default search action
Long Jiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j20]Long Jiao, Xiao Luo, Lingyan Zha, Hua Bao, Jingjin Zhang, Xiaokun Gu:
Machine learning assisted water management strategy on a self-sustaining seawater desalination and vegetable cultivation platform. Comput. Electron. Agric. 217: 108569 (2024) - [j19]Qi Jiang, Rui Wang, Libin Dou, Long Jiao, Cheng Hu:
A Gaussian Mixture CPHD Filter for Multi-Target Tracking in Target-Dependent False Alarms. Remote. Sens. 16(2): 251 (2024) - 2023
- [j18]Long Jiao, Yao Ge, Kai Zeng, Benjamin C. Hilburn:
Location Privacy and Spectrum Efficiency Enhancement in Spectrum Sharing Systems. IEEE Trans. Cogn. Commun. Netw. 9(6): 1472-1488 (2023) - [j17]Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, Yishan Yang:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 18: 948-964 (2023) - [j16]Junqing Le, Di Zhang, Xinyu Lei, Long Jiao, Kai Zeng, Xiaofeng Liao:
Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers. IEEE Trans. Inf. Forensics Secur. 18: 4329-4344 (2023) - 2022
- [j15]Ning Wang, Weiwei Li, Long Jiao, Amir Alipour-Fanid, Tao Xiang, Kai Zeng:
Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices. IEEE Internet Things J. 9(11): 9036-9048 (2022) - [j14]Jie Tang, Hong Wen, Huan-Huan Song, Long Jiao, Kai Zeng:
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices. IEEE Internet Things J. 9(16): 15228-15239 (2022) - [j13]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kannan Govindan, Daniel Wu, Prasant Mohapatra:
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks. IEEE Trans. Mob. Comput. 21(5): 1657-1671 (2022) - [j12]Long Jiao, Pu Wang, Amir Alipour-Fanid, Huacheng Zeng, Kai Zeng:
Enabling Efficient Blockage-Aware Handover in RIS-Assisted mmWave Cellular Networks. IEEE Trans. Wirel. Commun. 21(4): 2243-2257 (2022) - 2021
- [j11]Weiwei Li, Ning Wang, Long Jiao, Kai Zeng:
Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks. IEEE Access 9: 60419-60432 (2021) - [j10]Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Long Jiao, Kai Zeng:
Online-Learning-Based Defense Against Jamming Attacks in Multichannel Wireless CPS. IEEE Internet Things J. 8(17): 13278-13290 (2021) - [j9]Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kaiyu Qin:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. IEEE Trans. Inf. Forensics Secur. 16: 466-481 (2021) - [j8]Ning Wang, Weiwei Li, Amir Alipour-Fanid, Long Jiao, Monireh Dabaghchian, Kai Zeng:
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks. IEEE Trans. Inf. Forensics Secur. 16: 658-670 (2021) - [j7]Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng:
Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks. IEEE Trans. Wirel. Commun. 20(5): 3321-3335 (2021) - 2020
- [j6]Ning Wang, Weiwei Li, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng:
Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead. IEEE Netw. 34(6): 198-204 (2020) - [j5]Ning Wang, Long Jiao, Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng:
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. IEEE Trans. Inf. Forensics Secur. 15: 1363-1378 (2020) - 2019
- [j4]Ning Wang, Pu Wang, Amir Alipour-Fanid, Long Jiao, Kai Zeng:
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities. IEEE Internet Things J. 6(5): 8169-8181 (2019) - [j3]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. IEEE Wirel. Commun. 26(5): 48-54 (2019) - 2005
- [j2]Ronald-Bryan O. Alferez, Yuan-Fang Wang, Long Jiao:
An Affine-Invariant Tool for Retrieving Images from Homogeneous Databases. Multim. Tools Appl. 25(1): 133-159 (2005) - 2004
- [j1]Long Jiao, Yi-Leh Wu, Gang Wu, Edward Y. Chang, Yuan-Fang Wang:
Anatomy of a multicamera video surveillance system. Multim. Syst. 10(2): 144-163 (2004)
Conference and Workshop Papers
- 2024
- [c17]Amir Alipour-Fanid, Monireh Dabaghchian, Long Jiao, Kai Zeng:
Learning-Based Secure Spectrum Sharing for Intelligent IoT Networks. ISQED 2024: 1-8 - [c16]Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. WISEC 2024: 196-206 - 2022
- [c15]Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. INFOCOM Workshops 2022: 1-2 - [c14]Ya Jiang, Long Jiao, Liang Zhao, Kai Zeng:
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks. WiseML@WiSec 2022: 75-80 - 2021
- [c13]Pu Wang, Long Jiao, Kai Zeng, Zheng Yan:
Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals. INFOCOM 2021: 1-10 - [c12]Long Jiao, Guohua Sun, Junqing Le, Kai Zeng:
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces. WiseML@WiSec 2021: 61-66 - 2020
- [c11]Long Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng:
Efficient Physical Layer Group Key Generation in 5G Wireless Networks. CNS 2020: 1-9 - [c10]Ning Wang, Junqing Le, Weiwei Li, Long Jiao, Zhihao Li, Kai Zeng:
Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning. CNS 2020: 1-9 - [c9]Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng:
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks. INFOCOM 2020: 2579-2588 - 2018
- [c8]Long Jiao, Jie Tang, Kai Zeng:
Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel. CNS 2018: 1-9 - [c7]Ning Wang, Long Jiao, Kai Zeng:
Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication. CNS 2018: 1-9 - [c6]Long Jiao, Ning Wang, Kai Zeng:
Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication. GLOBECOM 2018: 1-6 - [c5]Jie Tang, Long Jiao, Ning Wang, Pu Wang, Kai Zeng, Hong Wen:
Mobility Improves NOMA Physical Layer Security. GLOBECOM 2018: 1-6 - [c4]Ning Wang, Long Jiao, Pu Wang, Monireh Dabaghchian, Kai Zeng:
Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication. GLOBECOM 2018: 1-6 - 2012
- [c3]Guojie Qin, Min Xie, Guoman Liu, Long Jiao, Boxiang Zhou:
A tri-level parallel architecture for NAND flash storage system. BMEI 2012: 1336-1340 - 2003
- [c2]Yi-Leh Wu, Long Jiao, Gang Wu, Edward Y. Chang, Yuan-Fang Wang:
Invariant Feature Extraction and Biased Statistical Inference for Video Surveillance. AVSS 2003: 284-289 - [c1]Gang Wu, Yi-Leh Wu, Long Jiao, Yuan-Fang Wang, Edward Y. Chang:
Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance. ACM Multimedia 2003: 528-538
Informal and Other Publications
- 2024
- [i3]Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. CoRR abs/2405.03045 (2024) - 2023
- [i2]Long Jiao, Yao Ge, Kai Zeng, Benjamin C. Hilburn:
Location Privacy and Spectrum Efficiency Enhancement in Spectrum Sharing Systems. CoRR abs/2308.13884 (2023) - 2019
- [i1]Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng:
Physical Layer Key Generation in 5G Wireless Networks. CoRR abs/1908.10362 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint