


default search action
Ke-Wen Huang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ke-Wen Huang
, Hui-Ming Wang
, Liang Yang
:
Smart Jamming Using Reconfigurable Intelligent Surface: Asymptotic Analysis and Optimization. IEEE Trans. Wirel. Commun. 23(1): 637-651 (2024) - 2021
- [j14]Ke-Wen Huang
, Hui-Ming Wang
, H. Vincent Poor
:
On Covert Communication Against Sequential Change-Point Detection. IEEE Trans. Inf. Theory 67(11): 7285-7303 (2021) - [j13]Ke-Wen Huang
, Hui-Ming Wang
:
Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure. IEEE Trans. Wirel. Commun. 20(1): 345-359 (2021) - [j12]Ke-Wen Huang
, Hao Deng
, Hui-Ming Wang
:
Jamming Aided Covert Communication With Multiple Receivers. IEEE Trans. Wirel. Commun. 20(7): 4480-4494 (2021) - [i12]Ke-Wen Huang, Hao Deng, Hui-Ming Wang:
Jamming Aided Covert Communication with Multiple Receivers. CoRR abs/2103.01433 (2021) - 2020
- [j11]Ke-Wen Huang
, Hui-Ming Wang
, Don Towsley
, H. Vincent Poor
:
LPD Communication: A Sequential Change-Point Detection Perspective. IEEE Trans. Commun. 68(4): 2474-2490 (2020) - [j10]Jiawei Lyu
, Hui-Ming Wang
, Ke-Wen Huang
:
Physical Layer Security in D2D Underlay Cellular Networks With Poisson Cluster Process. IEEE Trans. Commun. 68(11): 7123-7139 (2020) - [j9]Ke-Wen Huang
, Hui-Ming Wang
:
Passive Beamforming for IRS Aided Wireless Networks. IEEE Wirel. Commun. Lett. 9(12): 2035-2039 (2020) - [i11]Ke-Wen Huang, Hui-Ming Wang:
Passive Beamforming for IRS Aided Wireless Networks. CoRR abs/2007.10943 (2020) - [i10]Ke-Wen Huang, Hui-Ming Wang:
Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure. CoRR abs/2009.08512 (2020)
2010 – 2019
- 2019
- [j8]Ke-Wen Huang
, Hui-Ming Wang
, Jia Hou
, Shi Jin
:
Joint Spatial Division and Diversity for Massive MIMO Systems. IEEE Trans. Commun. 67(1): 258-272 (2019) - [c4]Jiawei Lyu, Tong-Xing Zheng, Ke-Wen Huang, Yuehua Feng, Hui-Ming Wang:
Secure Transmissions of D2D Underlay Cellular Networks with Poisson Cluster Process. GLOBECOM 2019: 1-6 - [i9]Ke-Wen Huang, Hui-Ming Wang, Don Towsley, H. Vincent Poor:
LPD Communication: A Sequential Change-Point Detection Perspective. CoRR abs/1906.08938 (2019) - 2018
- [j7]Ke-Wen Huang
, Hui-Ming Wang
:
Identifying the Fake Base Station: A Location Based Approach. IEEE Commun. Lett. 22(8): 1604-1607 (2018) - [j6]Hui-Ming Wang, Ke-Wen Huang, Theodoros A. Tsiftsis:
Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack. IEEE J. Sel. Areas Commun. 36(4): 860-876 (2018) - [j5]Hui-Ming Wang
, Yiming Xu
, Ke-Wen Huang
, Zhu Han, Theodoros A. Tsiftsis
:
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks. IEEE Trans. Commun. 66(8): 3610-3622 (2018) - [j4]Hui-Ming Wang
, Ke-Wen Huang
, Theodoros A. Tsiftsis
:
Base Station Cooperation in Millimeter Wave Cellular Networks: Performance Enhancement of Cell-Edge Users. IEEE Trans. Commun. 66(11): 5124-5139 (2018) - [j3]Ke-Wen Huang
, Hui-Ming Wang
:
Combating the Control Signal Spoofing Attack in UAV Systems. IEEE Trans. Veh. Technol. 67(8): 7769-7773 (2018) - [j2]Ke-Wen Huang
, Hui-Ming Wang
, Yongpeng Wu
, Robert Schober:
Pilot Spoofing Attack by Multiple Eavesdroppers. IEEE Trans. Wirel. Commun. 17(10): 6433-6447 (2018) - [c3]Tong-Xing Zheng, Qian Yang, Ke-Wen Huang, Hui-Ming Wang, Zhiqiang Wei, Jinhong Yuan:
Physical-Layer Secure Transmissions in Cache-Enabled Cooperative Small Cell Networks. GLOBECOM 2018: 1-6 - [i8]Hui-Ming Wang, Ke-Wen Huang, Theodoros A. Tsiftsis:
Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack. CoRR abs/1801.04104 (2018) - [i7]Hui-Ming Wang, Yiming Xu, Ke-Wen Huang, Zhu Han, Theodoros A. Tsiftsis:
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks. CoRR abs/1803.08640 (2018) - [i6]Ke-Wen Huang, Hui-Ming Wang:
Combating the Control Signal Spoofing Attack in UAV Systems. CoRR abs/1804.06562 (2018) - [i5]Hui-Ming Wang, Ke-Wen Huang, Theodoros A. Tsiftsis:
Base Station Cooperation in Millimeter Wave Cellular Networks: Performance Enhancement of Cell-Edge Users. CoRR abs/1806.05325 (2018) - [i4]Ke-Wen Huang, Hui-Ming Wang:
Identifying the Fake Base Station: A Location Based Approach. CoRR abs/1806.05326 (2018) - [i3]Ke-Wen Huang, Hui-Ming Wang, Yongpeng Wu, Robert Schober:
Pilot Spoofing Attack by Multiple Eavesdroppers. CoRR abs/1807.08905 (2018) - [i2]Ke-Wen Huang, Hui-Ming Wang, Jia Hou, Shi Jin:
Joint Spatial Division and Diversity for Massive MIMO Systems. CoRR abs/1809.03751 (2018) - 2017
- [j1]Hui-Ming Wang
, Ke-Wen Huang
, Qian Yang, Zhu Han:
Joint Source-Relay Secure Precoding for MIMO Relay Networks With Direct Links. IEEE Trans. Commun. 65(7): 2781-2793 (2017) - [c2]Yiming Xu, Hui-Ming Wang, Qian Yang, Ke-Wen Huang, Tong-Xing Zheng:
Cooperative Transmission for Physical Layer Security by Exploring Social Awareness. GLOBECOM Workshops 2017: 1-6 - [c1]Ying Ju, Xiayi Qiu, Yuan Chen, Ke-Wen Huang, Qinye Yin, Hui-Ming Wang:
Beamforming design for interference management in millimeter wave cellular networks with partial CSI. WCSP 2017: 1-6 - [i1]Yiming Xu, Hui-Ming Wang, Qian Yang, Ke-Wen Huang, Tong-Xing Zheng:
Cooperative Transmission for Physical Layer Security by Exploring Social Awareness. CoRR abs/1712.09159 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint