


default search action
Ji He 0002
Person information
- affiliation: Xidian University, Xian, Shaanxi, China
Other persons with the same name
- Ji He — disambiguation page
- Ji He 0001
— Guangzhou Medical University, Guangzhou, China - Ji He 0003
— Beijing University of Chemical Technology, Beijing, China - Ji He 0004
— Xi'an University of Technology, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j18]Jianing Wang
, Yuanyu Zhang
, Xinghui Zhu
, Ji He
, Shuangrui Zhao
, Yulong Shen
, Xiaohong Jiang
:
GCI-GANomaly: A Novel GPS Spoofing Detection Scheme Based on Grayscale Constellation Image. IEEE Trans. Inf. Forensics Secur. 21: 3022-3037 (2026)- 2025
[j17]Mu Niu
, Pinchang Zhang
, Ji He
, Yuanyu Zhang
, Zhiquan Liu
:
PHY-Layer Authentication Exploiting Spatial Channel and Radiometric Signatures for mmWave MIMO Systems. IEEE Commun. Lett. 29(9): 2108-2112 (2025)
[j16]Changjian Qin, Mu Niu
, Ji He
, Pinchang Zhang
:
Improved PHY-Layer Authentication Utilizing Radiation Pattern Feature for 6G-IoT Systems. IEEE Internet Things J. 12(16): 34619-34622 (2025)
[j15]Pinchang Zhang
, Huangwenqing Shi
, Jiankuo Dong
, Ji He
, Xiaohong Jiang
, Fu Xiao
:
Enhanced Two-Way Privacy-Preserving PHY-Layer Authentication for UAV-Assisted MIMO Systems. IEEE Trans. Dependable Secur. Comput. 22(6): 6998-7009 (2025)
[j14]Shichang Guo
, Yuanyu Zhang
, Jiayi Guo, Shuangrui Zhao
, Ji He
, Yulong Shen
, Xiaohong Jiang
:
A High-Entropy Physical Layer Key Generation Scheme for 5G Systems. IEEE Trans. Inf. Forensics Secur. 20: 8357-8372 (2025)
[j13]Lijie Zheng
, Ji He
, Xinghui Zhu
, Yuanyu Zhang
, Yulong Shen
, Tarik Taleb
:
RSMA-Enabled Multi-UAV Secure Communication via MARL With Multi-Task Attention DRNN. IEEE Trans. Inf. Forensics Secur. 20: 12624-12639 (2025)
[j12]Shih Yu Chang
, Ji He
, Arumugam Nallanathan
:
Application of Gromov-Wasserstein Matching for Vehicular Social Network Security Profiling. IEEE Trans. Veh. Technol. 74(9): 14661-14674 (2025)
[i6]Haiyang Wang, Yuanyu Zhang, Xinghui Zhu, Ji He, Shuangtrui Zhao, Yulong Shen, Xiaohong Jiang:
Practical Spoofing Attacks on Galileo Open Service Navigation Message Authentication. CoRR abs/2501.09246 (2025)
[i5]Lijie Zheng, Ji He, Shih Yu Chang, Yulong Shen, Dusit Niyato:
LLM Meets the Sky: Heuristic Multi-Agent Reinforcement Learning for Secure Heterogeneous UAV Networks. CoRR abs/2507.17188 (2025)- 2024
[j11]Wenhao Zhang
, Ji He
, Yulong Shen, Xiaohong Jiang:
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection. Comput. Commun. 219: 216-228 (2024)
[j10]Ji He
, Mu Niu, Pinchang Zhang
, Changjian Qin:
Enhancing PHY-Layer Authentication in RIS-Assisted IoT Systems With Cascaded Channel Features. IEEE Internet Things J. 11(14): 24984-24997 (2024)
[j9]Jiaqing Bai
, Ji He
, Yanping Chen
, Yulong Shen
, Xiaohong Jiang
:
RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks. IEEE Syst. J. 18(3): 1504-1515 (2024)
[i4]Wenhao Zhang, Ji He, Yuanyu Zhang:
Covert Multicast in UAV-Enabled Wireless Communication Systems With One-hop and Two-hop Strategies. CoRR abs/2410.12287 (2024)- 2023
[j8]Changjian Qin, Pinchang Zhang
, Ji He:
Spatially correlated channel estimation for RIS-assisted MIMO systems with correlated gaussian perturbation. IET Commun. 17(16): 1888-1898 (2023)
[j7]Yu Zhang
, Shuangrui Zhao
, Ji He
, Yuanyu Zhang
, Yulong Shen
, Xiaohong Jiang
:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. IET Inf. Secur. 2023: 1-15 (2023)
[j6]Pinchang Zhang
, Jiankuo Dong, Ji He
, Jun Liu
, Fu Xiao
:
Adaptive Jamming Attack Detection Under Noise Uncertainty in mmWave Massive MIMO Systems. IEEE Trans. Veh. Technol. 72(7): 9002-9016 (2023)
[j5]Yuanyu Zhang
, Zhumeng Zheng
, Ji He
, Shuangrui Zhao
, Qianyue Qu
, Yulong Shen
, Xiaohong Jiang
:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. IEEE Trans. Wirel. Commun. 22(12): 9907-9922 (2023)
[i3]Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang:
Covert Communication in Hybrid Microwave/mmWave A2G Systems with Transmission Mode Selection. CoRR abs/2302.00301 (2023)- 2022
[j4]Pinchang Zhang
, Yangyang Liu, Ji He
:
Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification. Sensors 22(23): 9202 (2022)
[j3]Ji He
, Jia Liu
, Wei Su
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System. IEEE Trans. Commun. 70(8): 5451-5468 (2022)
[j2]Jiaqing Bai
, Ji He
, Yanping Chen
, Yulong Shen
, Xiaohong Jiang
:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. IEEE Trans. Inf. Forensics Secur. 17: 2920-2935 (2022)
[c5]Jiaqing Bai, Ji He, Xiaohong Jiang:
Covert Communication in NOMA Systems with Decision-Assisted Q-learning. CANDARW 2022: 283-287
[i2]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. CoRR abs/2207.05383 (2022)- 2021
[c4]Yuanyu Zhang, Ji He
, Qianyue Qu, Zhiwei Zhang:
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. NaNA 2021: 8-14
[c3]Jiaqing Bai
, Ji He
, Xiaohong Jiang, Lijun Chen:
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI. NaNA 2021: 206-211- 2020
[j1]Ji He
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. IEEE Trans. Inf. Forensics Secur. 15: 1347-1362 (2020)
2010 – 2019
- 2019
[c2]Ji He
, Jia Liu, Yang Xu, Xiaohong Jiang:
Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime. HPSR 2019: 1-7- 2018
[i1]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying. CoRR abs/1802.06538 (2018)- 2016
[c1]Ji He
, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-29 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







