stealing your personal PINs via mobile web application. WCSP 2017: 1-6 - 2016
- [j15]Dong Wang, Aiqun Hu, Linning Peng:
A Novel Secret Key Generation Method in OFDM System for Physical Layer Security. Int. J. Interdiscip. Telecommun. Netw. 8(1): 21-34 (2016) - [j14]Liquan Chen, Zijuan Fan, Miao Lu, Aiqun Hu:
Information Hiding Capacities in Different Multiple Antennas Systems. J. Inf. Hiding Multim. Signal Process. 7(4): 714-728 (2016) - [c21]Guyue Li, Aiqun Hu, Linning Peng, Chen Sun:
The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements. GLOBECOM Workshops 2016: 1-6 - [c20]Mingfu Xue, Jian Wang, Aiqun Hu:
An enhanced classification-based golden chips-free hardware Trojan detection technique. AsianHOST 2016: 1-6 - [c19]Linning Peng, Aiqun Hu, Yu Jiang, Yan Yan, Changming Zhu:
A differential constellation trace figure based device identification method for ZigBee nodes. WCSP 2016: 1-6 - [c18]Jiabao Yu, Aiqun Hu, Linning Peng:
Blind DCTF-based estimation of carrier frequency offset for RF fingerprint extraction. WCSP 2016: 1-6 - 2015
- [j13]Tao Li, Aiqun Hu:
Trusted mobile model based on DTE technology. Int. J. Inf. Sec. 14(5): 457-469 (2015) - [j12]Zhenchao Zhu, Aiqun Hu, Anmin Fu:
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 14(11): 4245-4254 (2015) - [j11]Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou:
Special issue on recent advances in network and information security - security and communication networks journal. Secur. Commun. Networks 8(1): 1 (2015) - [c17]Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu:
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme. ICCCS 2015: 14-24 - [c16]Guyue Li, Aiqun Hu, Yaning Zou, Linning Peng, Mikko Valkama:
A Novel Transform for Secret Key Generation in Time-Varying TDD Channel under Hardware Fingerprint Deviation. VTC Fall 2015: 1-5 - [c15]Hao Fang, Aiqun Hu, Le Shi, Tao Li:
SESS: A security-enhanced secret storage scheme for password managers. WCSP 2015: 1-5 - 2014
- [j10]Mingfu Xue, Wei Liu, Aiqun Hu, Youdong Wang:
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique. IEICE Trans. Inf. Syst. 97-D(3): 606-609 (2014) - [j9]Yi Huang, Aiqun Hu, Yongming Huang, Shengdong Xie, Delai Zhu, Mingfu Xue:
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems. IEEE Trans. Veh. Technol. 63(6): 2941-2947 (2014) - 2013
- [j8]Zhenchao Zhu, Aiqun Hu, Anmin Fu:
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents. Quantum Inf. Process. 12(2): 1173-1183 (2013) - [c14]Mingfu Xue, Aiqun Hu, Yi Huang, Guyue Li:
Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection. DASC 2013: 131-136 - [c13]Yi Huang, Aiqun Hu, Wei Liu, Tao Li, Shengdong Xie:
An Extension of DTFT-Based Sinusoidal Signal Time Delay Estimation Algorithm for Linear Time-Varying Situation. GreenCom/iThings/CPScom 2013: 554-563 - [c12]Tao Li, Aiqun Hu:
Trust relationships in secure mobile systems. WCNC 2013: 1882-1887 - 2012
- [j7]Mingfu Xue, Aiqun Hu, Chunlong He:
Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy. IEICE Trans. Inf. Syst. 95-D(6): 1694-1697 (2012) - [j6]Shengdong Xie, Aiqun Hu, Yi Huang:
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion. KSII Trans. Internet Inf. Syst. 6(4): 1063-1075 (2012) - [c11]Tao Li, Aiqun Hu:
A private-data protection mechanism for trusted mobile platform. CHINACOM 2012: 222-226 - [c10]Tao Li, Aiqun Hu:
Efficient transitive trust model for mobile terminal. CHINACOM 2012: 233-238 - 2011
- [j5]Yu Jiang, Aiqun Hu:
Finding the Most Vital Link with Respect to the Characteristic of Network Communication. J. Networks 6(3): 462-469 (2011) - [c9]Pinlu Yang, Aiqun Hu:
Two-piecewise companding transform for PAPR reduction of OFDM signals. IWCMC 2011: 619-623 - 2010
- [j4]Changsheng Wan, Aiqun Hu, Juan Zhang:
A Novel Authentication Protocol for Wireless Access Security. J. Convergence Inf. Technol. 5(8): 200-207 (2010) - [c8]Wei Liu, Aiqun Hu:
Steady-state performance analyses for sliding window max-correlation matching adaptive algorithms. WCSP 2010: 1-6
2000 – 2009
- 2009
- [j3]Changsheng Wan, Aiqun Hu, Juan Zhang:
Managing Handover Authentication in Big-domain Wireless Environment. J. Convergence Inf. Technol. 4(3): 86-93 (2009) - 2008
- [j2]Rui Jiang, Aiqun Hu, Jianhua Li:
Formal Protocol Design of ESIKE Based on Authentication Tests. Int. J. Netw. Secur. 6(3): 246-254 (2008) - [c7]Juncai Shi, Aiqun Hu:
Maximum Utility-Based Resource Allocation Algorithm in the IEEE 802.16 OFDMA System. ICC 2008: 311-316 - [c6]Qing Xu, Changsheng Wan, Aiqun Hu:
The Performance Analysis of Fast EAP Re-authentication Protocol. ISCSCT (1) 2008: 99-103 - 2007
- [c5]Changsheng Wan, Aiqun Hu:
A Dynamic Network Access Identifier Used for Location Privacy. FGCN (2) 2007: 233-236 - [c4]Rui Jiang, Aiqun Hu, Xiaohui Yang:
Advanced robust e-mail protocols with perfect forward secrecy. SEDE 2007: 176-181 - 2006
- [c3]Dan Wang, Aiqun Hu:
A Combined Residual Frequency and Sampling Clock Offset Estimation for OFDM Systems. APCCAS 2006: 1184-1187 - [c2]Ping Wang, Aiqun Hu, Wenjiang Pei:
The Design of Anti-collision Mechanism of UHF RFID System based on CDMA. APCCAS 2006: 1703-1708 - [c1]Rui Jiang, Aiqun Hu, Xiaohui Yang:
Advanced remote password authentication and key agreement using smart card. CAINE 2006: 364-370
1990 – 1999
- 1998
- [j1]Jie Su, Aiqun Hu, Zhenya He:
Solving a kind of nonlinear programming problems via analog neural networks. Neurocomputing 18(1-3): 1-9 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint