default search action
Guyue Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Honghai Tang, Guyue Li, Tao Guo, Aiqun Hu:
A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS. IEEE Commun. Lett. 28(4): 783-787 (2024) - [j36]Hao Xu, Kai-Kit Wong, Wee-Kiat New, Guyue Li, Farshad Rostami Ghadi, Yongxu Zhu, Shi Jin, Chan-Byoung Chae, Yangyang Zhang:
Coding-Enhanced Cooperative Jamming for Secret Communication in Fluid Antenna Systems. IEEE Commun. Lett. 28(9): 1991-1995 (2024) - [j35]Guyue Li, Yiyun Ma, Wenhao Wang, Junqing Zhang, Hongyi Luo:
The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting. IEEE Internet Things J. 11(10): 18824-18838 (2024) - [j34]Xiaowei Yuan, Yu Jiang, Guyue Li, Aiqun Hu:
Wireless Channel Key Generation Based on Multisubcarrier Phase Difference. IEEE Internet Things J. 11(20): 32939-32955 (2024) - [j33]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. IEEE Trans. Inf. Forensics Secur. 19: 5090-5105 (2024) - [j32]Jianhuan Wang, Shang Gao, Guyue Li, Keke Gai, Bin Xiao:
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks. IEEE Trans. Inf. Forensics Secur. 19: 9115-9128 (2024) - [j31]Yicong Du, Huan Dai, Hongbo Liu, Yan Wang, Guyue Li, Yanzhi Ren, Yingying Chen, Ke Zhang:
Secret Key Generation Based on Manipulated Channel Measurement Matching. IEEE Trans. Mob. Comput. 23(10): 9532-9548 (2024) - [j30]Zechen Zhang, Guyue Li, Jitong Shi, Haobo Li, Aiqun Hu:
Real-World Aircraft Recognition Based on RF Fingerprinting With Few Labeled ADS-B Signals. IEEE Trans. Veh. Technol. 73(2): 2866-2871 (2024) - [j29]Xinwei Zhang, Guyue Li, Junqing Zhang, Linning Peng, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. IEEE Trans. Veh. Technol. 73(7): 10135-10149 (2024) - [j28]Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. IEEE Trans. Wirel. Commun. 23(3): 2153-2166 (2024) - [j27]Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang:
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. IEEE Wirel. Commun. 31(1): 118-124 (2024) - [j26]Lei Hu, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation. IEEE Wirel. Commun. Lett. 13(2): 417-421 (2024) - [c30]Zhonghao Liu, Xinwei Zhang, Guyue Li, Helei Cui, Jiaheng Wang, Bin Xiao:
A Secure and Reliable Blockchain-based Audit Log System. ICC 2024: 2010-2015 - [i16]Hao Xu, Kai-Kit Wong, Wee-Kiat New, Guyue Li, Farshad Rostami Ghadi, Yongxu Zhu, Shi Jin, Chan-Byoung Chae, Yangyang Zhang:
Coding-Enhanced Cooperative Jamming for Secret Communication in Fluid Antenna Systems. CoRR abs/2407.02400 (2024) - 2023
- [j25]Lei Hu, Chen Sun, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems. IEEE Trans. Commun. 71(11): 6499-6513 (2023) - [j24]Yilun Sun, Guyue Li, Hongyi Luo, Yuexiu Xing, Shuping Dang, Aiqun Hu:
Location-Invariant Radio Frequency Fingerprint for Base Station Recognition. IEEE Wirel. Commun. Lett. 12(9): 1583-1587 (2023) - [c29]Hongyi Luo, Guyue Li, Yuexiu Xing, Junqing Zhang, Aiqun Hu, Xianbin Wang:
RelativeRFF: Multi-Antenna Device Identification in Multipath Propagation Scenarios. ICC 2023: 3708-3713 - [c28]Zhonghao Liu, Xinwei Zhang, Laphou Lao, Guyue Li, Bin Xiao:
DBE-voting: A Privacy-Preserving and Auditable Blockchain-Based E-Voting System. ICC 2023: 6571-6577 - [c27]Haixi Sun, Guyue Li, Haoyu Li, Aiqun Hu, Yexia Cheng, Ye Tian, Shen He:
A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI. ICCC 2023: 1-6 - [c26]Qingchun Meng, Guyue Li, Jitong Shi, Aiqun Hu:
Enhancing RF Fingerprinting with a Simulated Attack Detection Strategy for Few Labeled Signals. ICCT 2023: 281-285 - [c25]Haoyu Li, Guyue Li, Lei Hu, Aiqun Hu, Derrick Wing Kwan Ng:
RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift Optimization. VTC Fall 2023: 1-5 - [i15]Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang:
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. CoRR abs/2301.01453 (2023) - [i14]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation. CoRR abs/2303.07015 (2023) - [i13]Lei Hu, Chen Sun, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems. CoRR abs/2303.12455 (2023) - [i12]Wenhao Wang, Guyue Li, Zhiming Chu, Haobo Li, Daniele Faccio:
Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks. CoRR abs/2311.10389 (2023) - 2022
- [j23]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 9(8): 6081-6094 (2022) - [j22]Guyue Li, Chen Sun, Wei Xu, Marco Di Renzo, Aiqun Hu:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. IEEE Trans. Inf. Forensics Secur. 17: 211-225 (2022) - [j21]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? IEEE Wirel. Commun. 29(4): 146-153 (2022) - [c24]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. GLOBECOM 2022: 2352-2357 - [c23]Zhichao Huang, Guyue Li, Aiqun Hu, Jiabao Yu, Siyun Wu:
Recognizing Automotive Ethernet Device by Extracting Fingerprint from Power Spectrum. ICCT 2022: 1442-1446 - [c22]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. INFOCOM 2022: 1-10 - [c21]Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao:
Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. TrustCom 2022: 921-926 - [c20]Yujie Hou, Guyue Li, Shuping Dang, Lei Hu, Aiqun Hu:
Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation. VTC Fall 2022: 1-5 - [i11]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. CoRR abs/2207.11752 (2022) - [i10]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. CoRR abs/2211.03065 (2022) - [i9]Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. CoRR abs/2211.03132 (2022) - 2021
- [j20]Guyue Li, Zheying Zhang, Junqing Zhang, Aiqun Hu:
Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet Things J. 8(1): 357-369 (2021) - [j19]Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu:
A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition. IEEE Internet Things J. 8(14): 11276-11289 (2021) - [j18]Yang Yang, Aiqun Hu, Jiabao Yu, Guyue Li, Zhen Zhang:
Radio frequency fingerprint identification based on stream differential constellation trace figures. Phys. Commun. 49: 101458 (2021) - [j17]Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. IEEE Trans. Inf. Forensics Secur. 16: 968-982 (2021) - [j16]Guyue Li, Yinghao Xu, Wei Xu, Eduard A. Jorswieck, Aiqun Hu:
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications. IEEE Trans. Inf. Forensics Secur. 16: 5264-5278 (2021) - [j15]Yuexiu Xing, Ting Wang, Fen Zhou, Aiqun Hu, Guyue Li, Linning Peng:
EVAL Cane: Nonintrusive Monitoring Platform With a Novel Gait-Based User-Identification Scheme. IEEE Trans. Instrum. Meas. 70: 1-15 (2021) - [c19]Yinghao Xu, Aiqun Hu, Guyue Li:
LOBBY: A Novel Physical-layer Key Generation Method. ICCBN 2021: 295-299 - [c18]Lei Hu, Guyue Li, Hongyi Luo, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. VTC Fall 2021: 1-5 - [c17]Hongyi Luo, Guyue Li, Lei Hu:
On the Security of RIS-assisted Manipulating Attack in MISO systems. VTC Fall 2021: 1-5 - [c16]Xinwei Zhang, Guyue Li, Zongyue Hou, Aiqun Hu:
Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network. VTC Fall 2021: 1-6 - [i8]You Chen, Guyue Li, Cunhua Pan, Lei Hu, Aiqun Hu:
Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network. CoRR abs/2105.00511 (2021) - [i7]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems. CoRR abs/2105.08364 (2021) - [i6]Lei Hu, Guyue Li, Hongyi Luo, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. CoRR abs/2108.05497 (2021) - [i5]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. CoRR abs/2112.02273 (2021) - [i4]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? CoRR abs/2112.10043 (2021) - 2020
- [j14]Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo:
A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels. IEEE Access 8: 138406-138446 (2020) - [j13]Chen Sun, Guyue Li:
Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation. IEEE Access 8: 164580-164592 (2020) - [j12]Chen Sun, Haiyu Yang, Guyue Li:
AmpRmdr: Remainder-Based Secret Key Generation Using Wireless Channel Amplitude. IEEE Access 8: 228178-228187 (2020) - [j11]Yuexiu Xing, Aiqun Hu, Junqing Zhang, Jiabao Yu, Guyue Li, Ting Wang:
Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar. IEEE Internet Things J. 7(10): 10581-10593 (2020) - [c15]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. ICC 2020: 1-6 - [c14]Chuan He, Yinghao Xu, Jitong Shi, Chongqing Lei, Guyue Li:
Detection Algorithm of the Mimicry Attack and Its Implementation in the ZigBee Platform. ICCT 2020: 1083-1088 - [i3]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. CoRR abs/2005.08476 (2020) - [i2]Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. CoRR abs/2009.09142 (2020)
2010 – 2019
- 2019
- [j10]Guyue Li, Jiabao Yu, Yuexiu Xing, Aiqun Hu:
Location-Invariant Physical Layer Identification Approach for WiFi Devices. IEEE Access 7: 106974-106986 (2019) - [j9]Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao, Aiqun Hu:
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 21(5): 497 (2019) - [j8]Guyue Li, Zheying Zhang, Yi Yu, Aiqun Hu:
A Hybrid Information Reconciliation Method for Physical Layer Key Generation. Entropy 21(7): 688 (2019) - [j7]Boqian Liu, Aiqun Hu, Guyue Li:
Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems. IEEE Commun. Lett. 23(9): 1493-1496 (2019) - [j6]Jiabao Yu, Aiqun Hu, Guyue Li, Linning Peng:
A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network. IEEE Internet Things J. 6(4): 6786-6799 (2019) - [j5]Linning Peng, Guyue Li, Junqing Zhang, Roger F. Woods, Ming Liu, Aiqun Hu:
An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation. IEEE Trans. Mob. Comput. 18(3): 507-519 (2019) - [j4]Junqing Zhang, Ming Ding, Guyue Li, Alan Marshall:
Key Generation Based on Large Scale Fading. IEEE Trans. Veh. Technol. 68(8): 8222-8226 (2019) - [c13]Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu:
Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification. CNS 2019: 196-204 - [c12]Guyue Li, Liangjun Hu, Aiqun Hu:
Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks. ICC Workshops 2019: 1-6 - [c11]Li Yao, Linning Peng, Guyue Li, Hua Fu, Aiqun Hu:
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels. ICCT 2019: 113-117 - [c10]Yufan Wang, Linning Peng, Hua Fu, Guyue Li, Aiqun Hu:
Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System. ICCT 2019: 270-275 - [c9]Zheying Zhang, Guyue Li, Aiqun Hu:
An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation. VTC Spring 2019: 1-5 - [c8]Yuexiu Xing, Aiqun Hu, Jiabao Yu, Guyue Li, Linning Peng, Fen Zhou:
A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars. WiMob 2019: 1-6 - [c7]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. WiMob 2019: 1-6 - [i1]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. CoRR abs/1907.08809 (2019) - 2018
- [j3]Yuexiu Xing, Aiqun Hu, Junqing Zhang, Linning Peng, Guyue Li:
On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios. IEEE Commun. Lett. 22(11): 2326-2329 (2018) - [j2]Guyue Li, Aiqun Hu, Chen Sun, Junqing Zhang:
Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems. IEEE Commun. Lett. 22(12): 2487-2490 (2018) - [j1]Guyue Li, Aiqun Hu, Junqing Zhang, Linning Peng, Chen Sun, Daming Cao:
High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing. IEEE Trans. Commun. 66(7): 3022-3034 (2018) - [c6]Linning Peng, Guyue Li, Junqing Zhang, Aiqun Hu:
Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels. GLOBECOM Workshops 2018: 1-6 - 2017
- [c5]Guyue Li, Aiqun Hu, Junqing Zhang, Bin Xiao:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. GLOBECOM 2017: 1-6 - 2016
- [c4]Guyue Li, Aiqun Hu, Linning Peng, Chen Sun:
The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements. GLOBECOM Workshops 2016: 1-6 - 2015
- [c3]Guyue Li, Aiqun Hu, Yaning Zou, Linning Peng, Mikko Valkama:
A Novel Transform for Secret Key Generation in Time-Varying TDD Channel under Hardware Fingerprint Deviation. VTC Fall 2015: 1-5 - 2014
- [c2]Guyue Li, Zhaoquan Gu, Xiao Lin, Haosen Pu, Qiang-Sheng Hua:
Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks. MSWiM 2014: 313-320 - 2013
- [c1]Mingfu Xue, Aiqun Hu, Yi Huang, Guyue Li:
Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection. DASC 2013: 131-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint