Wireless Innovation and Cybersecurity Lab (WICL)

Department of Electrical and Computer Engineering

Aerial View of the George Mason Fairfax Campus

Publications

Books

Refereed Journal & Conference Papers

2021

  • Federated Continuous Learning With Broad Network Architecture
    Junqing Le, Xinyu Lei, Nankun Mu, Hengrun Zhang, Kai Zeng, Xiaofeng Liao
    IEEE Transactions on Cybernetics, vol. 51, no. 8, pp. 3874 - 3888, Aug. 2021
  • Online Learning-Based Defense Against Jamming Attacks in Multi-Channel Wireless CPS
    Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Long Jiao, Kai Zeng
    IEEE Internet of Things Journal, Accepted, Mar. 2021

    PDF Code
  • Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks
    Weiwei Li, Ning Wang, Long Jiao, Kai Zeng
    IEEE Access, vol. 9, pp. 60419 - 60432, April. 2021

    PDF
  • Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces
    Long Jiao, Guohua Sun, Junqing Le, Kai Zeng
    In 3rd ACM Workshop on Wireless Security and Machine Learning (WiseML '21), June 28-July 2, 2021, Abu Dhabi, United Arab Emirates

    PDF
  • Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks
    Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng
    IEEE Transactions on Wireless Communications, vol. 20, no. 5, pp. 3321-3335, May 2021
  • Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals
    Pu Wang, Long Jiao, Kai Zeng, and Zheng Yan
    IEEE Infocom'21, May 2021

    PDF
  • Manipulative Attack against Physical Layer Key Agreement and Countermeasures
    Rong Jin, Kai Zeng
    IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 475-489, Jan. 2021.(Impact factor: 6.404)

    PDF
  • A Reassessment of Friendly Jamming Efficiency
    Rong Jin, Kai Zeng
    IEEE Transactions on Mobile Computing, vol. 20, no. 1, pp. 32-47, Jan. 2021. (Impact factor: 5.112)

    PDF

2020

  • Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks
    Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kannan Govindan, Daniel Wu, Prasant Mohapatra
    IEEE TRANSACTIONS ON MOBILE COMPUTING 2020
  • Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead
    Ning Wang, Weiwei Li, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng
    IEEE Network, vol. 34, no. 6, pp. 198-204, Dec. 2020

    PDF
  • Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks
    Ning Wang, Weiwei Li, Amir Alipour-Fanid, Long Jiao, Monireh Dabaghchian, Kai Zeng
    IEEE Transactions on Information Forensics and Security, vol. 16, pp. 658-670, Aug. 2020
  • Impact of Jamming Attacks on Vehicular Cooperative Adaptive Cruise Control Systems
    Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng
    IEEE Transactions on Vehicular Technologies, vol. 69, no. 11, pp. 12679 - 12693, Nov. 2020

    PDF
  • Physical Layer Secure MIMO Communications Against Eavesdroppers with Arbitrary Number of Antennas
    Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kai-Yu Qin
    IEEE Transactions on Information Forensics and Security, vol. 16, pp. 466 - 481, Aug. 2020
  • Secure MIMO-SVD Communications Against Eavesdroppers with any Number of Antennas
    Jie Tang, Hong Wen, Huanhuan Song, Kai Zeng, Kaiyu Qin
    IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11077 - 11089, Oct. 2020
  • Compressed Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications
    Ning Wang, Weiwei Li, Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng
    IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7764 - 7772, Aug. 2020. (Impact factor: 11.750)

    PDF
  • Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks
    Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng
    IEEE Infocom,20, July 2020

    PDF, Data, and Code
  • Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning
    Ning Wang, Junqing Le, Weiwei Li, Long Jiao, Zhihao Li, Kai Zeng
    IEEE CNS, July 2020

    PDF
  • A Practical Downlink NOMA Scheme for Wireless LANs
    Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Qiben Yan, Kai Zeng, Wenjing Lou, Huacheng Zeng
    IEEE Transactions on Communications, vol. 68, no. 4, pp. 2236-2250, Jan. 2020. (Impact factor: 6.720)
  • Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization
    Y. Pan, Y. Hou, M. Li, R. Gerdes, K. Zeng, M. Towfiq, and B. Cetiner
    IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 106-120, Jan. 2020. (Impact factor: 6.404)
  • Efficient Physical Layer Group Key Generation in 5G Wireless Networks
    Long Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng
    IEEE Transactions on Information Forensics and Security, vol. 16, pp. 466 - 481, Aug. 2020

    PDF
  • Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics with Unreliable Conditions
    Jing Xu, Shimin Gong, Yuze Zou, Wei Liu, Kai Zeng, Dusit Niyato
    IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 1, pp. 394 - 407, March 2020

2019

  • Pilot Contamination Attack Detection for NOMA in 5G Mm-Wave Massive MIMO Networks
    Ning Wang, Long Jiao, Amir Alipour Fanid, Monireh Dabaghchian, Kai Zeng
    IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1363-1378, Sept. 2019

    PDF
  • Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic
    Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng
    IEEE Transactions on Information Forensics and Security , Early Access, 2019

    PDF
  • Manipulative Attack against Physical Layer Key Agreement and Countermeasure
    Rong Jin and Kai Zeng
    IEEE Transactions on Dependable and Secure Computing, Early Access, 2019

    PDF
  • A Reassessment on Friendly Jamming Efficiency
    Rong Jin, Kai Zeng, Kai Zhang
    IEEE Transactions on Mobile Computing, Early Access, 2019

    PDF
  • Large-scale Cost-aware Classification Using Feature Computational Dependencies
    Qingzhe Li, Amir Alipour-Fanid, Martin Slawski, Yanfang Ye, Lingfei Wu, Kai Zeng, Liang Zhao
    IEEE Transactions on Knowledge and Data Engineering, Early Access, 2019
  • Physical Layer Key Generation in 5G Wireless Networks
    Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng
    IEEE Wireless Communicaitons, vol. 26, no. 5, pp. 48-54, Oct. 2019
  • Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks
    Jie Tang, Hong Wen, Kai Zeng, Run-fa Liao, Fei Pan, Lin Hu
    IEEE Network, vol. 33, no. 5, pp. 126-133, Sept. 2019

    PDF
  • Physical Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities
    Ning Wang, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng
    IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169-8181, July 2019

    PDF
  • Multi-stage Deep Classifier Cascades for Open World Recognition
    Xiaojie Guo, Amir Alipour-Fanid, Lingfei Wu, Hemant Purohit, Xiang Chen, Kai Zeng, Liang Zhao
    The 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, Nov. 3-7, 2019

    PDF
  • Machine Learning-Based Delay-Aware UAV Detection over Encrypted Wi-Fi Traffic
    Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng
    2019 International Workshop On Cyber-Physical Systems Security, Washington D.C., June, 2019

    PDF
  • Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication
    Ning Wang, Jie Tang, Kai Zeng
    2019 Workshop on Physical-layer Methods for Security and Privacy in 5G and the IoT, Washington D.C., June, 2019
  • Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge
    Hengrun Zhang, Kai Zeng
    IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019
  • Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise
    Pu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan
    IEEE Infocom, Paris, France, April 29 - May 2, 2019

    PDF

2018

  • Secure Inductive-Coupled Near Field Communication at Physical Layer
    Rong Jin, Kai Zeng
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 12, pp. 3078 - 3093, Dec. 2018

    PDF
  • Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks
    Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer
    IEEE/ACM Transactions on Networking, 2018

    PDF
  • Impact of Mobility on Physical Layer Security over Wireless Fading Channels
    Jie Tang, Monireh Dabaghchian, Kai Zeng, Hong Wen
    IEEE Transactions on Wireless Communications, 2018

    PDF
  • Physical layer multi-user key generation in wireless networks
    Rong Jin, Kai Zeng
    Wireless Networks, vol. 24, no. 4, pp. 1043 - 1054, May 2018
  • Robust Spectrum Monitoring in Cognitive Radio Networks with Uncertain Traffic Information
    Wenbo Xu, Jing Xu, Jiachen Li, Wei Liu, Shimin Gong, Kai Zeng
    IEEE Access, vol. 6, 2018

