- Wireless Signal Modulation Classification
- Wireless Communication Security Techniques
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Digital Media Forensic Detection
- Biometric Identification and Security
- Network Security and Intrusion Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
- IPv6, Mobility, Handover, Networks, Security
- Advanced Wireless Communication Technologies
- Full-Duplex Wireless Communications
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Antenna Design and Analysis
- Advanced Authentication Protocols Security
- Radar Systems and Signal Processing
- Cloud Data Security Solutions
- Security and Verification in Computing
- Integrated Circuits and Semiconductor Failure Analysis
- User Authentication and Security Systems
- Access Control and Trust
- Wireless Communication Networks Research
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- Speech and Audio Processing
Southeast University
2016-2025
Peking University
2024-2025
Purple Mountain Laboratories
2019-2024
State Key Laboratory of Mobile Communications
2024
National Technical University of Athens
2024
Academic Degrees & Graduate Education
2023
Center Point
2022
Oceaneering International (United States)
2022
Bridge University
2022
Royal Botanic Gardens, Kew
2022
Radio frequency (RF) fingerprint is the inherent hardware characteristics and has been employed to classify identify wireless devices in many Internet of Things applications. This paper extracts novel RF features, designs a hybrid adaptive classification scheme adjusting environment conditions, carries out extensive experiments evaluate performance. In particular, four modulation namely differential constellation trace figure, carrier offset, offset I/Q extracted from are employed. The...
This paper proposes a novel deep learning-based radio frequency fingerprint (RFF) identification method for internet of things (IoT) terminal authentications. Differential constellation trace figure (DCTF), two-dimensional (2D) representation differential relationship signal time series, is utilized to extract RFF features without requiring any synchronization. A convolutional neural network (CNN) then designed identify different devices using DCTF features. Compared the existing CNN-based...
With the increasing popularity of Internet Things (IoT), device identification, and authentication has become a critical security issue. Recently, radio frequency (RF) fingerprint-based identification schemes have attracted wide attention as they extract inherent characteristics hardware circuits which is very hard to forge. However, existing RF approaches face problems unstable region interest (ROI), high-cost feature design, incomplete automation. To address these problems, this paper...
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage network traffic. However, SDN will experience long packet delay loss rate when the communication link between two is jammed by SDN-aimed DoS attacks massive table-miss packets. In this paper, we propose FloodDefender, an efficient protocol-independent defense framework for SDN/OpenFlow networks mitigate attacks. It stands controller platform other apps,...
The Internet of Things (IoT) is a transformative technology, which revolutionizing our everyday life by connecting everyone and everything together. massive number devices are preferably connected wirelessly because the easy installment flexible deployment. However, broadcast nature wireless medium makes information accessible to including malicious users, should hence be protected encryption. Unfortunately, secure efficient provision cryptographic keys for low-cost IoT challenging; weak...
Random and high-agreement secret key generation from noisy wideband channels is challenging due to the autocorrelation inside channel samples compromised cross correlation between measurements of two keying parties. This paper studies signal preprocessing algorithms establish uncorrelated in presence independent eavesdroppers. We first propose a general mathematical model for various schemes, including principal component analysis (PCA), discrete cosine transform (DCT) wavelet (WT). Among...
The introduction of software-defined networking (SDN) has emerged as a new network paradigm for innovations. By decoupling the control plane from data in traditional networks, SDN provides high programmability to and manage networks. However, communication between two planes can be bottleneck whole network. SDN-aimed DoS attacks cause long packet delay loss rate by using massive table-miss packets jam links planes. To detect mitigate attacks, this paper presents FloodDefender, an efficient...
Radio-frequency fingerprints (RFFs) are promising solutions for realizing low-cost physical layer authentication. Machine learning-based methods have been proposed RFF extraction and discrimination. However, most existing designed the closed-set scenario where set of devices is remains unchanged. These can not be generalized to discrimination unknown devices. To enable from both known devices, we propose a new end-to-end deep learning framework extracting RFFs raw received signals. The...
Many efforts have been devoted to the development of efficient Network Intrusion Detection System (NIDS) using machine learning approaches in Software-defined (SDN). Unfortunately, existing solutions failed detect real-time and zero-day attacks due their limited throughput prior knowledge-based detection. To this end, we propose Griffin, a NIDS that uses unsupervised expertise both known intrusion with high accuracy. Specifically, Griffin an feature extraction framework capture sequential...
Physical layer key generation (PKG) is a promising means to provide on-the-fly shared secret keys by exploiting the intrinsic randomness of radio channel. However, performance PKG highly dependent on propagation environments. Due its feature controlling wireless environment, reconfigurable intelligent surface (RIS) appealing be applied in PKG. In this article, contrast existing literature, we investigate both constructive and destructive effects RIS scheme. For aspect, have identified static...
Radio frequency fingerprint (RFF) is an intrinsic hardware characteristic and has been employed for device identification. Its application in low signal-to-noise-ratio (SNR) never explored because its identification performance greatly affected by the received signal quality. This letter proposes a novel RFF scheme spread spectrum systems SNR scenarios. In scheme, preprocessing method, information data estimation-based stacking algorithm, proposed, which leverages repeated spreading...
The one-time pad (OTP) secure transmission relies on the random keys to achieve perfect secrecy, while unpredictable wireless channel is shown be a good source. There very few work of joint design OTP and key generation from channels. This article provides comprehensive quantitative investigation achieved by randomness. We propose two schemes, i.e., identical key-based physical-layer (IK-PST) un-IK-PST (UK-PST). quantitatively analyze performance both schemes prove that UK-PST outperforms...
Channel reciprocity-based key generation (CRKG) has recently emerged as a new technique to address the problem of distribution in wireless networks. However, this approach relies upon characteristics fading channels, corresponding secret rate may be low when communication link is blocked. To enhance applicability CRKG harsh propagation scenarios, paper introduces novel multiuser scheme, which referred RIS-assisted (RMK) that leverages reconfigurable intelligent surface (RIS) technology for...
Radio Frequency Fingerprinting (RFF) is one of the promising passive authentication approaches for improving security Internet Things (IoT). However, with proliferation low-power IoT devices, it becomes imperative to improve identification accuracy at low SNR scenarios. To address this problem, paper proposes a general Denoising AutoEncoder (DAE)-based model deep learning RFF techniques. Besides, partially stacking method designed appropriately combine semi-steady and steady-state RFFs...
Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated measurements of wireless channels, which relies on reciprocal channel characteristics between uplink and downlink, is a promising security technique for Internet Things (IoT). However, it challenging to extract common features in frequency-division duplexing (FDD) systems as downlink transmissions operate at different frequency bands whose responses are not anymore. Existing PKG methods FDD have many...
Radio-frequency fingerprinting (RFF) exploiting hardware characteristics has been employed for device recognition to enhance the overall security. However, performance unreliability in long-term experiments, channel fading interference, and unauthorized devices verification are three open problems that restrict development of RFF recognition. To address these issues, a robust extraction scheme based on corresponding algorithms is studied. For first problem, stacking repetitive symbols...
Physical-layer secret key generation has emerged as a promising solution for establishing cryptographic keys by leveraging reciprocal and time-varying wireless channels. However, existing approaches suffer from low rates vulnerabilities under various attacks in slowly varying environments. We propose new physical-layer approach with channel obfuscation, which improves the dynamic property of parameters based on random filtering antenna scheduling. Our makes one party obfuscate to allow...
The wide spread of rumors inflicts damages on social media platforms. Detecting has become an emerging problem concerning the public and government. A crucial for detection is lack reliably pre-annotated dataset to train classification models. To solve this problem, we propose unsupervised model that detects by measuring how well tweets follow normal patterns. However, challenging in automatically discover patterns tweets. tackle challenge, first a novel tree variational autoencoder...
Physical layer key generation (PLKG) is a promising technique to establish symmetric keys between resource-constrained legitimate users. However, PLKG suffers from low rate in harsh environments where channel randomness limited. To address the problem, reconfigurable intelligent surfaces (RISs) are introduced reshape channels by controlling massive reflecting elements, which can provide more diversity. In this paper, we design probing protocol fully extract cascaded channel, i.e., through...
Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires reciprocity in order set up symmetric keys between two users. This paper investigates enhancing the channel using a loop-back scheme with multiple frequency bands time-division duplex (TDD) communication systems, mitigate effect of hardware fingerprint interference and synchronization offset. The is evaluated be robust passive eavesdropping active...
Recently, Radio Frequency Fingerprinting (RFF) becomes a promising technique which augments existing multifactor authentication schemes at the device level to counter forgery and related threats. As RFF leverages discriminable hardware imperfections reflected in (RF) signals for identification, it has good property of scalability, accuracy, energy-efficiency tamper resistance. However, its identification accuracy might be compromised when locations training testing are different, is more...
As mass devices access to network in the era of Internet Things (IoT), control becomes more important. Traditional authentication mechanisms are no longer suitable for IoT with limited physical and computational resources because their complexity. This problem can be solved by device fingerprinting, which identify only traffic characteristics. However, existing fingerprinting technologies cannot accurately devices' type from same manufacturer equips these similar hardwares softwares....
LoRa wireless technology is a revolutionary network access with wide application prospect. An identification method for Lora devices based on physical layer fingerprinting proposed to provide identities authentication. Contrary previous works, differential constellation trace figure established from the radio frequency (RF) features of devices, which transforms feature matching image recognition. A classification Euclidean distance clustering center signal performed analyze figure. The...
Physical-layer key generation (PKG) based on channel reciprocity has recently emerged as a new technique to establish secret keys between devices. Most works focus pairwise communication scenarios with single or small-scale antennas. However, the fifth (5G) wireless communications employ massive multiple-input multiple-output (MIMO) support multiple users simultaneously, bringing serious overhead of reciprocal acquisition. This paper presents multi-user in MIMO networks. We provide beam...