Publications
2025
- Q. Xiao, G. Li, Z. Liu and A. Hu, “Optimal Subcarrier Allocation Scheme for Physical-Layer Key Generation in an OFDMA Network,” in IEEE Transactions on Information Forensics and Security.
- G. Li et al., “Endogenous Security Techniques for Safeguarding Next-Generation Spectrum Usage at the Physical Layer,” in IEEE Network, doi: 10.1109/MNET.2025.3565201.
- Chu Z, Li G, Meng Q, et al. Defeating CSI obfuscation mechanisms: A study on unauthorized Wi-Fi Sensing in wireless sensor network[J]. Computer Networks, 2025: 111208.
- Liu M, Zhou Z, Shi Q, G. Li et al. Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers[J]. IEEE Transactions on Communications, 2025.
- Wu T, Li G, Wang J, et al. PPCA: Privacy-Preserving Continuous Authentication Scheme With Consistency Proof for Zero-Trust Architecture Networks[J]. IEEE Internet of Things Journal, 2025.
2024
- Y. Du, H. Dai, H. Liu, G. Li, Y. Ren and K. Zhang, “Efficient and Error-Free Secret Key Generation Leveraging Sorted Indices Matching,” in IEEE Transactions on Mobile Computing, doi: 10.1109/TMC.2024.3465042.
- J Wang, S Gao,G. Li, K Gai, and B Xiao, “SAMCU: Secure and Anonymous Multi-Channel Updates in Payment-Channel Networks,”accepted by IEEE Transactions on Information Forensics and Security (TIFS), 2024.
H. Yang, B. Xie, J. Wang, G. Li, and B. Xiao, “Privacy-Preserving and Secure Decentralized Identity Management for Multiple Controllers,” in Proc. IEEE Global Communications Conference (GLOBECOM), Cape Town, South Africa, 8–12 Dec. 2024, pp. 1-6.
S. Feng, Y. Cheng, G. Li* and B. Xiao, “ Physical-layer Secret Key Generation with Energy Efficiency Maximization,” in Proc. IEEE Global Communications Conference (GLOBECOM), Cape Town, South Africa, 8–12 Dec. 2024, pp. 1-6.
H. Xu, K. Wong, W. New, G. Li, F. Ghadi, Y. Zhu, S. Jin, C. Chae, Y. Zhang, “Coding-Enhanced Cooperative Jamming for Secret Communication in Fluid Antenna Systems,” in IEEE Communications Letters, doi: 10.1109/LCOMM.2024.3418338.
X. Yuan, Y. Jiang, G. Li and A. Hu, “Wireless Channel Key Generation Based on Multisubcarrier Phase Difference,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2024.3418812.
G. Li et al., “RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation,” in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5090-5105, 2024.
Y Du, H Dai, H Liu, Y Wang, G Li, Y Ren, Y Chen, and K Zhang, “Secret key generation based on manipulated channel measurement matching,” IEEE Transactions on Mobile Computing (TMC), 2024, DOI: 10.1109/TMC.2024.3364909.
G. Li, Y. Ma, W. Wang, J. Zhang and H. Luo, “The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting,” accepted by IEEE Internet Things J., 2024.
X. Zhang, G. Li*, J. Zhang, L. Peng, A. Hu, X. Wang, Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments, accepted by IEEE Transactions on Vehicular Technology, 2024.
W. Wang, G. Li*, Z. Chu, H. Li and D. Faccio, “Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks,” IEEE Sens. J., pp. 1-15, 2024.
- H. Tang, G. Li*, T. Guo and A. Hu, “A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS,” in IEEE Communications Letters, vol. 28, no. 4, pp. 783-787, April 2024, doi: 10.1109/LCOMM.2024.3362362.
2023
H. Luo, G. Li*, Y. Xing, J. Zhang and X. Wang, RelativeRFF: Multi-Antenna Device Identification in Multipath Propagation Scenarios,” ICC 2023 - IEEE International Conference on Communications, Rome, Italy, 2023, pp. 3708-3713, doi: 10.1109/ICC45041.2023.10279540.
G. Li, H. Luo, J. Yu, A. Hu and J. Wang, “Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications,” in IEEE Wireless Communications, vol. 31, no. 1, pp. 118-124, February 2024, doi: 10.1109/MWC.012.2200289.
L. Hu, G. Li*, A. Hu, and D.W.K.Ng, “Exploiting Malicious RIS for Secret Key Acquisition in Physical-layer Key Generation,” in IEEE Wireless Communications Letters, vol. 13, no. 2, pp. 417-421, Feb. 2024, doi: 10.1109/LWC.2023.3330809.
Y. Sun, G. Li*, H. Luo, Y. Xing, S. Dang and A. Hu, “Location-Invariant Radio Frequency Fingerprint for Base Station Recognition,” in IEEE Wireless Communications Letters, vol. 12, no. 9, pp. 1583-1587, Sept. 2023, doi: 10.1109/LWC.2023.3283800.
L. Hu, C. Sun,G. Li*, A. Hu and D. W. K. Ng, “Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems,” in IEEE Transactions on Communications, vol. 71, no. 11, pp. 6499-6513, Nov. 2023, doi: 10.1109/TCOMM.2023.3301048.
Q. Meng,G. Li*, J. Shi, and A. Hu, “ Enhancing RF Fingerprinting with a Simulated Attack Detection Strategy for Few Labeled Signals,” 2023 IEEE 23rd International Conference on Communication Technology (ICCT), Wuxi, China, 2023.
H. Sun, G. Li, H. Li, A. Hu, Y. Cheng, Y. Tian, and S. He, “A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI,” 2023 IEEE/CIC International Conference on Communications in China (ICCC), Dalian, China, 2023, pp. 1-6, doi: 10.1109/ICCC57788.2023.10233395.
L. Hu, G. Li*, X. Qian, A. Hu and D. W. K. Ng, “Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels,” in IEEE Trans. on Wireless Comm., 2023, doi: 10.1109/TWC.2023.3296076.
L. Yang, G. Li, T. Guo, H. Xu, and A. Hu, “Physical-layer Secret Key Generation for Dual-task Scenarios,” China Communications.
Z. Zhang, G. Li, J. Shi, H. Li and A. Hu, “Real-World Aircraft Recognition Based on RF Fingerprinting With Few Labeled ADS-B Signals,” in IEEE Transactions on Vehicular Technology, vol. 73, no. 2, pp. 2866-2871, Feb. 2024, doi: 10.1109/TVT.2023.3314491.
H. Li,G. Li et al., “RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift Optimization,” 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, Hong Kong, 2023, pp. 1-5, doi: 10.1109/VTC2023-Fall60731.2023.10333843.
- Q. Xiao, J. Zhao, S. Feng, G. Li* and A. Hu, “Securing NextG Networks with Physical-Layer Key Generation: A Survey”, accepted by Security and Safety, 2023.
2022
胡奥婷,胡爱群*,胡韵,李古月,韩金广.机器学习中差分隐私的数据共享及发布:技术、应用和挑战[J].信息安全学报,2022,7(4):1-16
L. Hu, G. Li*, X. Qian, D.W.K.Ng, and A. Hu, “Joint transmit and reflective beamforming for RIS-assisted secret key generation,” in Proc. IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil, 4–8 Dec. 2022, pp. 1-6.
Z. Huang, G. Li*, A. Hu, J. Yu and S. Wu, Recognizing automotive ethernet device by extracting fingerprint from power spectrum, in Proc. of the 22th IEEE International Conference on Communication Technology (ICCT 2022), Nanjing, 11-14 Nov. 2022, pp. 1-5.
Y. Hou, G. Li*, S. Dang, L. Hu and A. Hu, “Physical layer encryption scheme based on dynamic constellation rotation,” in Proc. IEEE 96nd Veh. Technol. Conf.(VTC-Fall), Beijing, China, 26-29 Sep.2022, pp. 1-5.
J. Yang, S. Gao, G. Li*, R. Sui and Bin. X, “Reducing gas consumption of Tornado Cash and other smart contracts in Ethereum, in Proc. IEEE 21th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 28-30 Oct. 2022, pp. 1-6.
G. Li*, Jitong Shi, Jiabao Yu and Aiqun Hu, “E-Fin: Enabling RF Fingerprinting for Real-world aircraft with Few Labeled ADS-B Signals”, in Proc. 3rd URSI Atlantic / Asia-Pacific Radio Science Meeting, Gran Canaria, Spain Europe, 29 May - 3 June, 2022, pp. 1-4.
李古月, 胡爱群*. 网络空间安全专业课程思政教学探索与实践——以东南大学“网络空间安全新进展”课程为例[J]. 网络与信息安全学报, 2022, 8(2): 183-189.
G. Li*, L. Hu, P. Staat, H. Elders-Boll, C. Zenger, and C. Paar, et al., “Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?”, IEEE Wireless Communications Magazine, vol. 29, no. 4, pp. 146-153, 2022.
