default search action
Hong Li 0003
Person information
- affiliation (PhD 2009): Tsinghua University, Department of Electronic Engineering, Beijing, China
Other persons with the same name
- Hong Li — disambiguation page
- Hong Li 0001 — DFKI, Language Technology Lab, Saarbrücken, Germany
- Hong Li 0002 — Beijing Jiaotong University, School of Electrical Engineering, China (and 1 more)
- Hong Li 0004 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing Key Laboratory of IOT Information Security, China
- Hong Li 0005 — Xianyang Normal University, School of Computer Science, China (and 1 more)
- Hong Li 0006 — Inner Mongolia University, School of Mathematical Sciences, Hohhot, China
- Hong Li 0007 — Xidian University, School of Mathematics and Statistics, National Key Laboratory of Antennas and Microwave Technology, Xi'an, China
- Hong Li 0008 — University of Lapland, Rovaniemi, Finland
- Hong Li 0009 — Huazhong University of Science and Technology, School of Mathematics and Statistics, Wuhan, China
- Hong Li 0010 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, China
- Hong Li 0011 — New Jersey Institute of Technology, Center for Wireless Communication and Signal Processing Research, Newark, NJ, USA
- Hong Li 0012 — NXP Semiconductors, Eindhoven, The Netherlands (and 3 more)
- Hong Li 0013 — Chinese Academy of Sciences, Shanghai Institutes for Biological Sciences, Key Laboratory of Computational Biology, China
- Hong Li 0014 — East Carolina University, Department of Information Management Systems, Greenville, NC, USA
- Hong Li 0015 — Shanghai Jiao Tong University, Shanghai, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Weiyu Gao, Hong Li, Minghan Zhong, Mingquan Lu:
An Innovation-Bounded Kalman Filtering Approach Securing GNSS Timing in Industrial Networks. IEEE Trans. Ind. Electron. 71(9): 11388-11397 (2024) - [j16]Ziheng Zhou, Hong Li, Zhiyuan Chen, Mingquan Lu:
Velocity Consistency Checking Based GNSS Spoofing Detection Method for Vehicles. IEEE Trans. Veh. Technol. 73(2): 1974-1990 (2024) - 2023
- [j15]Weiyu Gao, Hong Li, Minghan Zhong, Mingquan Lu:
The Separate Clock Drift Matched Filter to Detect Time Synchronization Attacks Toward Global Navigation Satellite Systems. IEEE Trans. Ind. Electron. 70(6): 6305-6315 (2023) - [j14]Weiyu Gao, Hong Li, Minghan Zhong, Mingquan Lu:
An Underestimated Cybersecurity Problem: Quick-Impact Time Synchronization Attacks and a Fast-Triggered Detection Method. IEEE Trans. Smart Grid 14(6): 4784-4798 (2023) - [j13]Zhongxiao Wang, Xiaoming Zhang, Ziheng Zhou, Mingquan Lu, Hong Li:
GNSS Spoofer Localization for Vehicles Based on Doppler and Clock Drift Double Difference. IEEE Trans. Veh. Technol. 72(4): 4466-4481 (2023) - 2020
- [j12]Shunshun Shang, Hong Li, Chenxi Peng, Mingquan Lu:
A Novel Method for GNSS Meaconer Localization Based on a Space-Time Double-Difference Model. IEEE Trans. Aerosp. Electron. Syst. 56(5): 3432-3449 (2020)
2010 – 2019
- 2018
- [j11]Fei Wang, Hong Li, Mingquan Lu:
GNSS Spoofing Detection Based on Unsynchronized Double-Antenna Measurements. IEEE Access 6: 31203-31212 (2018) - [j10]Meng Zhou, Hong Li, Mingquan Lu:
Calculation of the lower limit of the spoofing-signal ratio for a GNSS receiver-spoofer. EURASIP J. Wirel. Commun. Netw. 2018: 44 (2018) - 2017
- [j9]Fei Wang, Hong Li, Mingquan Lu:
GNSS Spoofing Countermeasure With a Single Rotating Antenna. IEEE Access 5: 8039-8047 (2017) - [j8]Fei Wang, Hong Li, Mingquan Lu:
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation. Sensors 17(7): 1532 (2017) - 2016
- [j7]Huiqi Tao, Hong Li, Mingquan Lu:
A Method of Detections' Fusion for GNSS Anti-Spoofing. Sensors 16(12): 2187 (2016) - 2015
- [j6]Hong Li, Mingquan Lu:
Double-chipwise correlation technique for efficient L2C signal acquisition. IEEE Trans. Aerosp. Electron. Syst. 51(2): 1575-1582 (2015) - 2014
- [j5]Hong Li, Mingquan Lu:
Research on global positioning system M-code acquisition method and the acquisition performance. IET Commun. 8(5): 587-596 (2014) - 2013
- [c1]Qiang Wang, Hong Li, Mingquan Lu:
Residual vector analysis method (RVAM) for evaluating the performance of GNSS Part of Channels' replay attacks. ChinaSIP 2013: 561-565 - 2010
- [j4]Hong Li, Mingquan Lu, Zhenming Feng:
Mapping and overlapping based carrier frequency searching technique for rapid GNSS long PN-code acquisition. Sci. China Inf. Sci. 53(12): 2642-2652 (2010)
2000 – 2009
- 2009
- [j3]Hong Li, Mingquan Lu, Xiaowei Cui, Zhenming Feng:
Generalized zero-padding scheme for direct GPS P-code acquisition. IEEE Trans. Wirel. Commun. 8(6): 2866-2871 (2009) - 2008
- [j2]Hong Li, Mingquan Lu, Zhenming Feng:
Improved Zero-Padding Method for Rapid Long PN-Code Acquisition. IEEE Trans. Signal Process. 56(8-1): 3795-3799 (2008) - [j1]Hong Li, Xiaowei Cui, Mingquan Lu, Zhenming Feng:
Dual-folding based rapid search method for long PN-code acquisition. IEEE Trans. Wirel. Commun. 7(12-2): 5286-5296 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint