474 results on '"Hu Aiqun"'
Search Results
2. Radio frequency fingerprint identification for Internet of Things: A survey
3. Securing NextG networks with physical-layer key generation: A survey
4. Research on bionic mechanism based endogenous security defense system
5. Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
6. Secure transmission technology based on direct modulation with random channel characteristics
7. SVM Multi-class Classification Method for Device Identification Using Eye Diagram Parameters
8. Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems
9. RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation
10. Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications
11. Radio Frequency Fingerprints Extraction for LTE-V2X: A Channel Estimation Based Methodology
12. Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels
13. Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments
14. Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
15. Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation
16. Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation
17. A channel resilient RFF extraction scheme for cyclic prefix contained systems
18. A High Consistency Wireless Key Generation Scheme for Vehicular Communication Based on Wiener Filter Extrapolation
19. Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?
20. Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments
21. A practical scheme for enhancing consistency and independence in wireless key generation for Wi-Fi networks
22. On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation
23. A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication
24. TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing
25. Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems
26. Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network
27. Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis
28. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks
29. Radio Frequency Fingerprint Identification Based on Denoising Autoencoders
30. Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis
31. A practical radio frequency fingerprinting scheme for mobile phones identification
32. Towards a privacy protection-capable noise fingerprinting for numerically aggregated data
33. Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection
34. A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme
35. The Early Rise of Social Security in China: Ideas and Reforms, 1911–1949
36. Neural Control Based Research of Endogenous Security Model
37. Radio frequency fingerprint identification based on stream differential constellation trace figures
38. A coding scheme to force the eavesdropper falling in error avalanche
39. LoRa Devices Identification Based on Differential Constellation Trace Figure
40. Trading off data resource availability and privacy preservation in multi-layer network transaction
41. Identification of IoT Devices Based on Hardware and Software Fingerprint Features.
42. Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis
43. Hybrid RFF Identification for LTE Using Wavelet Coefficient Graph and Differential Spectrum
44. A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS
45. Data-and-Channel-Independent Radio Frequency Fingerprint Extraction for LTE-V2X
46. Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation
47. Generative adversarial network-based rogue device identification using differential constellation trace figure
48. A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme
49. Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection
50. Channel insensitive RFFI scheme designed for LTE-V2X
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.