Search Results - "Ji, Zijie"
-
1
A Two-Step Environment-Learning-Based Method for Optimal UAV Deployment
Published in IEEE access (2019)“…Unmanned aerial vehicles (UAVs) can be used as low-altitude flight base stations to satisfy the coverage requirements of wireless users in various scenarios…”
Get full text
Journal Article -
2
Tunable Photoresponse in a Two-Dimensional Superconducting Heterostructure
Published in Nanomaterials (Basel, Switzerland) (19-01-2023)“…The photo-induced superconducting phase transition is widely used in probing the physical properties of correlated electronic systems and to realize broadband…”
Get full text
Journal Article -
3
Physical Layer Key Generation for IOS-Assisted Communication Systems
Published in IEEE transactions on vehicular technology (01-11-2024)“…Different from reflecting-only metasurfaces, intelligent omni-surfaces (IOSs) are capable of both refracting and reflecting the received signals, providing a…”
Get full text
Journal Article -
4
Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks
Published in IEEE transactions on vehicular technology (01-01-2021)“…We propose and analyze secret key generation using intelligent reflecting surface (IRS) assisted wireless communication networks. To this end, we first…”
Get full text
Journal Article -
5
Multiple mechanisms of the low temperature photoresponse in niobium diselenide
Published in Applied physics letters (29-11-2021)“…Niobium diselenide (NbSe2) is a layered transition metal dichalcogenide with novel quantum phases at low temperatures (T) such as superconductivity and charge…”
Get full text
Journal Article -
6
Controlled Synthesis of a Two-Dimensional Non-van der Waals Ferromagnet toward a Magnetic Moiré Superlattice
Published in ACS nano (24-05-2022)“…Two-dimensional (2D) magnetic materials provide an ideal platform for spintronics, magnetoelectrics, and numerous intriguing physical phenomena in 2D limits…”
Get full text
Journal Article -
7
Probing the Inelastic Electron Tunneling via the Photocurrent in a Vertical Graphene van der Waals Heterostructure
Published in ACS nano (26-09-2023)“…Inelastic electron tunneling (IET), accompanied by energy transfer between the tunneling charge carriers and other elementary excitations, is widely used to…”
Get full text
Journal Article -
8
Lane Detection Based on Two-Stage Noise Features Filtering and Clustering
Published in IEEE sensors journal (01-08-2022)“…Lane detection is essential for autonomous vehicles, and vision-based lane detection is widely used in the field of intelligent driving cars because of its low…”
Get full text
Journal Article -
9
Physical Layer Key Generation for Secure OAM Communication Systems
Published in IEEE transactions on vehicular technology (01-11-2022)“…In this paper, we propose a physical layer secret key (PLSK) generation scheme for secure encrypted transmissions in orbital angular momentum (OAM)…”
Get full text
Journal Article -
10
Non-Stationarity Characterization and Geometry-Cluster-Based Stochastic Model for High-Speed Train Radio Channels
Published in IEEE transactions on intelligent transportation systems (01-07-2023)“…In time-variant high-speed train (HST) radio channels, the scattering environment changes rapidly with the movement of terminals, leading to a serious…”
Get full text
Journal Article -
11
Random Shifting Intelligent Reflecting Surface for OTP Encrypted Data Transmission
Published in IEEE wireless communications letters (01-06-2021)“…In this letter, we propose a novel encrypted data transmission scheme using an intelligent reflecting surface (IRS) to generate secret keys in wireless…”
Get full text
Journal Article -
12
AI-Enhanced Generalizable Scheme for Path Loss Prediction in LoRaWAN
Published in IEEE internet of things journal (15-04-2024)“…Long-range wide-area network (LoRaWAN) is a widely used technology in the Internet of Things (IoT), which provides long-range (LoRa) communication with low…”
Get full text
Journal Article -
13
A Three-Dimensional Geometry-based Stochastic Model for Air-to-Air UAV Channels
Published in 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall) (01-11-2020)“…Recently, the utilization of unmanned aerial vehicles (UAVs) has been increasingly popular in various fields. As a brand new scenario of wireless…”
Get full text
Conference Proceeding -
14
Stochastic Analysis of Double Blockchain Architecture in IoT Communication Networks
Published in IEEE internet of things journal (15-06-2022)“…In this article, we present practical stochastic modeling and detailed performance analysis of our double blockchain (DBC) from Hao et al. (2021) for secure…”
Get full text
Journal Article -
15
Wireless Secret Key Generation for Distributed Antenna Systems: A Joint Space-Time-Frequency Perspective
Published in IEEE internet of things journal (01-01-2022)“…Wireless secret key generation has emerged as a promising technique for Internet-of-Things (IoT) systems to establish shared encryption keys between the server…”
Get full text
Journal Article -
16
Physical-Layer-Based Secure Communications for Static and Low-Latency Industrial Internet of Things
Published in IEEE internet of things journal (01-10-2022)“…This article proposes a wireless key generation solution for secure low-latency communications with active jamming attack prevention in wireless networked…”
Get full text
Journal Article -
17
Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks
Published in IEEE wireless communications letters (01-05-2020)“…This letter investigates the security of physical layer secret key generation in highly reconfigurable scattering environments. Based on our derived secret key…”
Get full text
Journal Article -
18
Secret Key Generation Based on 3D Spatial Angles for UAV Communications
Published in 2021 IEEE Wireless Communications and Networking Conference (WCNC) (29-03-2021)“…Unmanned aerial vehicle (UAV) will be an essential carrier for future wireless communications due to its flexible deployment and low cost. As such, the…”
Get full text
Conference Proceeding -
19
Active Attack Detection Based on Interpretable Channel Fingerprint and Adversarial Autoencoder
Published in ICC 2022 - IEEE International Conference on Communications (16-05-2022)“…This paper investigates how to build an active attack detection framework that is driven by fundamental channel modeling and practical wireless datasets…”
Get full text
Conference Proceeding -
20
A two-step decorrelation method on time-frequency correlated channel for secret key generation
Published in 2018 IEEE Wireless Communications and Networking Conference (WCNC) (01-04-2018)“…Secret key generation based on channel reciprocity is an important branch of wireless physical layer security which provides strong or even theoretically…”
Get full text
Conference Proceeding