


Остановите войну!
for scientists:


default search action
Guyue Li
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Yilun Sun
, Guyue Li
, Hongyi Luo
, Yuexiu Xing
, Shuping Dang
, Aiqun Hu
:
Location-Invariant Radio Frequency Fingerprint for Base Station Recognition. IEEE Wirel. Commun. Lett. 12(9): 1583-1587 (2023) - [c24]Haixi Sun, Guyue Li, Haoyu Li, Aiqun Hu, Yexia Cheng, Ye Tian, Shen He:
A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI. ICCC 2023: 1-6 - [i14]Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang:
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. CoRR abs/2301.01453 (2023) - [i13]Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation. CoRR abs/2303.07015 (2023) - [i12]Lei Hu, Chen Sun, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems. CoRR abs/2303.12455 (2023) - 2022
- [j23]Xinwei Zhang
, Guyue Li
, Junqing Zhang
, Aiqun Hu
, Zongyue Hou, Bin Xiao
:
Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 9(8): 6081-6094 (2022) - [j22]Guyue Li
, Chen Sun
, Wei Xu
, Marco Di Renzo
, Aiqun Hu
:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. IEEE Trans. Inf. Forensics Secur. 17: 211-225 (2022) - [j21]Guyue Li, Lei Hu, Paul Staat
, Harald Elders-Boll
, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? IEEE Wirel. Commun. 29(4): 146-153 (2022) - [c23]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. GLOBECOM 2022: 2352-2357 - [c22]Zhichao Huang, Guyue Li, Aiqun Hu, Jiabao Yu, Siyun Wu:
Recognizing Automotive Ethernet Device by Extracting Fingerprint from Power Spectrum. ICCT 2022: 1442-1446 - [c21]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. INFOCOM 2022: 1-10 - [c20]Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao:
Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. TrustCom 2022: 921-926 - [c19]Yujie Hou, Guyue Li, Shuping Dang
, Lei Hu, Aiqun Hu:
Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation. VTC Fall 2022: 1-5 - [i11]Lei Hu, Guyue Li, Xuewen Qian, Derrick Wing Kwan Ng, Aiqun Hu:
Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation. CoRR abs/2207.11752 (2022) - [i10]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. CoRR abs/2211.03065 (2022) - [i9]Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. CoRR abs/2211.03132 (2022) - 2021
- [j20]Guyue Li
, Zheying Zhang, Junqing Zhang
, Aiqun Hu
:
Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet Things J. 8(1): 357-369 (2021) - [j19]Xinyu Zhou
, Aiqun Hu
, Guyue Li
, Linning Peng
, Yuexiu Xing
, Jiabao Yu
:
A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition. IEEE Internet Things J. 8(14): 11276-11289 (2021) - [j18]Yang Yang
, Aiqun Hu, Jiabao Yu, Guyue Li, Zhen Zhang:
Radio frequency fingerprint identification based on stream differential constellation trace figures. Phys. Commun. 49: 101458 (2021) - [j17]Guyue Li
, Chen Sun
, Eduard A. Jorswieck
, Junqing Zhang
, Aiqun Hu
, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. IEEE Trans. Inf. Forensics Secur. 16: 968-982 (2021) - [j16]Guyue Li
, Yinghao Xu
, Wei Xu
, Eduard A. Jorswieck
, Aiqun Hu
:
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications. IEEE Trans. Inf. Forensics Secur. 16: 5264-5278 (2021) - [j15]Yuexiu Xing
, Ting Wang
, Fen Zhou
, Aiqun Hu
, Guyue Li
, Linning Peng
:
EVAL Cane: Nonintrusive Monitoring Platform With a Novel Gait-Based User-Identification Scheme. IEEE Trans. Instrum. Meas. 70: 1-15 (2021) - [c18]Lei Hu, Guyue Li, Hongyi Luo
, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. VTC Fall 2021: 1-5 - [c17]Hongyi Luo
, Guyue Li, Lei Hu:
On the Security of RIS-assisted Manipulating Attack in MISO systems. VTC Fall 2021: 1-5 - [c16]Xinwei Zhang
, Guyue Li, Zongyue Hou, Aiqun Hu:
Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network. VTC Fall 2021: 1-6 - [i8]You Chen, Guyue Li, Cunhua Pan, Lei Hu, Aiqun Hu:
Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network. CoRR abs/2105.00511 (2021) - [i7]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems. CoRR abs/2105.08364 (2021) - [i6]Lei Hu, Guyue Li, Hongyi Luo, Aiqun Hu:
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. CoRR abs/2108.05497 (2021) - [i5]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. CoRR abs/2112.02273 (2021) - [i4]Guyue Li, Lei Hu, Paul Staat, Harald Elders-Boll, Christian T. Zenger, Christof Paar, Aiqun Hu:
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? CoRR abs/2112.10043 (2021) - 2020
- [j14]Junqing Zhang
, Guyue Li
, Alan Marshall
, Aiqun Hu
, Lajos Hanzo
:
A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels. IEEE Access 8: 138406-138446 (2020) - [j13]Chen Sun
, Guyue Li
:
Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation. IEEE Access 8: 164580-164592 (2020) - [j12]Chen Sun
, Haiyu Yang, Guyue Li
:
AmpRmdr: Remainder-Based Secret Key Generation Using Wireless Channel Amplitude. IEEE Access 8: 228178-228187 (2020) - [j11]Yuexiu Xing
, Aiqun Hu
, Junqing Zhang
, Jiabao Yu
, Guyue Li
, Ting Wang:
Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar. IEEE Internet Things J. 7(10): 10581-10593 (2020) - [c15]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao
:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. ICC 2020: 1-6 - [c14]Chuan He, Yinghao Xu, Jitong Shi, Chongqing Lei, Guyue Li:
Detection Algorithm of the Mimicry Attack and Its Implementation in the ZigBee Platform. ICCT 2020: 1083-1088 - [i3]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. CoRR abs/2005.08476 (2020) - [i2]Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. CoRR abs/2009.09142 (2020)
2010 – 2019
- 2019
- [j10]Guyue Li
, Jiabao Yu, Yuexiu Xing, Aiqun Hu:
Location-Invariant Physical Layer Identification Approach for WiFi Devices. IEEE Access 7: 106974-106986 (2019) - [j9]Guyue Li
, Chen Sun, Junqing Zhang
, Eduard A. Jorswieck
, Bin Xiao
, Aiqun Hu:
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 21(5): 497 (2019) - [j8]Guyue Li
, Zheying Zhang, Yi Yu, Aiqun Hu:
A Hybrid Information Reconciliation Method for Physical Layer Key Generation. Entropy 21(7): 688 (2019) - [j7]Boqian Liu
, Aiqun Hu
, Guyue Li
:
Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems. IEEE Commun. Lett. 23(9): 1493-1496 (2019) - [j6]Jiabao Yu
, Aiqun Hu
, Guyue Li
, Linning Peng
:
A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network. IEEE Internet Things J. 6(4): 6786-6799 (2019) - [j5]Linning Peng
, Guyue Li
, Junqing Zhang
, Roger F. Woods
, Ming Liu, Aiqun Hu
:
An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation. IEEE Trans. Mob. Comput. 18(3): 507-519 (2019) - [j4]Junqing Zhang
, Ming Ding
, Guyue Li
, Alan Marshall
:
Key Generation Based on Large Scale Fading. IEEE Trans. Veh. Technol. 68(8): 8222-8226 (2019) - [c13]Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing
, Jiabao Yu:
Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification. CNS 2019: 196-204 - [c12]Guyue Li, Liangjun Hu, Aiqun Hu:
Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks. ICC Workshops 2019: 1-6 - [c11]Li Yao, Linning Peng, Guyue Li, Hua Fu, Aiqun Hu:
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels. ICCT 2019: 113-117 - [c10]Yufan Wang, Linning Peng, Hua Fu, Guyue Li, Aiqun Hu:
Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System. ICCT 2019: 270-275 - [c9]Zheying Zhang, Guyue Li, Aiqun Hu:
An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation. VTC Spring 2019: 1-5 - [c8]Yuexiu Xing
, Aiqun Hu, Jiabao Yu, Guyue Li, Linning Peng, Fen Zhou:
A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars. WiMob 2019: 1-6 - [c7]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing
, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. WiMob 2019: 1-6 - [i1]Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. CoRR abs/1907.08809 (2019) - 2018
- [j3]Yuexiu Xing
, Aiqun Hu
, Junqing Zhang
, Linning Peng
, Guyue Li
:
On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios. IEEE Commun. Lett. 22(11): 2326-2329 (2018) - [j2]Guyue Li
, Aiqun Hu
, Chen Sun
, Junqing Zhang
:
Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems. IEEE Commun. Lett. 22(12): 2487-2490 (2018) - [j1]Guyue Li
, Aiqun Hu
, Junqing Zhang
, Linning Peng
, Chen Sun
, Daming Cao
:
High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing. IEEE Trans. Commun. 66(7): 3022-3034 (2018) - [c6]Linning Peng, Guyue Li, Junqing Zhang, Aiqun Hu:
Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels. GLOBECOM Workshops 2018: 1-6 - 2017
- [c5]Guyue Li, Aiqun Hu, Junqing Zhang
, Bin Xiao
:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. GLOBECOM 2017: 1-6 - 2016
- [c4]Guyue Li, Aiqun Hu, Linning Peng, Chen Sun:
The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements. GLOBECOM Workshops 2016: 1-6 - 2015
- [c3]Guyue Li, Aiqun Hu, Yaning Zou, Linning Peng, Mikko Valkama
:
A Novel Transform for Secret Key Generation in Time-Varying TDD Channel under Hardware Fingerprint Deviation. VTC Fall 2015: 1-5 - 2014
- [c2]Guyue Li, Zhaoquan Gu, Xiao Lin, Haosen Pu, Qiang-Sheng Hua:
Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks. MSWiM 2014: 313-320 - 2013
- [c1]Mingfu Xue, Aiqun Hu, Yi Huang, Guyue Li:
Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection. DASC 2013: 131-136
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint