Skip to main content

and
  1. No Access

    Article

    A High Consistency Wireless Key Generation Scheme for Vehicular Communication Based on Wiener Filter Extrapolation

    Secret key generation from wireless channel is an emerging technology for communication network security, which exploits the reciprocity and time variability of wireless channels to generate symmetrical keys b...

    Yiming Ma, Linning Peng, Wenhao Yin, Hua Fu, Aiqun Hu, Peng Guo in Automotive Innovation (2023)

  2. No Access

    Chapter and Conference Paper

    Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis

    In the 5G network, the access method of IoT terminals is mainly wireless access. Aiming at the high authentication cost in massive access scenarios, this paper proposes a secondary authentication method based ...

    **n Hu, Yu Jiang, Aiqun Hu in Conference Proceedings of 2022 2nd Interna… (2023)

  3. Article

    Open Access

    Generative adversarial network-based rogue device identification using differential constellation trace figure

    With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent...

    Zekun Chen, Linning Peng, Aiqun Hu, Hua Fu in EURASIP Journal on Wireless Communications… (2021)

  4. No Access

    Chapter and Conference Paper

    A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme

    Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...

    Qianchuan Xv, Yubo Song, Xuan Li, Aiqun Hu in Advances in Artificial Intelligence and Se… (2021)

  5. No Access

    Chapter and Conference Paper

    Neural Control Based Research of Endogenous Security Model

    With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...

    Tao Li, Xu Hu, Aiqun Hu in Artificial Intelligence and Security (2021)

  6. No Access

    Chapter and Conference Paper

    Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection

    Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...

    Qi Chen, Yubo Song, Aiqun Hu in Advances in Artificial Intelligence and Security (2021)

  7. Chapter

    The Early Rise of Social Security in China: Ideas and Reforms, 1911–1949

    Applying the editor’s “onion skin model” of social policy ideas, this chapter analyses the early rise of social security ideas and policies in Republican China (1911–1949). Facing imperialism, Chinese elites t...

    Aiqun Hu in One Hundred Years of Social Protection (2021)

  8. No Access

    Chapter and Conference Paper

    LoRa Devices Identification Based on Differential Constellation Trace Figure

    With the development of the Internet of Things, the application of LoRa devices is more and more extensive. However, the security access issues of LoRa terminals has not been paid enough attention yet. In this...

    **uting Wu, Yu Jiang, Aiqun Hu in Artificial Intelligence and Security (2020)

  9. Article

    Open Access

    Physical layer identification of LoRa devices using constellation trace figure

    LoRa wireless technology is a revolutionary wireless network access technology with a wide application prospect. An identification method for Lora devices based on physical layer fingerprinting is proposed to ...

    Yu Jiang, Linning Peng, Aiqun Hu, Sheng Wang in EURASIP Journal on Wireless Communications… (2019)

  10. No Access

    Article

    A lightweight physical-layer based security strategy for Internet of things

    Recently, most physical-layer based security strategies for Internet of thing tackle the two fundamental issues—authentication and communication key generation. However, the cost of such schemes is often high ...

    Yu Jiang, Aiqun Hu, Jie Huang in Cluster Computing (2019)

  11. No Access

    Article

    Importance-based entropy measures of complex networks’ robustness to attacks

    Intentional attacks usually cause greater damage than random failures to complex networks, so it is important to study the networks’ resilience to attacks. Although various entropy measures have been available...

    Yu Jiang, Aiqun Hu, Jie Huang in Cluster Computing (2019)

  12. No Access

    Article

    Protective immunity elicited by measles vaccine exerts anti-tumor effects on measles virus hemagglutinin gene-modified cancer cells in a mouse model

    Measles vaccine is widely used in China to prevent the measles virus (MV) infection. People immunized with measles vaccine can obtain long-term protective immunity. Measles virus surface glycoprotein hemagglut...

    Yuan Qi, Kailin **ng, Lanlin Zhang in Journal of Cancer Research and Clinical On… (2018)

  13. No Access

    Article

    Throughput and BER of wireless powered DF relaying in Nakagami-m fading

    Energy harvesting provides a promising solution to the extra energy requirement at the relay due to relaying. In this paper, the throughput and bit error rate of a decode-and-forward relaying system are studie...

    Yan Gao, Yunfei Chen, Aiqun Hu in Science China Information Sciences (2017)

  14. No Access

    Article

    Trusted mobile model based on DTE technology

    Due to increasing demands for mobile security, the Trusted Computing Group organized a special group—Mobile Phone Working Group (MPWG) to deal with mobile security specification business. Though MPWG proposes ...

    Tao Li, Aiqun Hu in International Journal of Information Security (2015)

  15. No Access

    Chapter and Conference Paper

    Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme

    Hardware Trojan has emerged as a major security concern for integrated circuits. This paper presents a novel design obfuscation scheme against hardware Trojan attacks based on chaos finite state machine (FSM) ...

    Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu in Cloud Computing and Security (2015)

  16. No Access

    Article

    A novel artificial noise aided security scheme to resist blind source separation attacks

    In this paper, we discuss the physical layer security from a new angle of view and propose a novel approach to resist some attacks in signal processing perspective. The scenario considered in this paper is tha...

    Guyue Li, Aiqun Hu, Yongming Huang in Chinese Science Bulletin (2014)

  17. No Access

    Article

    A novel point mutation in exon 20 of EGFR showed sensitivity to erlotinib

    Mutations of epidermal growth factor receptor (EGFR) gene are good predictors of response to treatment with EGFR tyrosine kinase inhibitors (TKIs) for non-small cell lung cancer (NSCLC). It is well establishe...

    Kailin **ng, **aoyan Zhou, **nmin Zhao, Si Sun, Zhiguo Luo, Huijie Wang in Medical Oncology (2014)

  18. No Access

    Article

    Two-Stage Channel Estimation Algorithm for TD-SCDMA System Employing Multi-Cell Joint Detection

    The conventional Steiner channel estimator is inefficient for TD-SCDMA systems employing multi-cell joint detection because of its low estimation accuracy. A novel two-stage channel estimation algorithm was p...

    **aoqin Song, Ke Li, Aiqun Hu in Circuits, Systems & Signal Processing (2007)

  19. No Access

    Article

    Multi-block chaining-based authentication mode

    A fast authentication mode based on Multi-Block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of...

    Yuhua Huang, Aiqun Hu, Ziguo Zhong in Journal of Electronics (China) (2006)

  20. No Access

    Article

    A novel link adaptation scheme to enhance performance of IEEE 802.11g wireless LAN

    A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can over...

    Liquan Chen, Aiqun Hu in Journal of Electronics (China) (2006)