G. Li*, H. Yang, J. Zhang, H. Liu and A. Hu, “Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments” , in Proc. IEEE International Conference on Computer Communications (INFOCOM), Virtual Conference, 2-5. May, 2022, pp. 1-10.
2021
- SONG Yubo, GENG Yijin, LI Guyue, LI Tao. Identification of LoRa Device Based on Differential Constellation Trace Figure[J]. Netinfo Security, 2021, 21(1): 41-48.
G. Li, C. Sun*, W. Xu, M. D. Renzo and A. Hu, “On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface Assisted Multiuser Systems”, IEEE Transactions on Information Forensics and Security, vol.17, pp. 211-225, 2021.
G. Li*, Y. Xu, W. Xu, E. Jorswieck and A. Hu, “Robust Key Generation With Hardware Mismatch for Secure MIMO Communications”, IEEE Transactions on Information Forensics and Security, vol.16, pp. 5264-5278, 2021.
X. Zhang, G. Li*, J. Zhang, A. Hu, Z. Hou and B. Xiao, “Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems”, IEEE Internet of Things Journal, vol. 9, no. 8, pp. 6081-6094, 2022.
Y. Yang, A. Hu*, J. Yu, G. Li, Z. Zhang, Radio Frequency Fingerprint Identification Based on Stream Differential Constellation Trace Figures, accepted for publication in Physical Communication.
H. Luo, G. Li*, L. Hu, “On the Security of RIS-assisted Manipulating Attack in MISO systems”, in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5.
L. Hu, G. Li*, H. Luo, and A. Hu, “On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation”, in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5.
X. Zhang, G. Li*, Z. Hou and A. Hu, “Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network” in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5.
L. Hu, Y. Chen,G. Li* and A. Hu, Exploiting Artificial Randomness for Fast Secret Key Generation in Quasi-static Environments, in Proc. IEEE 6th International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 9-11, Jul. 2021, pp. 1-5.
Y. Xu, A. Hu* and G. Li, LOBBY: A Novel Physical-layer Key Generation Method, in Proc. 4th International Conference on Communication Engineering and Technology (ICCET), Shanghai, China, 25-27, Feb. 2021, pp. 1-5.
X. Zhou, A. Hu*, G. Li, L. Peng, Y. Xing and J. Yu, A Robust Radio Frequency Fingerprint Extraction Scheme for Practical Device Recognition, IEEE Internet of Things Journal, vol. 8, no. 14, pp. 11276-11289, 2021.
G. Li, C. Sun*, E. Jorswieck, J. Zhang and A. Hu. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks, IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 968-982, 2021.
- G. Li*, Z. Zhang, J. Zhang and A. Hu, Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation, IEEE Internet of Things Journal, vol. 8, no. 1, pp. 357-369, 2021.
2020
C. Sun, H. Yang and G. Li*, AmpRmdr: Remainder-Based Secret Key Generation Using Wireless Channel Amplitude, IEEE Access, vol. 8, pp. 228178 - 228187, 2020.
C. Sun and G. Li*, Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation, IEEE Access, vol. 8, pp. 164580-164592, 2020.
J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels, IEEE Access, vol. 8, pp. 138406 - 138446, 2020.
Y. Xing, T. Wang, F. Zhou, A. Hu*, G. Li, and L. Peng, “EVAL cane: Non-intrusive monitoring platform with a novel gait-based user identification scheme,” IEEE Trans. Instrum. Meas., vol. 70: 2500115, 2020.
Y. Xing, A. Hu*, J. Zhang, J. Yu, G. Li, and T. Wang, “Design of a robust radio frequency fingerprint identification scheme for multi-mode LFM radar,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10581-10593, 2020.
李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密码学报, 2020, 7(2): 224-248.
袁瑞, 彭林宁, 李古月, 付华. 不同环境下无线信道密钥生成性能研究[J]. 密码学报, 2020, 7(2): 261-273.
Y. Chen, G. Li*, C. Sun, J. Zhang, E. Jorswieck and B. Xiao. Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks, in Proc. IEEE ICC, Virtual Conference, 7-11. June, 2020, pp. 1-6.
2019
G. Li, J. Yu, Y. Xing, and A. Hu. Location-invariant physical layer identification approach for WiFi devices. IEEE Access, pages 106974 - 106986, 2019.
J. Yu, A. Hu, F. Zhou, Y. Xing, Y. Yu, G. Li, and L. Peng. Radio frequency fingerprint identification based on denoising autoencoders. In Proc. 15th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob), pages 1–6, Barcelona, Spain, Oct. 2019.
Y. Xing, A. Hu, J. Yu, G. Li, L. Peng and F. Zhou, A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars, in Proc. IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21 - 23 Oct, 2019, pp. 1-6.
G. Li, Z. Zhang, Y. Yu and A. Hu, A Hybrid Information Reconciliation Method for Physical-layer Key Generation, Entropy. 2019; 21(7):688.
胡爱群,李古月, 彭林宁, 李涛. 融入思政的网络空间安全前沿技术教学探索[J]. 网络与信息安全学报, 2019, 5(3): 54-66.
B. Liu, A. Hu and G. Li, Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems, IEEE Communications Letters, vol. 23, no. 9, pp. 1493 - 1496, 2019.
J. Zhang, M. Ding, G. Li and A. Marshall, Key Generation Based on Large Scale Fading, IEEE Transactions on Vehicular Technology, vol. 68, no. 8, pp. 8222 – 8226, 2019.
G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao and A Hu. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy. 2019; 21(5):497.
J. Yu, A. Hu, G. Li and L. Peng, A Robust RF Fingerprinting Approach Using Multi-Sampling Convolutional Neural Network, in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6786-6799, Aug. 2019.
X. Zhou, A. Hu, G. Li, L. Peng, Y. Xing and J. Yu, Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification, in Proc. IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, 10-12 Jun. 2019, pp. 1-9.
G. Li, L. Hu, and A. Hu, Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks, in Proc. IEEE ICC Workshops (WPLS), Shanghai, China, 20-24. May, 2019, pp. 1-6.
Z. Zhang, G. Li and A. Hu, An Adaptive Information Reconciliation Protocol for Physical-layer Based Secret Key Generation, in Proc. IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lumpur, Malaysia, 28 April – 1 May, 2019, pp. 1-5.
J. Yu, A. Hu, G. Li and L. Peng, A Multi-Sampling Convolutional Neural Network-Based RF Fingerprinting Approach for Low-Power Devices, in Proc. IEEE INFOCOM Workshop Internet of Things for Adversarial Environments (IoTAE), Paris, France, 29 April - 2 May, 2019, pp.1-6.
L. Peng, G. Li, J. Zhang, R. Woods, M. Liu, and A. Hu, An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation, IEEE Transactions on Mobile Computing, vol.18, no.3, pp.507-519, 2019.
2018年
G. Li, A. Hu, C. Sun and J. Zhang, Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems, IEEE Communications Letters, vol.22, no.12, pp.2487-2490, 2018.
Y. Xing, A. Hu, J. Zhang, L. Peng and G. Li, On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios, IEEE Communications Letters, vol.22, no.11, pp.2326-2329, 2018.
L. Peng, G. Li, J. Zhang, and A. Hu, Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels Measurements, in Proc. IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Abu Dhabi, UAE, 9-13 Dec. 2018, pp.1-6.
L. Hu, G. Li, A. Hu and C. Cao, Lightweight group key distribution method based on high similar wireless channel characteristics, in Proc. of 18th IEEE International Conference on Communication Technology (ICCT 2018), Chongqing,8-11 Oct.2018, pp.1-5.
G. Li, A. Hu, J. Zhang, L. Peng, C. Sun and D. Cao, High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing, in IEEE Transactions on Communications, vol. 66, no. 7, pp. 3022-3034, July 2018.
2017年
G. Li, A. Hu, J. Zhang, and B. Xiao, Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation, in Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6.
L. Peng, G. Li and A. Hu, Channel Reciprocity Improvement of Secret Key Generation with Loop-back Transmissions, in Proc. of the 17th IEEE International Conference on Communication Technology (ICCT 2017), Chengdu, 27-30 Oct. 2017, pp. 1-6.
李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208.
2016年及之前
G. Li, and A. Hu, Virtual MIMO-based Cooperative Beamforming and Jamming Scheme for the Clustered Wireless Sensor Network Security, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2246-2250.
G. Li, and A. Hu, MISO Secrecy Transmission via Designing Artificial Noise by Receiver under Perfect and Imperfect CSI”, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2664-2668.
G. Li, A. Hu, L. Peng, and C. Sun, “The optimal preprocessing approach for secret key generation from OFDM channel measurements,” in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Washington DC, Dec. 2016, pp.1-6.
G. Li, A. Hu, Y. Zou, L. Peng, M. Valkama, A Novel Transform for Secret Key Generation in Time-varying TDD Channel under Hardware Fingerprint Deviation, in Proc.IEEE 82th Vehicular Technology Conference (VTC2015-Fall), Boston, Sep. 2015, pp.1-5.
