default search action
Pu Wang 0003
Person information
- affiliation: George Mason University, Fairfax, USA
- affiliation: Xidian University, State Key Lab on Integrated Services Networks, School of Cyber Engineering, Xian, China
- not to be confused with: Pu Wang 0002
Other persons with the same name
- Pu Wang — disambiguation page
- Pu Wang 0001 — University of North Carolina at Charlotte, USA (and 1 more)
- Pu Wang 0002 — George Mason University, Fairfax, Virginia, USA
- Pu Wang 0004 (aka: Pu (Perry) Wang) — Mitsubishi Electric Research Laboratories (MERL), Cambridge, MA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Jiajun Li, Pu Wang, Zheng Yan, Yishan Yang, Kai Zeng:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. IEEE Trans. Inf. Forensics Secur. 19: 2470-2486 (2024) - [j14]Yishan Yang, Zheng Yan, Kai Zeng, Pu Wang, Jiajun Li:
Physical Layer Authentication in Backscatter Communication: A Review. IEEE Wirel. Commun. 31(3): 264-270 (2024) - 2023
- [j13]Xiaojun Cheng, Xuyang Jing, Zheng Yan, Xian Li, Pu Wang, Wei Wu:
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution. J. Netw. Comput. Appl. 216: 103659 (2023) - [j12]Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, Yishan Yang:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 18: 948-964 (2023) - 2022
- [j11]Pu Wang, Zheng Yan, Kai Zeng:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 17: 2818-2834 (2022) - [j10]Long Jiao, Pu Wang, Amir Alipour-Fanid, Huacheng Zeng, Kai Zeng:
Enabling Efficient Blockage-Aware Handover in RIS-Assisted mmWave Cellular Networks. IEEE Trans. Wirel. Commun. 21(4): 2243-2257 (2022) - [j9]Pu Wang, Zheng Yan, Ning Wang, Kai Zeng:
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise. IEEE Trans. Wirel. Commun. 21(9): 7794-7809 (2022) - 2021
- [j8]Li Wang, Yu Chen, Pu Wang, Zheng Yan:
Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications. IEEE Commun. Stand. Mag. 5(4): 41-47 (2021) - [j7]Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng:
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks. IEEE Trans. Wirel. Commun. 20(5): 3321-3335 (2021) - [c8]Pu Wang, Long Jiao, Kai Zeng, Zheng Yan:
Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals. INFOCOM 2021: 1-10 - 2020
- [j6]Ning Wang, Weiwei Li, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng:
Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead. IEEE Netw. 34(6): 198-204 (2020) - [j5]Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic. IEEE Trans. Inf. Forensics Secur. 15: 2346-2360 (2020) - [c7]Long Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng:
Efficient Physical Layer Group Key Generation in 5G Wireless Networks. CNS 2020: 1-9 - [c6]Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng:
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks. INFOCOM 2020: 2579-2588 - [c5]Pu Wang, Limei He, Zheng Yan, Wei Feng:
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking. SPDE 2020: 643-660
2010 – 2019
- 2019
- [j4]Ning Wang, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng:
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities. IEEE Internet Things J. 6(5): 8169-8181 (2019) - [j3]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. IEEE Wirel. Commun. 26(5): 48-54 (2019) - [c4]Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic. CNS 2019: 1-7 - [c3]Pu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan:
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. INFOCOM 2019: 460-468 - [i2]Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic. CoRR abs/1905.06396 (2019) - [i1]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. CoRR abs/1908.10362 (2019) - 2018
- [j2]Zheng Yan, Pu Wang, Wei Feng:
A novel scheme of anonymous authentication on trust in Pervasive Social Networking. Inf. Sci. 445-446: 79-96 (2018) - [c2]Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen:
Mobility Improves NOMA Physical Layer Security. GLOBECOM 2018: 1-6 - [c1]Ning Wang, Long Jiao, Pu Wang, Monireh Dabaghchian, Kai Zeng:
Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication. GLOBECOM 2018: 1-6 - 2015
- [j1]Zheng Yan, Wei Feng, Pu Wang:
Anonymous Authentication for Trustworthy Pervasive Social Networking. IEEE Trans. Comput. Soc. Syst. 2(3): 88-98 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint