default search action
Jie Tang 0005
Person information
- affiliation: George Mason University, Fairfax, VA, USA
- affiliation: University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, China
Other persons with the same name
- Jie Tang — disambiguation page
- Jie Tang 0001 — Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Jie Tang 0002 — South China University of Technology, School of Electronic and Information Engineering, Guangzhou, China (and 2 more)
- Jie Tang 0003 — South China University of Technology, School of Computer Science and Engineering, Guangzhou, China (and 2 more)
- Jie Tang 0004 — Chinese Academy of Sciences, Shanghai Advanced Research Institute, China
- Jie Tang 0006 — Nanjing University, Department of Computer Science and Technology, tate Key Laboratory for Novel Software Technology, Nanjing, China
- Jie Tang 0007 — Nanjing University of Information Science and Technology, School of Management Science and Engineering, China (and 1 more)
- Jie Tang 0008 — Airbnb Inc., San Francisco, CA, USA
- Jie Tang 0009 — East China Jiaotong University, School of Information Engineering, Nanchang, China
- Jie Tang 0010 — Sichuan Vocational and Technical College of Communications, Department of Rail Transit, Chengdu, China
- Jie Tang 0011 — Beijing University of Posts and Telecommunications, School of Economics and Management, Beijing, China (and 1 more)
- Jie Tang 0012 — University of Hong Kong (and 1 more)
- Jie Tang 0013 — Wuhan Fourth Hospital, Department of Orthopaedics, Wuhan, China
- Jie Tang 0014 — Capital Medical University, Xuanwu Hospital, Department of Neurosurgery, Beijing, China
- Jie Tang 0015 — National University of Defense Technology, College of Intelligence Science, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]Huanhuan Song, Hong Wen, Jie Tang, Pin-Han Ho, Runhui Zhao:
Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications. IEEE Internet Things J. 10(5): 4462-4474 (2023) - [j28]Tengyue Zhang, Hong Wen, Yixin Jiang, Jie Tang:
Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing. IEEE Internet Things J. 10(10): 8996-9006 (2023) - [j27]Lin Hu, Shuai Tan, Hong Wen, Jinsong Wu, Jiabing Fan, Songlin Chen, Jie Tang:
Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 18: 3692-3705 (2023) - [i2]Lin Hu, Jiabing Fan, Hong Wen, Jie Tang, Qianbin Chen:
Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure. CoRR abs/2305.19574 (2023) - 2022
- [j26]Jie Tang, Hong Wen, Huanhuan Song:
Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity. IET Commun. 16(3): 206-217 (2022) - [j25]Jie Tang, Hong Wen, Huan-Huan Song, Long Jiao, Kai Zeng:
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices. IEEE Internet Things J. 9(16): 15228-15239 (2022) - [j24]Yi Chen, Kadhim Hayawi, Qian Zhao, Junjie Mou, Ling Yang, Jie Tang, Qing Li, Hong Wen:
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors 22(18): 6789 (2022) - [j23]Yi Chen, Kadhim Hayawi, Meikai Fan, Shih Yu Chang, Jie Tang, Ling Yang, Rui Zhao, Zhongqi Mao, Hong Wen:
A Bilevel Optimization Model Based on Edge Computing for Microgrid. Sensors 22(20): 7710 (2022) - [j22]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kannan Govindan, Daniel Wu, Prasant Mohapatra:
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks. IEEE Trans. Mob. Comput. 21(5): 1657-1671 (2022) - 2021
- [j21]Huanhuan Song, Hong Wen, Qicong Yang, Jie Tang, Yi Chen, Tengyue Zhang, FeiYi Xie, Songlin Chen:
Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS. IEEE Access 9: 27287-27297 (2021) - [j20]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kaiyu Qin:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. IEEE Trans. Inf. Forensics Secur. 16: 466-481 (2021) - [j19]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, FeiYi Xie:
Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection. IEEE Trans. Ind. Informatics 17(7): 4999-5009 (2021) - [c15]Jie Tang, Hong Wen, Huanhuan Song, Rui-Fei Wang:
On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission. ICCT 2021: 852-857 - 2020
- [j18]Runfa Liao, Hong Wen, Songlin Chen, FeiYi Xie, Fei Pan, Jie Tang, Huanhuan Song:
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet Things J. 7(3): 2077-2088 (2020) - [j17]Jie Tang, Hong Wen, Huanhuan Song, Tengyue Zhang, Kaiyu Qin:
On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things. IEEE Internet Things J. 7(10): 10635-10649 (2020) - [j16]Huanhuan Song, Hong Wen, Jie Tang, Yi Chen, FeiYi Xie, Runfa Liao, Songlin Chen:
PLS-Based Secrecy Transmission for VANETs. IEEE Trans. Veh. Technol. 69(7): 7596-7608 (2020) - [j15]Jie Tang, Hong Wen, Huanhuan Song, Kai Zeng, Kaiyu Qin:
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas. IEEE Trans. Veh. Technol. 69(10): 11077-11089 (2020) - [c14]Xiaochen Wang, Tingsong Xiao, Jie Tang, Deqiang Ouyang, Jie Shao:
MRMRP: Multi-source Review-Based Model for Rating Prediction. DASFAA (2) 2020: 20-35
2010 – 2019
- 2019
- [j14]Gao Yuan Zhang, Hong Wen, Longye Wang, Liang Song, Jie Tang, Runfa Liao:
Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers. IET Commun. 13(2): 186-197 (2019) - [j13]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, Runfa Liao, Yi Chen, Yixin Jiang:
Analysis of the physical layer security enhancing of wireless communication system under the random mobile. IET Commun. 13(9): 1164-1170 (2019) - [j12]Jie Tang, Hong Wen, Kai Zeng, Runfa Liao, Fei Pan, Lin Hu:
Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks. IEEE Netw. 33(5): 126-133 (2019) - [j11]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. IEEE Wirel. Commun. 26(5): 48-54 (2019) - [c13]Ning Wang, Jie Tang, Kai Zeng:
Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication. CNS 2019: 1-5 - [i1]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. CoRR abs/1908.10362 (2019) - 2018
- [j10]Gao Yuan Zhang, Hong Wen, Longye Wang, Xiaoli Zeng, Jie Tang, Runfa Liao, Liang Song:
Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1975-1979 (2018) - [j9]Lin Hu, Hong Wen, Bin Wu, Fei Pan, Runfa Liao, Huanhuan Song, Jie Tang, Xiumin Wang:
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 5(1): 219-228 (2018) - [j8]Gao Yuan Zhang, Hong Wen, Longye Wang, Ping Xie, Liang Song, Jie Tang, Runfa Liao:
Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks. Sensors 18(1): 52 (2018) - [j7]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan, Runfa Liao:
Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers. IEEE Trans. Veh. Technol. 67(3): 2108-2117 (2018) - [j6]Jie Tang, Monireh Dabaghchian, Kai Zeng, Hong Wen:
Impact of Mobility on Physical Layer Security Over Wireless Fading Channels. IEEE Trans. Wirel. Commun. 17(12): 7849-7864 (2018) - [c12]Long Jiao, Jie Tang, Kai Zeng:
Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel. CNS 2018: 1-9 - [c11]Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen:
Mobility Improves NOMA Physical Layer Security. GLOBECOM 2018: 1-6 - 2017
- [j5]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan:
Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks. IEEE Commun. Lett. 21(3): 524-527 (2017) - [j4]Gao Yuan Zhang, Hong Wen, Jiexin Pu, Jie Tang:
Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding. IET Commun. 11(11): 1808-1814 (2017) - [c10]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan, Zhengguang Zhang, Yixin Jiang, Aidong Xu:
Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers. VTC Fall 2017: 1-5 - [c9]Jie Tang, Hong Wen, Kai Zeng, Lin Hu, Song-Lin Chen:
Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code. VTC Fall 2017: 1-5 - 2016
- [j3]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan:
Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks. IEEE Access 4: 5607-5623 (2016) - [j2]Jie Tang, Hong Wen, Lin Hu, Huanhuan Song, Gao Yuan Zhang, Fei Pan, Hongbin Liang:
Associating MIMO beamforming with security codes to achieve unconditional communication security. IET Commun. 10(12): 1522-1531 (2016) - [c8]Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:
The performance of the MIMO physical layer security system with imperfect CSI. CNS 2016: 346-347 - [c7]Lin Hu, Bin Wu, Jie Tang, Fei Pan, Hong Wen:
Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming. ICC 2016: 1-5 - 2015
- [j1]Hong Wen, Jie Tang, Jinsong Wu, Huanhuan Song, Tingyong Wu, Bin Wu, Pin-Han Ho, Shichao Lv, Li-Min Sun:
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE Trans. Emerg. Top. Comput. 3(1): 119-126 (2015) - [c6]Qiyi Han, Runfa Liao, Jie Tang:
Rumor spreading in interdependent social networks. ICCC Workshops 2015: 17-21 - [c5]Fei Pan, Hong Wen, Huanhuan Song, Tang Jie, Longye Wang:
5G security architecture and light weight security authentication. ICCC Workshops 2015: 94-98 - [c4]Jie Tang, Hong Wen, Huanhuan Song, Fei Pan:
Combining MIMO beamforming with security codes to achieve unconditional communication security. ICCC Workshops 2015: 105-109 - [c3]Lin Hu, Hong Wen, Jie Tang, Zhen-Qing He, Jian Su:
Joint cooperative jamming and beamforming for secure transmission in two-cell networks. ICCC Workshops 2015: 110-114 - 2014
- [c2]Jie Tang, Huanhuan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen:
A MIMO cross-layer precoding security communication system. CNS 2014: 500-501 - 2013
- [c1]Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A novel detection scheme for malicious nodes in smart meter system. CNS 2013: 379-380
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint