Ke-Wen Huang

ORCID: 0000-0002-6223-6153
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Radar Systems and Signal Processing
  • Security in Wireless Sensor Networks
  • Millimeter-Wave Propagation and Modeling
  • Advanced Statistical Process Monitoring
  • Full-Duplex Wireless Communications
  • Statistical Methods in Clinical Trials
  • Antenna Design and Analysis
  • Underwater Vehicles and Communication Systems
  • Advanced Antenna and Metasurface Technologies
  • UAV Applications and Optimization
  • Biometric Identification and Security
  • Advanced Wireless Communication Techniques
  • graph theory and CDMA systems
  • Wireless Signal Modulation Classification
  • Sparse and Compressive Sensing Techniques
  • Concrete Corrosion and Durability
  • Blind Source Separation Techniques
  • Statistical Methods and Inference
  • Advanced Adaptive Filtering Techniques
  • Statistical Distribution Estimation and Applications
  • Cognitive Radio Networks and Spectrum Sensing

Hunan University
2023-2025

Xi'an Jiaotong University
2017-2021

Shaoguan University
2018-2019

Unmanned aerial vehicle (UAV) system is vulnerable to the control signal spoofing attack due openness of wireless communications. In this correspondence, a physical layer approach proposed combat attack, i.e., determine whether received packet from ground station or potential malicious attacker (MA), which does not need share any secret key. We consider worst case where UAV have prior knowledge about MA. Utilizing channel feature angles arrival, distance-based path loss, and Rician-$\kappa$...

10.1109/tvt.2018.2830345 article EN IEEE Transactions on Vehicular Technology 2018-04-26

Transmitter-side channel state information of the legitimate destination plays a critical role in physical layer secure transmissions. However, training procedure is vulnerable to pilot spoofing attack (PSA) or jamming (PJA) by an active eavesdropper (Eve), which inevitably results severe private leakage. In this paper, we propose random (RCT)-based downlink transmission framework for time division duplex multiple antennas base station. proposed RCT scheme, orthogonal sequences (PSs) are...

10.1109/jsac.2018.2825148 article EN IEEE Journal on Selected Areas in Communications 2018-04-01

Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase order to wiretap data transmitted from transmitter, Alice, receiver, Bob. We propose new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses intelligent reflecting surface (IRS) reflect sent Bob Alice. The proposed scheme, referred as IRS-PCA, increases leakage Alice IRS during phase, which...

10.1109/twc.2020.3024808 article EN IEEE Transactions on Wireless Communications 2020-09-25

Millimeter wave (mmWave) signals are much more sensitive to blockage, which results in a significant increase of the outage probability, especially for users at edge cells. In this paper, we exploit technique base station (BS) cooperation improve performance cell-edge downlink transmission mmWave cellular networks. We design two cooperative schemes, referred as fixed-number BS (FNC) scheme and fixed-region (FRC) scheme, respectively. FNC BSs consist M nearest around served users, FRC include...

10.1109/tcomm.2018.2848910 article EN IEEE Transactions on Communications 2018-06-19

In this paper, we investigate the design of a pilot spoofing attack (PSA) carried out by multiple single-antenna eavesdroppers (Eves) in downlink time-division duplex system, where antenna base station (BS) transmits confidential information to legitimate user. During uplink channel training phase, Eves collaboratively impair acquisition link, aimed at maximizing wiretapping signal-to-noise ratio (SNR) subsequent data transmission phase. Two different scenarios are investigated: 1) BS is...

10.1109/twc.2018.2859949 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2018-08-02

We consider that a transmitter covertly communicates with multiple receivers under the help of friendly jammer. The messages intended for different are transmitted in mutually orthogonal frequency bands. An adversary observes all these bands aiming at detecting whether or not communication occurs, while jammer broadcasts jamming signals to degrade detection performance adversary. block Rayleigh fading channel model and evaluate covert two situations: 1) wireless channels vary slowly such...

10.1109/twc.2021.3059306 article EN IEEE Transactions on Wireless Communications 2021-02-23

Fake base station (FBS) attack is a great security challenge to wireless user equipment (UE). During the cell selection stage, UE receives multiple synchronization signals (SSs) from nearby stations (BSs) and then synchronizes itself with strongest SS. An FBS also can transmit an SS sufficient power confuse UE, which makes connect FBS, may lead leakage of private information. In this letter, countermeasure by utilizing location information investigated. Two awareness based FBS-resistance...

10.1109/lcomm.2018.2843334 article EN IEEE Communications Letters 2018-06-04

In this paper, we propose a joint source-relay precoding scheme to secure an amplify-and-forward multiple-input multiple-output wireless relay network in the existence of multi-antenna eavesdropper. Different from existing works that only consider some specific signal design simplify problem, take both direct links source destination and eavesdropper into account, investigate general covariance matrices optimization problem maximize secrecy rate, which leads difficult non-convex problem. To...

10.1109/tcomm.2017.2686870 article EN publisher-specific-oa IEEE Transactions on Communications 2017-03-24

In this paper, we establish a framework for low probability of detection (LPD) communication from sequential change-point (SCPD) perspective, where transmitter, Alice, wants to hide her transmission receiver, Bob, an adversary, Willie. The new facilitates modeling LPD and further evaluating its performance under the condition that Willie has no prior knowledge about when Alice might start determine existence as quickly possible in real-time manner. We consider three different tests, i.e.,...

10.1109/tcomm.2020.2969416 article EN publisher-specific-oa IEEE Transactions on Communications 2020-02-02

Device-to-device (D2D) communication is a promising solution to meet rapidly growing demands for data services via spectrum reuse. This paper studies the physical layer security in D2D underlay cellular network from network-wide perspective, where locations of and users are modeled as Poisson cluster processes (PCPs) characterize clustering feature users, eavesdroppers (Eves) base stations (BSs) PCP point process (PPP), respectively. We establish an analytical framework assess coverage...

10.1109/tcomm.2020.3017287 article EN IEEE Transactions on Communications 2020-08-17

Social awareness and social ties are becoming increasingly popular with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields wireless communications, such as resource sharing, cooperative communication, so on. In this paper, we propose a based hybrid beamforming jamming scheme to secure transmissions under stochastic geometry framework, where friendly nodes categorized into relays jammers according their locations degrees...

10.1109/tcomm.2018.2821158 article EN publisher-specific-oa IEEE Transactions on Communications 2018-03-30

We take the viewpoint of wireless attackers, and investigate use reconfigurable intelligent surface (RIS) in degrading communications performance a time-division duplex system, which multiple-antenna base station (BS) transmits independent data streams to multiple user terminals (UTs). Each channel coherent time block consists training (CT) phase followed by transmission (DT) phase. During CT phase, UTs broadcast pilots enable BS estimate channels, RIS manipulates environment so that...

10.1109/twc.2023.3280975 article EN IEEE Transactions on Wireless Communications 2023-06-07

In this letter, we design passive beamforming in an intelligent reflecting surface (IRS) assisted multiple-user wireless network. Two different scenarios are considered, namely, multicasting and multi-user downlink transmission. We optimize the vector of IRS to maximize smallest signal-to-noise ratio users both scenarios. Based on alternating direction method multipliers algorithm, a low complexity is designed iteratively solve established problem. each iteration proposed method, solution...

10.1109/lwc.2020.3011596 article EN IEEE Wireless Communications Letters 2020-07-23

We propose a downlink beamforming scheme that combines spatial division and orthogonal space-time block coding (OSTBC) in multi-user massive multiple-input multiple-output systems. The beamformer is divided into two parts: pre-beamforming matrix to separate the users different beams with no interference between each other, which designed based on low-rank covariance of channel, linear precoding using partial or even channel state information (CSI) concatenated by an OSTBC. To construct...

10.1109/tcomm.2018.2870415 article EN IEEE Transactions on Communications 2018-09-17

Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...

10.1109/glocomw.2017.8269218 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2017-12-01

Recently, device-to-device (D2D) communication has emerged as a promising solution to meet rapidly growing demands for data services. This paper studies the physical layer security of D2D underlay cellular network, where and communications coexist in presence randomly distributed eavesdroppers (Eves). We establish an analytical framework assess performance network interest. To be specific, by modeling Poisson cluster process (PCP), we derive exact expressions coverage outage probabilities...

10.1109/globecom38437.2019.9013528 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

The safety of coated steel belts (CSBs) is crucial for reliable elevator operation, as they are critical components in systems. Magnetic flux leakage (MFL) testing the preferred non-destructive method evaluating CSBs due to its high sensitivity. Previous studies overlooked tensile stress's impact on in-service MFL CSBs, potentially resulting inaccurate defect assessments. This research aims investigate stress signal by developing a theoretical model, conducting finite element simulations,...

10.1080/10589759.2023.2274014 article EN Nondestructive Testing And Evaluation 2023-11-14

We investigate covert communication under a sequential change-point detection (SCPD) framework, where transmitter, Alice, attempts to communicate reliably with receiver, Bob, over an additive white Gaussian noise channel, while simultaneously ensuring covertness (low probability of detection) respect adversary, Willie. Different from the binary hypothesis test based framework considered in prior works Willie collects all signal samples together and makes decision batch manner, we view...

10.1109/tit.2021.3104601 article EN IEEE Transactions on Information Theory 2021-08-13

Social awareness and social ties are becoming increasingly fashionable with emerging mobile handheld devices. trust degree describing the strength of has drawn lots research interests in many fields including secure cooperative communications. Such reflects users' willingness for cooperation, which impacts selection users practical networks. In this paper, we propose a relay jamming scheme to communication based on under stochastic geometry framework. We aim analyze involved secrecy outage...

10.48550/arxiv.1712.09159 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Spectrum sensing has attracted much attention due to its significant contribution idle spectrum detection in Cognitive Radio Networks.However, specialized discussion is on complexity-based strategy for seldom considered.Motivated by this, this paper devoted sensing.Firstly, three efficiency functions are defined estimate of a scheme.Then novel proposed given performance and computational complexity.After that, the extended energy detector, Cyclostationary feature covariance matrix detector...

10.3837/tiis.2019.09.003 article EN KSII Transactions on Internet and Information Systems 2019-09-30

For the specific propagation characteristics of millimeter wave, in this paper, we study beamforming design and interference management wave cellular networks with partial channel state information (CSI). Specifically, propose two schemes, namely eigen orthogonal beamforming, based on covariance matrix, analyze intercell caused by proposed schemes. We find that performance is greatly influenced number clusters which constitute channel, angular spread. This different from traditional...

10.1109/wcsp.2017.8170896 article EN 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP) 2017-10-01

Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, training procedure is vulnerable to pilot spoofing attack (PSA) or jamming (PJA) by an active eavesdropper (Eve), which inevitably results severe private leakage. In this paper, we propose random (RCT) based downlink transmission framework for time division duplex (TDD) multiple antennas base station (BS). proposed RCT scheme, orthogonal...

10.48550/arxiv.1801.04104 preprint EN other-oa arXiv (Cornell University) 2018-01-01
Coming Soon ...