


Остановите войну!
for scientists:


default search action
Hong Wen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j111]Baofeng Ji
, Mingkun Zhang, Ling Xing, Xiaoli Li, Chunguo Li, Congzheng Han, Hong Wen:
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract. Digit. Commun. Networks 9(1): 47-55 (2023) - [j110]Huanhuan Song
, Hong Wen
, Jie Tang
, Pin-Han Ho
, Runhui Zhao:
Secrecy Energy Efficiency Maximization for Distributed Intelligent-Reflecting-Surface-Assisted MISO Secure Communications. IEEE Internet Things J. 10(5): 4462-4474 (2023) - 2022
- [j109]Jie Tang
, Hong Wen, Huanhuan Song:
Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity. IET Commun. 16(3): 206-217 (2022) - [j108]Wenjing Hou
, Hong Wen
, Ning Zhang
, Jinsong Wu
, Wenxin Lei
, Runhui Zhao:
Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things. IEEE Internet Things J. 9(1): 706-718 (2022) - [j107]Yi Chen
, Pin-Han Ho
, Hong Wen
, Shih Yu Chang
, Shahriar Real
:
On Physical-Layer Authentication via Online Transfer Learning. IEEE Internet Things J. 9(2): 1374-1385 (2022) - [j106]Jie Tang
, Hong Wen
, Huan-Huan Song
, Long Jiao, Kai Zeng
:
Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices. IEEE Internet Things J. 9(16): 15228-15239 (2022) - [j105]Baofeng Ji, Yifan Liu, Ling Xing, Chunguo Li, Gaoyuan Zhang, Congzheng Han, Hong Wen, Shahid Mumtaz:
Survey of Secure Communications of Internet of Things with Artificial Intelligence. IEEE Internet Things Mag. 5(3): 92-99 (2022) - [j104]Baofeng Ji, Zhenzhen Chen, Shahid Mumtaz, Congzheng Han, Chunguo Li, Hong Wen, Dan Wang:
A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends. IEEE Netw. 36(2): 153-161 (2022) - [j103]Yi Chen, Kadhim Hayawi
, Qian Zhao, Junjie Mou, Ling Yang, Jie Tang, Qing Li, Hong Wen
:
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors 22(18): 6789 (2022) - [j102]Yi Chen, Kadhim Hayawi
, Meikai Fan, Shih Yu Chang, Jie Tang, Ling Yang, Rui Zhao, Zhongqi Mao, Hong Wen
:
A Bilevel Optimization Model Based on Edge Computing for Microgrid. Sensors 22(20): 7710 (2022) - [j101]FeiYi Xie
, Zhibo Pang
, Hong Wen
, Wenxin Lei
, Xinchen Xu:
Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks. IEEE Trans. Ind. Informatics 18(4): 2796-2806 (2022) - [j100]Wenxin Lei
, Zhibo Pang
, Hong Wen
, Wenjing Hou
, Wen Han:
FDI Attack Detection at the Edge of Smart Grids Based on Classification of Predicted Residuals. IEEE Trans. Ind. Informatics 18(12): 9302-9311 (2022) - [j99]Baofeng Ji
, Ying Han
, Yanan Wang
, Dun Cao
, Fazhan Tao
, Zhumu Fu, Peng Li, Hong Wen
:
Relay Cooperative Transmission Algorithms for IoV Under Aggregated Interference. IEEE Trans. Intell. Transp. Syst. 23(7): 9712-9725 (2022) - [j98]Jie Tang
, Long Jiao
, Kai Zeng
, Hong Wen
, Kannan Govindan, Daniel Wu, Prasant Mohapatra
:
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks. IEEE Trans. Mob. Comput. 21(5): 1657-1671 (2022) - [c91]Wanjie Tao, Yu Li, Liangyue Li, Zulong Chen, Hong Wen, Peilin Chen, Tingting Liang, Quan Lu:
SMINet: State-Aware Multi-Aspect Interests Representation Network for Cold-Start Users Recommendation. AAAI 2022: 8476-8484 - [c90]Qijie Shen, Hong Wen, Jing Zhang, Qi Rao:
Hierarchically Fusing Long and Short-Term User Interests for Click-Through Rate Prediction in Product Search. CIKM 2022: 1767-1776 - [c89]Wanjie Tao, Zhang-Hua Fu, Liangyue Li, Zulong Chen, Hong Wen, Yuanyuan Liu, Qijie Shen, Peilin Chen:
A Dual Channel Intent Evolution Network for Predicting Period-Aware Travel Intentions at Fliggy. CIKM 2022: 3524-3533 - [c88]Fanwei Zhu, Zulong Chen, Fan Zhang, Jiazhen Lou, Hong Wen, Shui Liu, Qi Rao, Tengfei Yuan, Shenghua Ni, Jinxin Hu, Fuzhen Sun, Quan Lu:
SASNet: Stage-aware Sequential Matching for Online Travel Recommendation. CIKM 2022: 3725-3734 - [c87]Lin Hu
, Junxiang Peng, Yan Zhang, Hong Wen, Shuai Tan, Jiabing Fan:
Artificial Noise Assisted Interference Alignment for Physical Layer Security Enhancement. GLOBECOM 2022: 4148-4153 - [c86]Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. INFOCOM Workshops 2022: 1-2 - [c85]Wenjing Hou, Hong Wen, Ning Zhang, Wenxin Lei, Haojie Lin:
Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid. INFOCOM Workshops 2022: 1-2 - [c84]Wenxin Lei, Sijing Wang, Ning Zhang, Hong Wen, Wenjing Hou, Haojie Lin, Zhu Han:
Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing. INFOCOM Workshops 2022: 1-2 - [c83]Jiazhen Lou, Hong Wen, Fuyu Lv, Jing Zhang, Tengfei Yuan, Zhao Li:
Re-weighting Negative Samples for Model-Agnostic Matching. SIGIR 2022: 1823-1827 - [c82]Xiaofeng Pan, Ming Li, Jing Zhang, Keren Yu, Hong Wen, Luping Wang, Chengjun Mao, Bo Cao:
MetaCVR: Conversion Rate Prediction via Meta Learning in Small-Scale Recommendation Scenarios. SIGIR 2022: 2110-2114 - [c81]Wanjie Tao, Liangyue Li, Chen Chen, Zulong Chen, Hong Wen:
When Online Meets Offline: Exploring Periodicity for Travel Destination Prediction. SIGIR 2022: 2366-2370 - [c80]Qijie Shen, Hong Wen, Wanjie Tao, Jing Zhang, Fuyu Lv, Zulong Chen, Zhao Li:
Deep Interest Highlight Network for Click-Through Rate Prediction in Trigger-Induced Recommendation. WWW 2022: 422-430 - [i9]Qijie Shen, Hong Wen, Wanjie Tao, Jing Zhang, Fuyu Lv, Zulong Chen, Zhao Li:
Deep Interest Highlight Network for Click-Through Rate Prediction in Trigger-Induced Recommendation. CoRR abs/2202.08959 (2022) - [i8]Jiazhen Lou, Hong Wen, Fuyu Lv, Jing Zhang, Tengfei Yuan, Zhao Li:
Re-weighting Negative Samples for Model-Agnostic Matching. CoRR abs/2207.02468 (2022) - 2021
- [j97]Huanhuan Song
, Hong Wen
, Qicong Yang, Jie Tang
, Yi Chen, Tengyue Zhang
, FeiYi Xie
, Songlin Chen:
Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS. IEEE Access 9: 27287-27297 (2021) - [j96]WenXin Lei
, Hong Wen
, Wenjing Hou, Xinchen Xu:
New Security State Awareness Model for IoT Devices With Edge Intelligence. IEEE Access 9: 69756-69765 (2021) - [j95]Wenjing Hou
, Hong Wen
, Huanhuan Song
, Wenxin Lei, Wei Zhang
:
Multiagent Deep Reinforcement Learning for Task Offloading and Resource Allocation in Cybertwin-Based Networks. IEEE Internet Things J. 8(22): 16256-16268 (2021) - [j94]Gaoyuan Zhang
, Haiqiong Li
, Congzheng Han
, Congyu Shi
, Hong Wen, Dan Wang:
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels. Secur. Commun. Networks 2021: 6641192:1-6641192:19 (2021) - [j93]Ming Zhan
, Zhibo Pang
, Kan Yu
, Hong Wen
:
Reverse Calculation-Based Low Memory Turbo Decoder for Power Constrained Applications. IEEE Trans. Circuits Syst. I Regul. Pap. 68(6): 2688-2701 (2021) - [j92]Jie Tang
, Long Jiao, Kai Zeng
, Hong Wen
, Kaiyu Qin
:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. IEEE Trans. Inf. Forensics Secur. 16: 466-481 (2021) - [j91]Songlin Chen
