Kai Zeng

According to our database1, Kai Zeng authored at least 113 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2021
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic.
IEEE Trans. Inf. Forensics Secur., 2020

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020

Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics With Unreliable Conditions.
IEEE Trans. Cogn. Commun. Netw., 2020

Compressed-Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications.
IEEE Internet Things J., 2020

Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Efficient Physical Layer Group Key Generation in 5G Wireless Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Physical Layer Key Generation in 5G Wireless Networks.
IEEE Wirel. Commun., 2019

Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks.
IEEE Netw., 2019

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.
IEEE Internet Things J., 2019

Intelligent Policing Strategy for Traffic Violation Prevention.
CoRR, 2019

Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Multi-stage Deep Classifier Cascades for Open World Recognition.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Physical layer multi-user key generation in wireless networks.
Wirel. Networks, 2018

Impact of Mobility on Physical Layer Security Over Wireless Fading Channels.
IEEE Trans. Wirel. Commun., 2018

Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2018

Secure Inductive-Coupled Near Field Communication at Physical Layer.
IEEE Trans. Inf. Forensics Secur., 2018

Introduction to the Special Section From the IEEE ICC 2018 Conference.
IEEE Trans. Cogn. Commun. Netw., 2018

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study.
CoRR, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018

Robust Spectrum Monitoring in Cognitive Radio Networks With Uncertain Traffic Information.
IEEE Access, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018

Prediction-time Efficient Classification Using Feature Computational Dependencies.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios.
Proceedings of the IEEE International Smart Cities Conference, 2018

Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models.
Proceedings of the IEEE International Smart Cities Conference, 2018

Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks.
IEEE Trans. Veh. Technol., 2017

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs.
EAI Endorsed Trans. Security Safety, 2017

Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios.
CoRR, 2017

Platoon Stability and Safety Analysis of Cooperative Adaptive Cruise Control under Wireless Rician Fading Channels and Jamming Attacks.
CoRR, 2017

Optimal Online Learning with Randomized Feedback Graphs with Application in PUE Attacks in CRN.
CoRR, 2017

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis.
Proceedings of the Computer Network Security, 2017

Hardware module-based message authentication in intra-vehicle networks.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Throughput optimization in multi-hop wireless networks with reconfigurable antennas.
Proceedings of the 2017 International Conference on Computing, 2017

String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2016

Practical Secret Key Agreement for Full-Duplex Near Field Communications.
IEEE Trans. Mob. Comput., 2016

MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers.
IEEE Trans. Inf. Forensics Secur., 2016

Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

TPC Chair's welcome.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Intelligence Measure of Cognitive Radios with Learning Capabilities.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Online learning-based optimal primary user emulation attacks in cognitive radio networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A smartphone-based driver fatigue detection using fusion of multiple real-time facial features.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Live Video Forensics: Source Identification in Lossy Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Physical layer key generation in wireless networks: challenges and opportunities.
IEEE Commun. Mag., 2015

Online learning for unreliable passive monitoring in multi-channel wireless networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Physical layer key agreement under signal injection attacks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SecNFC: Securing inductively-coupled Near Field Communication at physical layer.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications.
Veh. Commun., 2014

Efficient Data Capturing for Network Forensics in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise.
EAI Endorsed Trans. Cogn. Commun., 2014

Physical layer challenge-response authentication in wireless networks with relay.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Delay analysis of physical layer key generation in multi-user dynamic wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014

MagPairing: Exploiting magnetometers for pairing smartphones in close proximity.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller.
IEEE Trans. Mob. Comput., 2013

Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space.
IEEE Trans. Mob. Comput., 2013

Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
IEEE Trans. Inf. Forensics Secur., 2013

PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks.
IEEE J. Sel. Areas Commun., 2013

Video source identification in lossy wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

iSens: Detecting hidden busy channels in WM systems with interactive sensing for CRN.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Detecting multi-channel wireless microphone user emulation attacks in white space with noise.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wirel. Networks, 2012

Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Improving crowd-sourced Wi-Fi localization systems using Bluetooth beacons.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Transmit power estimation with a single monitor in multi-band networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Fast rendezvous for cognitive radios by exploiting power leakage at adjacent channels.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Chaining for securing data provenance in distributed information networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Detecting spectrum misuse in wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Trusted collaborative spectrum sensing for mobile cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Probability Density of the Received Power in Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011

Opportunistic spectrum scheduling for mobile cognitive radio networks in white space.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

PRONET: Network trust assessment based on incomplete provenance.
Proceedings of the MILCOM 2011, 2011

Identity-based attack detection in mobile wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Adaptive wireless channel probing for shared key generation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Hearing is believing: Detecting mobile primary user emulation attack in white space.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Non-cryptographic authentication and identification in wireless networks.
IEEE Wirel. Commun., 2010

Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2010

Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Jamming-Resistant Communication: Channel Surfing without Negotiation.
Proceedings of IEEE International Conference on Communications, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009

Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

FSA: A Fast Coordination Scheme for Opportunistic Routing.
Proceedings of IEEE International Conference on Communications, 2009

2008
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks.
IEEE Trans. Wirel. Commun., 2008

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2008

On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
Mob. Networks Appl., 2007

2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006


  Loading...