default search action
Hong Wen 0001
Person information
- affiliation: University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, Chengdu, China
Other persons with the same name
- Hong Wen — disambiguation page
- Hong Wen 0002 — Alibaba Group, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j119]Yuan Tian, Hong Wen, Jiaxin Zhou, Zhiqiang Duan, Tao Li:
Optimized Radio Frequency Footprint Identification Based on UAV Telemetry Radios. Sensors 24(16): 5099 (2024) - [j118]Zhiwei Chen, Zhibo Pang, Wenjing Hou, Hong Wen, Mi Wen, Runhui Zhao, Tao Tang:
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation. IEEE Trans. Consumer Electron. 70(1): 2391-2400 (2024) - [j117]Wenxin Lei, Zhibo Pang, Hong Wen, Wenjing Hou, Wen Li:
Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things. IEEE Trans. Ind. Informatics 20(3): 4327-4336 (2024) - [j116]Wenjing Hou, Hong Wen, Ning Zhang, Wenxin Lei, Haojie Lin, Zhu Han, Qiang Liu:
Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks. IEEE Trans. Mob. Comput. 23(5): 4376-4388 (2024) - 2023
- [j115]Baofeng Ji, Mingkun Zhang, Ling Xing, Xiaoli Li, Chunguo Li, Congzheng Han, Hong Wen:
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract. Digit. Commun. Networks 9(1): 47-55 (2023) - [j114]Huanhuan Song, Hong Wen, Jie Tang, Pin-Han Ho, Runhui Zhao:
Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications. IEEE Internet Things J. 10(5): 4462-4474 (2023) - [j113]Tengyue Zhang, Hong Wen, Yixin Jiang, Jie Tang:
Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing. IEEE Internet Things J. 10(10): 8996-9006 (2023) - [j112]Xinchen Xu, Hong Wen, Huanhuan Song, Yingwei Zhao:
A DT Machine Learning-Based Satellite Orbit Prediction for IoT Applications. IEEE Internet Things Mag. 6(2): 96-100 (2023) - [j111]Zhiwei Chen, Hong Wen, Wenjing Hou, Yixin Jiang, Liang Chen, Runhui Zhao, Xinyu Hou:
Blockchain-Enabled Cross-Layer Radio Frequency Fingerprinting Identification with Machine Learning for IIoT. IEEE Netw. 37(4): 170-178 (2023) - [j110]Yanxu Zhu, Hong Wen, Runhui Zhao, Yixin Jiang, Qiang Liu, Peng Zhang:
Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing. Sensors 23(9): 4509 (2023) - [j109]Lin Hu, Shuai Tan, Hong Wen, Jinsong Wu, Jiabing Fan, Songlin Chen, Jie Tang:
Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 18: 3692-3705 (2023) - [j108]Baofeng Ji, Jiayu Huang, Yi Wang, Kang Song, Chunguo Li, Congzheng Han, Hong Wen:
Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference. IEEE Trans. Intell. Transp. Syst. 24(7): 7736-7745 (2023) - [j107]Baofeng Ji, Yanan Wang, Ling Xing, Chunguo Li, Yi Wang, Hong Wen:
IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2564-2573 (2023) - [c67]Wenxin Lei, Zhibo Pang, Hong Wen, Wenjing Hou, Xiaoling Zhang:
Edge-enabled Zero Trust Architecture for ICPS with Spatial and Temporal Granularity. ICPS 2023: 1-6 - [c66]Ziyang Yu, Huanhuan Song, Hong Wen, Yonghuang Liu, Wen Li:
A Hardware Simulation Platform of Artificial Noise-Assisted MIMO Communication System Based on LabVIEW-USRP. PIMRC 2023: 1-6 - [i1]Lin Hu, Jiabing Fan, Hong Wen, Jie Tang, Qianbin Chen:
Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure. CoRR abs/2305.19574 (2023) - 2022
- [j106]Jie Tang, Hong Wen, Huanhuan Song:
Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity. IET Commun. 16(3): 206-217 (2022) - [j105]Wenjing Hou, Hong Wen, Ning Zhang, Jinsong Wu, Wenxin Lei, Runhui Zhao:
Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things. IEEE Internet Things J. 9(1): 706-718 (2022) - [j104]Yi Chen, Pin-Han Ho, Hong Wen, Shih Yu Chang, Shahriar Real:
On Physical-Layer Authentication via Online Transfer Learning. IEEE Internet Things J. 9(2): 1374-1385 (2022) - [j103]Jie Tang, Hong Wen, Huan-Huan Song, Long Jiao, Kai Zeng:
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices. IEEE Internet Things J. 9(16): 15228-15239 (2022) - [j102]Baofeng Ji, Yifan Liu, Ling Xing, Chunguo Li, Gaoyuan Zhang, Congzheng Han, Hong Wen, Shahid Mumtaz:
Survey of Secure Communications of Internet of Things with Artificial Intelligence. IEEE Internet Things Mag. 5(3): 92-99 (2022) - [j101]Baofeng Ji, Zhenzhen Chen, Shahid Mumtaz, Congzheng Han, Chunguo Li, Hong Wen, Dan Wang:
A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends. IEEE Netw. 36(2): 153-161 (2022) - [j100]Yi Chen, Kadhim Hayawi, Qian Zhao, Junjie Mou, Ling Yang, Jie Tang, Qing Li, Hong Wen:
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors 22(18): 6789 (2022) - [j99]Yi Chen, Kadhim Hayawi, Meikai Fan, Shih Yu Chang, Jie Tang, Ling Yang, Rui Zhao, Zhongqi Mao, Hong Wen:
A Bilevel Optimization Model Based on Edge Computing for Microgrid. Sensors 22(20): 7710 (2022) - [j98]FeiYi Xie, Zhibo Pang, Hong Wen, Wenxin Lei, Xinchen Xu:
Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks. IEEE Trans. Ind. Informatics 18(4): 2796-2806 (2022) - [j97]Wenxin Lei, Zhibo Pang, Hong Wen, Wenjing Hou, Wen Han:
FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals. IEEE Trans. Ind. Informatics 18(12): 9302-9311 (2022) - [j96]Baofeng Ji, Ying Han, Yanan Wang, Dun Cao, Fazhan Tao, Zhumu Fu, Peng Li, Hong Wen:
Relay Cooperative Transmission Algorithms for IoV Under Aggregated Interference. IEEE Trans. Intell. Transp. Syst. 23(7): 9712-9725 (2022) - [j95]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kannan Govindan, Daniel Wu, Prasant Mohapatra:
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks. IEEE Trans. Mob. Comput. 21(5): 1657-1671 (2022) - [c65]Lin Hu, Junxiang Peng, Yan Zhang, Hong Wen, Shuai Tan, Jiabing Fan:
Artificial Noise Assisted Interference Alignment for Physical Layer Security Enhancement. GLOBECOM 2022: 4148-4153 - [c64]Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. INFOCOM Workshops 2022: 1-2 - [c63]Wenjing Hou, Hong Wen, Ning Zhang, Wenxin Lei, Haojie Lin:
Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid. INFOCOM Workshops 2022: 1-2 - [c62]Wenxin Lei, Sijing Wang, Ning Zhang, Hong Wen, Wenjing Hou, Haojie Lin, Zhu Han:
Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing. INFOCOM Workshops 2022: 1-2 - 2021
- [j94]Huanhuan Song, Hong Wen, Qicong Yang, Jie Tang, Yi Chen, Tengyue Zhang, FeiYi Xie, Songlin Chen:
Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS. IEEE Access 9: 27287-27297 (2021) - [j93]WenXin Lei, Hong Wen, Wenjing Hou, Xinchen Xu:
New Security State Awareness Model for IoT Devices With Edge Intelligence. IEEE Access 9: 69756-69765 (2021) - [j92]Wenjing Hou, Hong Wen, Huanhuan Song, Wenxin Lei, Wei Zhang:
Multiagent Deep Reinforcement Learning for Task Offloading and Resource Allocation in Cybertwin-Based Networks. IEEE Internet Things J. 8(22): 16256-16268 (2021) - [j91]Gaoyuan Zhang, Haiqiong Li, Congzheng Han, Congyu Shi, Hong Wen, Dan Wang:
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels. Secur. Commun. Networks 2021: 6641192:1-6641192:19 (2021) - [j90]Ming Zhan, Zhibo Pang, Kan Yu, Hong Wen:
Reverse Calculation-Based Low Memory Turbo Decoder for Power Constrained Applications. IEEE Trans. Circuits Syst. I Regul. Pap. 68(6): 2688-2701 (2021) - [j89]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kaiyu Qin:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. IEEE Trans. Inf. Forensics Secur. 16: 466-481 (2021) - [j88]Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang, Yueming Lu:
Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks. IEEE Trans. Ind. Informatics 17(3): 2041-2051 (2021) - [j87]Fei Pan, Hong Wen, Xuesong Gao, Haibo Pu, Zhibo Pang:
Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS. IEEE Trans. Ind. Informatics 17(5): 3693-3702 (2021) - [j86]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, FeiYi Xie:
Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection. IEEE Trans. Ind. Informatics 17(7): 4999-5009 (2021) - [j85]Baofeng Ji, Yanan Wang, Kang Song, Chunguo Li, Hong Wen, Varun G. Menon, Shahid Mumtaz:
A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends. IEEE Trans. Ind. Informatics 17(10): 7145-7154 (2021) - [j84]Baofeng Ji, Ying Han, Peng Li, Shahid Mumtaz, Kang Song, Chunguo Li, Dan Wang, Hong Wen:
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel. IEEE Trans. Intell. Transp. Syst. 22(3): 1881-1891 (2021) - [c61]Wenxin Lei, Wenjing Hou, Aidong Xu, Yixin Jiang, Hong Wen, Yunan Zhang:
A Situational Awareness Model for Edge Computing Devices. CONF-CDS 2021: 51:1-51:5 - [c60]Haojie Lin, Wenjing Hou, Hong Wen, Wenxin Lei, Sihui Wu, Zhiwei Chen:
MADDPG-based Task Offloading and Resource Management for Edge System. CONF-CDS 2021: 52:1-52:5 - [c59]Zhiwei Chen, Wenjing Hou, Hong Wen, Wenxin Lei, Sihui Wu, Haojie Lin:
Multi-dimensional Resource Management System Based on Blockchain and Cybertwin. CONF-CDS 2021: 53:1-53:5 - [c58]Wen Han, Wenjing Hou, Hong Wen, Wenxin Lei, Xinchen Xu, Haojie Lin:
Reinforcement Learning-based Multidimensional Resource Management in Edge Cloud Regions. CONF-CDS 2021: 54:1-54:5 - [c57]Jie Tang, Hong Wen, Huanhuan Song, Rui-Fei Wang:
On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission. ICCT 2021: 852-857 - [c56]Tengyue Zhang, Hong Wen, Zhibo Pang, Huanhuan Song:
CSI-Free Physical Layer Security against Eavesdropping Attack based on Intelligent Surface for Industrial Wireless. WFCS 2021: 175-182 - 2020
- [j83]Baofeng Ji, Xueru Zhang, Shahid Mumtaz, Congzheng Han, Chunguo Li, Hong Wen, Dan Wang:
Survey on the Internet of Vehicles: Network Architectures and Applications. IEEE Commun. Stand. Mag. 4(1): 34-41 (2020) - [j82]Runfa Liao, Hong Wen, Songlin Chen, FeiYi Xie, Fei Pan, Jie Tang, Huanhuan Song:
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet Things J. 7(3): 2077-2088 (2020) - [j81]Jie Tang, Hong Wen, Huanhuan Song, Tengyue Zhang, Kaiyu Qin:
On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things. IEEE Internet Things J. 7(10): 10635-10649 (2020) - [j80]Shu Fu, Nan Chen, Ning Zhang, Xin Jian, Feng Lyu, Hong Wen, Xuemin Sherman Shen:
Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing. IEEE Netw. 34(1): 94-100 (2020) - [j79]Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. Peer-to-Peer Netw. Appl. 13(3): 1026-1037 (2020) - [j78]Baofeng Ji, Yuqi Li, Sudan Chen, Congzheng Han, Chunguo Li, Hong Wen:
Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel. IEEE Trans. Cogn. Commun. Netw. 6(3): 904-914 (2020) - [j77]Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin Sherman Shen:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 350-362 (2020) - [j76]FeiYi Xie, Hong Wen, Jinsong Wu, Wenjing Hou, Huanhuan Song, Tengyue Zhang, Runfa Liao, Yixin Jiang:
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. IEEE Trans. Emerg. Top. Comput. Intell. 4(3): 276-286 (2020) - [j75]FeiYi Xie, Hong Wen, Jinsong Wu, Songlin Chen, Wenjing Hou, Yixin Jiang:
Convolution Based Feature Extraction for Edge Computing Access Authentication. IEEE Trans. Netw. Sci. Eng. 7(4): 2336-2346 (2020) - [j74]Huanhuan Song, Hong Wen, Jie Tang, Yi Chen, FeiYi Xie, Runfa Liao, Songlin Chen:
PLS-Based Secrecy Transmission for VANETs. IEEE Trans. Veh. Technol. 69(7): 7596-7608 (2020) - [j73]Jie Tang, Hong Wen, Huanhuan Song, Kai Zeng, Kaiyu Qin:
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas. IEEE Trans. Veh. Technol. 69(10): 11077-11089 (2020) - [c55]Yi Chen, Shahriar Real, Hong Wen, Boyang Cheng, Wei Wang, Pin-Han Ho, Shih Yu Chang:
On Physical-Layer Authentication via Triple Pool Convolutional Neural Network. GLOBECOM (Workshops) 2020: 1-6
2010 – 2019
- 2019
- [j72]Fei Pan, Zhibo Pang, Ming Xiao, Hong Wen, Runfa Liao:
Clone Detection Based on Physical Layer Reputation for Proximity Service. IEEE Access 7: 3948-3957 (2019) - [j71]Baofeng Ji, Bingbing Xing, Kang Song, Chunguo Li, Hong Wen, Luxi Yang:
The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT. IEEE Access 7: 31397-31408 (2019) - [j70]Baofeng Ji, Yuqi Li, Benchuan Zhou, Chunguo Li, Kang Song, Hong Wen:
Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting. IEEE Access 7: 38738-38747 (2019) - [j69]Songlin Chen, Hong Wen, Jinsong Wu, WenXin Lei, Wenjing Hou, Wenjie Liu, Aidong Xu, Yixin Jiang:
Internet of Things Based Smart Grids Supported by Intelligent Edge Computing. IEEE Access 7: 74089-74102 (2019) - [j68]Runfa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Huanhuan Song, FeiYi Xie, Yixin Jiang, Minggui Cao:
Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access 7: 116390-116401 (2019) - [j67]Baofeng Ji, Zhenzhen Chen, Yuqi Li, Sudan Chen, Guoqiang Zheng, Hong Wen:
Energy harvesting and information transmission scheme with UAV relay cooperation. EURASIP J. Wirel. Commun. Netw. 2019: 278 (2019) - [j66]Gao Yuan Zhang, Hong Wen, Longye Wang, Liang Song, Jie Tang, Runfa Liao:
Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers. IET Commun. 13(2): 186-197 (2019) - [j65]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, Runfa Liao, Yi Chen, Yixin Jiang:
Analysis of the physical layer security enhancing of wireless communication system under the random mobile. IET Commun. 13(9): 1164-1170 (2019) - [j64]Jie Tang, Hong Wen, Kai Zeng, Runfa Liao, Fei Pan, Lin Hu:
Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks. IEEE Netw. 33(5): 126-133 (2019) - [j63]Yi Chen, Hong Wen, Jinsong Wu, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang, Zhen Wang:
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources. Sensors 19(8): 1926 (2019) - [j62]Runfa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, FeiYi Xie, Minggui Cao:
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks. Sensors 19(11): 2440 (2019) - [j61]Songlin Chen, Hong Wen, Jinsong Wu, Aidong Xu, Yixin Jiang, Huanhuan Song, Yi Chen:
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication. Sensors 19(16): 3610 (2019) - [j60]Yuanpeng Xie, Hong Wen, Bin Wu, Yixin Jiang, Jiaxiao Meng:
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 7(2): 383-391 (2019) - [j59]Fei Pan, Zhibo Pang, Hong Wen, Michele Luvisotto, Ming Xiao, Runfa Liao, Jie Chen:
Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Trans. Ind. Informatics 15(12): 6481-6491 (2019) - [j58]Huanhuan Song, Hong Wen, Runfa Liao, Yi Chen, Songlin Chen:
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels. IEEE Wirel. Commun. Lett. 8(3): 657-660 (2019) - [c54]Aidong Xu, Yixin Jiang, Jinsong Wu, Yunan Zhang, Wenjin Hou, Hong Wen, Yi Zheng:
Efficiency and Security for Edge Computing Assisted Smart Grids. GLOBECOM Workshops 2019: 1-5 - [c53]FeiYi Xie, Aidong Xu, Yixin Jiang, Songlin Chen, Runfa Liao, Hong Wen:
Edge Intelligence based Co-training of CNN. ICCSE 2019: 830-834 - [c52]Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang:
Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet. ICII 2019: 381-386 - 2018
- [j57]Ming Zhan, Jun Wu, Hong Wen, Peng Zhang:
A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building. IEEE Access 6: 39037-39045 (2018) - [j56]Baofeng Ji, Lifan Sun, Chunguo Li, Congcheng Han, Hong Wen:
Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms. Ad Hoc Sens. Wirel. Networks 40(1-2): 49-72 (2018) - [j55]Longye Wang, Gao Yuan Zhang, Hong Wen, Xiaoli Zeng:
An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length. Adv. Math. Commun. 12(3): 541-552 (2018) - [j54]Shu Fu, Jinsong Wu, Hong Wen, Yueping Cai, Bin Wu:
Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects. IEEE Commun. Mag. 56(8): 145-151 (2018) - [j53]Ming Zhan, Zhibo Pang, Ming Xiao, Hong Wen:
A state metrics compressed decoding technique for energy-efficient turbo decoder. EURASIP J. Wirel. Commun. Netw. 2018: 152 (2018) - [j52]Baofeng Ji, Yuqi Li, Yinghui Meng, Yi Wang, Kang Song, Congzheng Han, Hong Wen, Liang Song:
Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels. EURASIP J. Wirel. Commun. Netw. 2018: 265 (2018) - [j51]Xiaoli Zeng, Longye Wang, Hong Wen, Gao Yuan Zhang:
Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 982-987 (2018) - [j50]Gao Yuan Zhang, Hong Wen, Longye Wang, Xiaoli Zeng, Jie Tang, Runfa Liao, Liang Song:
Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1975-1979 (2018) - [j49]Yi Chen, Hong Wen, Huanhuan Song, Songlin Chen, FeiYi Xie, Qing Yang, Lin Hu:
Lightweight one-time password authentication scheme based on radio-frequency fingerprinting. IET Commun. 12(12): 1477-1484 (2018) - [j48]Lin Hu, Hong Wen, Bin Wu, Fei Pan, Runfa Liao, Huanhuan Song, Jie Tang, Xiumin Wang:
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 5(1): 219-228 (2018) - [j47]FeiYi Xie, Hong Wen, Yushan Li, Songlin Chen, Lin Hu, Yi Chen, Huanhuan Song:
Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things. IEEE Internet Things J. 5(5): 3967-3977 (2018) - [j46]Qiyi Han, Hong Wen, Fang Miao:
Rumor spreading in interdependent social networks. Peer-to-Peer Netw. Appl. 11(5): 955-965 (2018) - [j45]Gao Yuan Zhang, Hong Wen, Longye Wang, Ping Xie, Liang Song, Jie Tang, Runfa Liao:
Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks. Sensors 18(1): 52 (2018) - [j44]Shu Fu, Hong Wen, Bin Wu:
Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming. IEEE Trans. Veh. Technol. 67(3): 2025-2034 (2018) - [j43]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan, Runfa Liao:
Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers. IEEE Trans. Veh. Technol. 67(3): 2108-2117 (2018) - [j42]Huanhuan Song, Hong Wen, Lin Hu, Songlin Chen, Zhengguang Zhang, Runfa Liao:
Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN. IEEE Trans. Veh. Technol. 67(11): 10482-10491 (2018) - [j41]Jie Tang, Monireh Dabaghchian, Kai Zeng, Hong Wen:
Impact of Mobility on Physical Layer Security Over Wireless Fading Channels. IEEE Trans. Wirel. Commun. 17(12): 7849-7864 (2018) - [j40]Huanhuan Song, Hong Wen, Lin Hu, Yi Chen, Runfa Liao:
Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels. IEEE Wirel. Commun. Lett. 7(4): 514-517 (2018) - [j39]Songlin Chen, Hong Wen, Jinsong Wu, Jie Chen, Wenjie Liu, Lin Hu, Yi Chen:
Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm. Wirel. Commun. Mob. Comput. 2018: 6039878:1-6039878:10 (2018) - [j38]Baofeng Ji, Bingbing Xing, Kang Song, Chunguo Li, Hong Wen, Luxi Yang:
Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels. Wirel. Commun. Mob. Comput. 2018 (2018) - [j37]Runfa Liao, Hong Wen, Jinsong Wu, Huanhuan Song, Fei Pan, Lian Dong:
The Rayleigh Fading Channel Prediction via Deep Learning. Wirel. Commun. Mob. Comput. 2018: 6497340:1-6497340:11 (2018) - [c51]LiuFei Chen, Yushan Li, Hong Wen, WenXin Lei, Wenjing Hou, Jie Chen:
Block Chain Based Secure Scheme For Mobile Communication. CNS 2018: 1-2 - [c50]Yushan Li, LiuFei Chen, Jie Chen, FeiYi Xie, Songlin Chen, Hong Wen:
A Low Complexity Feature Extraction for the RF Fingerprinting Process. CNS 2018: 1-2 - [c49]Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen:
Mobility Improves NOMA Physical Layer Security. GLOBECOM 2018: 1-6 - [c48]Fei Pan, Zhibo Pang, Michele Luvisotto, Xiaolin Jiang, Roger N. Jansson, Ming Xiao, Hong Wen:
Authentication Based on Channel State Information for Industrial Wireless Communications. IECON 2018: 4125-4130 - [c47]Baofeng Ji, Bingbing Xing, Huahong Ma, Chunguo Li, Hong Wen, Luxi Yang:
Performance Analysis of Multi-Hop Relaying Cooperation for Internet-of-Things System. SAM 2018: 65-69 - [c46]Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, WenXin Lei, Aidong Xu:
A Novel Terminal Security Access Method Based on Edge Computing for IoT. NaNA 2018: 394-398 - 2017
- [j36]Shu Fu, Hong Wen, Jinsong Wu, Bin Wu:
Cross-Networks Energy Efficiency Tradeoff: From Wired Networks to Wireless Networks. IEEE Access 5: 15-26 (2017) - [j35]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan:
Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks. IEEE Commun. Lett. 21(3): 524-527 (2017) - [j34]Longye Wang, Xiaoli Zeng, Hong Wen:
Asymmetric ZCZ Sequence Sets with Inter-Subset Uncorrelated Sequences via Interleaved Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(2): 751-756 (2017) - [j33]Xiaoli Zeng, Longye Wang, Hong Wen:
Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1936-1941 (2017) - [j32]Gao Yuan Zhang, Hong Wen, Jiexin Pu, Jie Tang:
Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding. IET Commun. 11(11): 1808-1814 (2017) - [j31]Shu Fu, Hong Wen, Jinsong Wu, Bin Wu:
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism. IEEE Syst. J. 11(2): 578-587 (2017) - [c45]Fei Pan, Hong Wen, Runfa Liao, Yixin Jiang, Aidong Xu, Kai Ouyang, Xiping Zhu:
Physical layer authentication based on channel information and machine learning. CNS 2017: 364-365 - [c44]Runfa Liao, Hong Wen, Fei Pan, Huanhuan Song, Yixin Jiang, FeiYi Xie, Aidong Xu:
