What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gaojie Chen
Google Scholar
ORCID:
0000-0003-2978-0365
16
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users.
Yun Wen
Gaojie Chen
Sisai Fang
Miaowen Wen
Stefano Tomasin
Marco Di Renzo
2024
journals/tifs
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System.
Yun Wen
Gaojie Chen
Sisai Fang
Zheng Chu
Pei Xiao
Rahim Tafazolli
2024
journals/tifs
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback.
Peng Xu
Gaojie Chen
Zheng Yang
Yong Li
Stefano Tomasin
2024
journals/tifs
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels.
Peng Xu
Jun Yang
Gaojie Chen
Zheng Yang
Yong Li
Moe Z. Win
2023
journals/tifs
STAR-RIS Assisted Secure Transmission for Downlink Multi-Carrier NOMA Networks.
Yanbo Zhang
Zheng Yang
Jingjing Cui
Peng Xu
Gaojie Chen
Yi Wu
Marco Di Renzo
2021
journals/tifs
Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks.
Yulong Nie
Xiaolong Lan
Yong Liu
Qingchun Chen
Gaojie Chen
Lisheng Fan
Dong Tang
2021
journals/tifs
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming.
Zaid Abdullah
Gaojie Chen
Mohammed A. M. Abdullah
Jonathon A. Chambers
2021
journals/tifs
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems.
Sunghwan Cho
Gaojie Chen
Justin P. Coon
2021
journals/tifs
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks.
Chong Huang
Gaojie Chen
Kai-Kit Wong
2021
journals/tifs
Secrecy of Multi-Antenna Transmission With Full-Duplex User in the Presence of Randomly Located Eavesdroppers.
Ishmam Zabir
Ahmed Maksud
Gaojie Chen
Brian M. Sadler
Yingbo Hua
2020
journals/tifs
Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems With Active Eavesdropping.
Mahmoud Alageli
Aïssa Ikhlef
Fahad Alsifiany
Mohammed A. M. Abdullah
Gaojie Chen
Jonathon A. Chambers
2019
journals/tifs
Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers.
Jinchuan Tang
Gaojie Chen
Justin P. Coon
2019
journals/tifs
Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems.
Sunghwan Cho
Gaojie Chen
Justin P. Coon
2017
journals/tifs
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers.
Gaojie Chen
Justin P. Coon
Marco Di Renzo
2015
journals/tifs
Physical Layer Network Security in the Full-Duplex Relay System.
Gaojie Chen
Yu Gong
Pei Xiao
Jonathon A. Chambers
2014
journals/tifs
Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks.
Gaojie Chen
Zhao Tian
Yu Gong
Zhi Chen
Jonathon A. Chambers
Coauthors
Ahmed Maksud
(1)
Aïssa Ikhlef
(1)
Brian M. Sadler
(1)
Chong Huang
(1)
Dong Tang
(1)
Fahad Alsifiany
(1)
Gaojie Chen
(16)
Ishmam Zabir
(1)
Jinchuan Tang
(1)
Jingjing Cui
(1)
Jonathon A. Chambers
(4)
Jun Yang
(1)
Justin P. Coon
(4)
Kai-Kit Wong
(1)
Lisheng Fan
(1)
Mahmoud Alageli
(1)
Marco Di Renzo
(3)
Miaowen Wen
(1)
Moe Z. Win
(1)
Mohammed A. M. Abdullah
(2)
Pei Xiao
(2)
Peng Xu
(3)
Qingchun Chen
(1)
Rahim Tafazolli
(1)
Sisai Fang
(2)
Stefano Tomasin
(2)
Sunghwan Cho
(2)
Xiaolong Lan
(1)
Yanbo Zhang
(1)
Yi Wu
(1)
Yingbo Hua
(1)
Yong Li
(2)
Yong Liu
(1)
Yu Gong
(2)
Yulong Nie
(1)
Yun Wen
(2)
Zaid Abdullah
(1)
Zhao Tian
(1)
Zheng Chu
(1)
Zheng Yang
(3)
Zhi Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to