Search

Your search keyword '"Kaizhi HUANG"' showing total 128 results

Search Constraints

Start Over You searched for: Author "Kaizhi HUANG" Remove constraint Author: "Kaizhi HUANG" Language undetermined Remove constraint Language: undetermined
128 results on '"Kaizhi HUANG"'

Search Results

8. Reconfigurable Intelligent Surface Assisted DOA Estimation under Strong Interference

14. A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI

17. RIS aided Physical Layer Key Generation of IoT network in Static Environments

18. Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment

19. Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems

21. Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation

22. Wireless Channel-Based Physical Layer One-Time Pad Encryption Scheme for Modulated Signals

27. Physical Layer Key Generation Scheme Through Scrambling the Correlated Eavesdropping Channel

30. Nonagreement secret key generation based on spatial symmetric scrambling and secure polar coding

31. Secrecy energy efficiency performance in communication networks with mobile sinks

32. Unified and fast handover authentication based on link signatures in 5G SDN‐based HetNet

33. Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems

34. Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks

35. Physical layer security in massive internet of things: delay and security analysis

36. Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication

37. Secure transmission for heterogeneous cellular network with limited feedback

38. Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

39. DOA Estimation Algorithm for Reconfigurable Intelligent Surface Co-Prime Linear Array Based on Multiple Signal Classification Approach

40. Non-reconciliation Secret Keys Based Secure Transmission Scheme Using Polar Codes

41. A Joint Beamforming Design in Heterogeneous SWIPT Network with Imperfect CSI

42. Cooperative Group Secret Key Generation Based on Secure Network Coding

43. Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things

44. Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach

45. Secure spectral-energy efficiency tradeoff in random cognitive relay networks

46. Secure transmission scheme based on dual- thresholds for simultaneous wireless information and power transfer

47. Analysis on Physical-Layer Security for Multi-Cell Coordination Aided Ultra-Dense Heterogeneous Networks

48. 5G entering into a new era [Guest Editorial]

49. Physical-Layer Secret Key Generation with Correlated Eavesdropping Channel

50. A Network Slicing Deployment Method for Guaranteeing Service Performance

Catalog

Books, media, physical & digital resources