A physical layer secure transmission method based on channel prediction and QoS. CNS 2017: 366-367 - [c43]Huanhuan Song, Luping Zhang, Hong Wen, Aidong Xu, Yixin Jiang, Runfa Liao, Songlin Chen, Yi Chen:
Performance analysis of cooperative secure transmission system. CNS 2017: 368-369 - [c42]Qing Yang, Yixin Jiang, Aidong Xu, Hong Wen, Feng Wang, LiuFei Chen, Kai Ouyang, Xiping Zhu:
A model divides the mobile security level based on SVM. CNS 2017: 370-371 - [c41]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
A method of reconciling the key discrepancy by exploiting unconditional secure transmission. CNS 2017: 372-373 - [c40]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
The realization of key extraction based on USRP and OFDM channel response. CNS 2017: 374-375 - [c39]Ming Zhan, Jun Wu, Hong Wen:
An Optimized Resource Efficient Approximation of max* Operator for Recalculation in Turbo Code Decoder. ES 2017: 168-172 - [c38]Yan Zhang, Guowu Yang, Lin Hu, Hong Wen, Jinsong Wu:
Dot-product based preference preserved hashing for fast collaborative filtering. ICC 2017: 1-6 - [c37]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan, Zhengguang Zhang, Yixin Jiang, Aidong Xu:
Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers. VTC Fall 2017: 1-5 - [c36]Fei Pan, Yixin Jiang, Hong Wen, Runfa Liao, Aidong Xu:
Physical Layer Security Assisted 5G Network Security. VTC Fall 2017: 1-5 - [c35]Huanhuan Song, Hong Wen, Lin Hu, Zhengguang Zhang, Luping Zhang:
MISO Secure Transmission with Imperfect Channel State Information. VTC Fall 2017: 1-5 - [c34]Jie Tang, Hong Wen, Kai Zeng, Lin Hu, Song-Lin Chen:
Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code. VTC Fall 2017: 1-5 - [c33]Longye Wang, Xiaoli Zheng, Hong Wen, Gao Yuan Zhang:
Novel Asymmetric Zero Correlation Zone Sequence Sets for Code Division Multiple Access. VTC Fall 2017: 1-5 - 2016
- [j30]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan:
Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks. IEEE Access 4: 5607-5623 (2016) - [j29]Longye Wang, Xiaoli Zeng, Hong Wen:
Designs of Inter-Group Complementary Sequence Set from Interleaving Z-Periodic Complementary Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(5): 987-993 (2016) - [j28]Longye Wang, Xiaoli Zeng, Hong Wen:
Families of asymmetric sequence pair set with zero-correlation zone via interleaved technique. IET Commun. 10(3): 229-234 (2016) - [j27]Jie Tang, Hong Wen, Lin Hu, Huanhuan Song, Gao Yuan Zhang, Fei Pan, Hongbin Liang:
Associating MIMO beamforming with security codes to achieve unconditional communication security. IET Commun. 10(12): 1522-1531 (2016) - [j26]Yaofang Li, Jie Xiao, Bin Wu, Hong Wen, Hongfang Yu, Shu Yang, Shanshan Xin, Jianing Guo:
Cloud service provisioning in two types of DCN with awareness of delay and link failure probability. Photonic Netw. Commun. 31(2): 217-227 (2016) - [j25]Qiyi Han, Hong Wen, Gang Feng, Bin Wu, Mengyin Ren:
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Netw. Appl. 9(6): 1020-1030 (2016) - [c32]Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:
The performance of the MIMO physical layer security system with imperfect CSI. CNS 2016: 346-347 - [c31]Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu:
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. CNS 2016: 348-349 - [c30]Zhengguang Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu:
A MIMO cross-layer secure communication scheme based on spatial modulation. CNS 2016: 350-351 - [c29]Jianli Huang, Yixin Jiang, Aidong Xu, Hong Wen, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang:
Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels. CNS 2016: 368-369 - [c28]Yan Zhang, Guowu Yang, Defu Lian, Hong Wen, Jinsong Wu:
Constraint Free Preference Preserving Hashing for Fast Recommendation. GLOBECOM 2016: 1-6 - [c27]Lin Hu, Bin Wu, Jie Tang, Fei Pan, Hong Wen:
Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming. ICC 2016: 1-5 - [c26]Shu Fu, Hong Wen, Jinsong Wu, Bin Wu:
The cross-network energy efficient tradeoff: From wavelength division multiplexing wired networks to 5G wireless networks. INFOCOM Workshops 2016: 712-717 - 2015
- [j24]Shu Fu, Bin Wu, Xiaohong Jiang, Achille Pattavina, Hong Wen, Hongfang Yu:
Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead. Comput. Networks 87: 33-43 (2015) - [j23]Qiyi Han, Hong Wen, Mengyin Ren, Bin Wu, Shengqiang Li:
A topological potential weighted community-based recommendation trust model for P2P networks. Peer-to-Peer Netw. Appl. 8(6): 1048-1058 (2015) - [j22]Hong Wen, Jie Tang, Jinsong Wu, Huanhuan Song, Tingyong Wu, Bin Wu, Pin-Han Ho, Shichao Lv, Li-Min Sun:
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE Trans. Emerg. Top. Comput. 3(1): 119-126 (2015) - [c25]Qiyi Han, Hong Wen, Jinsong Wu, Mengyin Ren:
Rumor Spreading and Security Monitoring in Complex Networks. CSoNet 2015: 48-59 - [c24]Qiyi Han, Hong Wen, Gang Feng, Longye Wang, Fei Pan:
Secure Interdependent Networks for Peer-to-Peer and Online Social Network. GLOBECOM 2015: 1-6 - [c23]Yuanpeng Xie, Yixin Jiang, Runfa Liao, Hong Wen, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
User privacy protection for cloud computing based smart grid. ICCC Workshops 2015: 7-11 - [c22]Yuanpeng Xie, Yixin Jiang, Runfa Liao, Hong Wen, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
A hierarchical key management system applied in cloud-based smart grid. ICCC Workshops 2015: 22-26 - [c21]Fei Pan, Hong Wen, Huanhuan Song, Tang Jie, Longye Wang:
5G security architecture and light weight security authentication. ICCC Workshops 2015: 94-98 - [c20]Jie Tang, Hong Wen, Huanhuan Song, Fei Pan:
Combining MIMO beamforming with security codes to achieve unconditional communication security. ICCC Workshops 2015: 105-109 - [c19]Lin Hu, Hong Wen, Jie Tang, Zhen-Qing He, Jian Su:
Joint cooperative jamming and beamforming for secure transmission in two-cell networks. ICCC Workshops 2015: 110-114 - [c18]Fei Pan, Huanhuan Song, Hong Wen:
An OFDM cross-layer encryption secure communication scheme. ICCC Workshops 2015: 115-119 - [c17]Yuanpeng Xie, Hong Wen, Jinsong Wu, Yixin Jiang, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
Three-Layers Secure Access Control for Cloud-Based Smart Grids. VTC Fall 2015: 1-5 - 2014
- [j21]Longye Wang, Xiaoli Zeng, Hong Wen:
A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(12): 2556-2561 (2014) - [j20]Gao Yuan Zhang, Liang Zhou, Hong Wen:
Modified channel-independent weighted bit flipping decoding algorithm for low-density-parity-check codes. IET Commun. 8(6): 833-840 (2014) - [j19]Ming Zhan, Jun Wu, Hong Wen:
Reduced memory decoding schemes for turbo decoding based on storing the index of the state metric. IET Commun. 8(12): 2095-2105 (2014) - [j18]Ming Yi, Xinsheng Ji, Kaizhi Huang, Hong Wen, Bin Wu:
Achieving strong security based on fountain code with coset pre-coding. IET Commun. 8(14): 2476-2483 (2014) - [j17]Jie Xiao, Bin Wu, Xiaohong Jiang, Achille Pattavina, Hong Wen, Lei Zhang:
Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks. JOCN 6(3): 270-281 (2014) - [j16]Bin Wu, Shu Fu, Xiaohong Jiang, Hong Wen:
Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks. IEEE J. Sel. Areas Commun. 32(8): 1533-1541 (2014) - [j15]Jie Xiao, Hong Wen, Bin Wu, Xiaohong Jiang, Pin-Han Ho, Lei Zhang:
Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks. IEEE Trans. Commun. 62(1): 235-245 (2014) - [j14]Shu Fu, Bin Wu, Hong Wen, Pin-Han Ho, Gang Feng:
Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP. IEEE Trans. Wirel. Commun. 13(1): 112-123 (2014) - [j13]Hong Wen, Pin-Han Ho, Bin Wu:
Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions. IEEE Wirel. Commun. Lett. 3(3): 273-276 (2014) - [c16]Mengyin Ren, Yixin Jiang, Xiaobin Guo, Qiyi Han, Hong Wen, Bin Wu, Zhen Chen:
P2P networks monitoring based on the social network analysis and the topological potential. CNS 2014: 492-493 - [c15]Ting Ma, Yixin Jiang, Hong Wen, Bin Wu, Xiaobin Guo, Zhen Chen:
Physical Layer Assist Mutual Authentication scheme for smart meter system. CNS 2014: 494-495 - [c14]Jie Tang, Huanhuan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen:
A MIMO cross-layer precoding security communication system. CNS 2014: 500-501 - [c13]Longye Wang, Hong Wen, Xiaoli Zeng, Bin Wu:
New families of asymmetric zero-correlation zone sequence sets based on interleaved perfect sequence. ICCC 2014: 31-36 - [c12]Qiyi Han, Hong Wen, Ting Ma, Bin Wu:
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. ICCC 2014: 199-203 - [c11]Longye Wang, Xiaoli Zeng, Hong Wen:
A Novel Construction of Asymmetric Sequence Pairs Set with Zero-Correlation Zone. SETA 2014: 280-289 - 2013
- [j12]Hong Wen, Yi Fan Wang, Xiping Zhu, Jianqiang Li, Liang Zhou:
Physical layer assist authentication technique for smart meter system. IET Commun. 7(3) (2013) - [j11]Xiang Ling, Bin Wu, Hong Wen, Lili Pan, Fengya Luo:
Fast and efficient parallel-shift water-filling algorithm for power allocation in orthogonal frequency division multiplexing-based underlay cognitive radios. IET Commun. 7(12): 1269-1278 (2013) - [j10]Gao Yuan Zhang, Li-Min Sun, Hong Wen, Bin Wu, Xiping Zhu, Liang Zhou:
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems. Int. J. Distributed Sens. Networks 9 (2013) - [j9]Hong Wen, Shaoqian Li, Xiping Zhu, Liang Zhou:
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks. IEEE Netw. 27(3): 34-39 (2013) - [j8]Hong Wen, Guang Gong, Shichao Lv, Pin-Han Ho:
Framework for MIMO cross-layer secure communication based on STBC. Telecommun. Syst. 52(4): 2177-2185 (2013) - [j7]Rizwan Ghaffar, Umer Salim, Pin-Han Ho, Hong Wen:
On Managing Interferences under Heterogeneous CSIT Feedback for Multi-User Transmission. IEEE Trans. Wirel. Commun. 12(2): 828-839 (2013) - [c10]Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A novel detection scheme for malicious nodes in smart meter system. CNS 2013: 379-380 - [c9]Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
The security issue of WSNs based on cloud computing. CNS 2013: 383-384 - [c8]Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A P2P recommended trust nodes selection algorithm based on topological potential. CNS 2013: 395-396 - [c7]Yixin Jiang, Xiaobin Guo, Chao Li, Hong Wen, Cai Lei, Zhang Rui:
An efficient and secure search database scheme for cloud computing in smart grid. CNS 2013: 413-414 - 2012
- [j6]Hong Wen, Pin-Han Ho, Xiaohong Jiang:
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC). IEEE Wirel. Commun. Lett. 1(2): 49-52 (2012) - [j5]Xiang Ling, Bin Wu, Hong Wen, Pin-Han Ho, Zhiqiang Bao, Lili Pan:
Adaptive Threshold Control for Energy Detection Based Spectrum Sensing in Cognitive Radios. IEEE Wirel. Commun. Lett. 1(5): 448-451 (2012) - 2011
- [j4]Hong Wen, Pin-Han Ho:
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks. KSII Trans. Internet Inf. Syst. 5(2): 440-456 (2011) - [c6]Ling Yang, ShiLi Song, Wei Wei Su, Yi Fan Wang, Hong Wen:
The Performance Analysis of LT Codes. FGIT-FGCN (1) 2011: 227-235 - [c5]Gao Yuan Zhang, Hong Wen, Liang Zhou, Ling Yang, Yi Fan Wang:
The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes. FGIT-FGCN (1) 2011: 254-260 - 2010
- [j3]Hong Wen, Pin-Han Ho, Guang Gong:
A framework of physical layer technique assisted authentication for vehicular communication networks. Sci. China Inf. Sci. 53(10): 1996-2004 (2010) - [j2]Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:
Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf. Secur. 4(4): 390-396 (2010) - [c4]Hong Wen, Guang Gong, Pin-Han Ho:
MIMO Cross-Layer Secure Communication Architecture Based on STBC. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j1]Hong Wen, Guang Gong, Pin-Han Ho:
Build-in wiretap channel I with feedback and LDPC codes. J. Commun. Networks 11(6): 538-543 (2009) - [c3]Hong Wen, Pin-Han Ho, Guang Gong:
A Novel Framework for Message Authentication in Vehicular Communication Networks. GLOBECOM 2009: 1-6 - 2007
- [c2]Ning He, Hong Wen, Shuya Yang, Liang Zhou:
An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC code. FGCN (2) 2007: 220-223 - [c1]Shuya Yang, Hong Wen, Ning He, Liang Zhou:
The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes. FGCN (2) 2007: 241-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint