Hong Wen

According to our database1, Hong Wen authored at least 142 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing.
IEEE Network, 2020

2019
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels.
IEEE Wireless Commun. Letters, 2019

Adaboost-based security level classification of mobile intelligent terminals.
The Journal of Supercomputing, 2019

Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS.
IEEE Trans. Industrial Informatics, 2019

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing.
IEEE Trans. Cloud Computing, 2019

Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks.
Sensors, 2019

Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
Sensors, 2019

Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources.
Sensors, 2019

Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks.
IEEE Network, 2019

Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers.
IET Communications, 2019

Analysis of the physical layer security enhancing of wireless communication system under the random mobile.
IET Communications, 2019

A Causal Perspective to Unbiased Conversion Rate Estimation on Data Missing Not at Random.
CoRR, 2019

Conversion Rate Prediction via Post-Click Behaviour Modeling.
CoRR, 2019

Clone Detection Based on Physical Layer Reputation for Proximity Service.
IEEE Access, 2019

Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication.
IEEE Access, 2019

The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT.
IEEE Access, 2019

Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting.
IEEE Access, 2019

Internet of Things Based Smart Grids Supported by Intelligent Edge Computing.
IEEE Access, 2019

Edge Intelligence based Co-training of CNN.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Multi-Level Deep Cascade Trees for Conversion Rate Prediction in Recommendation System.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.
PhD thesis, 2018

The Rayleigh Fading Channel Prediction via Deep Learning.
Wireless Communications and Mobile Computing, 2018

Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels.
Wireless Communications and Mobile Computing, 2018

Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm.
Wireless Communications and Mobile Computing, 2018

Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels.
IEEE Wireless Commun. Letters, 2018

Impact of Mobility on Physical Layer Security Over Wireless Fading Channels.
IEEE Trans. Wireless Communications, 2018

Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN.
IEEE Trans. Vehicular Technology, 2018

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers.
IEEE Trans. Vehicular Technology, 2018

Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming.
IEEE Trans. Vehicular Technology, 2018

Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.
Sensors, 2018

Rumor spreading in interdependent social networks.
Peer-to-Peer Networking and Applications, 2018

Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things.
IEEE Internet of Things Journal, 2018

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things.
IEEE Internet of Things Journal, 2018

Lightweight one-time password authentication scheme based on radio-frequency fingerprinting.
IET Communications, 2018

Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers.
IEICE Transactions, 2018

Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences.
IEICE Transactions, 2018

A state metrics compressed decoding technique for energy-efficient turbo decoder.
EURASIP J. Wireless Comm. and Networking, 2018

Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels.
EURASIP J. Wireless Comm. and Networking, 2018

Multi-Level Deep Cascade Trees for Conversion Rate Prediction.
CoRR, 2018

Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects.
IEEE Communications Magazine, 2018

An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length.
Adv. in Math. of Comm., 2018

Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms.
Ad Hoc & Sensor Wireless Networks, 2018

A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building.
IEEE Access, 2018

A Novel Terminal Security Access Method Based on Edge Computing for IoT.
Proceedings of the International Conference on Networking and Network Applications, 2018

Sparse Detection for Spatial Modulation in Multiple Access Channels.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Performance Analysis of Multi-Hop Relaying Cooperation for Internet-of-Things System.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Authentication Based on Channel State Information for Industrial Wireless Communications.
Proceedings of the IECON 2018, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

A Low Complexity Feature Extraction for the RF Fingerprinting Process.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Block Chain Based Secure Scheme For Mobile Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism.
IEEE Systems Journal, 2017

Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding.
IET Communications, 2017

Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property.
IEICE Transactions, 2017

Asymmetric ZCZ Sequence Sets with Inter-Subset Uncorrelated Sequences via Interleaved Technique.
IEICE Transactions, 2017

Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks.
IEEE Communications Letters, 2017

Cross-Networks Energy Efficiency Tradeoff: From Wired Networks to Wireless Networks.
IEEE Access, 2017

Novel Asymmetric Zero Correlation Zone Sequence Sets for Code Division Multiple Access.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

MISO Secure Transmission with Imperfect Channel State Information.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Physical Layer Security Assisted 5G Network Security.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Target aspect feature extraction and application from multi-aspect high resolution SAR.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Dot-product based preference preserved hashing for fast collaborative filtering.
Proceedings of the IEEE International Conference on Communications, 2017

An Optimized Resource Efficient Approximation of max* Operator for Recalculation in Turbo Code Decoder.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

A model divides the mobile security level based on SVM.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Performance analysis of cooperative secure transmission system.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Physical layer authentication based on channel information and machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A physical layer secure transmission method based on channel prediction and QoS.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

The realization of key extraction based on USRP and OFDM channel response.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A method of reconciling the key discrepancy by exploiting unconditional secure transmission.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Peer-to-Peer Networking and Applications, 2016

Cloud service provisioning in two types of DCN with awareness of delay and link failure probability.
Photonic Network Communications, 2016

Families of asymmetric sequence pair set with zero-correlation zone via interleaved technique.
IET Communications, 2016

Associating MIMO beamforming with security codes to achieve unconditional communication security.
IET Communications, 2016

Designs of Inter-Group Complementary Sequence Set from Interleaving Z-Periodic Complementary Sequences.
IEICE Transactions, 2016

Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks.
IEEE Access, 2016

The cross-network energy efficient tradeoff: From wavelength division multiplexing wired networks to 5G wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

An improved detection and feature retrieval method of anisotropic scattering for multi-aspect PolSAR data processing based on DRIA framework.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Constraint Free Preference Preserving Hashing for Fast Recommendation.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

The performance of the MIMO physical layer security system with imperfect CSI.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A MIMO cross-layer secure communication scheme based on spatial modulation.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerging Topics Comput., 2015

A topological potential weighted community-based recommendation trust model for P2P networks.
Peer-to-Peer Networking and Applications, 2015

Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead.
Comput. Networks, 2015

Three-Layers Secure Access Control for Cloud-Based Smart Grids.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

A hierarchical key management system applied in cloud-based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

User privacy protection for cloud computing based smart grid.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Combining MIMO beamforming with security codes to achieve unconditional communication security.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

5G security architecture and light weight security authentication.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

An OFDM cross-layer encryption secure communication scheme.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Joint cooperative jamming and beamforming for secure transmission in two-cell networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Secure Interdependent Networks for Peer-to-Peer and Online Social Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Rumor Spreading and Security Monitoring in Complex Networks.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions.
IEEE Wireless Commun. Letters, 2014

Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP.
IEEE Trans. Wireless Communications, 2014

Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks.
IEEE Trans. Communications, 2014

Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks.
IEEE Journal on Selected Areas in Communications, 2014

Modified channel-independent weighted bit flipping decoding algorithm for low-density-parity-check codes.
IET Communications, 2014

Reduced memory decoding schemes for turbo decoding based on storing the index of the state metric.
IET Communications, 2014

Achieving strong security based on fountain code with coset pre-coding.
IET Communications, 2014

A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence.
IEICE Transactions, 2014

A Novel Construction of Asymmetric Sequence Pairs Set with Zero-Correlation Zone.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

New families of asymmetric zero-correlation zone sequence sets based on interleaved perfect sequence.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A MIMO cross-layer precoding security communication system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

P2P networks monitoring based on the social network analysis and the topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Physical Layer Assist Mutual Authentication scheme for smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Physical Layer Approaches for Securing Wireless Communication Systems.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-6510-2, 2013

On Managing Interferences under Heterogeneous CSIT Feedback for Multi-User Transmission.
IEEE Trans. Wireless Communications, 2013

Framework for MIMO cross-layer secure communication based on STBC.
Telecommunication Systems, 2013

A framework of the PHY-layer approach to defense against security threats in cognitive radio networks.
IEEE Network, 2013

A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems.
IJDSN, 2013

Physical layer assist authentication technique for smart meter system.
IET Communications, 2013

Fast and efficient parallel-shift water-filling algorithm for power allocation in orthogonal frequency division multiplexing-based underlay cognitive radios.
IET Communications, 2013

Network coding based reliable broadcast protocol in Multi-Channel Multi-Radio Wireless Mesh Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

The security issue of WSNs based on cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A novel detection scheme for malicious nodes in smart meter system.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An efficient and secure search database scheme for cloud computing in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A P2P recommended trust nodes selection algorithm based on topological potential.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC).
IEEE Wireless Commun. Letters, 2012

Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios.
IEEE Wireless Commun. Letters, 2012

2011
A key points-based blind watermarking approach for vector geo-spatial data.
Comput. Environ. Urban Syst., 2011

Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks.
TIIS, 2011

The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes.
Proceedings of the Communication and Networking, 2011

The Performance Analysis of LT Codes.
Proceedings of the Communication and Networking, 2011

2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Information Security, 2010

A framework of physical layer technique assisted authentication for vehicular communication networks.
SCIENCE CHINA Information Sciences, 2010

MIMO Cross-Layer Secure Communication Architecture Based on STBC.
Proceedings of the Global Communications Conference, 2010

2009
Build-in wiretap channel I with feedback and LDPC codes.
Journal of Communications and Networks, 2009

Manufacturing RSM and Manufacturing Resource Sharing.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

An Ontology Modeling Method of Mechanical Fault Diagnosis System Based on RSM.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

A Novel Framework for Message Authentication in Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A cross-layer approach to enhance the security of wireless networks based on MIMO.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2007
An Adaptive State Detection Service for Manufacturing Grid.
Proceedings of the Third International Conference on Semantics, 2007

Research on Manufacturing Resource Sharing Framework Based on RSM.
Proceedings of the Third International Conference on Semantics, 2007

The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes.
Proceedings of the Future Generation Communication and Networking, 2007

An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC code.
Proceedings of the Future Generation Communication and Networking, 2007

2005
A new classification method based on Cloude Pottier eigenvalue/eigenvector decomposition.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
Design of odd-periodic complementary binary signal set.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004


  Loading...