Publications
Books
Refereed Journal & Conference Papers
2021
-
Federated Continuous Learning With Broad Network Architecture
Junqing Le, Xinyu Lei, Nankun Mu, Hengrun Zhang, Kai Zeng, Xiaofeng Liao
IEEE Transactions on Cybernetics, vol. 51, no. 8, pp. 3874 - 3888, Aug. 2021
-
Online Learning-Based Defense Against Jamming Attacks in Multi-Channel Wireless CPS
Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Long Jiao, Kai Zeng
IEEE Internet of Things Journal, Accepted, Mar. 2021
PDF Code
-
Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks
Weiwei Li, Ning Wang, Long Jiao, Kai Zeng
IEEE Access, vol. 9, pp. 60419 - 60432, April. 2021
PDF
-
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces
Long Jiao, Guohua Sun, Junqing Le, Kai Zeng
In 3rd ACM Workshop on Wireless Security and Machine Learning (WiseML '21), June 28-July 2, 2021, Abu Dhabi, United Arab Emirates
PDF
-
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks
Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng
IEEE Transactions on Wireless Communications, vol. 20, no. 5, pp. 3321-3335, May 2021
-
Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals
Pu Wang, Long Jiao, Kai Zeng, and Zheng Yan
IEEE Infocom'21, May 2021
PDF
-
Manipulative Attack against Physical Layer Key Agreement and Countermeasures
Rong Jin, Kai Zeng
IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 475-489, Jan. 2021.(Impact factor: 6.404)
PDF
-
A Reassessment of Friendly Jamming Efficiency
Rong Jin, Kai Zeng
IEEE Transactions on Mobile Computing, vol. 20, no. 1, pp. 32-47, Jan. 2021. (Impact factor: 5.112)
PDF
2020
-
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks
Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kannan Govindan, Daniel Wu, Prasant Mohapatra
IEEE TRANSACTIONS ON MOBILE COMPUTING 2020
-
Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead
Ning Wang, Weiwei Li, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng
IEEE Network, vol. 34, no. 6, pp. 198-204, Dec. 2020
PDF
-
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks
Ning Wang, Weiwei Li, Amir Alipour-Fanid, Long Jiao, Monireh Dabaghchian, Kai Zeng
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 658-670, Aug. 2020
-
Impact of Jamming Attacks on Vehicular Cooperative Adaptive Cruise Control Systems
Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng
IEEE Transactions on Vehicular Technologies, vol. 69, no. 11, pp. 12679 - 12693, Nov. 2020
PDF
-
Physical Layer Secure MIMO Communications Against Eavesdroppers with Arbitrary Number of Antennas
Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kai-Yu Qin
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 466 - 481, Aug. 2020
-
Secure MIMO-SVD Communications Against Eavesdroppers with any Number of Antennas
Jie Tang, Hong Wen, Huanhuan Song, Kai Zeng, Kaiyu Qin
IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11077 - 11089, Oct. 2020
-
Compressed Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications
Ning Wang, Weiwei Li, Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng
IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7764 - 7772, Aug. 2020. (Impact factor: 11.750)
PDF
-
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks
Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng
IEEE Infocom,20, July 2020
PDF, Data, and Code
-
Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning
Ning Wang, Junqing Le, Weiwei Li, Long Jiao, Zhihao Li, Kai Zeng
IEEE CNS, July 2020
PDF
-
A Practical Downlink NOMA Scheme for Wireless LANs
Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Qiben Yan, Kai Zeng, Wenjing Lou, Huacheng Zeng
IEEE Transactions on Communications, vol. 68, no. 4, pp. 2236-2250, Jan. 2020. (Impact factor: 6.720)
-
Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization
Y. Pan, Y. Hou, M. Li, R. Gerdes, K. Zeng, M. Towfiq, and B. Cetiner
IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 106-120, Jan. 2020. (Impact factor: 6.404)
-
Efficient Physical Layer Group Key Generation in 5G Wireless Networks
Long Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 466 - 481, Aug. 2020
PDF
-
Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics with Unreliable Conditions
Jing Xu, Shimin Gong, Yuze Zou, Wei Liu, Kai Zeng, Dusit Niyato
IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 1, pp. 394 - 407, March 2020
2019
-
Pilot Contamination Attack Detection for NOMA in 5G Mm-Wave Massive MIMO Networks
Ning Wang, Long Jiao, Amir Alipour Fanid, Monireh Dabaghchian, Kai Zeng
IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1363-1378, Sept. 2019
PDF
-
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic
Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng
IEEE Transactions on Information Forensics and Security , Early Access, 2019
PDF
-
Manipulative Attack against Physical Layer Key Agreement and Countermeasure
Rong Jin and Kai Zeng
IEEE Transactions on Dependable and Secure Computing, Early Access, 2019
PDF
-
A Reassessment on Friendly Jamming Efficiency
Rong Jin, Kai Zeng, Kai Zhang
IEEE Transactions on Mobile Computing, Early Access, 2019
PDF
-
Large-scale Cost-aware Classification Using Feature Computational Dependencies
Qingzhe Li, Amir Alipour-Fanid, Martin Slawski, Yanfang Ye, Lingfei Wu, Kai Zeng, Liang Zhao
IEEE Transactions on Knowledge and Data Engineering, Early Access, 2019
-
Physical Layer Key Generation in 5G Wireless Networks
Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng
IEEE Wireless Communicaitons, vol. 26, no. 5, pp. 48-54, Oct. 2019
-
Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks
Jie Tang, Hong Wen, Kai Zeng, Run-fa Liao, Fei Pan, Lin Hu
IEEE Network, vol. 33, no. 5, pp. 126-133, Sept. 2019
PDF
-
Physical Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities
Ning Wang, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng
IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169-8181, July 2019
PDF
-
Multi-stage Deep Classifier Cascades for Open World Recognition
Xiaojie Guo, Amir Alipour-Fanid, Lingfei Wu, Hemant Purohit, Xiang Chen, Kai Zeng, Liang Zhao
The 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, Nov. 3-7, 2019
PDF
-
Machine Learning-Based Delay-Aware UAV Detection over Encrypted Wi-Fi Traffic
Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng
2019 International Workshop On Cyber-Physical Systems Security, Washington D.C., June, 2019
PDF
-
Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication
Ning Wang, Jie Tang, Kai Zeng
2019 Workshop on Physical-layer Methods for Security and Privacy in 5G and the IoT, Washington D.C., June, 2019
-
Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge
Hengrun Zhang, Kai Zeng
IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019
-
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise
Pu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan
IEEE Infocom, Paris, France, April 29 - May 2, 2019
PDF
2018
-
Secure Inductive-Coupled Near Field Communication at Physical Layer
Rong Jin, Kai Zeng
IEEE Transactions on Information Forensics and Security, vol. 13, no. 12, pp. 3078 - 3093, Dec. 2018
PDF
-
Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks
Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer
IEEE/ACM Transactions on Networking, 2018
PDF
-
Impact of Mobility on Physical Layer Security over Wireless Fading Channels
Jie Tang, Monireh Dabaghchian, Kai Zeng, Hong Wen
IEEE Transactions on Wireless Communications, 2018
PDF
-
Physical layer multi-user key generation in wireless networks
Rong Jin, Kai Zeng
Wireless Networks, vol. 24, no. 4, pp. 1043 - 1054, May 2018
-
Robust Spectrum Monitoring in Cognitive Radio Networks with Uncertain Traffic Information
Wenbo Xu, Jing Xu, Jiachen Li, Wei Liu, Shimin Gong, Kai Zeng
IEEE Access, vol. 6, 2018
Link
-
Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication
Long Jiao, Ning Wang, Kai Zeng
Abu Dhabi, UAE, December 9 - 13, 2018
-
Efficient Identity Spoofing Attack Detection for IoT in Mm-Wave and Massive MIMO 5G Communication
Ning Wang, Long Jiao, Pu Wang, Monireh Dabaghchian, Kai Zeng
IEEE Globecom 2018, Abu Dhabi, UAE, December 9 - 13, 2018
-
Mobility Improves NOMA Physical Layer Security
Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen
IEEE Globecom 2018, Abu Dhabi, UAE, December 9 - 13, 2018
-
Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models
Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng
4th IEEE International Smart Cities Conference (ISC2), Kansas City, MO, Sept. 16 - 19, 2018
-
Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios
Yu Chen, Qi Dong, Xiaohua Li, Kai Zeng
4th IEEE International Smart Cities Conference (ISC2), Kansas City, MO, Sept. 16 - 19, 2018
-
Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel
Long Jiao, Jie Tang, Kai Zeng
IEEE Conference on Communications and Network Security (IEEE CNS'18), Beijing, China, May 30 - June 1, 2018
PDF
-
Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication
Ning Wang, Long Jiao, Kai Zeng
IEEE Conference on Communications and Network Security (IEEE CNS'18), Beijing, China, May 30 - June 1, 2018
PDF
-
Prediction-time Efficient Classification Using Feature Computational Dependencies
Liang Zhao, Amir Alipour-Fanid, Martin Slawski, Kai Zeng
KDD 2018, London, UK, August 19 - 23, 2018
PDF
2017
-
Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios
Monireh Dabaghchian, Amir Alipour-Fanid, Songsong Liu, Kai Zeng, Xiaohua Li, Yu Chen
ArXiv, 2017
PDF
-
Platoon stability and safety analysis of cooperative adaptive cruise control under wireless fading channels and jamming attacks
Amir Alipour-Fanid, Monireh Dabaghchian, and Kai Zeng
ArXiv, 2017
PDF
-
Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization
Y. Pan, Y. Hou, M. Li, R. Gerdes, K. Zeng, M. Towfiq, B. Cetiner
IEEE Transactions on Dependable and Secure Computing, 2017
-
Delay Analysis of Physical Layer Key Generation in Dynamic Roadside-to-Vehicle Networks
R. Jin, Xianru Du, K. Zeng, L. Huang, L. Xiao, J. Xu
IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2526-2535, March 2017
PDF
-
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng
International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Warsaw, Poland, Aug. 28 - 30, 2017
PDF
-
Hardware module-based message authentication in intra-vehicle networks
Eric Wang, William Xu, Suhas Sastry, Songsong Liu, Kai Zeng
The ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS'17), Pittsburgh, Pennsylvania, April 18 - 20, 2017
PDF
-
Throughput optimization in multi-hop wireless networks with reconfigurable antennas
Yantian Hou, Ming Li, Kai Zeng
International Conference on Computing, Networking and Communications (ICNC'17), Silicon Valley, USA, Jan. 26 - 29, 2017
PDF
-
String stability analysis of cooperative adaptive cruise control under jamming attacks
Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhang, Kai Zeng
IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Jan. 12 - 14, 2017
PDF
2016
-
MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers
R. Jin, K. Zeng, A. Pande, P. Mohapatra
IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1306-1320, June 2016
PDF
-
Practical Secret Key Agreement for Full-Duplex Near Field Communications
R. Jin, X. Du , Z. Deng, K. Zeng, J. Xu
IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 938-951, April 2016
PDF
-
Sniffer Channel Assignment with Imperfect Monitoring for Cognitive Radio Networks
J. Xu, Q. Wang, K. Zeng, and M. Liu
IEEE Transactions on Wireless Communications (TWC), vol. 15, no. 3, pp. 1703-1715, March 2016
PDF
-
Intelligence Measure of Cognitive Radios with Learning Capabilities
M. Dabaghchian, S. Liu, A. Alipour-Fanid, K. Zeng, X. Li, Y. Chen
IEEE GlobeCom 2016, Washington DC, Dec. 4 - 8, 2016
PDF
-
Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
M. Dabaghchian, A. Alipour-Fanid, K. Zeng, Q. Wang
IEEE Conference on Communications and Network Security (IEEE CNS'16), Philadelphia, PA, Oct. 17 - 19, 2016
PDF
-
Integration of Machine Learning and Human Learning for Training Optimization in Robust Linear Regression
X. Li, Y. Chen, K. Zeng
The 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'16), Shanghai, China, March 20 - 25, 2016
PDF
-
Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment
J. Xu, W. Liu, and K. Zeng
IEEE LCN 2016, Dubai, UAE, Nov. 7 - 10, 2016
2015
-
Physical Layer Key Generation in Wireless Networks: Challenges and Opportunities
K. Zeng
IEEE Communications Magazine, vol. 53, no. 6, pp. 33-39, June 2015
PDF
-
Live Video Forensics: Source Identification in Lossy Wireless Networks
S. Chen, A. Pande, K. Zeng, P. Mohapatra
IEEE Tansactions on Information Forensics and Security, vol. 10, no. 1, pp. 28-39, Jan. 2015
PDF
-
SecNFC: Securing Inductively-Coupled Near Field Communication at Physical Layer
R. Jin, K. Zeng
IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015
PDF
-
Physical Layer Key Agreement under Signal Injection Attack
R. Jin, K. Zeng
IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015
PDF
-
Online Learning for Unreliable Passive Monitoring in Multi-Channel Wireless Networks
J. Xu, K. Zeng, W. Liu
IEEE ICC 2015, London, UK, June 8 - 12, 2015
PDF
-
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice
Y. Hou, M. Li, R. Chauhan, R. M. Gerdes, K. Zengu
the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15), Singapore, Apr. 2015
2014
-
Efficient Data Capturing for Network Forensics in Cognitive Radio Networks
S. Chen, K. Zeng, P. Mohapatra
IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 1988-2000, Dec. 2014
PDF
-
Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise
D. Shan, K. Zeng, P. Richardson, W. Xiang
EAI Endorsed Transactions on Cognitive Communications, vol. 1, no. 1, pp. 1-13, July, 2014
PDF
-
Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications
D. Shan, P. Richardson, W. Xiang, K. Zeng, H. Qian, S. Addepalli
Vehicular Communications, vol. 1, no. 2, pp. 67-77, April, 2014
PDF
-
MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity
R. Jin, L. Shi, K. Zeng, A. Pande, P. Mohapatra
IEEE Conference on Commnunications and Network Security (IEEE CNS'14), San Francisco, CA, Oct. 29 - 31, 2014
PDF
-
Practical Secret Key Agreement for Full-Duplex Near Field Communications
R. Jin, X. Du, Z. Deng, K. Zeng, J. Xu
ACM ASIACCS 2014, Kyoto, Japan, June 4 - 6, 2014
PDF
-
Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty
J. Xu, Q. Wang, R. Jin, K. Zeng, M. Liu
Milcom 2014, Baltimore, MD, Oct. 6 - 8, 2014
PDF
-
Delay Analysis of Physical Layer Key Generation in Multi-user Dynamic Wireless Networks
R. Jin, X. Du, K. Zeng, L. Xiao, J. Xu
IEEE ICC 2014, Sydney, Australia, June 10 - 14, 2014
PDF
-
Physical Layer Challenge-Response Authentication in Wireless Networks with Relay
X. Du, D. Shan, K. Zeng, L. Huie
IEEE Infocom 2014, Toronto, Canada, April 27 - May 2, 2014
PDF
2013
-
Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
S. Jana, K. Zeng, W. Cheng, P. Mohapatra
IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1497-1507, Sept. 2013
PDF
-
PHY-CRAM: Physical Layer Challenge-Response Authentication for Wireless Networks
D. Shan, K. Zeng, W. Xiang, P. Richardson, Y. Dong
IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1817-1827, Sept. 2013
PDF
-
Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space
D. Shan, P. Richardson, W. Xiang, K. Zeng, H. Qian, S. Addepalli
IEEE Transactions on Mobile Computing, vol.12, no.3, pp. 401- 411, March 2013
PDF
-
Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller
Y. Wei, K. Zeng, P. Mohapatra
IEEE Transactions on Mobile Computing (TMC), vol. 12, no. 9, pp. 1842- 1852, Sept. 2013
PDF
-
iSens: Detecting Hidden Busy Channels in WM Systems with Interactive Sensing for CRN
D. Shan, K. Zeng, P. Richardson, W. Xiang
IEEE GlobeCom 2013, Atlanta, GA, Dec. 9-13, 2013
PDF
-
Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise
D. Shan, K. Zeng, P. Richardson, W. Xiang
The 8th International Conference on Cognitive Radio Oriented Wireless Networks (CrownCom) 2013, Washington DC, July 8 - 10, 2013
PDF
-
Video Source Identification in Lossy Wireless Networks
S. Chen, A. Pande, K. Zeng, P. Mohapatra
IEEE Infocom 2013, Mini-Conference, Turin, Italy, Apr. 14-19, 2013
PDF
2012
-
On Energy Efficiency of Geographic Opportunistic Routing in Lossy Multihop Wireless Networks
K. Zeng, J. Yang, W. Lou
ACM WINET, vol. 18, no. 8, pp 967-983, Nov. 2012
-
Chaining for Securing Data Provenance in Distributed Information Networks
X. Wang, K. Zeng, K. Govindan, P. Mohapatra
IEEE Milcom 2012, Orlando, FL, Oct. 29 - Nov. 1, 2012
PDF
-
Fast Rendezvous for Cognitive Radios by Exploiting Power Leakage At Adjacent Channels
L. Zhang, K. Tan, K. Zeng, P. Mohapatra
IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sydney, Australia, Sept. 9-12, 2012
-
Detecting Spectrum Misuse in Wireless Networks
K. Tan, K. Zeng, D. Wu, P. Mohapatra
The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Las Vegas, Nevada, USA, October 8-11, 2012
PDF
-
Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models
S. Yi, K. Zeng, J. Xu
The 7th International Conference on Wireless Algorithms, Systems, and Applications, Yellow Mountains, Anhui, P.R. China, Aug. 8 10, 2012
PDF
-
Edge-prioritized Channel- and Traffic-aware Uplink Carrier Aggregation in LTE-Advanced Systems
J. Zhu, K. Zeng, K. Kim, P. Mohapatra
IEEE WoWMoM 2012, San Francisco, CA, June 25 - 28, 2012
PDF
-
Improving Crowd-Sourced Wi-Fi Localization Systems using Bluetooth Beacons
R. Sivaraj, A. Pande, K. Zeng, K. Govindan, P. Mohapatra
IEEE SECON 2012, Seoul, Korea, June 18-21, 2012
PDF
-
Transmit Power Estimation with a Single Monitor in Multi-band Networks
S. Chen, K. Zeng, N. Cheng, P. Mohapatra
IEEE SECON 2012, Seoul, Korea, June 18-21, 2012
PDF
-
Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
S. Jana, K. Zeng, P. Mohapatra
IEEE Infocom 2012, Mini-Conference, Florida, March 25-30, 2012
PDF
2011
-
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links
M. Li, K. Zeng, W. Lou
Elsevier Computer Networks (COMNET), Vol. 55, pp. 2443-2464, July 2011
-
Probability Density of the Received Power in Mobile Networks
K. Govindan, K. Zeng, P. Mohapatra
IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp 3613-3619, 2011
PDF
-
PRONET: Network Trust Assessment Based on Incomplete Provenance
K. Govindan, X. Wang, M. Khan, G. Dogan, K. Zeng, G. Powell, T. Brown, T. Abdelzaher, P. Mohapatra
IEEE Milcom 2011, Baltimore, MD, Nov. 7 - Nov. 10, 2011
PDF
-
Efficient Data Capturing for Network Forensics in Cognitive Radio Networks
S. Chen, K. Zeng, P. Mohapatra
IEEE ICNP 2011, Vancouver, Canada, Oct. 17 - 20, 2011
PDF
-
Identity-based Attack Detection in Mobile Wireless Networks
K. Zeng, K. Govindan, D. Wu, P. Mohapatra
IEEE Infocom 2011, Shanghai, China, April 10-15, 2011. (Acceptance Ratio: 291/1823 = 15.9%)
PDF
-
Adaptive Wireless Channel Probing for Shared Key Generation
Y. Wei, K. Zeng, and P. Mohapatra
IEEE Infocom 2011, Shanghai, China, April 10-15, 2011
PDF
-
Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space
J. Zhu, K. Zeng, K. Kim, P. Mohapatra
IEEE Infocom 2011, Mini-Conference, Shanghai, China, April 10-15, 2011
PDF
-
Good Neighbor: Ad-Hoc Pairing of Nearby Wireless Devices by Multiple Antennas
L. Cai, K. Zeng, H. Chen, P. Mohapatra
NDSS Symposium 2011, San Diego, CA, February 6-9, 2011. (Acceptance Ratio: 28/139 = 20%)
PDF
-
Opportunistic Spectrum Scheduling for Mobile Cognitive Radio Networks in White Space
L. Zhang, K. Zeng, and P. Mohapatra
IEEE WCNC 2011, Quintana Roo, Mexico, March 28-31, 2011
PDF
2010
-
Non-cryptographic Authentication and Identification in Wireless Networks
K. Zeng, K. Govindan, P. Mohapatra
IEEE Wireless Communications, vol. 17, no. 5, pp. 56-62, Oct. 2010
PDF
-
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
K. Zeng, Z. Yang, W. Lou
IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3512-3521, Oct. 2010
PDF
-
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
K. Zeng, D. Wu, A. Chan, P. Mohapatra
IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010. (Acceptance Ratio: 276/1575 = 17.5%)
PDF
-
Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks
A. Chan, K. Zeng, P. Mohapatra, S. J. Lee, S. Banerjee
IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010.(Acceptance Ratio: 276/1575 = 17.5%)
PDF
-
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
K. Zeng, Z. Yang, W. Lou
IEEE Infocom 2010, Mini-Conference, San Deigo, CA, March 15-19, 2010
PDF
-
Jamming-Resistant Communication: Channel Surfing without Negotiation
S. Chen, K. Zeng, P. Mohapatra
IEEE ICC 2010, Cape Town, South Africa, May 23-27, 2010
PDF
2009
-
Location-aided opportunistic forwarding in multirate and multihop wireless networks
K. Zeng, Z. Yang, W. Lou
IEEE Transactions on Vehicular Technology (TVT),vol. 58, no. 6, pp. 3032-3040,July 2009
PDF
-
Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply
K. Zeng, K. Ren, W. Lou, P. J. Moran
ACM Wireless Networks (WINET), vol. 15 , no. 1, Jan. 2009
PDF
-
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
K. Zeng, D. Wu, A. Chan, P. Mohapatra
Poster in IEEE ICNP 2009, Princeton, NJ, Oct. 13-16, 2009
PDF
-
Opportunistic broadcast of warning messages in VANETs with unreliable links
M. Li, W. Lou, K. Zeng
MASS 2009, Macau SAR, China, Oct. 12-15, 2009
PDF
-
FSA: A Fast Coordination Scheme for Opportunistic Routing
Z. Yang, K. Zeng, W. Lou
IEEE ICC 2009, Dresden, Germany, June 2009
PDF
2008
-
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks
K. Zeng, W. Lou, H. Zhai
IEEE Transactions on Wireless Communications (TWC), vol. 7, no. 12, Dec., 2008
PDF
-
Secure and Fault-tolerant Event Boundary Detection in Wireless Sensor Networks
K. Ren, K. Zeng, W. Lou
IEEE Transactions on Wireless Communications (TWC), Vol. 7, no. 1, Jan. 2008
-
Towards secure link quality measurement in multihop wireless networks
K. Zeng, S. Yu, K. Ren, W. Lou, Y. Zhang
IEEE GLOBECOM 2008, New Orleans, LA, Nov., 2008
PDF
-
On End-to-end Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks
K. Zeng, W. Lou, H. Zhai
IEEE Infocom 2008, Phoenix, AZ, April 15-17, 2008. (Acceptance Ratio: 236/1152 = 20.5%)
PDF
2007
-
On throughput efficiency of geographic opportunistic routing in multihop wireless networks
K. Zeng, W. Lou, J. Yang, D. R. Brown III
ACM Mobile Networks and Applications (MONET), vol. 12 , no. 5, pp. 347-357, Dec. 2007
PDF
-
On Broadcast Authentication in Wireless Sensor Networks
K. Ren, W. Lou, K. Zeng, P. J. Moran
IEEE Transactions on Wireless Communications (TWC), Vol. 6, No. 11, pp. 4136-4144, Nov. 2007
-
Multi-rate geographic opportunistic routing in wireless ad hoc networks
K. Zeng, W. Lou, Y. Zhang
IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, October 29-31, 2007
PDF
-
On throughput efficiency of geographic opportunistic routing in multihop wireless networks
K. Zeng, W. Lou, J. Yang, D. R. Brown III
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, British Columbia, Canada, August 14-17, 2007. Best Paper Runner-up
PDF
-
On geographic collaborative forwarding in wireless ad hoc and sensor networks
K. Zeng, W. Lou, J. Yang, D. R. Brown III
International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, USA, August 1-3, 2007
PDF
2006
-
Routing optimization security in mobile IPv6
K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, R. H. Deng
Computer Networks, vol. 50, issue 13, pp.2401-2419, 2006
-
A new approach for random key pre-distribution in large-scale wireless sensor networks
K. Ren, K. Zeng, W. Lou
Journal of Wireless Communication and Mobile Computing (Special Issue on Wireless Networks Security), vol. 6, issue 3, pp. 307-318, 2006
-
Energy Aware Efficient Geographic Routing in Lossy Wireless Sensor Networks with Environmental Energy Supply
K. Zeng, K. Ren, W. Lou
The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, Ontario, Canada, August 7-9, 2006
PDF
-
Fault-tolerant event boundary detection in wireless sensor networks
K. Ren, K. Zeng, W. Lou
IEEE Global Telecommunications Conference (GLOBECOM 2006), November 27-December 1, 2006, San Francisco, CA, USA
-
Energy-efficient geographic routing in environmentally powered wireless sensor networks
K. Zeng, W. Lou, J. Yang, D. R. Brown III
IEEE Military Communication Conference (MILCOM 2006), Washington, DC, October 23-25, 2006
PDF
-
On broadcast authentication in wireless sensor networks
K. Ren, K. Zeng, W. Lou, P. J. Moran
Lecture Notes in Computer Science, vol. 4138, pp. 502-514. International Conference on Wireless Algorithms, Systems, and Applications (WASA 2006), Xi'an, China , August 15-18, 2006. Best Paper Award
2005
-
Geographic on-demand disjoint multipath routing in wireless ad hoc networks
K. Zeng, K. Ren, W. Lou
IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ
PDF
-
On efficient key pre-distribution in large scale wireless sensor networks
K. Ren, K. Zeng, W. Lou
IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ
2004
-
Study of Admission Control in Mobile Wireless Cellular Networks with Reconnection Phenomenon
K. Zeng, E. Zhao, and B. Shi,
Journal of HUST, March 2004
2001
-
The Simulation and Analysis of the Wireless Packet Fair Queuing Algorithm on NS-2
K. Zeng, L. Zou
Future Telecommunications Conference 2001, November 29-30, Beijing, China