default search action
Xiping Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2013
- [j3]Hong Wen, Yi Fan Wang, Xiping Zhu, Jianqiang Li, Liang Zhou:
Physical layer assist authentication technique for smart meter system. IET Commun. 7(3) (2013) - [j2]Gao Yuan Zhang, Li-Min Sun, Hong Wen, Bin Wu, Xiping Zhu, Liang Zhou:
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Hong Wen, Shaoqian Li, Xiping Zhu, Liang Zhou:
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks. IEEE Netw. 27(3): 34-39 (2013)
Conference and Workshop Papers
- 2017
- [c10]Fei Pan, Hong Wen, Runfa Liao, Yixin Jiang, Aidong Xu, Kai Ouyang, Xiping Zhu:
Physical layer authentication based on channel information and machine learning. CNS 2017: 364-365 - [c9]Qing Yang, Yixin Jiang, Aidong Xu, Hong Wen, Feng Wang, LiuFei Chen, Kai Ouyang, Xiping Zhu:
A model divides the mobile security level based on SVM. CNS 2017: 370-371 - [c8]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
A method of reconciling the key discrepancy by exploiting unconditional secure transmission. CNS 2017: 372-373 - [c7]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
The realization of key extraction based on USRP and OFDM channel response. CNS 2017: 374-375 - 2016
- [c6]Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:
The performance of the MIMO physical layer security system with imperfect CSI. CNS 2016: 346-347 - [c5]Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu:
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. CNS 2016: 348-349 - [c4]Zhengguang Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu:
A MIMO cross-layer secure communication scheme based on spatial modulation. CNS 2016: 350-351 - 2013
- [c3]Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A novel detection scheme for malicious nodes in smart meter system. CNS 2013: 379-380 - [c2]Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
The security issue of WSNs based on cloud computing. CNS 2013: 383-384 - [c1]Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A P2P recommended trust nodes selection algorithm based on topological potential. CNS 2013: 395-396
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint