已发表成果:
WOK 论文 192 篇;中文核心 10 篇;其它论文 4 篇;专利发明 10 个;图书及章节 1 本;
Learning-Based Reliable and Secure Transmission for UAV-RIS-Assisted Communication Systems
Intelligent Weighted Energy Consumption and Delay Optimization for UAV-Assisted MEC Under Malicious Jamming
Intelligent Semantic Location Privacy Protection Method for Location Based Services in Three-Dimensional Spaces
Efficient Beacon-Aided AUV Localization: A Reinforcement Learning Based Approach
Pareto-Optimal Aerial-Ground Energy Minimization for Aerial 3D Mobile Edge Computing Networks
Penalized Reinforcement Learning-Based Energy-Efficient UAV-RIS Assisted Maritime Uplink Communications Against Jamming
Reinforcement Learning Based Energy-Efficient Fast Routing for FANETs
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications
Security Performance Analysis of Single-User Downlink Communication Based on Double-RIS
Learning-Based Resource Management Optimization for UAV-Assisted MEC Against Jamming
Semantic Adaptive Geo-Indistinguishability for Location Privacy Protection in Mobile Networks
Efficient Communications in Multi-Agent Reinforcement Learning for Mobile Applications
Reinforcement Learning Based QoS-Aware Anti-jamming Underwater Video Transmission
Energy-Efficient Anti-Jamming Metaverse Resource Allocation Based on Reinforcement Learning
Risk-Aware Reinforcement Learning Based Federated Learning Framework for IoV
Compound-Protein Interaction Prediction with Sparse Perturbation-Aware Attention
Risk-Aware Reinforcement Learning-Based Federated Learning for IoV Systems
Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
UAV-Powered Multi-User Intelligent Reflecting Surface Backscatter Communication
Evolutionary trends of intelligent IoT networking for commercial and industrial use cases
Real-Time DDoS Defense in 5G-Enabled IoT: A Multidomain Collaboration Perspective
Reinforcement Learning Based AUV Localization in Underwater Acoustic Sensor Networks
Collaborative Inference for MEC Services Based on Multimodal Deep Neural Network
Deep Reinforcement Learning for Network Security Applications With A Safety Guide
Energy Harvesting Assisted Intelligent Computation Offloading Method for the IoT in Mining
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation
Reinforcement Learning based UAV Swarm Communications Against Jamming
Cooperative Non-Orthogonal Broadcast and Unicast Transmission for Integrated Satellite-Terrestrial Network
Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G
Redistillation of Radio Frequency Knowledge for RFF Imbalanced Sample Recognition
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming
An Advanced Integrated Visible Light Communication and Localization System
Reinforcement Learning based Energy-Efficient Routing with Latency Constraints for FANETs
Energy and Latency-Aware Resource Management for UAV-Assisted Mobile Edge Computing Against Jamming
Reliable Communications for Hypersonic Vehicles: A Reinforcement Learning Approach
Multi-Agent Reinforcement Learning for Wireless Networks Against Adversarial Communications
Efficient Communications for Multi-Agent Reinforcement Learning in Wireless Networks
Joint Trajectory Optimization and Power Control for Cognitive UAV-Assisted Secure Communications
Reinforcement Learning Based Friendly Jamming for Digital Twins Against Active Eavesdropping
Broadcast Secrecy Rate Maximization in UAV-Empowered IRS Backscatter Communications
Edge Intelligence for 6G Networks
Edge Intelligence for 6G Networks
Edge intelligence for 6G networks
Lead federated neuromorphic learning for wireless edge artificial intelligence
3D Geo-Indistinguishability for Indoor Location-Based Services
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming
IRS-Aided Energy-Efficient Secure WBAN Transmission Based on Deep Reinforcement Learning
Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure
Distributed Deep Reinforcement Learning-Based Spectrum and Power Allocation for Heterogeneous Networks
Safe Reinforcement Learning-based Indoor 3D Location Privacy Protection
Smart Grid Worm Detection Based on Deep Reinforcement Learning
Reinforcement Learning Based Energy-Efficient Collaborative Inference for Mobile Edge Computing
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks
Environment-Aware Reinforcement Learning Based VANET Communications Against Jamming and Interference
Energy-Efficient Collaborative Inference in MEC: A Multi-Agent Reinforcement Learning Based Approach
WIRELESS SECURITY CHALLENGES AND COUNTER MEASURES FOR DYNAMIC SPECTRUM SHARING
Reinforcement Learning Based Energy Efficient Underwater Passive Localization of Hidden Mobile Node
LEARNING-BASED LOW-LATENCY VIOT VIDEO STREAMING AGAINST JAMMING AND INTERFERENCE
Learning based efficient federated learning for object detection in MEC against jamming
Reinforcement learning based accurate detection of malicious URLs with multi-feature analysis
Reinforcement Learning Based Fast Worm Detection for Smart Grids
Defense against Advanced Persistent Threats in Smart Grids: A Reinforcement Learning Approach
Reinforcement Learning Based Vulnerability Analysis of Data Injection Attack for Smart Grids
Distributed reinforcement learning based framework for energy-efficient UAV relay against jamming
Reinforcement Learning-Based Sensitive Semantic Location Privacy Protection for VANETs
Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation
UAV Anti-Jamming Video Transmissions With QoE Guarantee: A Reinforcement Learning-Based Approach
Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks
Reinforcement Learning Based Sensor Encryption and Power Control for Low-Latency WBANs
DDoS Defense for IoT: A Stackelberg Game Model-Enabled Collaborative Framework
UAV-Aided Anti-Jamming Maritime Communications: A Deep Reinforcement Learning Approach
3D Beamforming Based on Deep Learning for Secure Communication in 5G and beyond Wireless Networks
Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach
Reinforcement learning based energy-efficient internet-of-things video transmission
Reinforcement Learning Based Energy Efficient Underwater Localization
Reinforcement Learning-Based Mobile Offloading for Edge Computing Against Jamming and Interference
Heterogeneous Edge Offloading With Incomplete Information: A Minority Game Approach
A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks
UAV-AIDED CELLULAR COMMUNICATIONS WITH DEEP REINFORCEMENT LEARNING AGAINST JAMMING
Reinforcement-Learning-Based Relay Mobility and Power Allocation for Underwater Sensor Networks Against Jamming
Auto-generating neural networks with reinforcement learning for multi-purpose image forensics
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis
Energy Efficient Relay in UAV Networks Against Jamming: A Reinforcement Learning Based Approach
Reinforcement Learning Based PHY Authentication for VANETs
Reinforcement Learning-Based Downlink Interference Control for Ultra-Dense Small Cells
DeepFusion: predicting movie popularity via cross-platform feature fusion
Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT Systems
Reinforcement Learning Based Efficient Underwater Image Communication
ELECTRIC NETWORK FREQUENCY BASED AUDIO FORENSICS USING CONVOLUTIONAL NEURAL NETWORKS
Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications
Reinforcement Learning-Based Microgrid Energy Trading With a Reduced Power Plant Schedule
Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping
Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing
Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach
Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting
Reinforcement Learning with Safe Exploration for Network Security
Protecting Semantic Trajectory Privacy for VANET with Reinforcement Learning
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning
Learning Based Security for VANET with Blockchain
SMDP based cross-area resource management for vehicular cloud networks
Impulsive Noise Recovery and Elimination: A Sparse Machine Learning Based Approach
Reinforcement Learning-Based Interference Control for Ultra-Dense Small Cells
Learning Based Power Control for mmWave Massive MIMO against Jamming
Reinforcement Learning Based Power Control for VANET Broadcast against Jamming
Dissecting campus wifi connections in an empirical view
Learning-Based Computation Offloading for IoT Devices With Energy Harvesting
Towards Smart Educational Recommendations with Reinforcement Learning in Classroom
Learning-Based PHY-Layer Authentication for Underwater Sensor Networks
Reinforcement Learning-Based Adaptive Modulation and Coding for Efficient Underwater Communications
Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming
Secure Mobile Crowdsensing Based on Deep Learning
IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Learning-Based Defense against Malicious Unmanned Aerial Vehicles
DQN-based power control for iot transmission against jamming
Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement Learning
Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Utility Maximization of Cloud-based In-Car Video Recording over Vehicular Access Networks
SECURITY IN MOBILE EDGE CACHING WITH REINFORCEMENT LEARNING
Collaborative UFH-based anti-jamming broadcast with learning
Game theoretic study on blockchain based secure edge networks
Attacker-Centric View of a Detection Game Against Advanced Persistent Threats
Introduction to the Issue on Machine Learning for Cognition in Radio Communications and Radar
Mobile Crowdsensing Games in Vehicular Networks
Anti-jamming Underwater Transmission with Mobility and Learning
Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection
Anti-Jamming Communication Game for UAV-Aided VANETs
UAV Relay in VANETs Against Smart Jamming with Reinforcement Learning
Reinforcement learning based PHY-layer authentication in cognitive radio networks
Reinforcement Learning Based Sensor Access Control for WBANs
PHY-Layer Authentication with Multiple Landmarks with Reduced Overhead
User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks
Reinforcement Learning-based NOMA Power Allocation in the Presence of Smart Jamming
FuzzyDP: Fuzzy-based big data publishing against inquiry attacks
Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats
Cloud-Based Malware Detection Game for Mobile Devices with Offloading
Advanced Persistent Threats Detection Game with Expert System for Cloud
A Secure Mobile Crowdsensing Game with Deep Reinforcement Learning
Game Theoretic Study on Channel-Based Authentication in MIMO Systems
FHY-layer authentication with multiple landmarks with reduced communication overhead
Game theoretic study of protecting MIMO transmissions against smart attacks
Defense against advanced persistent threats: A Colonel Blotto game approach
Physical-Layer Authentication Based on Extreme Learning Machine
Two-dimensional anti-jamming communication based on deep reinforcement learning
Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
Channel-based authentication game in MIMO systems
Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage
Energy trading game for microgrids using reinforcement learning
Defense against advanced persistent threats with expert system for internet of things
User-centric view of smart attacks in wireless networks
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
Mobile offloading game against smart attacks
Jamming games in underwater sensor networks with reinforcement learning
Spoofing detection with reinforcement learning in wireless networks
Spoofing detection games in underwater sensor networks
Mobile crowdsensing game in vehicular networks
A Mobile Offloading Game Against Smart Attacks
User-Centric View of Jamming Games in Cognitive Radio Networks
Active authentication with reinforcement learning based on ambient radio signals
Mobile cloud offloading for malware detections with learning
Jamming detection of smartphones for WiFi signals
Collaborative anti-jamming broadcast with uncoordinated frequency hopping over USRP
Anti-jamming transmissions with learning in heterogenous cognitive radio networks
Anti-jamming transmission stackelberg game with observation errors
Power control with reinforcement learning in cooperative cognitive radio networks against jamming
Prospect theoretic analysis of energy exchange among microgrids
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks
Anti-cheating prosumer energy exchange based on indirect reciprocity
Indoor distributed multiple-input multiple-output (MIMO) system capacity research based on angular domain information
Secure relay selection based on learning with negative externality in wireless networks
Proximity-based security using ambient radio signals
Proximity-based security techniques for mobile users in wireless networks
A Method to Simulate A Large Number of AP Upline
MAC design of uncoordinated FH-based collaborative broadcast
Jamming-resistant collaborative broadcast using uncoordinated frequency hopping
Characteristics of path loss and power coverage in cabin environment
Indirect reciprocity security game for large-scale wireless networks
Indirect Reciprocity Game Modelling for Secure Wireless Networks
Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks
On selfish behavior in wireless sensor networks: A game theoretic case study
Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part I: Single-hop Networks
Game-theoretic approach against selfish attacks in cognitive radio networks
Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks
PHY-authentication protocol for spoofing detection in wireless networks
Analysis and optimization on jamming-resistant collaborative broadcast in large-scale networks
Channel-based spoofing detection in frequency-selective Rayleigh channels
Point temperature sensor based on green decay in an Er:ZBLALiP microsphere
Channel-based detection of sybil attacks in wireless networks
恶意干扰下的无人机辅助边缘计算加权能耗与时延智能优化
电子与信息学报,1009-5896,2024-07-15.恶意干扰下的无人机辅助边缘计算加权能耗与时延智能优化
电子与信息学报,1009-5896,2024-07-15.三维空间位置服务中智能语义位置隐私保护方法
电子与信息学报,1009-5896,2024-02-02.能量收集辅助的矿山物联网智能计算卸载方法
电子与信息学报,1009-5896,2023-04-06.一种基于强化学习的嵌入式系统抗拒绝服务攻击的缓存调度方案
计算机科学,1002-137X,2020-06-28.基于强化学习的能量采集物联网视频编码技术
厦门大学学报(自然科学版),0438-0479,2019-11-28.基于专家系统的高级持续性威胁云端检测博弈
计算机研究与发展,1000-1239,2017-10-01.云存储安全技术研究进展综述
数据采集与处理,1004-9037,2016-05-15.一种基于传感器的认知无线网络攻击检测和定位方法
厦门大学学报(自然科学版),0438-0479,2012.机舱环境路径损耗和功率覆盖特征分析
电波科学学报,1005-0388,2012.面向数字孪生的智能无线通信抗干扰技术
移动通信,1006-1010,2023-06-15.面向5G的“无线通信原理”教学改革探索
高教学刊,2096-000X,2020-11-19.基于强化学习的低时延车联网群密钥分配管理技术
网络与信息安全学报,2096-109X,2020-10-13.基于区块链的网络安全技术综述
电信科学,1000-0801,2018.Chapter 13: Channel-Based Authentication//.Securing Wireless Communications at the Physical Layer. (专著). Springer, 2010年01月.