我的新闻

分享到:
部分指导毕业博士与硕士成果展示,欢迎有意深造同学联系攻读硕士或博士学位!
发布者: 王慧明 | 2022-06-26 | 2463

 

下表为本人指导的部分博士与硕士生成果列表,欢迎有意深造同学联系攻读硕士或博士学位!


 

姓名

年级

 

王超

2016毕业博士,目前任西安电子科技大学华山菁英副教授

  1. Chao Wang, and H.-M. Wang, “On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels,” IEEE Transactions on Information Forensics & Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
  2. Chao Wang, H.-M. Wang, and X.-G. Xia, “Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 589-605, Feb. 2015.
  3. Chao Wang and H.-M. Wang, “Robust joint beamforming and jamming for secure AF networks: low complexity design,” IEEE Transactions on Vehicular Technology, vol. 64, no. 5, pp. 2192-2198, May 2015.
  4. Chao Wang, H.-M. Wang, X.-G. Xia, and C. Liu, “Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach,” IEEE Transactions on Wireless  Communications,  vol. 14, no. 5, pp. 2596-2612, May. 2015.
  5. Chao Wang, H.-M. Wang, Derrick Wing Kwan Ng, X.-G. Xia, and C. Liu, “Joint beamforming and power allocation for secrecy in peer-to-peer relay networks,” IEEE Transactions on Wireless Communications,  vol. 14, no. 6, pp. 3280-3293, Jun. 2015.
  6. Chao Wang, H.-M. Wang, and B. Wang, “Low-overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI,” IEEE Signal Processing Letters, vol. 22, no. 12, pp. 2294 - 2298, Dec. 2015.
  7. Chao Wang and H.-M. Wang, “Opportunistic jamming for enhancing security: stochastic geometry modeling and analysis,” IEEE Transactions on Vehicular Technology, vol. 65. no. 12, pp. 10213-10217, Dec. 2016.
  8. Chao Wang and H.-M. Wang, “Physical layer security in millimeter wave cellular networks,” IEEE Transactions on Wireless Communications, vol. 15. no. 8, pp. 5569-5585, Aug. 2016.
  9. H.-M. WangChao Wang, and Derrick Wing Kwan Ng, “Artificial noise assisted secure transmission under training and feedback”, IEEE Transactions on Signal Processing, vol. 63, no. 23, pp. 6285 - 6298, Dec. 2015.
  10. H.-M. Wang, Chao Wang, Derrick Wing Kwan Ng, Moon Ho Lee, and Jia Xiao, “Artificial noise assisted secure transmission for distributed antenna systems,” IEEE Transactions on Signal Processing, vol. 64. no. 15, pp. 4050-4064, Aug. 2016.

郑通兴

2016毕业博士,目前任西安交通大学副教授

  1. T. Zheng, H.-M. Wang, and Qinye Yin, “On transmission secrecy outage of multi-antenna system with randomly located eavesdroppers,” IEEE Communications Letters, vol. 18, no. 8, pp. 1299-1302, Aug. 2014.
  2. T.-X. Zheng, H.-M. Wang, Feng Liu, and Moon Ho Lee, “Outage constrained secrecy throughput maximization for DF relay networks,” IEEE Transactions on Communications, vol. 63, no. 5, pp. 1741-1755, May 2015.
  3. T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multi-Antenna Transmission with Artificial Noise Against Randomly Distributed Eavesdroppers,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 4347 - 4362, Nov. 2015.
  4. T.-X. Zheng and H.-M. Wang, “Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp.8812-8817, Oct.. 2016.
  5. T.-X. Zheng, H.-M. Wang, Q. Yang and M. H. Lee, “Safeguarding decentralized wireless networks using full-duplex jamming receivers,” IEEE Transactions on Wireless Communications,  vol. 16. no. 1, pp. 278-292,  Jan. 2017.
  6. T.-X. Zheng, H.-M. Wang, and M. H. Lee “Multi-Antenna Transmission in Downlink Heterogeneous Cellular Networks under A Threshold-based Mobile Association Policy” IEEE Transactions on Communications,  vol. 65. no. 1, pp. 244-256,  Jan. 2017.
  7. T.-X. Zheng, H.-M. Wang, J. Yuan, Z. Han, and M. H. Lee,  “Physical layer security in wireless Ad Hoc networks under a hybrid full-/half-duplex receivers strategy,” IEEE Transactions on Wireless Communications, vol. 16, no. 6, pp. 3827-3839, Jun. 2017.
  8. H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Physical layer security in heterogeneous cellular networks,” IEEE Transactions on Communications, vol. 64, no. 3, pp. 1204-1219, Mar. 2016.
  9. H.-M. Wang, T. Zheng, and X.-G. Xia, “Secure MISO wiretap channels with multi-antenna passive eavesdropper: artificial noise vs. artificial fast fading,”IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 94-106, Jan. 2015.

杨骞

2020毕业博士,任职西安华为

  1. Q. Yang, Hui-Ming Wang, Q. Yin, and A. L. Swindlehurst, “Exploiting randomized continuous wave in secure backscatter communications,” IEEE Internet of Things Journal vol. 7, no. 4, pp. 3389-3403, April 2020.
  2. H.-M.Wang, Q. Yang, Z. Ding, and H. Vincent Poor, “Secure Short-Packet Communications for MissionCritical IoT Applications,” IEEE Transactions on Wireless Communications, vol. 18, no. 5, pp. 2565-2578, May. 2019.
  3. Q. Yang, H.-M. Wang, and T.-X. Zheng, “Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization,” IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 11309-11313, Nov.2018 
  4. Q. Yang, H.-M. Wang, T. X. Zheng, Z. Han, and M. H. Lee, “Wireless powered asynchronous backscatter networks with sporadic short packets: Performance analysis and optimization,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 984–997, Apr. 2018.
  5. Q. Yang, H.-M. Wang, D. W. Kwan Ng, and M. Lee, “NOMA in downlink SDMA with limited feedback: performance analysis and optimization,” IEEE Journal of Selected Area in Communications, vol. 35, no. 10, pp. 2281-2294, Oct. 2017.
  6. Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, “Physical layer security in MIMO backscatter wireless systems,” IEEE Transactions on Wireless Communications,  vol. 15. no. 11, pp. 7547-7560, Nov.  2016.

 

 

黄柯文

2021毕业博士,目前取得多所985高校教职,最后受聘湖南大学岳麓学者副教授

  1. Ke-Wen Huang, H.-M. Wangand H. V. Poor, “On Covert Communication Against Sequential Change-Point Detection,” IEEE Transactions on Information Theoryaccepted.
  2. Ke-Wen Huang and H.-M. Wang“Jamming Aided Covert Communication with Multiple Receivers,” IEEE Transactions on Wireless Communicationsvol. 20, no. 7, pp. 4480-4494, July 2021.
  3. Ke-Wen Huang and H.-M. Wang“Intelligent reflecting surface aided pilot contamination attack and its countermeasure,” IEEE Transactions on Wireless Communicationsvol. 20, no. 1, pp.345- 359, Jan 2021.
  4. Ke-Wen Huang and H.-M. Wang, “Passive Beamforming for IRS Aided Wireless Networks,” IEEE Wireless Communications Lettersvol. 9, no. 12, pp. 2035-2039, Dec. 2020.
  5. Ke-Wen Huang and H.-M. Wang, D. Towsley, and H. V. Poor, “LPD communication: A sequential change-point detection perspective ,” IEEE Transactions on Communication,   vol. 68, no. 4, pp. 2474-2490, April 2020.
  6. Ke-Wen Huang and H.-M. Wang, J. Hou, and S. Jin, “Joint Spatial Division and Diversity for Massive MIMO Systems,” IEEE Transactions on Communications, vol. 67, no. 1, pp. 258-272, Jan. 2019.
  7. Ke-Wen Huang and H.-M. Wang,  Y. Wu, and R. Schober, “Pilot spoofing attack by multiple eavesdroppers” IEEE Transactions on Wireless Communications, vol. 17, no. 10, pp. 6433-6447, Oct. 2018.
  8. Ke-Wen Huang and H.-M. Wang,“Identifying the fake base station: A location based approach,” IEEE Communications Letters, vol. 22, no. 8, pp. 1604-1607, Aug. 2018.
  9. Ke-Wen Huang and H.-M. Wang, “Combating the control signal spoofing attack in UAV systemsIEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7769-7773, Aug. 2018.
  10. H.-M. Wang, K.-W. Huang and Theodoros A. Tsiftsis, “Multiple antennas secure transmissio n under pilot spoofing and jamming attack”, IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 860-876, Apr. 2018.
  11. H.-M. Wang, K.-W. Huang, and  T. A. Tsiftsis, “Base station cooperation in millimeter wave cellular networks: Performance enhancement of cell-edge users,”IEEE Transaction on Communications, vol. 66, no. 11, pp. 5124-5139, Nov. 2018.
  12. H.-M. Wang, K.-W. Huang, Q. Yang and Z. Han, “Joint source-relay secure precoding for MIMO relay networks with direct links,” IEEE Transaction on Communications, vol. 65, no. 7, pp. 2781-2793, Jul. 2017.

 

冯晨

2021毕业硕士

  1.  Chen Feng, H.-M. Wangand H. V. Poor, “Reliable and secure short-packet communications,” IEEE Transactions on Wireless Communications, accepted.
  2.   Chen Feng and H.-M. Wang, “Secure Short-Packet Communications at the Physical Layer for 5G and Beyond,” IEEE Communications Standards Magazine, accepted.
  3. 冯晨,王慧明;面向5G 的短包物理层安全通信,中国科学:信息科学,已录用

 

付清伊

2021毕业硕士

  1. Qing-Yi Fu and H.-M. Wang“Detection of Hijacking DDoS Attack Based on Air Interface Traffic,” IEEE Wireless Communications Lettersaccepted.
  2. Qing-Yi Fu, Yue-Hua Feng, H.-M. Wang, and Peng Liu, “Initial satellite access authentication based on Doppler frequency shift,” IEEE Wireless Communications Lettersvol. 10, no. 3, pp.498- 502, Mar 2021.

 

张旭

2020毕业硕士

  1. H.-M. Wang, and Xu Zhang, “UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Perspective,” IEEE Transactions on Communicationsvol. 68, no. 9, pp. 5732-5746, Sept. 2020.
  2.  H.-M. Wang, Xu Zhang, and J.-C. Jiang, “UAV-involved wireless physical layer secure communications: overview and research directions”, IEEE Wireless Communications, Oct. 2019, pp.2–9.
  3. H.-M. Wang, Xu Zhang, Q. Yang, and T. A. Tsiftsis, “Secure Users Oriented Downlink MISO NOMA,” IEEE Journal of Selected Topics on Signal Processingvol. 13, no. 3, pp. 671-684, Jun. 2019.

 

张岩

2019毕业硕士,美国马里兰大学博士全额奖学金

  1. H.-M. Wang, Yan Zhang, Xu Zhang, and Zhetao Li, “Secrecy and covert communications against UAV surveillance via multi-hop networks” IEEE Transactions on Communications, vol. 68, no. 1, pp. 389-401, Jan. 2020.
  2. H.-M. Wang, Yan Zhang, D. W. K. Ng, and M. H. Lee, “Secure routing with power optimization for ad-hoc networks,” IEEE Transactions on Communications, vol. 66, no. 10, pp. 4666-4679, Oct. 2018.

 

张艺

2017毕业硕士,美国德州奥斯汀大学博士全额奖学金

  1. Yi Zhang, H.-M. Wang, T.-X. Zheng, and Q. Yang, “Energy-efficient transmission in non-orthogonal multiple access,” IEEE Transactions on Vehicular Technology, vol. 66. no.3, pp. 2852-2857,  Mar. 2017.
  2. Yi Zhang, H.-M. Wang, Q. Yang and Z. Ding, “Secrecy sum rate maximization in non-orthogonal multiple access,” IEEE Communications Letters, vol. 20. no. 5, pp. 930-933, May 2016.