A new approach for random key pre‐distribution in large‐scale wireless sensor networks K Ren, K Zeng, W Lou wireless communications and mobile computing 6 (3), 307-318, 2006 | 84 | 2006 |
A practical downlink NOMA scheme for wireless LANs PK Sangdeh, H Pirayesh, Q Yan, K Zeng, W Lou, H Zeng IEEE transactions on communications 68 (4), 2236-2250, 2020 | 20 | 2020 |
A reassessment on friendly jamming efficiency R Jin, K Zeng, K Zhang IEEE Transactions on Mobile Computing 20 (1), 32-47, 2019 | 8 | 2019 |
A smartphone-based driver fatigue detection using fusion of multiple real-time facial features Y Qiao, K Zeng, L Xu, X Yin 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016 | 40 | 2016 |
A survey on security, privacy, and trust in mobile crowdsourcing W Feng, Z Yan, H Zhang, K Zeng, Y Xiao, YT Hou IEEE Internet of Things Journal 5 (4), 2971-2992, 2017 | 147 | 2017 |
A survey on simulation tools and testbeds for cognitive radio networks study Q Dong, Y Chen, X Li, K Zeng arXiv preprint arXiv:1808.09858, 2018 | 9 | 2018 |
Achieving unconditional security for MIMO-BAN under short blocklength wiretap code J Tang, H Wen, K Zeng, L Hu, SL Chen 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-5, 2017 | 5 | 2017 |
Adaptive wireless channel probing for shared key generation Y Wei, K Zeng, P Mohapatra 2011 Proceedings IEEE INFOCOM, 2165-2173, 2011 | 51 | 2011 |
Adaptive wireless channel probing for shared key generation based on PID controller Y Wei, K Zeng, P Mohapatra IEEE Transactions on Mobile Computing 12 (9), 1842-1852, 2012 | 91 | 2012 |
An adaptive primary user emulation attack detection mechanism for cognitive radio networks Q Dong, Y Chen, X Li, K Zeng, R Zimmermann Security and Privacy in Communication Networks: 14th International …, 2018 | 16 | 2018 |
Anomaly detection in cognitive radio networks exploiting singular spectrum analysis Q Dong, Z Yang, Y Chen, X Li, K Zeng Computer Network Security: 7th International Conference on Mathematical …, 2017 | 13 | 2017 |
Assessing the Socio-economic Impacts of Secure Texting and Anti-Jamming Technologies in Non-Cooperative Networks OB Ogutu, EJ Oughton, K Zeng, BL Mark arXiv preprint arXiv:2303.17013, 2023 | 1 | 2023 |
Authiot: A transferable wireless authentication scheme for iot devices without input interface S Zhang, PK Sangdeh, H Pirayesh, H Zeng, Q Yan, K Zeng IEEE Internet of Things Journal 9 (22), 23072-23085, 2022 | 1 | 2022 |
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network Y Yang, M Kaveh, J Li, Y Zhang, Z Yan, K Zeng ICC 2023-IEEE International Conference on Communications, 4528-4533, 2023 | 1 | 2023 |
BCAuth: Physical layer enhanced authentication and attack tracing for backscatter communications P Wang, Z Yan, K Zeng IEEE Transactions on Information Forensics and Security 17, 2818-2834, 2022 | 19 | 2022 |
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks Y Jiang, L Jiao, L Zhao, K Zeng Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022 | 1 | 2022 |
Best practices in cybersecurity for utilities: Secure remote access K Zeng, Z Li | 1 | 2020 |
Bgkey: Group key generation for backscatter communications among multiple devices J Li, P Wang, Z Yan, Y Yang, K Zeng IEEE Transactions on Information Forensics and Security, 2023 | 1 | 2023 |
Bluetooth beacon based location determination J Zhu, K Zeng, P Mohapatra, KH Kim US Patent 8,965,398, 2015 | 98 | 2015 |
Capacity of Multirate Opportunistic Routing K Zeng, W Lou, M Li Wiley Telecom, 2011 | | 2011 |