黄柯文
我的位置在: 首页 > 学院概况 > 师资力量 > 黄柯文
教师介绍

无照片

黄柯文,博士,副教授。

2022年2月加入湖南大学信息科学与工程学院通信系。

2021年获得西安交通大学信息与通信工程专业博士学位。

2019年10月至2020年10月,至加州大学戴维斯分校访学。

2015年获得西安交通大学信息工程专业学士学位。
中文名: 黄柯文 英文名:
学历: 博士 职称: 副教授
联系电话: 电子邮件: huangkewen@hnu.edu.cn
研究方向: 无线通信,物理层安全,隐蔽通信
联系地址: 湖南大学信息科学与工程学院 304
所属机构:  通信工程系  学院教师
学术论文

[1] Ke-WenHuang, H.-M Wang, L. Yang, Smart Jamming Using Reconfigurable IntelligentSurface: Asymptotic Analysis and Optimization, IEEE Transactions on Wireless Communications, 2023.

[2] Ke-WenHuang,H.-M Wang, and H. V. Poor, “On Covert Communication Against SequentialChange-Point Detection” IEEE Transactions on Information Theory, vol. 67, no.11, pp. 7285– 7303, Aug. 2021.

[3] Ke-WenHuang, H. Deng, and H.-M Wang,“Jamming aided covert communication with multiple receivers” IEEE Transactionson Wireless Communications, vol. 20, no. 7, 4480–4494, July 2021.

[4] Ke-WenHuang and H. -M. Wang,“Intelligent reflecting surface aided pilot contamination attack and itscountermeasure,” IEEE Transactions on Wireless Communications, vol. 20, no. 1,pp. 345–359, Jan. 2021.

[5] Ke-WenHuang and H.-M Wang,“Passive beamforming for IRS aided wireless networks,” IEEE WirelessCommunications Letters, vol. 9, no. 12, pp. 2035–2039, Dec. 2020.

[6] Ke-WenHuang, H.-M Wang, D. Towsleyand H. V. Poor, “LPD communication: A sequential change-point detectionperspective,” IEEE Transactions on Communications, vol. 68, no. 4, pp.2474-2490, April 2020.

[7] Ke-WenHuang, H.‐M. Wang, J. Hou, andS. Jin, “Joint spatial division and diversity for massive MIMO systems,” IEEETransactions on Communications, vol. 67, no. 1, pp. 258–272, Jan. 2019.

[8] H.‐M. Wang, Ke-WenHuang, and T. A. Tsiftsis, “Base station cooperation inmillimeter wave cellular networks: Performance enhancement of cell–edge users,”IEEE Transactions on Communications, vol. 66, no. 11, pp. 5124–5139, Nov. 2018.

[9] Ke-WenHuang and H.‐M. Wang,“Identifying the fake base station: A location based approach,” IEEECommunications Letters, vol. 22, no. 8, pp. 1604‐1607, Aug. 2018.

[10]  Ke-WenHuang and H.‐M. Wang,“Combating the control signal spoofing attack in UAV systems,” IEEETransactions on Vehicular Technology, vol. 67, no. 8, pp. 7769‐7773, Aug. 2018.

[11]  H.‐M. Wang, Ke-WenHuang, and T. A. Tsiftsis, “Multiple antennassecure transmission under pilot spoofing and jamming attack,” IEEE Journal onSelected Areas in Communications, vol. 36, no. 4, pp. 860‐876, April 2018.

[12]  Ke-WenHuang, H.‐M. Wang, Y. Wu, andR. Schober, “Pilot spoofing attack by multiple eavesdroppers,” IEEETransactions on Wireless Communications, vol. 17, no. 10, pp. 6433‐6447, Oct.2018.

[13]  H.‐M. Wang, Ke-WenHuang, Q. Yang and Z. Han, “Joint source‐relaysecure precoding for MIMO relay networks with direct links,” IEEE Transactionson Communications, vol. 65, no. 7, pp. 2781‐2793, Jul. 2017.

[14] Y. Ju, X. Qiu, Y. Chen, Ke-WenHuang, Q. Yin and H. Wang,“Beamforming design for interference management in millimeter wave cellularnetworks with partial CSI,” 2017 9th International Conference on WirelessCommunications and Signal Processing (WCSP), Nanjing, 2017, pp. 1‐6.

[15] Y. Xu, H. Wang, Q. Yang, Ke-WenHuang, and T. Zheng,“Cooperative transmission for physical layer security by exploring socialawareness,” 2017 IEEE Globecom Workshops, Singapore, 2017, pp. 1‐6.

[16] H. Wang, Y. Xu, Ke-WenHuang, Z. Han and T. A. Tsiftsis, “Cooperativesecure transmission by exploiting social ties in random networks,” IEEETransactions on Communications, vol. 66, no. 8, pp. 3610‐3622.

[17] J. Lyu, H. Wang and Ke-WenHuang, “Physical layer security in D2Dunderlay cellular networks with poisson cluster process,” IEEE Transactions onCommunications.

[18] J. Lyu, T. Zheng, Ke-WenHuangg, Y. Feng and H. Wang, “Securetransmissions of D2D underlay cellular networks with poisson cluster process,”2019 IEEE Global Communications Conference (GLOBECOM).

[19] T.Zheng, Q. Yang, Ke-WenHuang,H. Wang, Z. Wei and J. Yuan, “Physical-layer secure transmissions incache-enabled cooperative small cell networks,” 2018 IEEE Global CommunicationsConference (GLOBECOM).