当前位置: X-MOL首页全球导师 国内导师 › 李古月

个人简介

李古月 职称:副教授 个人主页:https://www.researchgate.net/profile/Li_Guyue 教育背景 工学博士 (信息与通信工程),东南大学,中国,2017; 交流访学,坦佩雷理工大学,芬兰,2014; 工学学士 (信息科学与工程),东南大学,中国,2011。 欢迎有兴趣的本科生及研究生加入我们的PLS-LAB(Physical-Layer Security LAB)团队 :-) 研究课题 11.国家重点研发项目国际科技创新合作重点专项,基于量子密钥的物联网安全体系和关键技术联合研发,2020.6-2023.5,835万,进行中,参与。 10.国家自然科学基金专项项目,61941115,动态构造物理特征的空口安全通信理论方法研究, 2020/01至2021/12, 81万元,进行中,参与。 9. 江苏省重点研发计划产业前瞻与关键核心技术--竞争项目,BE2019109,2019/06-2022/06,250万元,进行中,参与。 8. 基本科研扶持项目,物联网边缘安全接入的关键技术研究,2019/03-2021/03,4万元,进行中,主持。 7. 国家自然科学基金青年科学基金项目,61801115,移动通信FDD信道密钥生成方法研究,2019/01-2021/12,22.5万元,进行中,主持。 6. 科技服务项目,江苏电力信息技术有限公司 基于设备指纹技术的无线接入安全管理平台委外研发服务采购, 2018-09-07-2019-12-30,116.1万元,进行中,主持。 5. 新进教师启动基金,3209008202,基于FDD信道特征的物理层安全技术研究 2018年3月-2019年12月,10万元,已结题,主持。 4. 国家自然科学基金青年科学基金项目,61602113,基于射频指纹的无线目标识别与定位技术研究,2017/01-2019/12,21万元,已结题,参与。 3. 国家自然科学基金青年科学基金项目,61601114,光通信系统基于物理层指纹的识别与认证安全技术研究,2017/01-2019/12,22万元,已结题,参与。 2. 江苏省自然科学基金青年项目, BK20160692,“基于物理层特征的无线通信安全技术”,2016/07-2019/6,20万元,已结题,参与。 1. 国家自然科学基金面上项目,61571110,“面向未来移动通信的物理层安全技术研究”,2016/01-2019/12,57万元,已结题,参与。 奖励与荣誉 东南大学授课竞赛三等奖 获得2019年东南大学至善青年学者B层次荣誉 课程信息 网络空间数学基础II(最优化与博弈论) 通信原理 数字通信 学术成果 专利 1. 发明专利 基于主成分分析的信道互易性增强方法 201610539867.3 授权 CN 106211149 A 2016.12.07李古月,胡爱群,王栋,韩远致,李晶琪 2. 发明专利 基于酉变换预处理的无线信道特征变级量化方法 201610539956.8 授权 CN 106027242 A 2016.10.12李古月,胡爱群,李晶琪,王栋,韩远致 3. 发明专利 基于无线信道特征的轻量级组密钥分发方法 受理 201810513227.4 2018.05.25 CN108696867A李古月,胡爱群,胡良君 4. 发明专利 基于多径分离的频分双工系统中互易信道系数构建方法 受理 201810830831.X 2018.07.26李古月,胡爱群,刘博谦 CN109039922A 5. 发明专利 一种基于路径相位差分的频分双工系统互易信道参数构建方法 受理 201810830832.4 2018.07.26李古月,胡爱群,刘博谦 6. 发明专利 一种频分双工系统中的密钥提取方法 受理 201910067771.5 2019.01.24 胡爱群,刘博谦,李古月 7. 发明专利 一种基于多采样卷积神经网络的射频指纹提取和识别方法 受理 201910080034.9 胡爱群,俞佳宝,李古月,彭林宁 8. 发明专利 一种鲁棒的低功耗设备射频指纹识别方法 受理 201910080693.2 胡爱群,俞佳宝,彭林宁,李古月 9. 发明专利 一种基于初始密钥不一致率的生成密钥自适应调和方法 受理 201910333552.7李古月 胡爱群 张喆颖 10. 发明专利 一种结合BBBSS协议与BCH码的生成密钥部分调和方法 受理 201910333854.4李古月 胡爱群 张喆颖 11. 发明专利 基于幅度取余的无线信道密钥随机性增强方法 受理 201910375302.X 李古月 杨海誉 何川 12.发明专利 一种基于接收信号强度的无线通信安全认证方法 受理 201911166170.6 2019.11.25 刘瑞之 李锦辉 刘余文 雷重庆 何川 李古月 13.发明专利 一种基于矩阵特征值的主动信道密钥生成方法及系统 受理 202010343555.1 2020年4月27日 李古月 胥英豪 胡爱群 14.发明专利 一种防近端窃听的主动信道密钥生成方法及系统 受理 202010343569.3 2020年4月27日 李古月胥英豪 胡爱群 15.发明专利 一种MIMO-OFDM系统的主动信道密钥生成方法及系统 受理 202010344216.5 2020年4月27日 胥英豪 李古月 胡爱群 其他 IEEE会员,担任国际SCI期刊IEEE TIFS、JASC、TWC、TCOM等期刊审稿人和IEEE ICC、IEEE Globalcom等国际旗舰会议的程序委员会委员。

研究领域

长期从事无线通信物理层安全研究,研究方向包括面向未来通信的物理层密钥分发技术、基于设备指纹的新一代安全接入技术、波束成形、人工噪声、MIMO-OFDM技术等。研究通过物理层技术实现对接入设备的安全认证及密钥分发,保障无线通信空中接口的安全。重点研究TDD/FDD/IBFD系统下的基于无线信道互易性的密钥生成技术以及IoT通信中基于设备指纹和链路指纹的认证与识别技术。

物理层安全;无线通信安全

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

2020年: [40] G. Li, C. Sun, E. Jorswieck, J. Zhang and A. Hu. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks, accepted by IEEE Transactions on Information Forensics and Security (TIFS), 2020. [39] C. Sun and G. Li, Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation, IEEE Access, vol. 8, pp. 164580-164592, 2020. [38] J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels, IEEE Access, vol. 8, pp. 138406 - 138446, 2020. [37] G. Li, Z. Zhang, J. Zhang and A. Hu, Encrypting Wireless Communications On the Fly Using One-Time Pad and Key Generation[J], IEEE Internet of Things Journal (preprint) ,doi: 10.1109/JIOT.2020.3004451, 2020. [36] Y. Xing, T. Wang, F. Zhou, A. Hu, G. Li, and L. Peng, “EVAL cane: Non-intrusive monitoring platform with a novel gait-based user identification scheme,” IEEE Trans. Instrum. Meas., pp. 1–1, 2020. [35] Y. Xing, A. Hu, J. Zhang, J. Yu, G. Li, and T. Wang, “Design of a robust radio frequency fingerprint identification scheme for multi-mode LFM radar,” IEEE Internet of Things Journal (preprint), 2020. [34] 李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密码学报, 2020, 7(2): 224-248. [33] 袁瑞, 彭林宁, 李古月, 付华. 不同环境下无线信道密钥生成性能研究[J]. 密码学报, 2020, 7(2): 261-273. [32] You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck and Bin Xiao. Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks, in Proc. IEEE ICC, Virtual Conference, 7-11. June, 2020. 2019年: [31]Guyue Li, Jiabao Yu, Yuexiu Xing, and Aiqun Hu. Location-invariant physical layer identification approach for WiFi devices. IEEE Access, pages 1–1, 2019. [30] Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu,Guyue Li, and Linning Peng. Radio frequency fingerprint identification based on denoising autoencoders. In Proc. 15th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob), pages 1–6, Barcelona, Spain, Oct. 2019. [29] Yuexiu Xing, Aiqun Hu, Jiabao Yu,Guyue Li, Linning Peng and Fen Zhou, A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars, in Proc. IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21 - 23 Oct, 2019, pp. 1-6. [28]Li G, Zhang Z, Yu Y, Hu A, A Hybrid Information Reconciliation Method for Physical-layer Key Generation, Entropy. 2019; 21(7):688. [27] 胡爱群,李古月, 彭林宁, 李涛. 融入思政的网络空间安全前沿技术教学探索[J]. 网络与信息安全学报, 2019, 5(3): 54-66. [26] B. Liu, A. Hu andG. Li, Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems, accepted by IEEE Communications Letters. [25] Junqing Zhang, Ming Ding,Guyue Li and Alan Marshall, Key Generation Based on Large Scale Fading, accepted by IEEE Transactions on Vehicular Technology. [24]Li G, Sun C, Zhang J, Jorswieck E, Xiao B, Hu A. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy. 2019; 21(5):497. [23]Jiabao Yu, Aiqun Hu, Guyue Li and Linning Peng, A Robust RF Fingerprinting Approach Using Multi-Sampling Convolutional Neural Network, in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6786-6799, Aug. 2019. [22] Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing and Jiabao Yu, Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification, in Proc. IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, 10-12 Jun. 2019, pp. 1-9. [21]Guyue Li, Liangjun Hu, and Aiqun Hu, Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks, in Proc. IEEE ICC Workshops (WPLS), Shanghai, China, 20-24. May, 2019. [20] Zheying Zhang,Guyue Li and Aiqun Hu, An Adaptive Information Reconciliation Protocol for Physical-layer Based Secret Key Generation, in Proc. IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lumpur, Malaysia, 28 April – 1 May, 2019, pp. 1-5. [19] Jiabao Yu, Aiqun Hu,Guyue Li and Linning Peng, A Multi-Sampling Convolutional Neural Network-Based RF Fingerprinting Approach for Low-Power Devices, in Proc. IEEE INFOCOM Workshop Internet of Things for Adversarial Environments (IoTAE), Paris, France, 29 April - 2 May, 2019, pp.1-6. [18] Linning Peng, Guyue Li, Junqing Zhang, Roger Woods, Ming Liu, and Aiqun Hu, An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation, IEEE Transactions on Mobile Computing, vol.18, no.3, pp.507-519, 2019. 2018年: [17]Guyue Li, Aiqun Hu, Chen Sun and Junqing Zhang, Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems, IEEE Communications Letters, vol.22, no.12, pp.2487-2490, 2018. [16] Yuexiu Xing, Aiqun Hu, Junqing Zhang, Linning Peng andGuyue Li, On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios,IEEE Communications Letters, vol.22, no.11, pp.2326-2329, 2018. [15] Linning Peng,Guyue Li, Junqing Zhang, and Aiqun Hu, Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless ChannelsMeasurements, in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Abu Dhabi, UAE, 9-13 Dec. 2018, pp.1-6. [14] Liangjun Hu,Guyue Li, Aiqun Hu and Congcong Cao,Lightweight group key distribution method based on high similar wireless channel characteristics,in Proc. of 18th IEEE International Conference on Communication Technology (ICCT 2018), Chongqing,8-11 Oct.2018, pp.1-5. [13]Guyue Li, Aiqun Hu, Junqing Zhang, Lining Peng, Chen Sun and Daming Cao, High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing,IEEE Transactions on Communications, vol.66, no.7, pp.3022-3034, 2018. 2017年: [12]G. Li, A. Hu, J. Zhang, and B. Xiao, Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation, in Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6. [11] Linning Peng,Guyue Li and Aiqun Hu, Channel Reciprocity Improvement of Secret Key Generation with Loop-back Transmissions, in Proc. of the 17th IEEE International Conference on Communication Technology (ICCT 2017), Chengdu, 27-30 Oct. 2017, pp. 1-6. [10]李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208. 2016年及之前: [9]G. Li, and A. Hu, Virtual MIMO-based Cooperative Beamforming and Jamming Scheme for the Clustered Wireless Sensor Network Security, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2246-2250. [8]G. Li, and A. Hu, MISO Secrecy Transmission via Designing Artificial Noise by Receiver under Perfect and Imperfect CSI”, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2664-2668. [7]G. Li, A. Hu, L. Peng, and C. Sun, “The optimal preprocessing approach for secret key generation from OFDM channel measurements,” in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Washington DC, Dec. 2016, pp.1-6. [6]Guyue Li, Aiqun Hu, Yaning Zou, Linning Peng, Mikko Valkama, A Novel Transform for Secret Key Generation in Time-varying TDD Channel under Hardware Fingerprint Deviation, in Proc.IEEE 82th Vehicular Technology Conference (VTC2015-Fall), Boston, Sep. 2015, pp.1-5. [5]Guyue Li, Aiqun Hu, Yongming Huang, A Novel Artificial Noise Aided Security Scheme to Resist Blind Source Separation Attacks, Chinese Science Bulletin, 2014,59(32):4225-4234. [4]李古月,胡爱群,石乐.无线信道的密钥生成方法[J]. 密码学报, 2014, 1(3): 211–224. [3]胡爱群,李古月.无线通信物理层安全方法综述[J]. 数据采集与处理 , 2014, 29(3): 341–350. [2]Guyue Li, Aiqun Hu, An Approach to Resist Blind Source Separation Attacks of Speech Signals, IET CSC2014: 1-7. [1] Xue Mingfu, Hu Aiqun, Huang Yi,Li Guyue, Monte Carlo based Test Pattern Generation for Hardware Trojan Detection, IEEE DASC2013:131 - 136.

推荐链接
down
wechat
bug