    Link
  • Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication
    Long Jiao, Ning Wang, Kai Zeng
    Abu Dhabi, UAE, December 9 - 13, 2018
  • Efficient Identity Spoofing Attack Detection for IoT in Mm-Wave and Massive MIMO 5G Communication
    Ning Wang, Long Jiao, Pu Wang, Monireh Dabaghchian, Kai Zeng
    IEEE Globecom 2018, Abu Dhabi, UAE, December 9 - 13, 2018
  • Mobility Improves NOMA Physical Layer Security
    Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen
    IEEE Globecom 2018, Abu Dhabi, UAE, December 9 - 13, 2018
  • Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models
    Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng
    4th IEEE International Smart Cities Conference (ISC2), Kansas City, MO, Sept. 16 - 19, 2018
  • Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios
    Yu Chen, Qi Dong, Xiaohua Li, Kai Zeng
    4th IEEE International Smart Cities Conference (ISC2), Kansas City, MO, Sept. 16 - 19, 2018
  • Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel
    Long Jiao, Jie Tang, Kai Zeng
    IEEE Conference on Communications and Network Security (IEEE CNS'18), Beijing, China, May 30 - June 1, 2018

    PDF
  • Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication
    Ning Wang, Long Jiao, Kai Zeng
    IEEE Conference on Communications and Network Security (IEEE CNS'18), Beijing, China, May 30 - June 1, 2018

    PDF
  • Prediction-time Efficient Classification Using Feature Computational Dependencies
    Liang Zhao, Amir Alipour-Fanid, Martin Slawski, Kai Zeng
    KDD 2018, London, UK, August 19 - 23, 2018

    PDF

2017

  • Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios
    Monireh Dabaghchian, Amir Alipour-Fanid, Songsong Liu, Kai Zeng, Xiaohua Li, Yu Chen
    ArXiv, 2017

    PDF
  • Platoon stability and safety analysis of cooperative adaptive cruise control under wireless fading channels and jamming attacks
    Amir Alipour-Fanid, Monireh Dabaghchian, and Kai Zeng
    ArXiv, 2017

    PDF
  • Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization
    Y. Pan, Y. Hou, M. Li, R. Gerdes, K. Zeng, M. Towfiq, B. Cetiner
    IEEE Transactions on Dependable and Secure Computing, 2017
  • Delay Analysis of Physical Layer Key Generation in Dynamic Roadside-to-Vehicle Networks
    R. Jin, Xianru Du, K. Zeng, L. Huang, L. Xiao, J. Xu
    IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2526-2535, March 2017

    PDF
  • Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
    Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng
    International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Warsaw, Poland, Aug. 28 - 30, 2017

    PDF
  • Hardware module-based message authentication in intra-vehicle networks
    Eric Wang, William Xu, Suhas Sastry, Songsong Liu, Kai Zeng
    The ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS'17), Pittsburgh, Pennsylvania, April 18 - 20, 2017

    PDF
  • Throughput optimization in multi-hop wireless networks with reconfigurable antennas
    Yantian Hou, Ming Li, Kai Zeng
    International Conference on Computing, Networking and Communications (ICNC'17), Silicon Valley, USA, Jan. 26 - 29, 2017

    PDF
  • String stability analysis of cooperative adaptive cruise control under jamming attacks
    Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhang, Kai Zeng
    IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Jan. 12 - 14, 2017

    PDF

2016

  • MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers
    R. Jin, K. Zeng, A. Pande, P. Mohapatra
    IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1306-1320, June 2016

    PDF
  • Practical Secret Key Agreement for Full-Duplex Near Field Communications
    R. Jin, X. Du , Z. Deng, K. Zeng, J. Xu
    IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 938-951, April 2016

    PDF
  • Sniffer Channel Assignment with Imperfect Monitoring for Cognitive Radio Networks
    J. Xu, Q. Wang, K. Zeng, and M. Liu
    IEEE Transactions on Wireless Communications (TWC), vol. 15, no. 3, pp. 1703-1715, March 2016

    PDF
  • Intelligence Measure of Cognitive Radios with Learning Capabilities
    M. Dabaghchian, S. Liu, A. Alipour-Fanid, K. Zeng, X. Li, Y. Chen
    IEEE GlobeCom 2016, Washington DC, Dec. 4 - 8, 2016

    PDF
  • Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
    M. Dabaghchian, A. Alipour-Fanid, K. Zeng, Q. Wang
    IEEE Conference on Communications and Network Security (IEEE CNS'16), Philadelphia, PA, Oct. 17 - 19, 2016

    PDF
  • Integration of Machine Learning and Human Learning for Training Optimization in Robust Linear Regression
    X. Li, Y. Chen, K. Zeng
    The 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'16), Shanghai, China, March 20 - 25, 2016

    PDF
  • Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment
    J. Xu, W. Liu, and K. Zeng
    IEEE LCN 2016, Dubai, UAE, Nov. 7 - 10, 2016

2015

  • Physical Layer Key Generation in Wireless Networks: Challenges and Opportunities
    K. Zeng
    IEEE Communications Magazine, vol. 53, no. 6, pp. 33-39, June 2015

    PDF
  • Live Video Forensics: Source Identification in Lossy Wireless Networks
    S. Chen, A. Pande, K. Zeng, P. Mohapatra
    IEEE Tansactions on Information Forensics and Security, vol. 10, no. 1, pp. 28-39, Jan. 2015

    PDF
  • SecNFC: Securing Inductively-Coupled Near Field Communication at Physical Layer
    R. Jin, K. Zeng
    IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015

    PDF
  • Physical Layer Key Agreement under Signal Injection Attack
    R. Jin, K. Zeng
    IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015

    PDF
  • Online Learning for Unreliable Passive Monitoring in Multi-Channel Wireless Networks
    J. Xu, K. Zeng, W. Liu
    IEEE ICC 2015, London, UK, June 8 - 12, 2015

    PDF
  • Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice
    Y. Hou, M. Li, R. Chauhan, R. M. Gerdes, K. Zengu
    the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15), Singapore, Apr. 2015

2014

  • Efficient Data Capturing for Network Forensics in Cognitive Radio Networks
    S. Chen, K. Zeng, P. Mohapatra
    IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 1988-2000, Dec. 2014

    PDF
  • Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise
    D. Shan, K. Zeng, P. Richardson, W. Xiang
    EAI Endorsed Transactions on Cognitive Communications, vol. 1, no. 1, pp. 1-13, July, 2014

    PDF
  • Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications
    D. Shan, P. Richardson, W. Xiang, K. Zeng, H. Qian, S. Addepalli
    Vehicular Communications, vol. 1, no. 2, pp. 67-77, April, 2014

    PDF
  • MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity
    R. Jin, L. Shi, K. Zeng, A. Pande, P. Mohapatra
    IEEE Conference on Commnunications and Network Security (IEEE CNS'14), San Francisco, CA, Oct. 29 - 31, 2014

    PDF
  • Practical Secret Key Agreement for Full-Duplex Near Field Communications
    R. Jin, X. Du, Z. Deng, K. Zeng, J. Xu
    ACM ASIACCS 2014, Kyoto, Japan, June 4 - 6, 2014

    PDF
  • Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty
    J. Xu, Q. Wang, R. Jin, K. Zeng, M. Liu
    Milcom 2014, Baltimore, MD, Oct. 6 - 8, 2014

    PDF
  • Delay Analysis of Physical Layer Key Generation in Multi-user Dynamic Wireless Networks
    R. Jin, X. Du, K. Zeng, L. Xiao, J. Xu
    IEEE ICC 2014, Sydney, Australia, June 10 - 14, 2014

    PDF
  • Physical Layer Challenge-Response Authentication in Wireless Networks with Relay
    X. Du, D. Shan, K. Zeng, L. Huie
    IEEE Infocom 2014, Toronto, Canada, April 27 - May 2, 2014

    PDF

2013

  • Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
    S. Jana, K. Zeng, W. Cheng, P. Mohapatra
    IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1497-1507, Sept. 2013

    PDF
  • PHY-CRAM: Physical Layer Challenge-Response Authentication for Wireless Networks
    D. Shan, K. Zeng, W. Xiang, P. Richardson, Y. Dong
    IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1817-1827, Sept. 2013

