近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
2020年:
[40] G. Li, C. Sun, E. Jorswieck, J. Zhang and A. Hu. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks, accepted by IEEE Transactions on Information Forensics and Security (TIFS), 2020.
[39] C. Sun and G. Li, Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation, IEEE Access, vol. 8, pp. 164580-164592, 2020.
[38] J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels, IEEE Access, vol. 8, pp. 138406 - 138446, 2020.
[37] G. Li, Z. Zhang, J. Zhang and A. Hu, Encrypting Wireless Communications On the Fly Using One-Time Pad and Key Generation[J], IEEE Internet of Things Journal (preprint) ,doi: 10.1109/JIOT.2020.3004451, 2020.
[36] Y. Xing, T. Wang, F. Zhou, A. Hu, G. Li, and L. Peng, “EVAL cane: Non-intrusive monitoring platform with a novel gait-based user identification scheme,” IEEE Trans. Instrum. Meas., pp. 1–1, 2020.
[35] Y. Xing, A. Hu, J. Zhang, J. Yu, G. Li, and T. Wang, “Design of a robust radio frequency fingerprint identification scheme for multi-mode LFM radar,” IEEE Internet of Things Journal (preprint), 2020.
[34] 李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密码学报, 2020, 7(2): 224-248.
[33] 袁瑞, 彭林宁, 李古月, 付华. 不同环境下无线信道密钥生成性能研究[J]. 密码学报, 2020, 7(2): 261-273.
[32] You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck and Bin Xiao. Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks, in Proc. IEEE ICC, Virtual Conference, 7-11. June, 2020.
2019年:
[31]Guyue Li, Jiabao Yu, Yuexiu Xing, and Aiqun Hu. Location-invariant physical layer identification approach for WiFi devices. IEEE Access, pages 1–1, 2019.
[30] Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu,Guyue Li, and Linning Peng. Radio frequency fingerprint identification based on denoising autoencoders. In Proc. 15th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob), pages 1–6, Barcelona, Spain, Oct. 2019.
[29] Yuexiu Xing, Aiqun Hu, Jiabao Yu,Guyue Li, Linning Peng and Fen Zhou, A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars, in Proc. IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21 - 23 Oct, 2019, pp. 1-6.
[28]Li G, Zhang Z, Yu Y, Hu A, A Hybrid Information Reconciliation Method for Physical-layer Key Generation, Entropy. 2019; 21(7):688.
[27] 胡爱群,李古月, 彭林宁, 李涛. 融入思政的网络空间安全前沿技术教学探索[J]. 网络与信息安全学报, 2019, 5(3): 54-66.
[26] B. Liu, A. Hu andG. Li, Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems, accepted by IEEE Communications Letters.
[25] Junqing Zhang, Ming Ding,Guyue Li and Alan Marshall, Key Generation Based on Large Scale Fading, accepted by IEEE Transactions on Vehicular Technology.
[24]Li G, Sun C, Zhang J, Jorswieck E, Xiao B, Hu A. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy. 2019; 21(5):497.
[23]Jiabao Yu, Aiqun Hu, Guyue Li and Linning Peng, A Robust RF Fingerprinting Approach Using Multi-Sampling Convolutional Neural Network, in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6786-6799, Aug. 2019.
[22] Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing and Jiabao Yu, Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification, in Proc. IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, 10-12 Jun. 2019, pp. 1-9.
[21]Guyue Li, Liangjun Hu, and Aiqun Hu, Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks, in Proc. IEEE ICC Workshops (WPLS), Shanghai, China, 20-24. May, 2019.
[20] Zheying Zhang,Guyue Li and Aiqun Hu, An Adaptive Information Reconciliation Protocol for Physical-layer Based Secret Key Generation, in Proc. IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lumpur, Malaysia, 28 April – 1 May, 2019, pp. 1-5.
[19] Jiabao Yu, Aiqun Hu,Guyue Li and Linning Peng, A Multi-Sampling Convolutional Neural Network-Based RF Fingerprinting Approach for Low-Power Devices, in Proc. IEEE INFOCOM Workshop Internet of Things for Adversarial Environments (IoTAE), Paris, France, 29 April - 2 May, 2019, pp.1-6.
[18] Linning Peng, Guyue Li, Junqing Zhang, Roger Woods, Ming Liu, and Aiqun Hu, An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation, IEEE Transactions on Mobile Computing, vol.18, no.3, pp.507-519, 2019.
2018年:
[17]Guyue Li, Aiqun Hu, Chen Sun and Junqing Zhang, Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems, IEEE Communications Letters, vol.22, no.12, pp.2487-2490, 2018.
[16] Yuexiu Xing, Aiqun Hu, Junqing Zhang, Linning Peng andGuyue Li, On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios,IEEE Communications Letters, vol.22, no.11, pp.2326-2329, 2018.
[15] Linning Peng,Guyue Li, Junqing Zhang, and Aiqun Hu, Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless ChannelsMeasurements, in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Abu Dhabi, UAE, 9-13 Dec. 2018, pp.1-6.
[14] Liangjun Hu,Guyue Li, Aiqun Hu and Congcong Cao,Lightweight group key distribution method based on high similar wireless channel characteristics,in Proc. of 18th IEEE International Conference on Communication Technology (ICCT 2018), Chongqing,8-11 Oct.2018, pp.1-5.
[13]Guyue Li, Aiqun Hu, Junqing Zhang, Lining Peng, Chen Sun and Daming Cao, High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing,IEEE Transactions on Communications, vol.66, no.7, pp.3022-3034, 2018.
2017年:
[12]G. Li, A. Hu, J. Zhang, and B. Xiao, Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation, in Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6.
[11] Linning Peng,Guyue Li and Aiqun Hu, Channel Reciprocity Improvement of Secret Key Generation with Loop-back Transmissions, in Proc. of the 17th IEEE International Conference on Communication Technology (ICCT 2017), Chengdu, 27-30 Oct. 2017, pp. 1-6.
[10]李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208.
2016年及之前:
[9]G. Li, and A. Hu, Virtual MIMO-based Cooperative Beamforming and Jamming Scheme for the Clustered Wireless Sensor Network Security, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2246-2250.
[8]G. Li, and A. Hu, MISO Secrecy Transmission via Designing Artificial Noise by Receiver under Perfect and Imperfect CSI”, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2664-2668.
[7]G. Li, A. Hu, L. Peng, and C. Sun, “The optimal preprocessing approach for secret key generation from OFDM channel measurements,” in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Washington DC, Dec. 2016, pp.1-6.
[6]Guyue Li, Aiqun Hu, Yaning Zou, Linning Peng, Mikko Valkama, A Novel Transform for Secret Key Generation in Time-varying TDD Channel under Hardware Fingerprint Deviation, in Proc.IEEE 82th Vehicular Technology Conference (VTC2015-Fall), Boston, Sep. 2015, pp.1-5.
[5]Guyue Li, Aiqun Hu, Yongming Huang, A Novel Artificial Noise Aided Security Scheme to Resist Blind Source Separation Attacks, Chinese Science Bulletin, 2014,59(32):4225-4234.
[4]李古月,胡爱群,石乐.无线信道的密钥生成方法[J]. 密码学报, 2014, 1(3): 211–224.
[3]胡爱群,李古月.无线通信物理层安全方法综述[J]. 数据采集与处理 , 2014, 29(3): 341–350.
[2]Guyue Li, Aiqun Hu, An Approach to Resist Blind Source Separation Attacks of Speech Signals, IET CSC2014: 1-7.
[1] Xue Mingfu, Hu Aiqun, Huang Yi,Li Guyue, Monte Carlo based Test Pattern Generation for Hardware Trojan Detection, IEEE DASC2013:131 - 136.