Kaizhi Huang

According to our database1, Kaizhi Huang authored at least 91 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
CSI-Based Physical Layer Authentication via Deep Learning.
IEEE Wirel. Commun. Lett., 2022

Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel.
IEEE Wirel. Commun. Lett., 2022

Discussion on a new paradigm of endogenous security towards 6G networks.
Frontiers Inf. Technol. Electron. Eng., 2022

DOA Estimation Algorithm for Reconfigurable Intelligent Surface Co-Prime Linear Array Based on Multiple Signal Classification Approach.
Inf., 2022

Efficient and secure communication scheme for OFDM system based on physical layer non-reconciled keys.
IET Commun., 2022

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.
Entropy, 2022

Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.
Entropy, 2022

Intelligent Reflecting Surface-Assisted Wireless Secret Key Generation against Multiple Eavesdroppers.
Entropy, 2022

2021
Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment.
IEEE Wirel. Commun. Lett., 2021

A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI.
IEEE Trans. Veh. Technol., 2021

Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface.
Secur. Commun. Networks, 2021

Joint active and passive beamforming optimization for intelligent reflecting surface assisted proactive eavesdropping.
IET Commun., 2021

Multi-antenna joint covert communication with a public communication link over wireless fading channel.
IET Commun., 2021

Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems.
IEICE Trans. Inf. Syst., 2021

Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

Multi-Antenna Covert Communications with Delay Constraint.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

2020
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys.
Secur. Commun. Networks, 2020

Secure transmission for heterogeneous cellular network with limited feedback.
Sci. China Inf. Sci., 2020

Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks.
Sci. China Inf. Sci., 2020

Physical Layer Key Generation Scheme Through Scrambling the Correlated Eavesdropping Channel.
IEEE Access, 2020

2019
Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks.
IEEE Trans. Commun., 2019

Secrecy energy efficiency performance in communication networks with mobile sinks.
Phys. Commun., 2019

Secrecy energy efficiency optimization in heterogeneous networks with simultaneous wireless information and power transfer.
Phys. Commun., 2019

Robust optimization for AN-aided wireless information and power transfer for secure heterogeneous networks.
Phys. Commun., 2019

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI.
KSII Trans. Internet Inf. Syst., 2019

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks.
KSII Trans. Internet Inf. Syst., 2019

Physical layer security in massive internet of things: delay and security analysis.
IET Commun., 2019

Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet.
IET Commun., 2019

Robust secure transmission for wireless information and power transfer in heterogeneous networks.
IET Commun., 2019

Robust secrecy energy efficiency optimisation in heterogeneous networks with simultaneous wireless information and power transfer: centralised and distributed design.
IET Commun., 2019

Robust Secrecy Energy Efficiency Optimization for Wireless Powered Heterogeneous Networks Using Distributed ADMM Algorithm.
IEEE Access, 2019

Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems.
IEEE Access, 2019

A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel.
IEEE Access, 2019

2018
A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks.
KSII Trans. Internet Inf. Syst., 2018

Cooperative Group Secret Key Generation Based on Secure Network Coding.
IEEE Commun. Lett., 2018

Minimizing secrecy outage probability in D2D-enabled cellular networks: Access control with power optimization.
Trans. Emerg. Telecommun. Technol., 2018

Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis.
Sci. China Inf. Sci., 2018

Overview of 5G security technology.
Sci. China Inf. Sci., 2018

Opportunistic access control for enhancing security in D2D-enabled cellular networks.
Sci. China Inf. Sci., 2018

Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things.
IEEE Access, 2018

Near-Optimal Pilot Signal Design for FDD Massive MIMO System: An Energy-Efficient Perspective.
IEEE Access, 2018

Resource Allocation for Secure Communication in K -Tier Heterogeneous Cellular Networks: A Spatial-Temporal Perspective.
IEEE Access, 2018

Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach.
IEEE Access, 2018

Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

On the Reliability and Security Performance of Opportunistic Relay Selection in Millimeter Wave Networks.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Secrecy Spectral Efficiency Fairness among Multi-Cells in SWIPT-Enabled Cooperative NOMA Transmissions.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

