Showing 1 - 20 results of 29 for search 'Kaizhi Huang', query time: 0.04s
Refine Results
-
1
Network slicing deployment method based on isolation level by Qirun PAN, Kaizhi HUANG, Wei YOU
Published 2020-04-01
Article -
2
-
3
Key generation method based on reconfigurable intelligent surface in quasi-static scene by Yinuo HAO, Liang JIN, Kaizhi HUANG, Shuaifang XIAO
Published 2021-04-01
Article -
4
Cooperative secret key generation for multi-hop relaying systems in Internet of things by Shuaifang XIAO, Yunfei GUO, Kaizhi HUANG, Liang JIN
Published 2018-03-01
Article -
5
-
6
A Communication Anti-Jamming Scheme Assisted by RIS with Angular Response by Jinpeng Wang, Wenyu Jiang, Kaizhi Huang, Xiaoli Sun
Published 2023-12-01
Article -
7
-
8
-
9
Cooperative secret key generation for multi-hop relaying systems in Internet of things by Shuaifang XIAO, Yunfei GUO, Kaizhi HUANG, Liang JIN
Published 2018-03-01
Article -
10
Research on the Networking Strategy in Indoor Visible Light Communication by Yang Liu, Hua Zhao, Kaizhi Huang, Xinsheng Ji
Published 2014-01-01
Article -
11
Research on the Networking Strategy in Indoor Visible Light Communication by Yang Liu, Hua Zhao, Kaizhi Huang, Xinsheng Ji
Published 2014-01-01
Article -
12
Endogenous Security for the Space-Integrated-Ground Information Network in 6G by Xinsheng JI, Kaizhi HUANG, Jiangxing WU, Yajun CHEN, Wei YOU
Published 2023-06-01
Article -
13
Secure opportunistic access control in D2D-enabled cellular network by Yajun CHEN, Xinsheng JI, Kaizhi HUANG, Jing YANG, Ming YI
Published 2018-01-01
Article -
14
Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System by Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu
Published 2023-07-01
Article -
15
Endogenous Security for the Space-Integrated-Ground Information Network in 6G by Xinsheng JI, Kaizhi HUANG, Jiangxing WU, Yajun CHEN, Wei YOU
Published 2023-06-01
Article -
16
Secure opportunistic access control in D2D-enabled cellular network by Yajun CHEN, Xinsheng JI, Kaizhi HUANG, Jing YANG, Ming YI
Published 2018-01-01
Article -
17
Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG
Published 2019-08-01
Article -
18
Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG
Published 2019-08-01
Article -
19
Opportunistic secure transmission scheme for simultaneous wireless information and power transfer by Keming MA, Yajun CHEN, Xin HU, Kaizhi HUANG, Xinsheng JI
Published 2019-02-01
Article -
20
Intelligent Reflecting Surface–Assisted Wireless Secret Key Generation against Multiple Eavesdroppers by Ya Liu, Kaizhi Huang, Xiaoli Sun, Shaochuan Yang, Liang Wang
Published 2022-03-01
Article