, Zhibo Pang
, Hong Wen
, Kan Yu
, Tengyue Zhang
, Yueming Lu
:
Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks. IEEE Trans. Ind. Informatics 17(3): 2041-2051 (2021) - [j90]Fei Pan
, Hong Wen
, Xuesong Gao, Haibo Pu, Zhibo Pang
:
Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS. IEEE Trans. Ind. Informatics 17(5): 3693-3702 (2021) - [j89]Tengyue Zhang
, Hong Wen
, Jie Tang
, Huanhuan Song
, FeiYi Xie
:
Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection. IEEE Trans. Ind. Informatics 17(7): 4999-5009 (2021) - [j88]Baofeng Ji, Yanan Wang
, Kang Song
, Chunguo Li
, Hong Wen
, Varun G. Menon
, Shahid Mumtaz
:
A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends. IEEE Trans. Ind. Informatics 17(10): 7145-7154 (2021) - [j87]Baofeng Ji, Ying Han
, Peng Li, Shahid Mumtaz
, Kang Song
, Chunguo Li
, Dan Wang
, Hong Wen
:
Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel. IEEE Trans. Intell. Transp. Syst. 22(3): 1881-1891 (2021) - [c79]Qijie Shen, Wanjie Tao, Jing Zhang, Hong Wen, Zulong Chen, Quan Lu:
SAR-Net: A Scenario-Aware Ranking Network for Personalized Fair Recommendation in Hundreds of Travel Scenarios. CIKM 2021: 4094-4103 - [c78]Wenxin Lei, Wenjing Hou, Aidong Xu, Yixin Jiang, Hong Wen, Yunan Zhang:
A Situational Awareness Model for Edge Computing Devices. CONF-CDS 2021: 51:1-51:5 - [c77]Haojie Lin, Wenjing Hou, Hong Wen, Wenxin Lei, Sihui Wu, Zhiwei Chen:
MADDPG-based Task Offloading and Resource Management for Edge System. CONF-CDS 2021: 52:1-52:5 - [c76]Zhiwei Chen, Wenjing Hou, Hong Wen, Wenxin Lei, Sihui Wu, Haojie Lin:
Multi-dimensional Resource Management System Based on Blockchain and Cybertwin. CONF-CDS 2021: 53:1-53:5 - [c75]Wen Han, Wenjing Hou, Hong Wen, Wenxin Lei, Xinchen Xu, Haojie Lin:
Reinforcement Learning-based Multidimensional Resource Management in Edge Cloud Regions. CONF-CDS 2021: 54:1-54:5 - [c74]Jie Tang, Hong Wen, Huanhuan Song, Rui-Fei Wang:
On the Design of IRS-assisted Directional Reflection for Physical Layer Secure Transmission. ICCT 2021: 852-857 - [c73]Hong Wen, Jing Zhang, Fuyu Lv, Wentian Bao, Tianyi Wang, Zulong Chen:
Hierarchically Modeling Micro and Macro Behaviors via Multi-Task Learning for Conversion Rate Prediction. SIGIR 2021: 2187-2191 - [c72]Tengyue Zhang, Hong Wen, Zhibo Pang, Huanhuan Song:
CSI-Free Physical Layer Security against Eavesdropping Attack based on Intelligent Surface for Industrial Wireless. WFCS 2021: 175-182 - [i7]Hong Wen, Jing Zhang, Fuyu Lv, Wentian Bao, Tianyi Wang, Zulong Chen:
Hierarchically Modeling Micro and Macro Behaviors via Multi-Task Learning for Conversion Rate Prediction. CoRR abs/2104.09713 (2021) - [i6]Qijie Shen, Wanjie Tao, Jing Zhang, Hong Wen, Zulong Chen, Quan Lu:
SAR-Net: A Scenario-Aware Ranking Network for Personalized Fair Recommendation in Hundreds of Travel Scenarios. CoRR abs/2110.06475 (2021) - [i5]Xiaofeng Pan, Yibin Shen, Jing Zhang, Keren Yu, Hong Wen, Shui Liu, Chengjun Mao, Bo Cao:
SAME: Scenario Adaptive Mixture-of-Experts for Promotion-Aware Click-Through Rate Prediction. CoRR abs/2112.13747 (2021) - [i4]Xiaofeng Pan, Ming Li, Jing Zhang, Keren Yu, Luping Wang, Hong Wen, Chengjun Mao, Bo Cao:
Conversion Rate Prediction via Meta Learning in Small-Scale Recommendation Scenarios. CoRR abs/2112.13753 (2021) - 2020
- [j86]Baofeng Ji, Xueru Zhang, Shahid Mumtaz
, Congzheng Han, Chunguo Li, Hong Wen, Dan Wang:
Survey on the Internet of Vehicles: Network Architectures and Applications. IEEE Commun. Stand. Mag. 4(1): 34-41 (2020) - [j85]Runfa Liao, Hong Wen
, Songlin Chen
, FeiYi Xie
, Fei Pan
, Jie Tang, Huanhuan Song
:
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet Things J. 7(3): 2077-2088 (2020) - [j84]Jie Tang
, Hong Wen
, Huanhuan Song
, Tengyue Zhang
, Kaiyu Qin
:
On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things. IEEE Internet Things J. 7(10): 10635-10649 (2020) - [j83]Lifang Li
, Zhiqiang Wang, Qingpeng Zhang, Hong Wen:
Effect of anger, anxiety, and sadness on the propagation scale of social media posts after natural disasters. Inf. Process. Manag. 57(6): 102313 (2020) - [j82]Shu Fu, Nan Chen, Ning Zhang
, Xin Jian, Feng Lyu
, Hong Wen, Xuemin Sherman Shen
:
Virtualization Enabled Multi-Point Cooperation with Convergence of Communication, Caching, and Computing. IEEE Netw. 34(1): 94-100 (2020) - [j81]Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen
, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. Peer-to-Peer Netw. Appl. 13(3): 1026-1037 (2020) - [j80]Baofeng Ji
, Yuqi Li
, Sudan Chen, Congzheng Han
, Chunguo Li
, Hong Wen
:
Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel. IEEE Trans. Cogn. Commun. Netw. 6(3): 904-914 (2020) - [j79]Huaxin Li
, Qingrong Chen
, Haojin Zhu
, Di Ma
, Hong Wen
, Xuemin Sherman Shen
:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 350-362 (2020) - [j78]Feng Wang, Dingde Jiang
, Hong Wen, Sheng Qi:
Security level protection for intelligent terminals based on differential privacy. Telecommun. Syst. 74(4): 425-435 (2020) - [j77]FeiYi Xie
, Hong Wen
, Jinsong Wu
, Wenjing Hou, Huanhuan Song
, Tengyue Zhang, Runfa Liao, Yixin Jiang:
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. IEEE Trans. Emerg. Top. Comput. Intell. 4(3): 276-286 (2020) - [j76]FeiYi Xie, Hong Wen
, Jinsong Wu
, Songlin Chen
, Wenjing Hou, Yixin Jiang:
Convolution Based Feature Extraction for Edge Computing Access Authentication. IEEE Trans. Netw. Sci. Eng. 7(4): 2336-2346 (2020) - [j75]Huanhuan Song
, Hong Wen
, Jie Tang
, Yi Chen
, FeiYi Xie
, Runfa Liao, Songlin Chen:
PLS-Based Secrecy Transmission for VANETs. IEEE Trans. Veh. Technol. 69(7): 7596-7608 (2020) - [j74]Jie Tang
, Hong Wen
, Huanhuan Song
, Kai Zeng
, Kaiyu Qin
:
Secure MIMO-SVD Communications Against Eavesdroppers With Any Number of Antennas. IEEE Trans. Veh. Technol. 69(10): 11077-11089 (2020) - [c71]Yi Chen, Shahriar Real, Hong Wen, Boyang Cheng, Wei Wang, Pin-Han Ho, Shih Yu Chang:
On Physical-Layer Authentication via Triple Pool Convolutional Neural Network. GLOBECOM (Workshops) 2020: 1-6 - [c70]Wentian Bao, Hong Wen, Sha Li, Xiao-Yang Liu, Quan Lin, Keping Yang:
GMCM: Graph-based Micro-behavior Conversion Model for Post-click Conversion Rate Estimation. SIGIR 2020: 2201-2210 - [c69]Hong Wen, Jing Zhang
, Yuan Wang, Fuyu Lv, Wentian Bao, Quan Lin, Keping Yang:
Entire Space Multi-Task Modeling via Post-Click Behavior Decomposition for Conversion Rate Prediction. SIGIR 2020: 2377-2386 - [c68]Wenhao Zhang
, Wentian Bao, Xiao-Yang Liu, Keping Yang, Quan Lin, Hong Wen, Ramin Ramezani:
Large-scale Causal Approaches to Debiasing Post-click Conversion Rate Estimation with Multi-task Learning. WWW 2020: 2775-2781
2010 – 2019
- 2019
- [j73]Fei Pan
, Zhibo Pang
, Ming Xiao
, Hong Wen, Runfa Liao:
Clone Detection Based on Physical Layer Reputation for Proximity Service. IEEE Access 7: 3948-3957 (2019) - [j72]Baofeng Ji
, Bingbing Xing, Kang Song, Chunguo Li, Hong Wen
, Luxi Yang:
The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT. IEEE Access 7: 31397-31408 (2019) - [j71]Baofeng Ji
, Yuqi Li, Benchuan Zhou, Chunguo Li, Kang Song, Hong Wen
:
Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting. IEEE Access 7: 38738-38747 (2019) - [j70]Songlin Chen
, Hong Wen
, Jinsong Wu
, WenXin Lei, Wenjing Hou, Wenjie Liu, Aidong Xu, Yixin Jiang:
Internet of Things Based Smart Grids Supported by Intelligent Edge Computing. IEEE Access 7: 74089-74102 (2019) - [j69]Runfa Liao, Hong Wen
, Jinsong Wu
, Fei Pan
, Aidong Xu, Huanhuan Song, FeiYi Xie, Yixin Jiang, Minggui Cao:
Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access 7: 116390-116401 (2019) - [j68]Baofeng Ji, Zhenzhen Chen, Yuqi Li, Sudan Chen, Guoqiang Zheng, Hong Wen:
Energy harvesting and information transmission scheme with UAV relay cooperation. EURASIP J. Wirel. Commun. Netw. 2019: 278 (2019) - [j67]Gao Yuan Zhang, Hong Wen, Longye Wang, Liang Song, Jie Tang, Runfa Liao:
Simple and robust near-optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers. IET Commun. 13(2): 186-197 (2019) - [j66]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, Runfa Liao, Yi Chen, Yixin Jiang:
Analysis of the physical layer security enhancing of wireless communication system under the random mobile. IET Commun. 13(9): 1164-1170 (2019) - [j65]Jie Tang, Hong Wen, Kai Zeng
, Runfa Liao, Fei Pan, Lin Hu
:
Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks. IEEE Netw. 33(5): 126-133 (2019) - [j64]Yi Chen, Hong Wen, Jinsong Wu
, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang, Zhen Wang:
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources. Sensors 19(8): 1926 (2019) - [j63]Runfa Liao, Hong Wen
, Jinsong Wu
, Fei Pan, Aidong Xu, Yixin Jiang, FeiYi Xie, Minggui Cao:
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks. Sensors 19(11): 2440 (2019) - [j62]Songlin Chen, Hong Wen
, Jinsong Wu
, Aidong Xu, Yixin Jiang, Huanhuan Song, Yi Chen:
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication. Sensors 19(16): 3610 (2019) - [j61]Yuanpeng Xie, Hong Wen
, Bin Wu, Yixin Jiang, Jiaxiao Meng:
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 7(2): 383-391 (2019) - [j60]Fei Pan
, Zhibo Pang
, Hong Wen
, Michele Luvisotto
, Ming Xiao
, Runfa Liao, Jie Chen:
Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Trans. Ind. Informatics 15(12): 6481-6491 (2019) - [j59]Feng Wang, Dingde Jiang, Hong Wen, Houbing Song
:
Adaboost-based security level classification of mobile intelligent terminals. J. Supercomput. 75(11): 7460-7478 (2019) - [j58]Huanhuan Song
, Hong Wen
, Runfa Liao, Yi Chen, Songlin Chen:
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels. IEEE Wirel. Commun. Lett. 8(3): 657-660 (2019) - [c67]Hong Wen, Jing Zhang
, Quan Lin, Keping Yang, Pipei Huang:
Multi-Level Deep Cascade Trees for Conversion Rate Prediction in Recommendation System. AAAI 2019: 338-345 - [c66]Aidong Xu, Yixin Jiang, Jinsong Wu
, Yunan Zhang, Wenjin Hou, Hong Wen, Yi Zheng:
Efficiency and Security for Edge Computing Assisted Smart Grids. GLOBECOM Workshops 2019: 1-5 - [c65]FeiYi Xie, Aidong Xu, Yixin Jiang, Songlin Chen, Runfa Liao, Hong Wen:
Edge Intelligence based Co-training of CNN. ICCSE 2019: 830-834 - [c64]Songlin Chen, Zhibo Pang, Hong Wen, Yu Kan, Tengyue Zhang:
Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet. ICII 2019: 381-386 - [i3]Hong Wen, Jing Zhang, Yuan Wang, Wentian Bao, Quan Lin, Keping Yang:
Conversion Rate Prediction via Post-Click Behaviour Modeling. CoRR abs/1910.07099 (2019) - [i2]Wenhao Zhang, Wentian Bao, Xiao-Yang Liu, Keping Yang, Quan Lin, Hong Wen, Ramin Ramezani:
A Causal Perspective to Unbiased Conversion Rate Estimation on Data Missing Not at Random. CoRR abs/1910.09337 (2019) - 2018
- [b2]Hong Wen:
On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. University of Waterloo, Ontario, Canada, 2018 - [j57]Ming Zhan
, Jun Wu
, Hong Wen, Peng Zhang:
A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building. IEEE Access 6: 39037-39045 (2018) - [j56]Baofeng Ji, Lifan Sun, Chunguo Li, Congcheng Han, Hong Wen:
Throughput Enhancement for Wireless Sensor Network Based on Network Allocation Vector Caching Algorithms. Ad Hoc Sens. Wirel. Networks 40(1-2): 49-72 (2018) - [j55]Longye Wang, Gao Yuan Zhang, Hong Wen, Xiaoli Zeng:
An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length. Adv. Math. Commun. 12(3): 541-552 (2018) - [j54]Shu Fu, Jinsong Wu
, Hong Wen, Yueping Cai, Bin Wu:
Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects. IEEE Commun. Mag. 56(8): 145-151 (2018) - [j53]Ming Zhan, Zhibo Pang
, Ming Xiao
, Hong Wen:
A state metrics compressed decoding technique for energy-efficient turbo decoder. EURASIP J. Wirel. Commun. Netw. 2018: 152 (2018) - [j52]Baofeng Ji, Yuqi Li, Yinghui Meng, Yi Wang, Kang Song, Congzheng Han, Hong Wen, Liang Song:
Performance analysis of two-way full-duplex relay with antenna selection under Nakagami channels. EURASIP J. Wirel. Commun. Netw. 2018: 265 (2018) - [j51]Xiaoli Zeng, Longye Wang, Hong Wen, Gao Yuan Zhang:
Design of Asymmetric ZPC Sequences with Multiple Subsets via Interleaving Known ZPC Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 982-987 (2018) - [j50]Gao Yuan Zhang, Hong Wen, Longye Wang, Xiaoli Zeng, Jie Tang, Runfa Liao, Liang Song:
Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1975-1979 (2018) - [j49]Yi Chen, Hong Wen, Huanhuan Song, Songlin Chen, FeiYi Xie, Qing Yang, Lin Hu
:
Lightweight one-time password authentication scheme based on radio-frequency fingerprinting. IET Commun. 12(12): 1477-1484 (2018) - [j48]Lin Hu
, Hong Wen
, Bin Wu, Fei Pan, Runfa Liao, Huanhuan Song, Jie Tang, Xiumin Wang:
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 5(1): 219-228 (2018) - [j47]FeiYi Xie, Hong Wen
, Yushan Li, Songlin Chen, Lin Hu
, Yi Chen
, Huanhuan Song
:
Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things. IEEE Internet Things J. 5(5): 3967-3977 (2018) - [j46]Qiyi Han, Hong Wen, Fang Miao:
Rumor spreading in interdependent social networks. Peer-to-Peer Netw. Appl. 11(5): 955-965 (2018) - [j45]Gao Yuan Zhang
, Hong Wen, Longye Wang, Ping Xie, Liang Song, Jie Tang, Runfa Liao:
Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks. Sensors 18(1): 52 (2018) - [j44]Shu Fu, Hong Wen
, Bin Wu:
Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming. IEEE Trans. Veh. Technol. 67(3): 2025-2034 (2018) - [j43]