Dong Wei

Orcid: 0009-0001-6508-4490

Affiliations:
  • School of Cyber Security, Chinese Academy of Sciences, Beijing, China
  • Beijing University of Posts and Telecommunications, Beijing, China (Ph.D., 2013)


According to our database1, Dong Wei authored at least 32 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication.
IEEE Trans. Inf. Forensics Secur., 2023

Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
Blind Recognition Algorithm for Scrambled Channel Encoder Based on the Features of Signal Matrix and Layered Neural Network.
Proceedings of the 15th International Symposium on Medical Information and Communication Technology, 2021

Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network Traffic.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis.
Proceedings of the 28th International Conference on Telecommunications, 2021

2020
A Secure Constellation Design for Polarized Modulation in Wireless Communications.
IEEE Access, 2020

Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies.
Proceedings of the 27th International Conference on Telecommunications, 2020

2019
Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

A Secure and Power-Efficient Constellations for Physical Layer Security.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

2016
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal.
IET Signal Process., 2016

Method for detecting text information leakage in electromagnetic radiation from a computer display.
IET Inf. Secur., 2016

Modulation recognition of PSK and QAM signals based on envelope spectrum analysis.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A novel wavelet based independent component analysis method for pre-processing computer video leakage signal.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Computer recognition based on the compromising emanations fingerprint.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
A spectrum efficient polarized OFDM scheme for wireless depolarized channel.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect.
Proceedings of the 22nd International Conference on Telecommunications, 2015

2014
A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

A novel method for computer video leaking signal detection.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
A Power Amplifier Energy Efficient Polarization Modulation Scheme Based on the Optimal Pre-Compensation.
IEEE Commun. Lett., 2013

A polarization-amplitude-phase modulation scheme for improving the power amplifier energy efficiency.
Ann. des Télécommunications, 2013

An Energy Efficient Subcarrier-power Allocation scheme for Polarization-Amplitude-Phase Modulation in channel with Polarization Mode Dispersion.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Polarization Mode Dispersion Tolerant Subcarrier-Power Allocation for Improving the Power Amplifier Energy Efficiency of Joint Polarization-Amplitude-Phase Modulation.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

An optimal pre-compensation based joint polarization-amplitude-phase modulation scheme for the power amplifier energy efficiency improvement.
Proceedings of IEEE International Conference on Communications, 2013

2012
A Polarization-Amplitude-Phase Modulation scheme for the Power Amplifier energy efficiency enhancement.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

An energy efficient Polarization Modulation scheme for nonlinear Power Amplifier.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2010
Virtual Polarization Detection: A Vector Signal Sensing Method for Cognitive Radios.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010


  Loading...