Ning Wang

Orcid: 0000-0003-1381-7952

Affiliations:
  • George Mason University, Fairfax, VA, USA
  • Beijing University of Posts and Telecommunications, MOE, Key Laboratory of Universal Wireless Communication, China


According to our database1, Ning Wang authored at least 37 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy-Preserving Machine Learning as a Service: Challenges and Opportunities.
IEEE Netw., November, 2023

2022
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022

Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices.
IEEE Internet Things J., 2022

Hypergraph-Based Active Minimum Delay Data Aggregation Scheduling in Wireless-Powered IoT.
IEEE Internet Things J., 2022

2021
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks.
IEEE Trans. Wirel. Commun., 2021

Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Online-Learning-Based Defense Against Jamming Attacks in Multichannel Wireless CPS.
IEEE Internet Things J., 2021

Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks.
IEEE Access, 2021

2020
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic.
IEEE Trans. Inf. Forensics Secur., 2020

Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead.
IEEE Netw., 2020

Compressed-Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications.
IEEE Internet Things J., 2020

Graph Convolution-Based Deep Clustering for Speech Separation.
IEEE Access, 2020

Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Efficient Physical Layer Group Key Generation in 5G Wireless Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Physical Layer Key Generation in 5G Wireless Networks.
IEEE Wirel. Commun., 2019

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.
IEEE Internet Things J., 2019

Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Safeguarding multiuser communication using full-duplex jamming and Q-learning algorithm.
IET Commun., 2018

Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Mobility Improves NOMA Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2018

Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication.
Proceedings of the IEEE Global Communications Conference, 2018

Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A cross-layer approach to message authentication based on sparse representation for wireless body area networks.
Int. J. Distributed Sens. Networks, 2017

Transforming the SMV model into MMV model based on the characteristics of wavelet coefficients.
IET Signal Process., 2017

Physical layer spoofing detection based on sparse signal processing and fuzzy recognition.
IET Signal Process., 2017

Physical-layer security in Internet of Things based on compressed sensing and frequency selection.
IET Commun., 2017

Physical-Layer Authentication Based on Extreme Learning Machine.
IEEE Commun. Lett., 2017

2016
Channel sparse representation based authentication for reconciliation of key generation.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Compressed Sensing Based on the Characteristic Correlation of ECG in Hybrid Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

Image compressed sensing based on the similarity of image blocks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

A novel physical layer spoofing detection based on sparse signal processing.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

2014
Compressed sensing-based unequal error protection by linear codes.
IET Signal Process., 2014


  Loading...