
He Fang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j19]Rushan Lin, Li Xu
, He Fang, Chuan Huang:
Efficient physical layer key generation technique in wireless communications. EURASIP J. Wirel. Commun. Netw. 2020(1): 13 (2020) - [j18]Zhenlong Xiao
, He Fang
, Xianbin Wang
:
Nonlinear Polynomial Graph Filter for Anomalous IoT Sensor Detection and Localization. IEEE Internet Things J. 7(6): 4839-4848 (2020) - [j17]He Fang, Angie Qi, Xianbin Wang:
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement. IEEE Netw. 34(3): 24-29 (2020) - [j16]He Fang
, Xianbin Wang
, Lajos Hanzo
:
Adaptive Trust Management for Soft Authentication and Progressive Authorization Relying on Physical Layer Attributes. IEEE Trans. Commun. 68(4): 2607-2620 (2020) - [j15]He Fang
, Xianbin Wang
, Li Xu
:
Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach. IEEE Trans. Wirel. Commun. 19(8): 5420-5432 (2020) - [c5]Ritambhara Singh, Pinar Demetci, Giancarlo Bonora, Vijay Ramani, Choli Lee, He Fang, Zhi-jun Duan, Xinxian Deng, Jay Shendure, Christine Disteche, William Stafford Noble:
Unsupervised manifold alignment for single-cell multi-omics data. BCB 2020: 40:1-40:10 - [c4]Qichao Lai, Li Xu, Manli Yuan, Feng Wang, He Fang:
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid. SPDE 2020: 676-691
2010 – 2019
- 2019
- [j14]Chenbin Zhao, Li Xu
, Jiguo Li, Feng Wang
, He Fang:
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage. IEEE Access 7: 160459-160471 (2019) - [j13]Guosheng Zhang
, Biao Zhang, William Perrie
, Yijun He
, Haiyan Li
, He Fang, K. Shahid Khurshid
, Kerri Warner:
C-Band Right-Circular Polarization Ocean Wind Retrieval. IEEE Geosci. Remote. Sens. Lett. 16(9): 1398-1401 (2019) - [j12]He Fang, William Perrie, Guosheng Zhang
, Xie Tao, K. Shahid Khurshid
, Kerri Warner, Jingsong Yang
, Yijun He
:
Ocean Surface Wind Speed Retrieval Using Simulated RADARSAT Constellation Mission Compact Polarimetry SAR Data. Remote. Sens. 11(16): 1876 (2019) - [j11]He Fang
, Xianbin Wang
, Lajos Hanzo
:
Learning-Aided Physical Layer Authentication as an Intelligent Process. IEEE Trans. Commun. 67(3): 2260-2273 (2019) - [j10]He Fang, Xianbin Wang, Stefano Tomasin:
Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks. IEEE Wirel. Commun. 26(5): 55-61 (2019) - [i3]He Fang, Xianbin Wang, Stefano Tomasin:
Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks. CoRR abs/1907.00429 (2019) - [i2]He Fang, Angie Qi, Xianbin Wang:
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? CoRR abs/1907.12092 (2019) - 2018
- [j9]He Fang, Xie Tao, William Perrie, Guosheng Zhang
, Jingsong Yang
, Yijun He
:
Comparison of C-Band Quad-Polarization Synthetic Aperture Radar Wind Retrieval Models. Remote. Sens. 10(9): 1448 (2018) - [j8]He Fang, Li Xu, Xianbin Wang
:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. IEEE Trans. Inf. Forensics Secur. 13(1): 197-209 (2018) - [j7]He Fang
, Li Xu
, Yulong Zou
, Xianbin Wang
, Kim-Kwang Raymond Choo
:
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication. IEEE Trans. Veh. Technol. 67(11): 10788-10799 (2018) - [c3]Jiyang Bai, He Fang, Junghoon Suh, Osama Aboul-Magd, Edward Au, Xianbin Wang
:
Adaptive Uplink OFDMA Random Access Grouping Scheme for Ultra-Dense Networks in IEEE 802.11ax. ICCC 2018: 34-39 - [i1]He Fang, Xianbin Wang, Lajos Hanzo:
Learning-Aided Physical Layer Authentication as an Intelligent Process. CoRR abs/1808.02456 (2018) - 2017
- [j6]He Fang, Li Xu, Kim-Kwang Raymond Choo
:
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput. 296: 153-167 (2017) - [j5]He Fang, Li Xu, Jie Li, Kim-Kwang Raymond Choo
:
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks. Comput. Commun. 105: 124-132 (2017) - [j4]He Fang, Xie Tao, William Perrie, Li Zhao, Jingsong Yang
, Yijun He
:
Ocean Wind and Current Retrievals Based on Satellite SAR Measurements in Conjunction with Buoy and HF Radar Data. Remote. Sens. 9(12): 1321 (2017) - [j3]He Fang, Li Xu, Xinyi Huang:
Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput. 21(4): 907-921 (2017) - 2016
- [j2]He Fang, Li Xu, Liang Xiao:
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks. Concurr. Comput. Pract. Exp. 28(10): 2958-2977 (2016) - [j1]Li Xu, He Fang, Zhiwei Lin:
Evolutionarily stable opportunistic spectrum access in cognitive radio networks. IET Commun. 10(17): 2290-2299 (2016) - [c2]Xie Tao, Li Zhao, Yijun He, He Fang:
Effects of current on electromagnetic scattering signal from one dimensional sea surface. IGARSS 2016: 2676-2679 - 2013
- [c1]He Fang, Li Xu, Chuan Huang:
Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network. MSN 2013: 127-132
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-14 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint