学术成果 |
[1] Meng R, Xu X, Zhao H, et al. Multiobservation-Multichannel-Attribute-Based Multiuser Authentication for Industrial Wireless Edge Networks[J]. IEEE Transactions on Industrial Informatics, 2024, 20(2): 2097-2108. [2] Meng R, Xu X, Wang B, et al. Physical-layer authentication based on hierarchical variational autoencoder for industrial internet of things[J]. IEEE Internet of Things Journal, 2023, 10(3): 2528-2544. [3] Meng R, Xu X, Sun H, et al. Multiuser physical-layer authentication based on latent perturbed neural networks for industrial internet of things[J]. IEEE Internet of Things Journal, 2023, 10(1): 637-652. [4] Meng R, Xu X, Li G, et al. Multi-Dimensional Fingerprints-based Multi-Attacker Detection for 6G Systems[J]. IEEE Internet of Things Journal, 2024, 11(2): 2665-2683. [5] Meng R, Xu B, Xu X, et al. A survey of Machine Learning-based Physical-Layer Authentication in wireless communications[J]. Journal of Network and Computer Applications, 2025: 104085. [6] Meng R, Fan D, Xu X, et al. Endogenous Security Through AI-Driven Physical-Layer Authentication for Future 6G Networks[J]. ZTE Communications, 2025, Accepted. [7] Meng R, Gao S, Fan D, et al., “A Survey of Secure Semantic Communications,” arXiv preprint arXiv:2501.00842, Under Review. [8] Meng R, Fan D, Gao H, et al., “Secure Semantic Communication With Homomorphic Encryption,” arXiv preprint arXiv:2501.10182, Under Review. [9] Meng R, Meng Z, Lu J, et al., “Intelligent Joint Security and Delay Determinacy Performance Guarantee Strategy in RIS-Assisted IIoT Communication Systems,” arXiv preprint arXiv: 2503.08086, Under Review. [10] Meng R, Zhao H, Xu B, et al., “TDGCN-Based Mobile Multiuser Physical-Layer Authentication for EI-Enabled IIoT,” arXiv preprint arXiv:2411.08628, Under Review. [11] Meng R, Zhu F, et al., “Efficient Gaussian process classification-based physical-layer authentication with configurable fingerprints for 6G-enabled IoT,” arXiv preprint arXiv:2307.12263, Under Review. |