G. Li, A. Hu and Y. Huang, A Novel Artificial Noise Aided Security Scheme to Resist Blind Source Separation Attacks, Chinese Science Bulletin, 2014,59(32):4225-4234.
李古月,胡爱群,石乐.无线信道的密钥生成方法[J]. 密码学报, 2014, 1(3): 211–224.
胡爱群,李古月.无线通信物理层安全方法综述[J]. 数据采集与处理 , 2014, 29(3): 341–350.
G. Li and A. Hu, An Approach to Resist Blind Source Separation Attacks of Speech Signals, IET CSC2014: 1-7.
M. Xue, A. Hu, Yi. Huang and G. Li, Monte Carlo based Test Pattern Generation for Hardware Trojan Detection, IEEE DASC2013:131 - 136.
专利
- 吴天琦,李古月,宋宇波,王家恒, 一种用户隐私保持的持续认证协议, 202411483392.1.
李古月,张鹤鸣,罗弘毅,何骏昊,一种MIMO场景下基于射频指纹的空口接入识别方法,受理,202311165415X
李古月,李皓钰,胡爱群,一种抗RIS干扰攻击的宽带无线信道密钥生成方法 2023.05.18.中国CN202310563301.4
李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法 2020.08.11 中国CN201910729172.5(授权)
李古月,胡爱群,王栋,韩远致,李晶琪 基于主成分分析的信道互易性增强方法2019.04.30 中国 CN201610539867.3(授权)
李古月,胡爱群,李晶琪,王栋,韩远致 基于酉变换预处理的无线信道特征变级量化方法2016.10.12 中国 CN201610539956.8(授权)
胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.09.21 国际PCT/CN2020/116433
李古月,胥英豪,胡爱群 一种防近端窃听的主动信道密钥生成方法及系统2020.08.25 中国 CN202010343569.3
胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.08.18 中国 CN202010344216.5
李古月,胥英豪,胡爱群 一种基于矩阵特征值的主动信道密钥生成方法及系统2020.08.07 中国 CN202010343555.1
刘瑞之,李锦辉,刘余文,雷重庆,何川,李古月 一种基于接收信号强度的无线通信安全认证方法2020.04.17 中国 CN201911166170.6
李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法2019.09.20 国际PCT/CN2019/10688
李古月,杨海誉,何川 基于幅度取余的无线信道密钥随机性增强方法2019.08.23 中国 CN201910375302.X
李古月,胡爱群,张喆颖 一种基于初始密钥不一致率的生成密钥自适应调和方法2019.08.02 中国 CN201910333552.7
李古月,胡爱群,张喆颖 一种结合BBBSS协议与BCH码的生成密钥部分调和方法2019.07.30 中国 CN201910333854.4(授权)
胡爱群,俞佳宝,彭林宁,李古月 一种鲁棒的低功耗设备射频指纹识别方法2019.06.21 中国 CN201910080693.2
胡爱群,俞佳宝,李古月,彭林宁 一种基于多采样卷积神经网络的射频指纹提取和识别方法2019.06.21 中国 CN201910080034.9
胡爱群,刘博谦,李古月,一种频分双工系统中的密钥提取方法2019.04.12 中国 CN201910067771.5
李古月,胡爱群,刘博谦, 基于多径分离的频分双工系统中互易信道系数构建方法2019.01.25 中国 CN201810830831.X (授权)
李古月,胡爱群,刘博谦 ,一种基于路径相位差分的频分双工系统互易信道参数构建方法2018.12.18 中国 ZL201810830831.X (授权)
李古月,胡爱群,胡良君,基于无线信道特征的轻量级组密钥分发方法2021.03.05 中国 ZL201810513227.4(授权)
李古月,何川,胡爱群,庄浩宇,杨海誉,基于前导差分谱的OFDM设备识别方法及装置 2019.07.23 CN11-417701 B(授权)
李古月;张鑫伟;侯宗越;王星宇,一种基于深度学习的频分双工系统密钥生成方法,受理,2021.3.24,202110312897.1
李古月;罗弘毅;马艺耘;胡爱群,一种针对生物指纹强迫按压的检测方法,受理,2022.2.23,202210170301.3
李古月;杨丽琳;冯淑颖;胡爱群,基于辛变换的物理层密钥生成预处理方法,受理,2022.2.23,202210169400.X
- 李古月;汪文灏;马艺耘;靳佳琪,一种抗胁迫攻击的生物指纹认证方法及系统,受理,2022.08.15,202210972296.8