    PDF
  • Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space
    D. Shan, P. Richardson, W. Xiang, K. Zeng, H. Qian, S. Addepalli
    IEEE Transactions on Mobile Computing, vol.12, no.3, pp. 401- 411, March 2013

    PDF
  • Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller
    Y. Wei, K. Zeng, P. Mohapatra
    IEEE Transactions on Mobile Computing (TMC), vol. 12, no. 9, pp. 1842- 1852, Sept. 2013

    PDF
  • iSens: Detecting Hidden Busy Channels in WM Systems with Interactive Sensing for CRN
    D. Shan, K. Zeng, P. Richardson, W. Xiang
    IEEE GlobeCom 2013, Atlanta, GA, Dec. 9-13, 2013

    PDF
  • Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise
    D. Shan, K. Zeng, P. Richardson, W. Xiang
    The 8th International Conference on Cognitive Radio Oriented Wireless Networks (CrownCom) 2013, Washington DC, July 8 - 10, 2013

    PDF
  • Video Source Identification in Lossy Wireless Networks
    S. Chen, A. Pande, K. Zeng, P. Mohapatra
    IEEE Infocom 2013, Mini-Conference, Turin, Italy, Apr. 14-19, 2013

    PDF

2012

  • On Energy Efficiency of Geographic Opportunistic Routing in Lossy Multihop Wireless Networks
    K. Zeng, J. Yang, W. Lou
    ACM WINET, vol. 18, no. 8, pp 967-983, Nov. 2012
  • Chaining for Securing Data Provenance in Distributed Information Networks
    X. Wang, K. Zeng, K. Govindan, P. Mohapatra
    IEEE Milcom 2012, Orlando, FL, Oct. 29 - Nov. 1, 2012

    PDF
  • Fast Rendezvous for Cognitive Radios by Exploiting Power Leakage At Adjacent Channels
    L. Zhang, K. Tan, K. Zeng, P. Mohapatra
    IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sydney, Australia, Sept. 9-12, 2012
  • Detecting Spectrum Misuse in Wireless Networks
    K. Tan, K. Zeng, D. Wu, P. Mohapatra
    The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Las Vegas, Nevada, USA, October 8-11, 2012

    PDF
  • Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models
    S. Yi, K. Zeng, J. Xu
    The 7th International Conference on Wireless Algorithms, Systems, and Applications, Yellow Mountains, Anhui, P.R. China, Aug. 8 10, 2012

    PDF
  • Edge-prioritized Channel- and Traffic-aware Uplink Carrier Aggregation in LTE-Advanced Systems
    J. Zhu, K. Zeng, K. Kim, P. Mohapatra
    IEEE WoWMoM 2012, San Francisco, CA, June 25 - 28, 2012

    PDF
  • Improving Crowd-Sourced Wi-Fi Localization Systems using Bluetooth Beacons
    R. Sivaraj, A. Pande, K. Zeng, K. Govindan, P. Mohapatra
    IEEE SECON 2012, Seoul, Korea, June 18-21, 2012

    PDF
  • Transmit Power Estimation with a Single Monitor in Multi-band Networks
    S. Chen, K. Zeng, N. Cheng, P. Mohapatra
    IEEE SECON 2012, Seoul, Korea, June 18-21, 2012

    PDF
  • Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
    S. Jana, K. Zeng, P. Mohapatra
    IEEE Infocom 2012, Mini-Conference, Florida, March 25-30, 2012

    PDF

2011

  • OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links
    M. Li, K. Zeng, W. Lou
    Elsevier Computer Networks (COMNET), Vol. 55, pp. 2443-2464, July 2011
  • Probability Density of the Received Power in Mobile Networks
    K. Govindan, K. Zeng, P. Mohapatra
    IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp 3613-3619, 2011

    PDF
  • PRONET: Network Trust Assessment Based on Incomplete Provenance
    K. Govindan, X. Wang, M. Khan, G. Dogan, K. Zeng, G. Powell, T. Brown, T. Abdelzaher, P. Mohapatra
    IEEE Milcom 2011, Baltimore, MD, Nov. 7 - Nov. 10, 2011

