Search

Your search keyword '"Hu Aiqun"' showing total 474 results

Search Constraints

Start Over You searched for: Author "Hu Aiqun" Remove constraint Author: "Hu Aiqun"
474 results on '"Hu Aiqun"'

Search Results

2. Radio frequency fingerprint identification for Internet of Things: A survey

3. Securing NextG networks with physical-layer key generation: A survey

4. Research on bionic mechanism based endogenous security defense system

5. Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security

6. Secure transmission technology based on direct modulation with random channel characteristics

7. SVM Multi-class Classification Method for Device Identification Using Eye Diagram Parameters

8. Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems

9. RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation

10. Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications

11. Radio Frequency Fingerprints Extraction for LTE-V2X: A Channel Estimation Based Methodology

12. Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels

13. Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments

14. Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics

15. Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation

16. Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation

19. Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?

20. Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments

22. On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation

23. A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication

24. TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing

25. Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems

26. Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network

27. Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis

28. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks

29. Radio Frequency Fingerprint Identification Based on Denoising Autoencoders

34. A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme

36. Neural Control Based Research of Endogenous Security Model

39. LoRa Devices Identification Based on Differential Constellation Trace Figure

41. Identification of IoT Devices Based on Hardware and Software Fingerprint Features.

Catalog

Books, media, physical & digital resources