High-Rate Secret Key Generation Method Using Two-Way Random Signal.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets.
KSII Trans. Internet Inf. Syst., 2017

AKA-PLA: Enhanced AKA Based on Physical Layer Authentication.
KSII Trans. Internet Inf. Syst., 2017

Analysis on Physical-Layer Security for Multi-Cell Coordination Aided Ultra-Dense Heterogeneous Networks.
IEICE Trans. Commun., 2017

Correction to: Artificial noise-assisted physical layer security in D2D-enabled cellular networks.
EURASIP J. Wirel. Commun. Netw., 2017

Artificial noise-assisted physical layer security in D2D-enabled cellular networks.
EURASIP J. Wirel. Commun. Netw., 2017

Spatio-temporal stochastic modeling of heterogeneous cellular networks: Security and delay analysis.
Proceedings of the 20th International Symposium on Wireless Personal Multimedia Communications, 2017

Physical layer security in IoT: A spatial-temporal perspective.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Achieving secure transmission using feedback-based LT code with degree distribution updated.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Physical layer security in heterogeneous cellular networks: A spatio-temporal perspective.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Physical Layer Security Scheme Based on Base Station Cooperation in Dense Heterogeneous Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Secure Transmission Scheme in K-Tier Dense Heterogeneous Cellular Networks with Imperfect Channel State Information.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Physical Layer Secret Key Capacity of Two Moving Terminals.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Physical layer security in D2D-enabled cellular networks: Artificial noise assisted.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Secrecy analysis based on energy threshold for simultaneous wireless information and power transfer in Internet of Things.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Secure and Reliable Transmission for Dense HetNets Based on Secure Energy Efficiency Optimization.
Proceedings of the Communications and Networking, 2017

2016
Transmission frequency-band hidden technology in physical layer security.
Sci. China Inf. Sci., 2016

MU-MIMO aided secure transmission in cognitive downlink heterogeneous cellular networks.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Performance analysis of the encryption method based on compressed sensing at the physical layer.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Analysis on Physical-Layer Security for Internet of Things in Ultra Dense Heterogeneous Networks.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Physical Layer Secret Key Capacity Using Correlated Wireless Channel Samples.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
On stochastic geometry modeling of WLAN capacity with dynamic sensitive control.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Energy efficiency analysis of energy harvesting relay-aided cooperative networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Analysis of Pilot Contamination on the Security Performance of Artificial Noise in MIMO Systems.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

A TOA-Based Geolocation Algorithm Utilizing Convex Combination.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

A physical-layer authentication scheme based on hash method.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Variable step-size affine projection normalized subband adaptive filter design.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Achieving strong security based on fountain code with coset pre-coding.
IET Commun., 2014

A Study on Networking Scheme of Indoor Visible Light Communication Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

A Game-Based Mechanism of Relay Selection for Wireless Network Security.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Adaptive Transmit and Receive Beamforming Based on Subspace Projection for Anti-jamming.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels.
IEEE Commun. Lett., 2013

2009
Controllable single accumulated state-sequential acquisition with low signal noise ratio.
Sci. China Ser. F Inf. Sci., 2009

Using Concurrently Executing Mechanism to Provide Secure Handoff Optimization for IPv6-Based Wireless Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Innovation Net Accumulation Sequential Estimation for Sequential Acquisition.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2008
Pseudo Target Dynamic Feasible Region Constraint Location Method Using Single Observer in NLOS Environment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2003
BER performance of MRC 2D-RAKE receivers in correlated Nakagami-fading.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

2002
Smart antenna and spatial diversity-combining.
Proceedings of the 55th IEEE Vehicular Technology Conference, 2002

Impact of power control error on the outage probability of 2D-RAKE receivers in Nakagami fading channels.
Proceedings of the Global Telecommunications Conference, 2002

2001
Performance analysis of coherent 2D-RAKE receiver for WCDMA in Nakagami multipath fading.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001


  Loading...