Aiqun Hu

According to our database1, Aiqun Hu authored at least 80 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure.
IEEE Trans. Veh. Technol., 2020

Detection and Mitigation of DoS Attacks in Software Defined Networks.
IEEE/ACM Trans. Netw., 2020

Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar.
IEEE Internet Things J., 2020

Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice.
IET Inf. Secur., 2020

Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks.
CoRR, 2020

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels.
IEEE Access, 2020

A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

LoRa Devices Identification Based on Differential Constellation Trace Figure.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation.
IEEE Trans. Mob. Comput., 2019

A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network.
IEEE Internet Things J., 2019

Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme.
IEEE Internet Things J., 2019

Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems.
IEEE Commun. Lett., 2019

A Hybrid Information Reconciliation Method for Physical Layer Key Generation.
Entropy, 2019

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
Entropy, 2019

Physical layer identification of LoRa devices using constellation trace figure.
EURASIP J. Wirel. Commun. Netw., 2019

A lightweight physical-layer based security strategy for Internet of things.
Clust. Comput., 2019

Importance-based entropy measures of complex networks' robustness to attacks.
Clust. Comput., 2019

Location-Invariant Physical Layer Identification Approach for WiFi Devices.
IEEE Access, 2019

Knowledge-Enhanced Ensemble Learning for Word Embeddings.
Proceedings of the World Wide Web Conference, 2019

Radio Frequency Fingerprint Identification Based on Denoising Autoencoders.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

A Design of Deep Learning Based Optical Fiber Ethernet Device Fingerprint Identification System.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

IoT device fingerprinting for relieving pressure in the access control.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Abnormal traffic detection of IoT terminals based on Bloom filter.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge.
IEEE Trans. Veh. Technol., 2018

High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing.
IEEE Trans. Commun., 2018

On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios.
IEEE Commun. Lett., 2018

Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems.
IEEE Commun. Lett., 2018

Energy Selected Transmitter RF Fingerprint Estimation in Multi-Antenna OFDM Systems.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018

Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels.
Proceedings of the IEEE Globecom Workshops, 2018

2017
An ESPRIT-Based Approach for RF Fingerprint Estimation in Multi-Antenna OFDM Systems.
IEEE Wirel. Commun. Lett., 2017

A subband excitation substitute based scheme for narrowband speech watermarking.
Frontiers Inf. Technol. Electron. Eng., 2017

Throughput and BER of wireless powered DF relaying in Nakagami-<i>m</i> fading.
Sci. China Inf. Sci., 2017

WebLogger: Stealing your personal PINs via mobile web application.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Feasibility Analysis of Lattice-based Proxy Re-Encryption.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Information Hiding Capacities in Different Multiple Antennas Systems.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Secret Key Generation Method in OFDM System for Physical Layer Security.
Int. J. Interdiscip. Telecommun. Netw., 2016

Blind DCTF-based estimation of carrier frequency offset for RF fingerprint extraction.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

A differential constellation trace figure based device identification method for ZigBee nodes.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Special issue on recent advances in network and information security - security and communication networks journal.
Secur. Commun. Networks, 2015

Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015

Trusted mobile model based on DTE technology.
Int. J. Inf. Sec., 2015

SESS: A security-enhanced secret storage scheme for password managers.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

A Novel Transform for Secret Key Generation in Time-Varying TDD Channel under Hardware Fingerprint Deviation.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems.
IEEE Trans. Veh. Technol., 2014

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique.
IEICE Trans. Inf. Syst., 2014

2013
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents.
Quantum Inf. Process., 2013

Trust relationships in secure mobile systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Extension of DTFT-Based Sinusoidal Signal Time Delay Estimation Algorithm for Linear Time-Varying Situation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion.
KSII Trans. Internet Inf. Syst., 2012

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy.
IEICE Trans. Inf. Syst., 2012

Efficient transitive trust model for mobile terminal.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

A private-data protection mechanism for trusted mobile platform.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Finding the Most Vital Link with Respect to the Characteristic of Network Communication.
J. Networks, 2011

Two-piecewise companding transform for PAPR reduction of OFDM signals.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
A Novel Authentication Protocol for Wireless Access Security.
J. Convergence Inf. Technol., 2010

Steady-state performance analyses for sliding window max-correlation matching adaptive algorithms.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

2009
Managing Handover Authentication in Big-domain Wireless Environment.
J. Convergence Inf. Technol., 2009

2008
Formal Protocol Design of ESIKE Based on Authentication Tests.
Int. J. Netw. Secur., 2008

The Performance Analysis of Fast EAP Re-authentication Protocol.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Maximum Utility-Based Resource Allocation Algorithm in the IEEE 802.16 OFDMA System.
Proceedings of IEEE International Conference on Communications, 2008

2007
Advanced robust e-mail protocols with perfect forward secrecy.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

A Dynamic Network Access Identifier Used for Location Privacy.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Advanced remote password authentication and key agreement using smart card.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

The Design of Anti-collision Mechanism of UHF RFID System based on CDMA.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

A Combined Residual Frequency and Sampling Clock Offset Estimation for OFDM Systems.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

1998
Solving a kind of nonlinear programming problems via analog neural networks.
Neurocomputing, 1998


  Loading...