    PDF
  • Efficient Data Capturing for Network Forensics in Cognitive Radio Networks
    S. Chen, K. Zeng, P. Mohapatra
    IEEE ICNP 2011, Vancouver, Canada, Oct. 17 - 20, 2011

    PDF
  • Identity-based Attack Detection in Mobile Wireless Networks
    K. Zeng, K. Govindan, D. Wu, P. Mohapatra
    IEEE Infocom 2011, Shanghai, China, April 10-15, 2011. (Acceptance Ratio: 291/1823 = 15.9%)

    PDF
  • Adaptive Wireless Channel Probing for Shared Key Generation
    Y. Wei, K. Zeng, and P. Mohapatra
    IEEE Infocom 2011, Shanghai, China, April 10-15, 2011

    PDF
  • Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space
    J. Zhu, K. Zeng, K. Kim, P. Mohapatra
    IEEE Infocom 2011, Mini-Conference, Shanghai, China, April 10-15, 2011

    PDF
  • Good Neighbor: Ad-Hoc Pairing of Nearby Wireless Devices by Multiple Antennas
    L. Cai, K. Zeng, H. Chen, P. Mohapatra
    NDSS Symposium 2011, San Diego, CA, February 6-9, 2011. (Acceptance Ratio: 28/139 = 20%)

    PDF
  • Opportunistic Spectrum Scheduling for Mobile Cognitive Radio Networks in White Space
    L. Zhang, K. Zeng, and P. Mohapatra
    IEEE WCNC 2011, Quintana Roo, Mexico, March 28-31, 2011

    PDF

2010

  • Non-cryptographic Authentication and Identification in Wireless Networks
    K. Zeng, K. Govindan, P. Mohapatra
    IEEE Wireless Communications, vol. 17, no. 5, pp. 56-62, Oct. 2010

    PDF
  • Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
    K. Zeng, Z. Yang, W. Lou
    IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3512-3521, Oct. 2010

    PDF
  • Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
    K. Zeng, D. Wu, A. Chan, P. Mohapatra
    IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010. (Acceptance Ratio: 276/1575 = 17.5%)

    PDF
  • Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks
    A. Chan, K. Zeng, P. Mohapatra, S. J. Lee, S. Banerjee
    IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010.(Acceptance Ratio: 276/1575 = 17.5%)

    PDF
  • Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
    K. Zeng, Z. Yang, W. Lou
    IEEE Infocom 2010, Mini-Conference, San Deigo, CA, March 15-19, 2010

    PDF
  • Jamming-Resistant Communication: Channel Surfing without Negotiation
    S. Chen, K. Zeng, P. Mohapatra
    IEEE ICC 2010, Cape Town, South Africa, May 23-27, 2010

    PDF

2009

  • Location-aided opportunistic forwarding in multirate and multihop wireless networks
    K. Zeng, Z. Yang, W. Lou
    IEEE Transactions on Vehicular Technology (TVT),vol. 58, no. 6, pp. 3032-3040,July 2009

    PDF
  • Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply
    K. Zeng, K. Ren, W. Lou, P. J. Moran
    ACM Wireless Networks (WINET), vol. 15 , no. 1, Jan. 2009

    PDF
  • Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
    K. Zeng, D. Wu, A. Chan, P. Mohapatra
    Poster in IEEE ICNP 2009, Princeton, NJ, Oct. 13-16, 2009

    PDF
  • Opportunistic broadcast of warning messages in VANETs with unreliable links
    M. Li, W. Lou, K. Zeng
    MASS 2009, Macau SAR, China, Oct. 12-15, 2009

    PDF
  • FSA: A Fast Coordination Scheme for Opportunistic Routing
    Z. Yang, K. Zeng, W. Lou
    IEEE ICC 2009, Dresden, Germany, June 2009

    PDF

2008

  • Capacity of opportunistic routing in multi-rate and multi-hop wireless networks
    K. Zeng, W. Lou, H. Zhai
    IEEE Transactions on Wireless Communications (TWC), vol. 7, no. 12, Dec., 2008

    PDF
  • Secure and Fault-tolerant Event Boundary Detection in Wireless Sensor Networks
    K. Ren, K. Zeng, W. Lou
    IEEE Transactions on Wireless Communications (TWC), Vol. 7, no. 1, Jan. 2008
  • Towards secure link quality measurement in multihop wireless networks
    K. Zeng, S. Yu, K. Ren, W. Lou, Y. Zhang
    IEEE GLOBECOM 2008, New Orleans, LA, Nov., 2008

    PDF
  • On End-to-end Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks
    K. Zeng, W. Lou, H. Zhai
    IEEE Infocom 2008, Phoenix, AZ, April 15-17, 2008. (Acceptance Ratio: 236/1152 = 20.5%)

    PDF

2007

  • On throughput efficiency of geographic opportunistic routing in multihop wireless networks
    K. Zeng, W. Lou, J. Yang, D. R. Brown III
    ACM Mobile Networks and Applications (MONET), vol. 12 , no. 5, pp. 347-357, Dec. 2007

    PDF
  • On Broadcast Authentication in Wireless Sensor Networks
    K. Ren, W. Lou, K. Zeng, P. J. Moran
    IEEE Transactions on Wireless Communications (TWC), Vol. 6, No. 11, pp. 4136-4144, Nov. 2007
  • Multi-rate geographic opportunistic routing in wireless ad hoc networks
    K. Zeng, W. Lou, Y. Zhang
    IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, October 29-31, 2007

    PDF
  • On throughput efficiency of geographic opportunistic routing in multihop wireless networks
    K. Zeng, W. Lou, J. Yang, D. R. Brown III
    The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, British Columbia, Canada, August 14-17, 2007. Best Paper Runner-up

    PDF
  • On geographic collaborative forwarding in wireless ad hoc and sensor networks
    K. Zeng, W. Lou, J. Yang, D. R. Brown III
    International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, USA, August 1-3, 2007

    PDF

2006

  • Routing optimization security in mobile IPv6
    K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, R. H. Deng
    Computer Networks, vol. 50, issue 13, pp.2401-2419, 2006
  • A new approach for random key pre-distribution in large-scale wireless sensor networks
    K. Ren, K. Zeng, W. Lou
    Journal of Wireless Communication and Mobile Computing (Special Issue on Wireless Networks Security), vol. 6, issue 3, pp. 307-318, 2006
  • Energy Aware Efficient Geographic Routing in Lossy Wireless Sensor Networks with Environmental Energy Supply
    K. Zeng, K. Ren, W. Lou
    The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, Ontario, Canada, August 7-9, 2006

    PDF
  • Fault-tolerant event boundary detection in wireless sensor networks
    K. Ren, K. Zeng, W. Lou
    IEEE Global Telecommunications Conference (GLOBECOM 2006), November 27-December 1, 2006, San Francisco, CA, USA
  • Energy-efficient geographic routing in environmentally powered wireless sensor networks
    K. Zeng, W. Lou, J. Yang, D. R. Brown III
    IEEE Military Communication Conference (MILCOM 2006), Washington, DC, October 23-25, 2006

    PDF
  • On broadcast authentication in wireless sensor networks
    K. Ren, K. Zeng, W. Lou, P. J. Moran
    Lecture Notes in Computer Science, vol. 4138, pp. 502-514. International Conference on Wireless Algorithms, Systems, and Applications (WASA 2006), Xi'an, China , August 15-18, 2006. Best Paper Award

2005

  • Geographic on-demand disjoint multipath routing in wireless ad hoc networks
    K. Zeng, K. Ren, W. Lou
    IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ

    PDF
  • On efficient key pre-distribution in large scale wireless sensor networks
    K. Ren, K. Zeng, W. Lou
    IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ

2004

  • Study of Admission Control in Mobile Wireless Cellular Networks with Reconnection Phenomenon
    K. Zeng, E. Zhao, and B. Shi,
    Journal of HUST, March 2004

2001

  • The Simulation and Analysis of the Wireless Packet Fair Queuing Algorithm on NS-2
    K. Zeng, L. Zou
    Future Telecommunications Conference 2001, November 29-30, Beijing, China