


default search action
Dong Wei 0002
Person information
- affiliation: School of Cyber Security, Chinese Academy of Sciences, Beijing, China
- affiliation (Ph.D., 2013): Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Dong Wei — disambiguation page
- Dong Wei 0001 — New Jersey Institute of Technology, Newark, NJ, USA
- Dong Wei 0003 — Texas University, Austin, TX, USA
- Dong Wei 0004
— Tencent Jarvis Lab, Shenzhen, Chin (and 2 more)
- Dong Wei 0006 — Zhejiang University, Hangzhou, China
- Dong Wei 0007
— Nanjing University of Science and Technology, Nanjing, China
- Dong Wei 0008
— Fudan University, Shanghai, China
- Dong Wei 0009 — Siemens Corporation, Princeton, NJ, USA
- Dong Wei 0010 — New Jersey Institute of Technology, Newark, NJ, USA
- Dong Wei 0011 — Rice University, Houston, TX, USA
- Dong Wei 0012 — North China University of Water Resources and Electric Power, Zhengzhou, China
- Dong Wei 0013 — Huawei Technologies Co., Ltd., Shenzhen, China
- Dong Wei 0015 — University of Science and Technology of China, Hefei, China
- Dong Wei 0016 — Synthetic Geographic Information Center of Shanxi, Taiyuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Yuemei Wu
, Dong Wei
, Caili Guo
, Weiqing Huang:
Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Trans. Inf. Forensics Secur. 18: 2144-2159 (2023) - [j6]Jinlong Xu
, Dong Wei
:
Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication. IEEE Trans. Inf. Forensics Secur. 18: 4593-4608 (2023) - 2022
- [c25]Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng:
Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems. ISCC 2022: 1-7 - [c24]Jinlong Xu, Dong Wei, Weiqing Huang:
Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint. ISCC 2022: 1-7 - [c23]Yuemei Wu, Dong Wei, Qiaoyu Zhang, Weiqing Huang, Xiang Meng:
Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes. PIMRC 2022: 1116-1121 - [c22]Jinlong Xu, Dong Wei, Weiqing Huang:
Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT. WoWMoM 2022: 434-443 - 2021
- [c21]Yuankun Wang, Weiqing Huang, Qiaoyu Zhang, Dong Wei:
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis. ICT 2021: 1-6 - [c20]Liuqun Zhai, Zhuang Qiao, Zhongfang Wang, Dong Wei:
Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network Traffic. ISCC 2021: 1-7 - [c19]Zhongfang Wang, Liuqun Zhai, Dong Wei:
Blind Recognition Algorithm for Scrambled Channel Encoder Based on the Features of Signal Matrix and Layered Neural Network. ISMICT 2021: 184-189 - 2020
- [j5]Degang Sun, Qiaoyu Zhang
, Dong Wei, Meng Zhang:
A Secure Constellation Design for Polarized Modulation in Wireless Communications. IEEE Access 8: 130588-130597 (2020) - [c18]Degang Sun, Huiyan Li, Dong Wei, Qiaoyu Zhang:
Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies. ICT 2020: 1-5
2010 – 2019
- 2019
- [c17]Weiqing Huang, Qiaoyu Zhang, Dong Wei, Huiyan Li:
A Secure and Power-Efficient Constellations for Physical Layer Security. SmartIoT 2019: 479-483 - [c16]Weiqing Huang, Yan Li, Dong Wei, Qiaoyu Zhang:
Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications. WASA 2019: 573-586 - 2016
- [j4]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for detecting text information leakage in electromagnetic radiation from a computer display. IET Inf. Secur. 10(6): 413-417 (2016) - [j3]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal. IET Signal Process. 10(1): 63-68 (2016) - [c15]Jun Shi, Degang Sun, Abbas Yongaçoglu, Meng Zhang, Dong Wei:
Computer recognition based on the compromising emanations fingerprint. CCECE 2016: 1-6 - [c14]Jun Shi, Abbas Yongaçoglu, Degang Sun, Dong Wei, Meng Zhang:
A novel wavelet based independent component analysis method for pre-processing computer video leakage signal. ISCC 2016: 334-339 - [c13]Dong Wei, Lili Liang, Meng Zhang, Rong Qiao, Wei-qing Huang:
A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications. MILCOM 2016: 1195-1201 - [c12]Min Li, Lili Liang, Dong Wei, Meng Zhang, Chunwei Miao:
Modulation recognition of PSK and QAM signals based on envelope spectrum analysis. PIMRC 2016: 1-7 - 2015
- [c11]Dong Wei, Meng Zhang, Wei Fan, Wei-qing Huang:
A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect. ICT 2015: 249-255 - [c10]Dong Wei, Meng Zhang, Wei Fan, Wei-qing Huang:
A spectrum efficient polarized OFDM scheme for wireless depolarized channel. ISCC 2015: 649-656 - 2014
- [c9]Jun Shi, Wei-qing Huang, Dong Wei, Degang Sun:
A novel method for computer video leaking signal detection. ASONAM 2014: 918-923 - [c8]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation. ICICS 2014: 191-199 - [c7]Degang Sun, Jun Shi, Dong Wei, Meng Zhang:
A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction. ICSAI 2014: 624-628 - 2013
- [j2]Dong Wei, Chunyan Feng, Caili Guo:
A polarization-amplitude-phase modulation scheme for improving the power amplifier energy efficiency. Ann. des Télécommunications 68(9-10): 515-524 (2013) - [j1]Dong Wei, Chunyan Feng, Caili Guo, Fangfang Liu:
A Power Amplifier Energy Efficient Polarization Modulation Scheme Based on the Optimal Pre-Compensation. IEEE Commun. Lett. 17(3): 513-516 (2013) - [c6]Dong Wei, Chunyan Feng, Caili Guo:
An optimal pre-compensation based joint polarization-amplitude-phase modulation scheme for the power amplifier energy efficiency improvement. ICC 2013: 4137-4142 - [c5]Dong Wei, Chunyan Feng, Caili Guo:
Polarization Mode Dispersion Tolerant Subcarrier-Power Allocation for Improving the Power Amplifier Energy Efficiency of Joint Polarization-Amplitude-Phase Modulation. VTC Spring 2013: 1-6 - [c4]Dong Wei, Chunyan Feng, Caili Guo:
An Energy Efficient Subcarrier-power Allocation scheme for Polarization-Amplitude-Phase Modulation in channel with Polarization Mode Dispersion. WCNC 2013: 580-585 - 2012
- [c3]Dong Wei, Chunyan Feng, Caili Guo, Fangfang Liu:
An energy efficient Polarization Modulation scheme for nonlinear Power Amplifier. GLOBECOM Workshops 2012: 69-74 - [c2]Dong Wei, Chunyan Feng, Caili Guo:
A Polarization-Amplitude-Phase Modulation scheme for the Power Amplifier energy efficiency enhancement. WPMC 2012: 369-373 - 2010
- [c1]Fangfang Liu, Chunyan Feng, Caili Guo, Yue Wang, Dong Wei:
Virtual Polarization Detection: A Vector Signal Sensing Method for Cognitive Radios. VTC Spring 2010: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-19 01:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint