[1]Ke-WenHuang, H.-M Wang, L. Yang, Smart Jamming Using Reconfigurable IntelligentSurface: Asymptotic Analysis and Optimization
, IEEE Transactions on Wireless Communications, 2023.
[2]Ke-WenHuang,H.-M Wang, and H. V. Poor, “On Covert Communication Against SequentialChange-Point Detection” IEEE Transactions on Information Theory, vol. 67, no.11, pp. 7285– 7303, Aug. 2021.
[3]Ke-WenHuang, H. Deng, and H.-M Wang,“Jamming aided covert communication with multiple receivers” IEEE Transactionson Wireless Communications, vol. 20, no. 7, 4480–4494, July 2021.
[4]Ke-WenHuangand H. -M. Wang,“Intelligent reflecting surface aided pilot contamination attack and itscountermeasure,” IEEE Transactions on Wireless Communications, vol. 20, no. 1,pp. 345–359, Jan. 2021.
[5]Ke-WenHuangand H.-M Wang,“Passive beamforming for IRS aided wireless networks,” IEEE WirelessCommunications Letters, vol. 9, no. 12, pp. 2035–2039, Dec. 2020.
[6]Ke-WenHuang, H.-M Wang, D. Towsleyand H. V. Poor, “LPD communication: A sequential change-point detectionperspective,” IEEE Transactions on Communications, vol. 68, no. 4, pp.2474-2490, April 2020.
[7]Ke-WenHuang, H.‐M. Wang, J. Hou, andS. Jin, “Joint spatial division and diversity for massive MIMO systems,” IEEETransactions on Communications, vol. 67, no. 1, pp. 258–272, Jan. 2019.
[8]H.‐M. Wang,Ke-WenHuang, and T. A. Tsiftsis, “Base station cooperation inmillimeter wave cellular networks: Performance enhancement of cell–edge users,”IEEE Transactions on Communications, vol. 66, no. 11, pp. 5124–5139, Nov. 2018.
[9]Ke-WenHuangand H.‐M. Wang,“Identifying the fake base station: A location based approach,” IEEECommunications Letters, vol. 22, no. 8, pp. 1604‐1607, Aug. 2018.
[10]Ke-WenHuangand H.‐M. Wang,“Combating the control signal spoofing attack in UAV systems,” IEEETransactions on Vehicular Technology, vol. 67, no. 8, pp. 7769‐7773, Aug. 2018.
[11]H.‐M. Wang,Ke-WenHuang, and T. A. Tsiftsis, “Multiple antennassecure transmission under pilot spoofing and jamming attack,” IEEE Journal onSelected Areas in Communications, vol. 36, no. 4, pp. 860‐876, April 2018.
[12]Ke-WenHuang, H.‐M. Wang, Y. Wu, andR. Schober, “Pilot spoofing attack by multiple eavesdroppers,” IEEETransactions on Wireless Communications, vol. 17, no. 10, pp. 6433‐6447, Oct.2018.
[13]H.‐M. Wang,Ke-WenHuang, Q. Yang and Z. Han, “Joint source‐relaysecure precoding for MIMO relay networks with direct links,” IEEE Transactionson Communications, vol. 65, no. 7, pp. 2781‐2793, Jul. 2017.
[14]Y. Ju, X. Qiu, Y. Chen,Ke-WenHuang, Q. Yin and H. Wang,“Beamforming design for interference management in millimeter wave cellularnetworks with partial CSI,” 2017 9th International Conference on WirelessCommunications and Signal Processing (WCSP), Nanjing, 2017, pp. 1‐6.
[15]Y. Xu, H. Wang, Q. Yang,Ke-WenHuang, and T. Zheng,“Cooperative transmission for physical layer security by exploring socialawareness,” 2017 IEEE Globecom Workshops, Singapore, 2017, pp. 1‐6.
[16]H. Wang, Y. Xu,Ke-WenHuang, Z. Han and T. A. Tsiftsis, “Cooperativesecure transmission by exploiting social ties in random networks,” IEEETransactions on Communications, vol. 66, no. 8, pp. 3610‐3622.
[17]J. Lyu, H. Wang andKe-WenHuang, “Physical layer security in D2Dunderlay cellular networks with poisson cluster process,” IEEE Transactions onCommunications.
[18]J. Lyu, T. Zheng,Ke-WenHuangg, Y. Feng and H. Wang, “Securetransmissions of D2D underlay cellular networks with poisson cluster process,”2019 IEEE Global Communications Conference (GLOBECOM).
[19]T.Zheng, Q. Yang,Ke-WenHuang,H. Wang, Z. Wei and J. Yuan, “Physical-layer secure transmissions incache-enabled cooperative small cell networks,” 2018 IEEE Global CommunicationsConference (GLOBECOM).