黄柯文
我的位置在: 首页 > 学院概况 > 师资力量 > 黄柯文
教师介绍

无照片

黄柯文,博士,副教授。

2022年2月加入湖南大学信息科学与工程学院通信系。

2021年获得西安交通大学信息与通信工程专业博士学位。

2019年10月至2020年10月,至加州大学戴维斯分校访学。

2015年获得西安交通大学信息工程专业学士学位。
中文名: 黄柯文 英文名:
学历: 博士 职称: 副教授
联系电话: 一八七九二四二七三零五(微信) 电子邮件: huangkewen@hnu.edu.cn
研究方向: 无线通信,物理层安全,隐蔽通信
联系地址: 湖南大学信息科学与工程学院 304
所属机构:  通信工程系  学院教师

2025年秋季入学研究生尚有名额,欢迎咨询。

学术论文
  • 1.    Ke-Wen Huang, H. -M. Wangand L. Yang, "Covert RIS-Based Symbiotic Radio in Artificial Noise-AidedSecure Communications Systems," in IEEE Transactions onWireless Communications

  • 2.  Ke-Wen Huang, S. Shi, H. -M. Wang and L.Yang, "Covert Communications in Active Reconfigurable Intelligent SurfaceBased Symbiotic Radio Systems," in IEEE Transactions on VehicularTechnology, vol. 74, no. 3, pp. 5164-5169, March 2025

  • 3. Ke-Wen Huang, H.-M Wang, L. Yang, Smart Jamming Using Reconfigurable IntelligentSurface:Asymptotic Analysis and Optimization, IEEETransactions on Wireless Communications, 2023.

  • 4.    Ke-Wen Huang, H.-M Wang, and H. V.Poor, “On Covert Communication Against SequentialChange-Point Detection” IEEETransactions on Information Theory, vol. 67, no.11, pp. 7285– 7303, Aug. 2021.

  • 5.  Ke-Wen Huang, H. Deng, and H.-MWang,“Jamming aided covert communication with multiple receivers” IEEETransactionson Wireless Communications, vol. 20, no. 7, 4480–4494, July 2021.

  • 6.  Ke-Wen Huang and H. -M.Wang,“Intelligent reflecting surface aided pilot contamination attack anditscountermeasure,” IEEE Transactions on Wireless Communications, vol. 20, no.1,pp. 345–359, Jan. 2021.

  • 7.      Ke-Wen Huang and H.-MWang,“Passive beamforming for IRS aided wireless networks,” IEEEWirelessCommunications Letters, vol. 9, no. 12, pp. 2035–2039, Dec. 2020.

  • 8.     Ke-Wen Huang, H.-M Wang, D. Towsleyand H. V. Poor, “LPD communication: Asequential change-point detectionperspective,” IEEE Transactions onCommunications, vol. 68, no. 4, pp.2474-2490, April 2020.

  • 9.   Ke-Wen Huang, H.‐M. Wang, J. Hou,andS. Jin, “Joint spatial division and diversity for massive MIMO systems,”IEEETransactions on Communications, vol. 67, no. 1, pp. 258–272, Jan. 2019.

  • 10. H.‐M. Wang, Ke-Wen Huang, and T. A.Tsiftsis, “Base station cooperation inmillimeter wave cellular networks:Performance enhancement of cell–edge users,”IEEE Transactions onCommunications, vol. 66, no. 11, pp. 5124–5139, Nov. 2018.

  • 11. Ke-Wen Huang and H.‐M.Wang,“Identifying the fake base station: A location based approach,”IEEECommunications Letters, vol. 22, no. 8, pp. 1604‐1607, Aug. 2018.

  • 12. Ke-Wen Huang and H.‐M.Wang,“Combating the control signal spoofing attack in UAV systems,”IEEETransactions on Vehicular Technology, vol. 67, no. 8, pp. 7769‐7773, Aug.2018.

  • 13.   H.‐M. Wang, Ke-Wen Huang, and T. A. Tsiftsis, “Multipleantennassecure transmission under pilot spoofing and jamming attack,” IEEEJournal onSelected Areas in Communications, vol. 36, no. 4, pp. 860‐876, April2018.

  • 14. Ke-Wen Huang, H.‐M. Wang, Y. Wu,andR. Schober, “Pilot spoofing attack by multiple eavesdroppers,”IEEETransactions on Wireless Communications, vol. 17, no. 10, pp. 6433‐6447,Oct.2018.

  • 15.   H.‐M. Wang, Ke-Wen Huang, Q. Yang and Z. Han, “Jointsource‐relaysecure precoding for MIMO relay networks with direct links,” IEEETransactionson Communications, vol. 65, no. 7, pp. 2781‐2793, Jul. 2017.

  • 16.   Y. Ju, X. Qiu, Y. Chen, Ke-Wen Huang, Q. Yin and H. Wang,“Beamformingdesign for interference management in millimeter wave cellularnetworks withpartial CSI,” 2017 9th International Conference on WirelessCommunications andSignal Processing (WCSP), Nanjing, 2017, pp. 1‐6.

  • 17. Y. Xu, H. Wang, Q. Yang, Ke-Wen Huang, and T.Zheng,“Cooperative transmission for physical layer security by exploringsocialawareness,” 2017 IEEE Globecom Workshops, Singapore, 2017.

  • 18.  H. -M. Wang, Y. Xu, Ke-Wen Huang, Z. Han and T. A. Tsiftsis,“Cooperativesecure transmission by exploiting social ties in random networks,”IEEETransactions on Communications, vol. 66, no. 8, pp. 3610‐3622.

  • 19.  J. Lyu, H. Wang and Ke-Wen Huang, “Physical layersecurity in D2Dunderlay cellular networks with poisson cluster process,” IEEETransactions onCommunications.

  • 20.  J. Lyu, T. Zheng, Ke-Wen Huangg, Y. Feng and H. Wang,“Securetransmissions of D2D underlay cellular networks with poisson clusterprocess,”2019 IEEE Global Communications Conference (GLOBECOM).

  • 21. T.Zheng, Q. Yang, Ke-WenHuang,H. Wang, Z. Wei and J. Yuan,“Physical-layer secure transmissions incache-enabled cooperative small cellnetworks,” 2018 IEEE Global CommunicationsConference (GLOBECOM).