Aiqun Hu

ORCID: 0000-0002-0398-4899
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Signal Modulation Classification
  • Wireless Communication Security Techniques
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Digital Media Forensic Detection
  • Biometric Identification and Security
  • Network Security and Intrusion Detection
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Wireless Communication Technologies
  • Full-Duplex Wireless Communications
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Antenna Design and Analysis
  • Advanced Authentication Protocols Security
  • Radar Systems and Signal Processing
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Integrated Circuits and Semiconductor Failure Analysis
  • User Authentication and Security Systems
  • Access Control and Trust
  • Wireless Communication Networks Research
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Speech and Audio Processing

Southeast University
2016-2025

Peking University
2024-2025

Purple Mountain Laboratories
2019-2024

State Key Laboratory of Mobile Communications
2024

National Technical University of Athens
2024

Academic Degrees & Graduate Education
2023

Center Point
2022

Oceaneering International (United States)
2022

Bridge University
2022

Royal Botanic Gardens, Kew
2022

Radio frequency (RF) fingerprint is the inherent hardware characteristics and has been employed to classify identify wireless devices in many Internet of Things applications. This paper extracts novel RF features, designs a hybrid adaptive classification scheme adjusting environment conditions, carries out extensive experiments evaluate performance. In particular, four modulation namely differential constellation trace figure, carrier offset, offset I/Q extracted from are employed. The...

10.1109/jiot.2018.2838071 article EN IEEE Internet of Things Journal 2018-05-18

This paper proposes a novel deep learning-based radio frequency fingerprint (RFF) identification method for internet of things (IoT) terminal authentications. Differential constellation trace figure (DCTF), two-dimensional (2D) representation differential relationship signal time series, is utilized to extract RFF features without requiring any synchronization. A convolutional neural network (CNN) then designed identify different devices using DCTF features. Compared the existing CNN-based...

10.1109/tvt.2019.2950670 article EN IEEE Transactions on Vehicular Technology 2019-10-31

With the increasing popularity of Internet Things (IoT), device identification, and authentication has become a critical security issue. Recently, radio frequency (RF) fingerprint-based identification schemes have attracted wide attention as they extract inherent characteristics hardware circuits which is very hard to forge. However, existing RF approaches face problems unstable region interest (ROI), high-cost feature design, incomplete automation. To address these problems, this paper...

10.1109/jiot.2019.2911347 article EN IEEE Internet of Things Journal 2019-04-16

The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage network traffic. However, SDN will experience long packet delay loss rate when the communication link between two is jammed by SDN-aimed DoS attacks massive table-miss packets. In this paper, we propose FloodDefender, an efficient protocol-independent defense framework for SDN/OpenFlow networks mitigate attacks. It stands controller platform other apps,...

10.1109/infocom.2017.8057009 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

The Internet of Things (IoT) is a transformative technology, which revolutionizing our everyday life by connecting everyone and everything together. massive number devices are preferably connected wirelessly because the easy installment flexible deployment. However, broadcast nature wireless medium makes information accessible to including malicious users, should hence be protected encryption. Unfortunately, secure efficient provision cryptographic keys for low-cost IoT challenging; weak...

10.1109/access.2020.3012006 article EN cc-by IEEE Access 2020-01-01

Random and high-agreement secret key generation from noisy wideband channels is challenging due to the autocorrelation inside channel samples compromised cross correlation between measurements of two keying parties. This paper studies signal preprocessing algorithms establish uncorrelated in presence independent eavesdroppers. We first propose a general mathematical model for various schemes, including principal component analysis (PCA), discrete cosine transform (DCT) wavelet (WT). Among...

10.1109/tcomm.2018.2814607 article EN IEEE Transactions on Communications 2018-03-12

The introduction of software-defined networking (SDN) has emerged as a new network paradigm for innovations. By decoupling the control plane from data in traditional networks, SDN provides high programmability to and manage networks. However, communication between two planes can be bottleneck whole network. SDN-aimed DoS attacks cause long packet delay loss rate by using massive table-miss packets jam links planes. To detect mitigate attacks, this paper presents FloodDefender, an efficient...

10.1109/tnet.2020.2983976 article EN IEEE/ACM Transactions on Networking 2020-04-15

Radio-frequency fingerprints (RFFs) are promising solutions for realizing low-cost physical layer authentication. Machine learning-based methods have been proposed RFF extraction and discrimination. However, most existing designed the closed-set scenario where set of devices is remains unchanged. These can not be generalized to discrimination unknown devices. To enable from both known devices, we propose a new end-to-end deep learning framework extracting RFFs raw received signals. The...

10.1109/tifs.2021.3106166 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

Many efforts have been devoted to the development of efficient Network Intrusion Detection System (NIDS) using machine learning approaches in Software-defined (SDN). Unfortunately, existing solutions failed detect real-time and zero-day attacks due their limited throughput prior knowledge-based detection. To this end, we propose Griffin, a NIDS that uses unsupervised expertise both known intrusion with high accuracy. Specifically, Griffin an feature extraction framework capture sequential...

10.1109/tnsm.2022.3175710 article EN IEEE Transactions on Network and Service Management 2022-05-17

Physical layer key generation (PKG) is a promising means to provide on-the-fly shared secret keys by exploiting the intrinsic randomness of radio channel. However, performance PKG highly dependent on propagation environments. Due its feature controlling wireless environment, reconfigurable intelligent surface (RIS) appealing be applied in PKG. In this article, contrast existing literature, we investigate both constructive and destructive effects RIS scheme. For aspect, have identified static...

10.1109/mwc.007.2100545 article EN IEEE Wireless Communications 2022-05-09

Radio frequency fingerprint (RFF) is an intrinsic hardware characteristic and has been employed for device identification. Its application in low signal-to-noise-ratio (SNR) never explored because its identification performance greatly affected by the received signal quality. This letter proposes a novel RFF scheme spread spectrum systems SNR scenarios. In scheme, preprocessing method, information data estimation-based stacking algorithm, proposed, which leverages repeated spreading...

10.1109/lcomm.2018.2871454 article EN IEEE Communications Letters 2018-09-20

The one-time pad (OTP) secure transmission relies on the random keys to achieve perfect secrecy, while unpredictable wireless channel is shown be a good source. There very few work of joint design OTP and key generation from channels. This article provides comprehensive quantitative investigation achieved by randomness. We propose two schemes, i.e., identical key-based physical-layer (IK-PST) un-IK-PST (UK-PST). quantitatively analyze performance both schemes prove that UK-PST outperforms...

10.1109/jiot.2020.3004451 article EN IEEE Internet of Things Journal 2020-06-23

Channel reciprocity-based key generation (CRKG) has recently emerged as a new technique to address the problem of distribution in wireless networks. However, this approach relies upon characteristics fading channels, corresponding secret rate may be low when communication link is blocked. To enhance applicability CRKG harsh propagation scenarios, paper introduces novel multiuser scheme, which referred RIS-assisted (RMK) that leverages reconfigurable intelligent surface (RIS) technology for...

10.1109/tifs.2021.3138612 article EN IEEE Transactions on Information Forensics and Security 2021-12-24

Radio Frequency Fingerprinting (RFF) is one of the promising passive authentication approaches for improving security Internet Things (IoT). However, with proliferation low-power IoT devices, it becomes imperative to improve identification accuracy at low SNR scenarios. To address this problem, paper proposes a general Denoising AutoEncoder (DAE)-based model deep learning RFF techniques. Besides, partially stacking method designed appropriately combine semi-steady and steady-state RFFs...

10.1109/wimob.2019.8923325 article EN 2019-10-01

Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated measurements of wireless channels, which relies on reciprocal channel characteristics between uplink and downlink, is a promising security technique for Internet Things (IoT). However, it challenging to extract common features in frequency-division duplexing (FDD) systems as downlink transmissions operate at different frequency bands whose responses are not anymore. Existing PKG methods FDD have many...

10.1109/jiot.2021.3109272 article EN IEEE Internet of Things Journal 2021-09-01

Radio-frequency fingerprinting (RFF) exploiting hardware characteristics has been employed for device recognition to enhance the overall security. However, performance unreliability in long-term experiments, channel fading interference, and unauthorized devices verification are three open problems that restrict development of RFF recognition. To address these issues, a robust extraction scheme based on corresponding algorithms is studied. For first problem, stacking repetitive symbols...

10.1109/jiot.2021.3051402 article EN IEEE Internet of Things Journal 2021-02-09

Physical-layer secret key generation has emerged as a promising solution for establishing cryptographic keys by leveraging reciprocal and time-varying wireless channels. However, existing approaches suffer from low rates vulnerabilities under various attacks in slowly varying environments. We propose new physical-layer approach with channel obfuscation, which improves the dynamic property of parameters based on random filtering antenna scheduling. Our makes one party obfuscate to allow...

10.1109/infocom48880.2022.9796694 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

The wide spread of rumors inflicts damages on social media platforms. Detecting has become an emerging problem concerning the public and government. A crucial for detection is lack reliably pre-annotated dataset to train classification models. To solve this problem, we propose unsupervised model that detects by measuring how well tweets follow normal patterns. However, challenging in automatically discover patterns tweets. tackle challenge, first a novel tree variational autoencoder...

10.1109/tkde.2023.3267821 article EN IEEE Transactions on Knowledge and Data Engineering 2023-04-17

Physical layer key generation (PLKG) is a promising technique to establish symmetric keys between resource-constrained legitimate users. However, PLKG suffers from low rate in harsh environments where channel randomness limited. To address the problem, reconfigurable intelligent surfaces (RISs) are introduced reshape channels by controlling massive reflecting elements, which can provide more diversity. In this paper, we design probing protocol fully extract cascaded channel, i.e., through...

10.1109/tifs.2023.3268881 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires reciprocity in order set up symmetric keys between two users. This paper investigates enhancing the channel using a loop-back scheme with multiple frequency bands time-division duplex (TDD) communication systems, mitigate effect of hardware fingerprint interference and synchronization offset. The is evaluated be robust passive eavesdropping active...

10.1109/tmc.2018.2842215 article EN IEEE Transactions on Mobile Computing 2018-05-31

Recently, Radio Frequency Fingerprinting (RFF) becomes a promising technique which augments existing multifactor authentication schemes at the device level to counter forgery and related threats. As RFF leverages discriminable hardware imperfections reflected in (RF) signals for identification, it has good property of scalability, accuracy, energy-efficiency tamper resistance. However, its identification accuracy might be compromised when locations training testing are different, is more...

10.1109/access.2019.2933242 article EN cc-by IEEE Access 2019-01-01

As mass devices access to network in the era of Internet Things (IoT), control becomes more important. Traditional authentication mechanisms are no longer suitable for IoT with limited physical and computational resources because their complexity. This problem can be solved by device fingerprinting, which identify only traffic characteristics. However, existing fingerprinting technologies cannot accurately devices' type from same manufacturer equips these similar hardwares softwares....

10.1145/3321408.3326671 article EN Proceedings of the ACM Turing Celebration Conference - China 2019-05-17

LoRa wireless technology is a revolutionary network access with wide application prospect. An identification method for Lora devices based on physical layer fingerprinting proposed to provide identities authentication. Contrary previous works, differential constellation trace figure established from the radio frequency (RF) features of devices, which transforms feature matching image recognition. A classification Euclidean distance clustering center signal performed analyze figure. The...

10.1186/s13638-019-1542-x article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-09-04

Physical-layer key generation (PKG) based on channel reciprocity has recently emerged as a new technique to establish secret keys between devices. Most works focus pairwise communication scenarios with single or small-scale antennas. However, the fifth (5G) wireless communications employ massive multiple-input multiple-output (MIMO) support multiple users simultaneously, bringing serious overhead of reciprocal acquisition. This paper presents multi-user in MIMO networks. We provide beam...

10.1109/tifs.2020.3026466 article EN IEEE Transactions on Information Forensics and Security 2020-09-24
Coming Soon ...