Ning Wang

ORCID: 0000-0003-1381-7952
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Wireless Signal Modulation Classification
  • Energy Harvesting in Wireless Networks
  • Sparse and Compressive Sensing Techniques
  • Advanced Wireless Communication Technologies
  • Privacy-Preserving Technologies in Data
  • Full-Duplex Wireless Communications
  • Antenna Design and Analysis
  • Advanced Sensor and Control Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Internet Traffic Analysis and Secure E-voting
  • Speech and Audio Processing
  • Advanced Authentication Protocols Security
  • Radar Systems and Signal Processing
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Data Security
  • Millimeter-Wave Propagation and Modeling
  • Smart Grid Security and Resilience
  • Wireless Communication Networks Research
  • Energy Efficient Wireless Sensor Networks
  • Advanced Algorithms and Applications
  • Advanced MIMO Systems Optimization
  • Industrial Technology and Control Systems
  • Fluid Dynamics and Vibration Analysis
  • Photonic and Optical Devices

Chongqing University
2012-2025

Qingdao Municipal Hospital
2025

Qingdao University
2025

Zhengzhou University
2015-2024

China Mobile (China)
2024

Cornell University
2024

Jiangnan University
2023

Aalborg University
2023

Chang'an University
2019-2022

National Institute for Radiological Protection
2022

The fifth generation (5G) wireless technologies serve as a key propellent to meet the increasing demands of future Internet Things (IoT) networks. For communication security in 5G IoT networks, physical-layer (PLS) has recently received growing interest. This paper aims provide comprehensive survey PLS techniques systems. investigation consists four hierarchical parts. In first part, we review characteristics under typical application scenarios. We then introduce threats from and categorize...

10.1109/jiot.2019.2927379 article EN IEEE Internet of Things Journal 2019-07-09

Most physical-layer authentication techniques use hypothesis tests to compare the radio channel information with record of Alice detect spoofer Eve in wireless networks. However, test threshold is not always available, especially dynamic In this letter, we propose a scheme based on extreme learning machine that exploit multi-dimensional characters channels and training data generated from spoofing model improve detection accuracy. Simulation results show our proposed technique can...

10.1109/lcomm.2017.2690437 article EN IEEE Communications Letters 2017-04-03

Identity spoofing attacks pose one of the most serious threats to wireless networks, where attacker can masquerade as legitimate users by modifying its own identity. Channel-based physical-layer security is a promising technology counter identity attacks. Although various channel-based technologies have been proposed, study attack detection in 5G networks largely open. This paper introduces new scheme based on channel virtual (or called beamspace) representation millimeter wave (mmWave)...

10.1109/access.2021.3073115 article EN cc-by IEEE Access 2021-01-01

Using a mobile charger to wirelessly charge sensors is promising yet not well-solved technique. Existing trajectory planning schemes for wireless either (1) fail optimize the one-to-many characteristic of charging or (2) jointly movement cost and cost. The objective this paper find optimal in terms energy minimization quadratic attenuation model. There exists trade-off between efficiency distance. If comes close sensors, high, but entire will be long vice versa. To address trade-off, we...

10.1109/icdcs.2019.00085 article EN 2019-07-01

Power non-orthogonal multiple access (NOMA) has been considered as a new enabling technology in 5G communication. In this paper, we introduce the problem of pilot contamination attack (PCA) on NOMA millimeter wave (mmWave) and massive MIMO Due to characteristics such superposed signals with multi-users, PCA detection faces challenges. By harnessing sparseness statistics mmWave virtual channel, propose two effective schemes for tackling static dynamic environments, respectively. For...

10.1109/tifs.2019.2939742 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2019-09-05

Grant-free random access is an emerging technology for providing massive connectivity 5G machine-type communications (mMTC), where non-orthogonal pilot sequences are used to simultaneously detect active users and estimate channels. However, grant-free IoT networks vulnerable contamination attacks (PCA), the attacker can send same pilots as legitimate harm user detection channel estimation. To defend against this attack, in article, we propose a physical-layer countermeasure based on virtual...

10.1109/tifs.2020.3017932 article EN IEEE Transactions on Information Forensics and Security 2020-08-19

Multiple-factor authentication can remarkably enhance the secure level of personal authentication. However, most existing multiple-factor schemes often involve third-party certification authority and specific biometric extraction devices, which could significantly affect efficiency practicality. To fill this gap, paper proposes a keyboard acoustic-based scheme, where acoustic properties are directly used as source factors. In particular, rhythm keystrokes indicates individual behavioral...

10.1117/12.3055978 article EN 2025-02-17

Lung adenocarcinoma (LUAD) remains a major cause of cancer-related mortality worldwide, with high heterogeneity and poor prognosis. Epigenetic dysregulation plays crucial role in LUAD progression, yet its potential molecular classification therapeutic prediction largely unexplored. We performed an integrated multi-omics analysis 432 patients from TCGA 398 GEO datasets. Using consensus clustering random survival forest (RSF) algorithms, we established epigenetic-based system constructed...

10.3389/fphar.2025.1540477 article EN cc-by Frontiers in Pharmacology 2025-02-19

Information security is a vital concern in Internet of Things (IoT). Traditional method based on public or private key encryption scheme limited by the trade‐off between low cost and high level security. Among different solutions, utilising compressed sensing (CS) combination with physical‐layer to achieve remarkable method. However, current literatures, little attention has been given area static environment, which will lead risk information leakage CS model. In this study, authors propose...

10.1049/iet-com.2016.1088 article EN IET Communications 2017-03-25

Resorting to the exploitation of physical attributes, physical-layer authentication (PLA) is a promising technology supplement and enhance current cryptography-based security mechanisms in wireless communications. fifth-generation (5G) communications, many disruptive technologies spring up, such as millimeter-wave communication (mmWave), massive multiple-input multiple-output (MiMO) non-orthogonal- multiple-access (NOMA). PLA schemes 5G networks are facing challenges while exposed...

10.1109/mnet.011.2000122 article EN IEEE Network 2020-11-01

A method to use laser supply power remotely for multinode wireless sensor networks is proposed in this paper. In the working space of networks, transformed a spatial distributed light field with certain uniformity and its wavelength converted most sensitive solar cell by phosphor element. Thus, more nodes can be powered at same time. demonstration experiment carried out, an yttrium aluminum garnet element stimulated 3 W 457 nm uniform diffused <formula formulatype="inline"...

10.1109/jsen.2011.2161465 article EN IEEE Sensors Journal 2011-07-13

The challenges surrounding the confidentiality of data transmission in context upcoming sixth-generation (6G) wireless networks are proposed this research. study explores potential role blockchain systems enhancing security. It examines integration machine learning (ML) techniques to address growing complexities handling massive volumes within 6G environment. This research involves a comprehensive survey existing strategies for maintaining automotive communication systems. further...

10.12694/scpe.v25i2.2629 article EN Scalable Computing Practice and Experience 2024-02-24

In the context of drone swarms, achieving efficient group secure communication is a challenging problem, due to inherent limitations imposed by drones' limited energy and constrained resources. Physical layer key generation (PLGK) promising technology enable security communication. However, most existing PLGK schemes struggle adapt dynamic nature swarms. To address this gap, paper proposes novel satellite cluster state information (SCSI)-based PLGK, which leverages signal status from all...

10.1109/tifs.2024.3381432 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

The consumer UAV (unmanned aerial vehicle) market has grown significantly over the past few years. Despite its huge potential in spurring economic growth by supporting various applications, increase of UAVs poses risks to public security and personal privacy. To minimize risks, efficiently detecting identifying invading is urgent need for both invasion detection forensics purposes. Given fact that are usually used a civilian environment, existing physical methods (such as radar, vision,...

10.1109/tifs.2019.2959899 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2019-12-17

Wirelessly powered backscatter communications (WPBC) is an emerging technology for providing continuous energy and ultra-low power communications. Despite some progress in WPBC systems, resource allocation multiple devices towards secure (BC) efficient-energy harvesting (EH) requests a deep-insight investigation. In this paper, we consider system which full-duplex access point (AP) transmits multi-sinewave signals to (BDs) injects artificial noise (AN) their transmissions. To maximize the...

10.1109/twc.2022.3162137 article EN cc-by IEEE Transactions on Wireless Communications 2022-03-31

In many IoT (Internet-of-Things) applications, a large number of low-cost devices are connected to the Internet through an access point (AP) or gateway via wireless communication. Due resource constraints on and broadcast nature medium, identity spoofing attacks easy launch but hard defend in network. this paper, under context 5G communication, we propose efficient physical layer attack detection scheme for IoT. By harnessing sparsity virtual channel mmWave Massive MIMO two- step scheme....

10.1109/glocom.2018.8647707 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Spoofing attacks pose a serious threat to wireless communications. Exploiting physical-layer features counter spoofing is promising solution. Although various attack detection (PL-SAD) techniques have been proposed for conventional 802.11 networks in the sub-6GHz band, study of PL-SAD 802.11ad 5G millimeter wave (mmWave) 60GHz band largely open. In this paper, we propose unique physical layer feature IEEE networks, i.e., signal-to-noise-ratio (SNR) trace obtained at receiver sector level...

10.1109/infocom41043.2020.9155382 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

The objectives were to identify the influence of teaching quality in higher vocational colleges on employment graduates, and develop instructional design through both theoretical empirical analysis, synthesize relationships among quality, human capital, quality. In collaboration with 17 experts, they selected purposive sampling involving 100 instructors within China. instruments using Delphi Technique a round questionnaire colleges' positively influenced graduates' capital findings revealed...

10.47738/jads.v5i1.169 article EN Journal of Applied Data Sciences 2024-01-29
Coming Soon ...