default search action
Kaizhi Huang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Xiaoyan Hu, Zheng Wan, Kaizhi Huang, Liang Jin, Mengyao Yan, Yajun Chen, Jinmei Yang:
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys. Sci. China Inf. Sci. 67(1) (2024) - [j68]Qinlong Li, Kaizhi Huang, Zheyuan Deng, Zheng Wan, Ming Yi:
A Multi-RIS-Assisted Static Environment Sensing Method. IEEE Commun. Lett. 28(6): 1317-1321 (2024) - [j67]Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Gaojie Chen, Li Zhen:
Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network. IET Signal Process. 2024: 1-15 (2024) - [j66]Zheng Wan, Kaizhi Huang, Xiaoming Xu, Ming Yi, Hui-Ming Wang, Zhengyu Zhu, Liang Jin:
RIS-Assisted Integration of Communications and Security: Protocol, Prototyping, and Field Trials. IEEE Internet Things J. 11(16): 26877-26887 (2024) - [j65]Zheng Wan, Zheng Chu, De Mi, Hui-Ming Wang, Liang Jin, Kaizhi Huang:
STAR-RIS-Assisted Physical-Layer Key Generation. IEEE Trans. Veh. Technol. 73(6): 9165-9170 (2024) - [j64]Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Li Zhen, De Mi:
IRS-Assisted Secret Key Generation With Transceiver Hardware Impairments. IEEE Trans. Veh. Technol. 73(8): 12154-12159 (2024) - [j63]Kaizhi Huang, Qinlong Li, Subei Ren, Zheng Wan, Ming Yi:
A RIS-Assisted MUSIC-Like Single-Channel Blind Direction-of-Arrival Estimation Method. IEEE Wirel. Commun. Lett. 13(8): 2190-2194 (2024) - 2023
- [j62]Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu:
Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System. Entropy 25(7): 1102 (2023) - [j61]Jinpeng Wang, Wenyu Jiang, Kaizhi Huang, Xiaoli Sun:
A Communication Anti-Jamming Scheme Assisted by RIS with Angular Response. Entropy 25(12): 1638 (2023) - [j60]Shaoyu Wang, Kaizhi Huang, Keming Ma, Xiaoming Xu, Xiaoyan Hu:
A lightweight encryption and message authentication framework for wireless communication. IET Commun. 17(3): 265-278 (2023) - [j59]Zhangbo Ren, Kaizhi Huang, Wenyu Jiang, Keming Ma, Jie Yang:
Reconfigurable intelligent surface enhanced MISO-OFDM anti-jamming communications: Joint active and passive precoding design. IET Commun. 17(6): 712-725 (2023) - [j58]Ya Liu, Kaizhi Huang, Xiaoli Sun, Jie Yang, Jianlei Zhao:
Secure wireless communications for STAR-RIS-assisted millimetre-wave NOMA uplink networks. IET Commun. 17(9): 1127-1139 (2023) - [j57]Zheng Wan, Mengyao Yan, Kaizhi Huang, Zhou Zhong, Xiaoming Xu, Yajun Chen, Fan Wu:
Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels. Frontiers Inf. Technol. Electron. Eng. 24(12): 1803-1814 (2023) - [j56]Yuda Lin, Liang Jin, Kaizhi Huang, Xiaoli Sun, Feihu Wang:
Multiantenna Joint Covert Communication System With Finite Blocklength. IEEE Syst. J. 17(1): 1170-1180 (2023) - [j55]Wenyu Jiang, Jie Yang, Xinsheng Ji, Kaizhi Huang, Jinmei Yang:
Robust Security Transmission Scheme for SWIPT-Enable Heterogeneous Networks With RIS. IEEE Syst. J. 17(4): 5417-5428 (2023) - [j54]Ya Liu, Jie Yang, Kaizhi Huang, Xiaoyan Hu, Yi Wang, Fan Wu:
An Optimal RIS Design Strategy for Jointly Improving Key Rate and Communication Performance in Quasi-Static Environments. IEEE Wirel. Commun. Lett. 12(9): 1618-1622 (2023) - [j53]Zheng Wan, Xiaoyan Hu, Xiaoli Sun, Xiaoming Xu, Kaizhi Huang, Liang Jin:
A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation. IEEE Wirel. Commun. Lett. 12(12): 2193-2197 (2023) - [c44]Wenyu Jiang, Kaizhi Huang, Ming Yi, Yajun Chen, Liang Jin:
RIS-Based Reconfigurable Antenna for Anti-Jamming Communications with Bit-Limited ADCs. GLOBECOM (Workshops) 2023: 1433-1438 - [c43]Zheng Wan, Yajun Chen, Xiaoyan Hu, Kaizhi Huang, Liang Jin, Jinmei Yang:
STAR-RIS Assisted Secret Key Generation: Joint Active and Passive Precoding Design. VTC Fall 2023: 1-6 - [i1]Kaizhi Huang, Wenyu Jiang, Yajun Chen, Liang Jin, Qingqing Wu, Xiaoling Hu:
Robust Anti-jamming Communications with DMA-Based Reconfigurable Heterogeneous Array. CoRR abs/2310.09466 (2023) - 2022
- [j52]Ya Liu, Kaizhi Huang, Xiaoli Sun, Shaochuan Yang, Liang Wang:
Intelligent Reflecting Surface-Assisted Wireless Secret Key Generation against Multiple Eavesdroppers. Entropy 24(4): 446 (2022) - [j51]Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Xiaoyan Hu, Jing Yang, Liang Jin:
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication. Entropy 24(4): 488 (2022) - [j50]Meng Wang, Kaizhi Huang, Zheng Wan, Xiaoli Sun, Liang Jin, Kai Zhao:
Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation. Entropy 24(8): 1167 (2022) - [j49]Xuanyan Song, Liang Jin, Kaizhi Huang, Shuaifang Xiao, Xiaoli Sun, Jianlei Zhao:
Efficient and secure communication scheme for OFDM system based on physical layer non-reconciled keys. IET Commun. 16(6): 659-671 (2022) - [j48]Tianyu Lan, Kaizhi Huang, Liang Jin, Xiaoming Xu, Xiaoli Sun, Zhou Zhong:
DOA Estimation Algorithm for Reconfigurable Intelligent Surface Co-Prime Linear Array Based on Multiple Signal Classification Approach. Inf. 13(2): 72 (2022) - [j47]Ya Liu, Jie Yang, Kaizhi Huang, Xiaoli Sun, Yi Wang:
Secure wireless communications in the multi-user MISO interference channel assisted by multiple reconfigurable intelligent surfaces. J. Commun. Networks 24(5): 530-540 (2022) - [j46]Wenyu Jiang, Kaizhi Huang, Yajun Chen, Xiaoli Sun, Jie Yang, Kai Zhao:
A joint design for multi-band heterogeneous networks when deploying reconfigurable intelligent surface. J. Commun. Networks 24(5): 613-623 (2022) - [j45]Xinsheng Ji, Jiangxing Wu, Liang Jin, Kaizhi Huang, Yajun Chen, Xiaoli Sun, Wei You, Shumin Huo, Jing Yang:
Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers Inf. Technol. Electron. Eng. 23(10): 1421-1450 (2022) - [j44]Yuda Lin, Liang Jin, Kaizhi Huang, Zhou Zhong, Qian Han:
Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel. IEEE Wirel. Commun. Lett. 11(6): 1253-1257 (2022) - [j43]Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Zhou Zhong, You Zhou:
CSI-Based Physical Layer Authentication via Deep Learning. IEEE Wirel. Commun. Lett. 11(8): 1748-1752 (2022) - [c42]Wenyu Jiang, Zhangbo Ren, Kaizhi Huang, Jie Yang, Yajun Chen, Xiaoli Sun:
A Joint Space-Frequency Anti-jamming Scheme Based on Reconfigurable Intelligent Surface. GLOBECOM 2022: 6408-6414 - 2021
- [j42]Zheng Wan, Kaizhi Huang, Lu Chen:
Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems. IEICE Trans. Inf. Syst. 104-D(7): 1058-1062 (2021) - [j41]Yuda Lin, Liang Jin, Kaizhi Huang, You Zhou:
Multi-antenna joint covert communication with a public communication link over wireless fading channel. IET Commun. 15(5): 695-707 (2021) - [j40]Jie Yang, Kaizhi Huang, Xiaoli Sun, Yi Wang:
Joint active and passive beamforming optimization for intelligent reflecting surface assisted proactive eavesdropping. IET Commun. 15(8): 1085-1095 (2021) - [j39]Jie Yang, Xinsheng Ji, Kaizhi Huang, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. Secur. Commun. Networks 2021: 8836757:1-8836757:12 (2021) - [j38]Jie Yang, Xinsheng Ji, Feihu Wang, Kaizhi Huang, Lin Guo:
A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI. IEEE Trans. Veh. Technol. 70(12): 12847-12857 (2021) - [j37]Xiaoyan Hu, Liang Jin, Kaizhi Huang, Xiaoli Sun, You Zhou, Jinghua Qu:
Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment. IEEE Wirel. Commun. Lett. 10(9): 1867-1870 (2021) - [c41]Yuda Lin, Liang Jin, Kaizhi Huang, Feihu Wang, Jinmei Yang:
Multi-Antenna Covert Communications with Delay Constraint. VTC Fall 2021: 1-5 - [c40]Liang Jin, Xiaoyan Hu, Xiaoli Sun, Yangming Lou, Kaizhi Huang, Zhou Zhong, Xiaoming Xu:
Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication. WCNC Workshops 2021: 1-7 - 2020
- [j36]Yajun Chen, Kaizhi Huang, You Zhou, Keming Ma, Henglei Jin, Xiaoming Xu:
Physical Layer Key Generation Scheme Through Scrambling the Correlated Eavesdropping Channel. IEEE Access 8: 48982-48990 (2020) - [j35]Kaizhi Huang, Bo Zhang, Zhou Zhong, Yajun Chen, Xiaoming Xu:
Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks. Sci. China Inf. Sci. 63(12) (2020) - [j34]Wenyu Jiang, Kaizhi Huang, Shuaifang Xiao, Xiaoming Xu:
Secure transmission for heterogeneous cellular network with limited feedback. Sci. China Inf. Sci. 63(12) (2020) - [j33]Xiaoyan Hu, Liang Jin, Kaizhi Huang, Keming Ma, Changcheng Song, Shuaifang Xiao:
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys. Secur. Commun. Networks 2020: 8840645:1-8840645:15 (2020)
2010 – 2019
- 2019
- [j32]Henglei Jin, Kaizhi Huang, Shuaifang Xiao, Yangming Lou, Xiaoming Xu, Yajun Chen:
A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel. IEEE Access 7: 26480-26487 (2019) - [j31]Shaoyu Wang, Xiaoming Xu, Kaizhi Huang, Xinsheng Ji, Yajun Chen, Liang Jin:
Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems. IEEE Access 7: 28597-28606 (2019) - [j30]Bo Zhang, Bin Li, Kaizhi Huang, Zhou Zhong, Lijian Zhang, Zesong Fei:
Robust Secrecy Energy Efficiency Optimization for Wireless Powered Heterogeneous Networks Using Distributed ADMM Algorithm. IEEE Access 7: 116277-116294 (2019) - [j29]Shuai Zhang, Xiaoming Xu, Jianhua Peng, Kaizhi Huang, Zhigang Li:
Physical layer security in massive internet of things: delay and security analysis. IET Commun. 13(1): 93-98 (2019) - [j28]Jing Yang, Xinsheng Ji, Kaizhi Huang, Yajun Chen, Xiaoming Xu, Ming Yi:
Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun. 13(2): 144-152 (2019) - [j27]Kaizhi Huang, Bo Zhang:
Robust secure transmission for wireless information and power transfer in heterogeneous networks. IET Commun. 13(4): 411-422 (2019) - [j26]Bo Zhang, Kaizhi Huang, Liang Jin, Ming Yi:
Robust secrecy energy efficiency optimisation in heterogeneous networks with simultaneous wireless information and power transfer: centralised and distributed design. IET Commun. 13(17): 2857-2870 (2019) - [j25]Yunjia Xu, Kaizhi Huang, Xin Hu, Yi Zou, Yajun Chen, Wenyu Jiang:
CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. KSII Trans. Internet Inf. Syst. 13(1): 110-132 (2019) - [j24]Yajun Chen, Ming Yi, Zhou Zhong, Keming Ma, Kaizhi Huang, Xinsheng Ji:
Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks. KSII Trans. Internet Inf. Syst. 13(10): 4923-4939 (2019) - [j23]Xiaohui Qi, Bin Li, Zheng Chu, Kaizhi Huang, Hongbin Chen, Zesong Fei:
Secrecy energy efficiency performance in communication networks with mobile sinks. Phys. Commun. 32: 41-49 (2019) - [j22]Bo Zhang, Kaizhi Huang:
Robust optimization for AN-aided wireless information and power transfer for secure heterogeneous networks. Phys. Commun. 33: 231-240 (2019) - [j21]Kaizhi Huang, Bo Zhang, Yajun Chen:
Secrecy energy efficiency optimization in heterogeneous networks with simultaneous wireless information and power transfer. Phys. Commun. 37 (2019) - [j20]Bin Li, Xiaohui Qi, Kaizhi Huang, Zesong Fei, Fuhui Zhou, Rose Qingyang Hu:
Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks. IEEE Trans. Commun. 67(1): 83-96 (2019) - 2018
- [j19]Bing Wang, Kaizhi Huang, Xiaoming Xu, Liang Jin, Zhou Zhong, Yi Wang:
Resource Allocation for Secure Communication in K -Tier Heterogeneous Cellular Networks: A Spatial-Temporal Perspective. IEEE Access 6: 772-782 (2018) - [j18]Yi Wang, Pengge Ma, Rui Zhao, Yongming Huang, Chunguo Li, Jun Zhu, Kaizhi Huang, Bing Wang:
Near-Optimal Pilot Signal Design for FDD Massive MIMO System: An Energy-Efficient Perspective. IEEE Access 6: 13275-13288 (2018) - [j17]Xin Hu, Bin Li, Kaizhi Huang, Zesong Fei, Kai-Kit Wong:
Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach. IEEE Access 6: 20609-20624 (2018) - [j16]Shuai Zhang, Xiaoming Xu, Huiming Wang, Jianhua Peng, Di Zhang, Kaizhi Huang:
Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things. IEEE Access 6: 58405-58417 (2018) - [j15]Xiaohui Qi, Kaizhi Huang, Bin Li, Liang Jin, Xinsheng Ji:
Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis. Sci. China Inf. Sci. 61(2): 022310:1-022310:15 (2018) - [j14]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Bin Li, Xiaolei Kang:
Opportunistic access control for enhancing security in D2D-enabled cellular networks. Sci. China Inf. Sci. 61(4): 042304:1-042304:12 (2018) - [j13]Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi:
Overview of 5G security technology. Sci. China Inf. Sci. 61(8): 081301:1-081301:25 (2018) - [j12]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Bin Li, Xiaolei Kang:
Minimizing secrecy outage probability in D2D-enabled cellular networks: Access control with power optimization. Trans. Emerg. Telecommun. Technol. 29(1) (2018) - [j11]Shuaifang Xiao, Yunfei Guo, Kaizhi Huang, Liang Jin:
Cooperative Group Secret Key Generation Based on Secure Network Coding. IEEE Commun. Lett. 22(7): 1466-1469 (2018) - [j10]Bo Zhang, Kaizhi Huang, Yajun Chen:
A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks. KSII Trans. Internet Inf. Syst. 12(6): 2595-2618 (2018) - [c39]Shengjun Zhang, Liang Jin, Yangming Lou, Kaizhi Huang, Zhou Zhong:
High-Rate Secret Key Generation Method Using Two-Way Random Signal. CyberC 2018 - [c38]Xin Hu, Kaizhi Huang, Jun Li, Yajun Chen, Yunjia Xu:
Secrecy Spectral Efficiency Fairness among Multi-Cells in SWIPT-Enabled Cooperative NOMA Transmissions. VTC Spring 2018: 1-6 - [c37]Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Shuai Zhang:
On the Reliability and Security Performance of Opportunistic Relay Selection in Millimeter Wave Networks. VTC Fall 2018: 1-6 - [c36]Shengjun Zhang, Liang Jin, Shilei Zhu, Kaizhi Huang, Zhou Zhong:
Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation. VTC Fall 2018: 1-6 - 2017
- [j9]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Jing Yang, Xin Hu, Yunjia Xu:
Artificial noise-assisted physical layer security in D2D-enabled cellular networks. EURASIP J. Wirel. Commun. Netw. 2017: 178 (2017) - [j8]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Jing Yang, Xin Hu, Yunjia Xu:
Correction to: Artificial noise-assisted physical layer security in D2D-enabled cellular networks. EURASIP J. Wirel. Commun. Netw. 2017: 199 (2017) - [j7]Zhihao Zhong, Jianhua Peng, Kaizhi Huang:
Analysis on Physical-Layer Security for Multi-Cell Coordination Aided Ultra-Dense Heterogeneous Networks. IEICE Trans. Commun. 100-B(10): 1846-1855 (2017) - [j6]Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi:
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. KSII Trans. Internet Inf. Syst. 11(2): 628-649 (2017) - [j5]Jing Yang, Xinsheng Ji, Kaizhi Huang, Ming Yi, Yajun Chen:
AKA-PLA: Enhanced AKA Based on Physical Layer Authentication. KSII Trans. Internet Inf. Syst. 11(7): 3747-3765 (2017) - [c35]Yunjia Xu, Kaizhi Huang, Yi Zou:
Secure and Reliable Transmission for Dense HetNets Based on Secure Energy Efficiency Optimization. ChinaCom (1) 2017: 557-566 - [c34]Xin Hu, Kaizhi Huang, Yajun Chen, Yunjia Xu, Quan Yuan:
Secrecy analysis based on energy threshold for simultaneous wireless information and power transfer in Internet of Things. ICCC 2017: 1-6 - [c33]Yajun Chen, Xinsheng Ji, Jing Yang, Kaizhi Huang, Ming Yi:
Physical layer security in D2D-enabled cellular networks: Artificial noise assisted. PIMRC 2017: 1-6 - [c32]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Xiaolei Kang:
Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks. VTC Spring 2017: 1-5 - [c31]Xu Wang, Mingliang Li, Liang Jin, Kaizhi Huang:
Physical Layer Secret Key Capacity of Two Moving Terminals. VTC Spring 2017: 1-6 - [c30]Yunjia Xu, Kaizhi Huang, Dazhao Ding, Xiaohui Qi, Yajun Chen:
Secure Transmission Scheme in K-Tier Dense Heterogeneous Cellular Networks with Imperfect Channel State Information. VTC Fall 2017: 1-5 - [c29]Bo Zhang, Kaizhi Huang, Ming Yi, Mingliang Yi:
Physical Layer Security Scheme Based on Base Station Cooperation in Dense Heterogeneous Networks. VTC Spring 2017: 1-7 - [c28]Xin Hu, Kaizhi Huang, Yajun Chen, Xiaoming Xu, Xiaohu Liang:
Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers. WCSP 2017: 1-6 - [c27]Bing Wang, Chunguo Li, Kaizhi Huang, Xiaoming Xu, Yi Wang:
Physical layer security in heterogeneous cellular networks: A spatio-temporal perspective. WCSP 2017: 1-6 - [c26]Likang Wang, Jianhua Peng, Ming Yi, Kaizhi Huang, Aiqin Li:
Achieving secure transmission using feedback-based LT code with degree distribution updated. WCSP 2017: 1-6 - [c25]Shuai Zhang, Jianhua Peng, Kaizhi Huang, Xiaoming Xu, Zhou Zhong:
Physical layer security in IoT: A spatial-temporal perspective. WCSP 2017: 1-6 - [c24]Bing Wang, Kaizhi Huang:
Spatio-temporal stochastic modeling of heterogeneous cellular networks: Security and delay analysis. WPMC 2017: 374-379 - 2016
- [j4]Xiangyu Li, Liang Jin, Kaizhi Huang, Lu Liu:
Transmission frequency-band hidden technology in physical layer security. Sci. China Inf. Sci. 59(1): 1-3 (2016) - [c23]Xu Wang, Liang Jin, Kaizhi Huang, Mingliang Li, Ming Yi:
Physical Layer Secret Key Capacity Using Correlated Wireless Channel Samples. GLOBECOM 2016: 1-6 - [c22]Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Zhou Zhong:
Analysis on Physical-Layer Security for Internet of Things in Ultra Dense Heterogeneous Networks. iThings/GreenCom/CPSCom/SmartData 2016: 39-43 - [c21]Xiaolei Kang, Xinsheng Ji, Kaizhi Huang, Zhou Zhong:
Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted. VTC Fall 2016: 1-5 - [c20]Yu Huang, Liang Jin, Kaizhi Huang, Lu Liu, Xiaolei Kang:
Performance analysis of the encryption method based on compressed sensing at the physical layer. WPMC 2016: 188-193 - [c19]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Xiaolei Kang, Xiaohui Qi:
Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers. WPMC 2016: 262-267 - [c18]Xiaohui Qi, Kaizhi Huang, Zhihao Zhong:
MU-MIMO aided secure transmission in cognitive downlink heterogeneous cellular networks. WPMC 2016: 274-279 - 2015
- [c17]Xiaohui Qi, Kaizhi Huang, Jing Yang:
Variable step-size affine projection normalized subband adaptive filter design. ICCC Workshops 2015: 1-6 - [c16]Jing Yang, Xinsheng Ji, Kaizhi Huang, Yajun Chen, Xiaohui Qi:
A physical-layer authentication scheme based on hash method. ICCC Workshops 2015: 99-104 - [c15]Xiaorui Gong, Jianhua Peng, Kaizhi Huang, Yajun Chen:
A TOA-Based Geolocation Algorithm Utilizing Convex Combination. VTC Spring 2015: 1-5 - [c14]Shengbin Lin, Kaizhi Huang, Wenyu Luo, Yi Zou:
Analysis of Pilot Contamination on the Security Performance of Artificial Noise in MIMO Systems. VTC Spring 2015: 1-5 - [c13]Zhiwei Zhang, Yunzhou Li, Kaizhi Huang, Chen Liang:
Energy efficiency analysis of energy harvesting relay-aided cooperative networks. WiOpt 2015: 1-7 - [c12]Zhiwei Zhang, Yunzhou Li, Kaizhi Huang, Chen Liang:
On stochastic geometry modeling of WLAN capacity with dynamic sensitive control. WiOpt 2015: 78-83 - 2014
- [j3]Ming Yi, Xinsheng Ji, Kaizhi Huang, Hong Wen, Bin Wu:
Achieving strong security based on fountain code with coset pre-coding. IET Commun. 8(14): 2476-2483 (2014) - [c11]Shengjun Zhang, Kaizhi Huang, Xiangyu Li:
Adaptive Transmit and Receive Beamforming Based on Subspace Projection for Anti-jamming. MILCOM 2014: 388-393 - [c10]Ying Hong, Kaizhi Huang, Wenyu Luo, Shengbin Lin:
A Game-Based Mechanism of Relay Selection for Wireless Network Security. VTC Spring 2014: 1-5 - [c9]Hua Zhao, Yang Liu, Kaizhi Huang, Xinsheng Ji, Dapeng Wang:
A Study on Networking Scheme of Indoor Visible Light Communication Networks. VTC Spring 2014: 1-5 - 2013
- [j2]Qiaolong Li, Huawei Song, Kaizhi Huang:
Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels. IEEE Commun. Lett. 17(5): 892-895 (2013)
2000 – 2009
- 2009
- [j1]Jiang Ji, Kaizhi Huang, Liang Jin, LiZhi Zhang, Meng Zhang:
Controllable single accumulated state-sequential acquisition with low signal noise ratio. Sci. China Ser. F Inf. Sci. 52(5): 858-866 (2009) - [c8]Kaizhi Huang, Jiang Ji, Liang Jin:
Innovation Net Accumulation Sequential Estimation for Sequential Acquisition. VTC Spring 2009 - [c7]Qiaolong Li, Kaizhi Huang, Liang Jin:
Using Concurrently Executing Mechanism to Provide Secure Handoff Optimization for IPv6-Based Wireless Networks. VTC Spring 2009 - 2008
- [c6]Hou Huifang, Kaizhi Huang, Liu Guangqiang:
CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. CSSE (3) 2008: 1015-1019 - [c5]Dandan Fan, Liang Jin, Kaizhi Huang:
Pseudo Target Dynamic Feasible Region Constraint Location Method Using Single Observer in NLOS Environment. GLOBECOM 2008: 4820-4824 - 2003
- [c4]Kaizhi Huang, Jing Wang, Guoan Chen, Youzheng Wang:
BER performance of MRC 2D-RAKE receivers in correlated Nakagami-fading. WCNC 2003: 173-177 - 2002
- [c3]Kaizhi Huang, Jing Wang, Youzheng Wang, Guoan Chen:
Impact of power control error on the outage probability of 2D-RAKE receivers in Nakagami fading channels. GLOBECOM 2002: 1800-1804 - [c2]Kaizhi Huang, Jing Wang, Guoan Chen, Youzheng Wang:
Smart antenna and spatial diversity-combining. VTC Spring 2002: 340-344 - 2001
- [c1]Kaizhi Huang, Jing Wang:
Performance analysis of coherent 2D-RAKE receiver for WCDMA in Nakagami multipath fading. VTC Fall 2001: 1168-1171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint