Buhong Wang

Orcid: 0000-0002-3287-4410

According to our database1, Buhong Wang authored at least 70 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reflecting Elements Analysis for Secure and Energy-Efficient UAV-RIS System With Phase Errors.
IEEE Wirel. Commun. Lett., February, 2024

LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
CoRR, 2024

2023
Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems.
IEEE Internet Things J., October, 2023

Secure Wireless-Powered NOMA Communications in Multi-UAV Systems.
IEEE Trans. Green Commun. Netw., September, 2023

Hybrid Beamforming for Secure Transmission of Massive MIMO UAV Communication Networks.
IEEE Syst. J., September, 2023

IRS-Assisted Secure UAV Communication System for Multiuser With Hardware Impairments.
IEEE Syst. J., September, 2023

IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping.
IEEE Syst. J., September, 2023

Enhanced Graph Neural Network with Multi-Task Learning and Data Augmentation for Semi-Supervised Node Classification.
Int. J. Pattern Recognit. Artif. Intell., September, 2023

Construction of Singleton-Type Optimal LRCs from Existing LRCs and Near-MDS Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., August, 2023

Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement.
Remote. Sens., June, 2023

Deep Reinforcement Learning Based UAV for Securing mmWave Communications.
IEEE Trans. Veh. Technol., April, 2023

Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction.
Remote. Sens., March, 2023

Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation.
Remote. Sens., March, 2023

Secure SWIPT-powered UAV communication against full-duplex active eavesdropper.
Wirel. Networks, 2023

Hidden Feature-Guided Semantic Segmentation Network for Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2023

Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor Attacks.
Remote. Sens., 2023

Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

2022
On the Ergodic Secrecy Capacity of Intelligent Reflecting Surface Aided Wireless Powered Communication Systems.
IEEE Wirel. Commun. Lett., 2022

Enhancing Reliability and Security of UAV-Enabled NOMA Communications With Power Allocation and Aerial Jamming.
IEEE Trans. Veh. Technol., 2022

Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2022

Fused Adaptive Receptive Field Mechanism and Dynamic Multiscale Dilated Convolution for Side-Scan Sonar Image Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2022

SCFNet: Semantic Condition Constraint Guided Feature Aware Network for Aircraft Detection in SAR Images.
IEEE Trans. Geosci. Remote. Sens., 2022

MLFFNet: Multilevel Feature Fusion Network for Object Detection in Sonar Images.
IEEE Trans. Geosci. Remote. Sens., 2022

Multiscale Feature Enhancement Network for Salient Object Detection in Optical Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2022

Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
IEEE Trans. Cybern., 2022

Securing Transmission for UAV Swarm-Enabled Communication Network.
IEEE Syst. J., 2022

Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning.
IEEE Internet Things J., 2022

Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles.
IEEE Internet Things J., 2022

Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission.
IEEE Internet Things J., 2022

Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems.
Entropy, 2022

Adversarial Attacks and Defense Methods for Power Quality Recognition.
CoRR, 2022

Datadriven false data injection attacks against cyber-physical power systems.
Comput. Secur., 2022

Secure Transmission of IRS-assisted A2G Multiuser Communication System with Hardware Impairments.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

NOMA aided Semi-Grant-Free Transmission: A Security Perspective.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

2021
Deep Learning Driven 3D Robust Beamforming for Secure Communication of UAV Systems.
IEEE Wirel. Commun. Lett., 2021

Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems.
IEEE Trans. Veh. Technol., 2021

Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers.
IEEE Trans. Inf. Forensics Secur., 2021

TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems.
IEEE Internet Things J., 2021

ADS-B anomaly data detection model based on VAE-SVDD.
Comput. Secur., 2021

Sonar Objective Detection Based on Dilated Separable Densely Connected CNNs and Quantum-Behaved PSO Algorithm.
Comput. Intell. Neurosci., 2021

Threat impact analysis to air traffic control systems through flight delay modeling.
Comput. Ind. Eng., 2021

Hybrid Beamforming Design for Securing Large-Scale Antenna Array Empowered UAV Communication System.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

2020
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection.
IEEE Wirel. Commun. Lett., 2020

Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users.
IEEE Trans. Veh. Technol., 2020

Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020

On the Security Enhancement of Uplink NOMA Systems With Jammer Selection.
IEEE Trans. Commun., 2020

Threat model and construction strategy on ADS-B attack data.
IET Inf. Secur., 2020

Secrecy precoding in MIMOME wireless communication system under partial CSI.
IET Commun., 2020

Dynamic temporal ADS-B data attack detection based on sHDP-HMM.
Comput. Secur., 2020

CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems.
IEEE Access, 2020

Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Security Performance Analysis of Physical Layer for UAV Swarm Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Vulnerabilities and Attacks of UAV Cyber Physical Systems.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020

2019
Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks.
IEEE Wirel. Commun. Lett., 2019

A Feature Extraction Method for P2P Botnet Detection Using Graphic Symmetry Concept.
Symmetry, 2019

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.
Secur. Commun. Networks, 2019

P2P Botnet Detection Based on Nodes Correlation by the Mahalanobis Distance.
Inf., 2019

Sequential collaborative detection strategy on ADS-B data attack.
Int. J. Crit. Infrastructure Prot., 2019

Online sequential attack detection for ADS-B data based on hierarchical temporal memory.
Comput. Secur., 2019

Hybrid MIMO Phased Array Radar With Center-Spanned Subarrays.
IEEE Access, 2019

Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

ADS-B Data Attack Detection Based on Generative Adversarial Networks.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Spoofing Attack Detection for Radar Network System State Estimation.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid.
Secur. Commun. Networks, 2018

Virtual Network Embedding Based on Topology Potential.
Entropy, 2018

Two-dimensional unitary matrix pencil method for synthesizing sparse planar arrays.
Digit. Signal Process., 2018

2014
A Method for Fast States Estimation of Multi-function Radar Based on Syntactic Derivation of Parse Chart.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2004
Array calibration of angularly dependent gain and phase uncertainties with carry-on instrumental sensors.
Sci. China Ser. F Inf. Sci., 2004

Robust DOA estimation and array calibration in the presence of mutual coupling for uniform linear array.
Sci. China Ser. F Inf. Sci., 2004


  Loading...