default search action
Kunrui Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Danyu Diao, Buhong Wang, Kunrui Cao, Beixiong Zheng, Jiang Weng, Jingyu Chen:
Secure RIS Deployment Strategies for Wireless-Powered Multi-UAV Communication. IEEE Internet Things J. 11(10): 18154-18166 (2024) - [j31]Hancheng Yang, Haiyang Ding, Kunrui Cao, Maged Elkashlan, Haipeng Li, Kewei Xin:
A RIS-Segmented Symbiotic Ambient Backscatter Communication System. IEEE Trans. Veh. Technol. 73(1): 812-825 (2024) - [j30]Runze Dong, Buhong Wang, Kunrui Cao, Jiwei Tian, Tianhao Cheng:
Secure Transmission Design of RIS Enabled UAV Communication Networks Exploiting Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 73(6): 8404-8419 (2024) - [j29]Danyu Diao, Buhong Wang, Kunrui Cao, Beixiong Zheng, Runze Dong, Tianhao Cheng, Jingyu Chen:
Reflecting Elements Analysis for Secure and Energy-Efficient UAV-RIS System With Phase Errors. IEEE Wirel. Commun. Lett. 13(2): 293-297 (2024) - [c12]Jingyu Chen, Kunrui Cao, Lu Lv, Beixiong Zheng, Haolian Chi, Siwei Tang, Danyu Diao:
On the Reliability and Security Enhancements of Double-RIS Enabled WPC System with Jamming. WCNC 2024: 1-6 - [c11]Siwei Tang, Kunrui Cao, Lin Zhang, Lu Lv, Jingyu Chen, Jiayi Chen:
STAR-RIS Aided Secure Wireless Powered Communication with Indoor and Outdoor Users. WCNC 2024: 1-6 - 2023
- [j28]Kunrui Cao, Haiyang Ding, Lu Lv, Zhou Su, Jing Tao, Fengkui Gong, Buhong Wang:
Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems. IEEE Internet Things J. 10(20): 18097-18110 (2023) - [j27]Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao:
IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping. IEEE Syst. J. 17(3): 3670-3681 (2023) - [j26]Runze Dong, Buhong Wang, Kunrui Cao, Jiwei Tian:
Hybrid Beamforming for Secure Transmission of Massive MIMO UAV Communication Networks. IEEE Syst. J. 17(3): 4200-4211 (2023) - [j25]Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao:
IRS-Assisted Secure UAV Communication System for Multiuser With Hardware Impairments. IEEE Syst. J. 17(3): 4946-4957 (2023) - [j24]Danyu Diao, Buhong Wang, Kunrui Cao, Jiang Weng, Runze Dong, Tianhao Cheng:
Secure Wireless-Powered NOMA Communications in Multi-UAV Systems. IEEE Trans. Green Commun. Netw. 7(3): 1205-1216 (2023) - [j23]Danyu Diao, Buhong Wang, Kunrui Cao:
Secure SWIPT-powered UAV communication against full-duplex active eavesdropper. Wirel. Networks 29(6): 2495-2504 (2023) - [c10]Runze Dong, Buhong Wang, Kunrui Cao, Jiwei Tian, Tianhao Cheng:
Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers. CyberC 2023: 295-300 - 2022
- [j22]Tianhao Cheng, Buhong Wang, Zhen Wang, Kunrui Cao, Runze Dong, Jiang Weng:
Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems. Entropy 24(11): 1605 (2022) - [j21]Jiwei Tian, Buhong Wang, Rongxiao Guo, Zhen Wang, Kunrui Cao, Xiaodong Wang:
Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles. IEEE Internet Things J. 9(22): 22399-22409 (2022) - [j20]Kunrui Cao, Haiyang Ding, Buhong Wang, Lu Lv, Jiwei Tian, Qingmei Wei, Fengkui Gong:
Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission. IEEE Internet Things J. 9(24): 24669-24681 (2022) - [j19]Feng Jing, Hailin Zhang, Mei Gao, Bin Xue, Kunrui Cao:
RIS-Assisted Multi-Antenna AmBC Signal Detection Using Deep Reinforcement Learning. Sensors 22(16): 6137 (2022) - [j18]Runze Dong, Buhong Wang, Kunrui Cao, Tianhao Cheng:
Securing Transmission for UAV Swarm-Enabled Communication Network. IEEE Syst. J. 16(4): 5200-5211 (2022) - [j17]Jiwei Tian, Buhong Wang, Zhen Wang, Kunrui Cao, Jing Li, Mete Ozay:
Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems. IEEE Trans. Cybern. 52(12): 13699-13713 (2022) - [j16]Danyu Diao, Buhong Wang, Kunrui Cao, Runze Dong, Tianhao Cheng:
Enhancing Reliability and Security of UAV-Enabled NOMA Communications With Power Allocation and Aerial Jamming. IEEE Trans. Veh. Technol. 71(8): 8662-8674 (2022) - [j15]Kunrui Cao, Haiyang Ding, Wei Li, Lu Lv, Mei Gao, Fengkui Gong, Buhong Wang:
On the Ergodic Secrecy Capacity of Intelligent Reflecting Surface Aided Wireless Powered Communication Systems. IEEE Wirel. Commun. Lett. 11(11): 2275-2279 (2022) - [c9]Danyu Diao, Buhong Wang, Kunrui Cao, Runze Dong, Tianhao Cheng:
Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT. ICCT 2022: 952-956 - [c8]Kunrui Cao, Buhong Wang:
NOMA aided Semi-Grant-Free Transmission: A Security Perspective. ISNCC 2022: 1-7 - [c7]Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao:
Secure Transmission of IRS-assisted A2G Multiuser Communication System with Hardware Impairments. WCSP 2022: 1046-1051 - 2021
- [j14]Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Rongxiao Guo:
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems. IEEE Internet Things J. 8(2): 1001-1015 (2021) - [j13]Kunrui Cao, Buhong Wang, Haiyang Ding, Lu Lv, Runze Dong, Tianhao Cheng, Fengkui Gong:
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers. IEEE Trans. Inf. Forensics Secur. 16: 786-799 (2021) - [j12]Kunrui Cao, Buhong Wang, Haiyang Ding, Lu Lv, Jiwei Tian, Hang Hu, Fengkui Gong:
Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems. IEEE Trans. Veh. Technol. 70(2): 1978-1983 (2021) - [j11]Runze Dong, Buhong Wang, Kunrui Cao:
Deep Learning Driven 3D Robust Beamforming for Secure Communication of UAV Systems. IEEE Wirel. Commun. Lett. 10(8): 1643-1647 (2021) - [c6]Runze Dong, Buhong Wang, Kunrui Cao, Tianhao Cheng, Danyu Diao:
Hybrid Beamforming Design for Securing Large-Scale Antenna Array Empowered UAV Communication System. WCSP 2021: 1-5 - 2020
- [j10]Fute Shang, Buhong Wang, Tengyao Li, Jiwei Tian, Kunrui Cao:
CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems. IEEE Access 8: 166951-166962 (2020) - [j9]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Dynamic temporal ADS-B data attack detection based on sHDP-HMM. Comput. Secur. 93: 101789 (2020) - [j8]Runze Dong, Buhong Wang, Kunrui Cao, Xia Li:
Secrecy precoding in MIMOME wireless communication system under partial CSI. IET Commun. 14(13): 2202-2209 (2020) - [j7]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Threat model and construction strategy on ADS-B attack data. IET Inf. Secur. 14(5): 542-552 (2020) - [j6]Kunrui Cao, Buhong Wang, Haiyang Ding, Lu Lv, Jiwei Tian, Fengkui Gong:
On the Security Enhancement of Uplink NOMA Systems With Jammer Selection. IEEE Trans. Commun. 68(9): 5747-5763 (2020) - [j5]Kunrui Cao, Buhong Wang, Haiyang Ding, Tengyao Li, Jiwei Tian, Fengkui Gong:
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping. IEEE Trans. Inf. Forensics Secur. 15: 2930-2943 (2020) - [j4]Kunrui Cao, Buhong Wang, Haiyang Ding, Tengyao Li, Fengkui Gong:
Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users. IEEE Trans. Veh. Technol. 69(2): 1942-1955 (2020) - [j3]Fute Shang, Buhong Wang, Tengyao Li, Jiwei Tian, Kunrui Cao, Rongxiao Guo:
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection. IEEE Wirel. Commun. Lett. 9(10): 1734-1737 (2020) - [c5]Kunrui Cao, Buhong Wang, Haiyang Ding, Fengkui Gong, Hang Hu, Jiwei Tian, Tianhao Cheng:
Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems. WCSP 2020: 801-806
2010 – 2019
- 2019
- [j2]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Online sequential attack detection for ADS-B data based on hierarchical temporal memory. Comput. Secur. 87 (2019) - [j1]Kunrui Cao, Buhong Wang, Haiyang Ding, Jiwei Tian:
Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks. IEEE Wirel. Commun. Lett. 8(5): 1316-1319 (2019) - [c4]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
ADS-B Data Attack Detection Based on Generative Adversarial Networks. CSS (1) 2019: 323-336 - [c3]Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li:
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning. CSS (1) 2019: 337-347 - [c2]Jiwei Tian, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li, Mete Ozay:
Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems. SmartGridComm 2019: 1-6 - 2016
- [c1]Kunrui Cao, Haiyang Ding, Zhongshan Fan:
Wireless information and power transfer in interference-limited two-way relaying system. ICCC 2016: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint