学术论文
[1] Ke-WenHuang, H.-M Wang, L. Yang, Smart Jamming Using Reconfigurable IntelligentSurface: Asymptotic Analysis and Optimization, IEEE Transactions on Wireless Communications, 2023.
[2] Ke-WenHuang,H.-M Wang, and H. V. Poor, “On Covert Communication Against SequentialChange-Point Detection” IEEE Transactions on Information Theory, vol. 67, no.11, pp. 7285– 7303, Aug. 2021.
[3] Ke-WenHuang, H. Deng, and H.-M Wang,“Jamming aided covert communication with multiple receivers” IEEE Transactionson Wireless Communications, vol. 20, no. 7, 4480–4494, July 2021.
[4] Ke-WenHuang and H. -M. Wang,“Intelligent reflecting surface aided pilot contamination attack and itscountermeasure,” IEEE Transactions on Wireless Communications, vol. 20, no. 1,pp. 345–359, Jan. 2021.
[5] Ke-WenHuang and H.-M Wang,“Passive beamforming for IRS aided wireless networks,” IEEE WirelessCommunications Letters, vol. 9, no. 12, pp. 2035–2039, Dec. 2020.
[6] Ke-WenHuang, H.-M Wang, D. Towsleyand H. V. Poor, “LPD communication: A sequential change-point detectionperspective,” IEEE Transactions on Communications, vol. 68, no. 4, pp.2474-2490, April 2020.
[7] Ke-WenHuang, H.‐M. Wang, J. Hou, andS. Jin, “Joint spatial division and diversity for massive MIMO systems,” IEEETransactions on Communications, vol. 67, no. 1, pp. 258–272, Jan. 2019.
[8] H.‐M. Wang, Ke-WenHuang, and T. A. Tsiftsis, “Base station cooperation inmillimeter wave cellular networks: Performance enhancement of cell–edge users,”IEEE Transactions on Communications, vol. 66, no. 11, pp. 5124–5139, Nov. 2018.
[9] Ke-WenHuang and H.‐M. Wang,“Identifying the fake base station: A location based approach,” IEEECommunications Letters, vol. 22, no. 8, pp. 1604‐1607, Aug. 2018.
[10] Ke-WenHuang and H.‐M. Wang,“Combating the control signal spoofing attack in UAV systems,” IEEETransactions on Vehicular Technology, vol. 67, no. 8, pp. 7769‐7773, Aug. 2018.
[11] H.‐M. Wang, Ke-WenHuang, and T. A. Tsiftsis, “Multiple antennassecure transmission under pilot spoofing and jamming attack,” IEEE Journal onSelected Areas in Communications, vol. 36, no. 4, pp. 860‐876, April 2018.
[12] Ke-WenHuang, H.‐M. Wang, Y. Wu, andR. Schober, “Pilot spoofing attack by multiple eavesdroppers,” IEEETransactions on Wireless Communications, vol. 17, no. 10, pp. 6433‐6447, Oct.2018.
[13] H.‐M. Wang, Ke-WenHuang, Q. Yang and Z. Han, “Joint source‐relaysecure precoding for MIMO relay networks with direct links,” IEEE Transactionson Communications, vol. 65, no. 7, pp. 2781‐2793, Jul. 2017.
[14] Y. Ju, X. Qiu, Y. Chen, Ke-WenHuang, Q. Yin and H. Wang,“Beamforming design for interference management in millimeter wave cellularnetworks with partial CSI,” 2017 9th International Conference on WirelessCommunications and Signal Processing (WCSP), Nanjing, 2017, pp. 1‐6.
[15] Y. Xu, H. Wang, Q. Yang, Ke-WenHuang, and T. Zheng,“Cooperative transmission for physical layer security by exploring socialawareness,” 2017 IEEE Globecom Workshops, Singapore, 2017, pp. 1‐6.
[16] H. Wang, Y. Xu, Ke-WenHuang, Z. Han and T. A. Tsiftsis, “Cooperativesecure transmission by exploiting social ties in random networks,” IEEETransactions on Communications, vol. 66, no. 8, pp. 3610‐3622.
[17] J. Lyu, H. Wang and Ke-WenHuang, “Physical layer security in D2Dunderlay cellular networks with poisson cluster process,” IEEE Transactions onCommunications.
[18] J. Lyu, T. Zheng, Ke-WenHuangg, Y. Feng and H. Wang, “Securetransmissions of D2D underlay cellular networks with poisson cluster process,”2019 IEEE Global Communications Conference (GLOBECOM).
[19] T.Zheng, Q. Yang, Ke-WenHuang,H. Wang, Z. Wei and J. Yuan, “Physical-layer secure transmissions incache-enabled cooperative small cell networks,” 2018 IEEE Global CommunicationsConference (GLOBECOM).