![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Xiaoming Xu 0002
Person information
- affiliation: PLA Strategic Support Force Information Engineering University, Zhengzhou, China
Other persons with the same name
- Xiaoming Xu — disambiguation page
- Xiaoming Xu 0001 — Shanghai Jiao Tong University, Shanghai, China
- Xiaoming Xu 0003
— Dalian University of Technology, School of Software, Dalian, China
- Xiaoming Xu 0004
— Shandong University, Jinan, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zheng Wan
, Kaizhi Huang
, Xiaoming Xu
, Ming Yi, Hui-Ming Wang
, Zhengyu Zhu
, Liang Jin
:
RIS-Assisted Integration of Communications and Security: Protocol, Prototyping, and Field Trials. IEEE Internet Things J. 11(16): 26877-26887 (2024) - 2023
- [j16]Shaoyu Wang
, Kaizhi Huang, Keming Ma, Xiaoming Xu, Xiaoyan Hu
:
A lightweight encryption and message authentication framework for wireless communication. IET Commun. 17(3): 265-278 (2023) - [j15]Zheng Wan
, Mengyao Yan, Kaizhi Huang
, Zhou Zhong, Xiaoming Xu, Yajun Chen, Fan Wu:
Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels. Frontiers Inf. Technol. Electron. Eng. 24(12): 1803-1814 (2023) - [j14]Zheng Wan
, Xiaoyan Hu
, Xiaoli Sun
, Xiaoming Xu, Kaizhi Huang
, Liang Jin
:
A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation. IEEE Wirel. Commun. Lett. 12(12): 2193-2197 (2023) - 2022
- [j13]Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Xiaoyan Hu
, Jing Yang, Liang Jin:
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication. Entropy 24(4): 488 (2022) - [j12]Tianyu Lan, Kaizhi Huang, Liang Jin, Xiaoming Xu, Xiaoli Sun, Zhou Zhong:
DOA Estimation Algorithm for Reconfigurable Intelligent Surface Co-Prime Linear Array Based on Multiple Signal Classification Approach. Inf. 13(2): 72 (2022) - [j11]Shaoyu Wang
, Kaizhi Huang
, Xiaoming Xu, Zhou Zhong, You Zhou:
CSI-Based Physical Layer Authentication via Deep Learning. IEEE Wirel. Commun. Lett. 11(8): 1748-1752 (2022) - 2021
- [c7]Liang Jin, Xiaoyan Hu
, Xiaoli Sun, Yangming Lou
, Kaizhi Huang, Zhou Zhong, Xiaoming Xu:
Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication. WCNC Workshops 2021: 1-7 - 2020
- [j10]Yajun Chen
, Kaizhi Huang
, You Zhou, Keming Ma, Henglei Jin
, Xiaoming Xu:
Physical Layer Key Generation Scheme Through Scrambling the Correlated Eavesdropping Channel. IEEE Access 8: 48982-48990 (2020) - [j9]Kaizhi Huang, Bo Zhang, Zhou Zhong, Yajun Chen, Xiaoming Xu:
Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks. Sci. China Inf. Sci. 63(12) (2020) - [j8]Wenyu Jiang, Kaizhi Huang, Shuaifang Xiao, Xiaoming Xu:
Secure transmission for heterogeneous cellular network with limited feedback. Sci. China Inf. Sci. 63(12) (2020)
2010 – 2019
- 2019
- [j7]Henglei Jin
, Kaizhi Huang
, Shuaifang Xiao, Yangming Lou
, Xiaoming Xu, Yajun Chen:
A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel. IEEE Access 7: 26480-26487 (2019) - [j6]Shaoyu Wang
, Xiaoming Xu, Kaizhi Huang
, Xinsheng Ji, Yajun Chen, Liang Jin:
Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems. IEEE Access 7: 28597-28606 (2019) - [j5]Shuai Zhang, Xiaoming Xu, Jianhua Peng, Kaizhi Huang, Zhigang Li:
Physical layer security in massive internet of things: delay and security analysis. IET Commun. 13(1): 93-98 (2019) - [j4]Jing Yang, Xinsheng Ji, Kaizhi Huang, Yajun Chen, Xiaoming Xu, Ming Yi:
Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun. 13(2): 144-152 (2019) - 2018
- [j3]Bing Wang
, Kaizhi Huang, Xiaoming Xu, Liang Jin, Zhou Zhong, Yi Wang:
Resource Allocation for Secure Communication in K -Tier Heterogeneous Cellular Networks: A Spatial-Temporal Perspective. IEEE Access 6: 772-782 (2018) - [j2]Shuai Zhang
, Xiaoming Xu, Huiming Wang, Jianhua Peng, Di Zhang, Kaizhi Huang:
Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things. IEEE Access 6: 58405-58417 (2018) - [j1]Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi:
Overview of 5G security technology. Sci. China Inf. Sci. 61(8): 081301:1-081301:25 (2018) - [c6]Shuai Zhang, Xiaoming Xu, Jianhua Peng, Yajun Chen, Shaoyu Wang:
Analysis of Uplink NOMA in Cellular IoT: A Physical Layer Security Perspective. VTC Fall 2018: 1-7 - [c5]Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Shuai Zhang:
On the Reliability and Security Performance of Opportunistic Relay Selection in Millimeter Wave Networks. VTC Fall 2018: 1-6 - [c4]Weili Ge, Zhongyong Wang, Huiming Wang, Xiaoming Xu, Di Zhang, Hehao Niu, Zhengyu Zhu:
Robust Beamforming Design for Power-Splitting SWIPT-based Distributed Antenna Systems. WCSP 2018: 1-6 - 2017
- [c3]Xin Hu, Kaizhi Huang, Yajun Chen, Xiaoming Xu, Xiaohu Liang:
Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers. WCSP 2017: 1-6 - [c2]Bing Wang, Chunguo Li, Kaizhi Huang, Xiaoming Xu, Yi Wang:
Physical layer security in heterogeneous cellular networks: A spatio-temporal perspective. WCSP 2017: 1-6 - [c1]Shuai Zhang, Jianhua Peng, Kaizhi Huang, Xiaoming Xu, Zhou Zhong:
Physical layer security in IoT: A spatial-temporal perspective. WCSP 2017: 1-6
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint