Motto

Three passions, simple but overwhelmingly strong, have governed my life: the longing for love, the search for knowledge, and unbearable pity for the suffering of mankind. These passions, like great winds, have blown me hither and thither, in a wayward course, over a deep ocean of anguish, reaching to the very verge of despair. --Bertrand Russell

Book Chapter:

1. Wang W. (2019) Pilot Spoofing Attack. In: Shen X., Lin X., Zhang K. (eds) Encyclopedia of Wireless Networks. Springer, Cham

Journal Articles:

  1. Y. Liu, W. Wang, H.-H. Chen, W. Meng, X. Shen, “ Resource allocation for secrecy rate maximization in D2D-enabled V2V channels: A hypergraph-based approach”, IEEE Transactions on Intelligent Transportation Systems, Under Review.
  2. Y. Cheng, K. H. Li, K. C. Teh, S. Luo, and W. Wang, “On performance analysis for cooperative NOMA systems with subchannel allocation and adaptive mode selection”, IEEE Transactions on Vehicular Technology, Accepted.
  3. Z. Yin, M. Jia, W. Wang, N. Cheng, F. Lyu, Q. Guo, and X. Shen, ``Secrecy rate analysis of satellite communications with frequency domain NOMA", IEEE Transactions on Vehicular Technology, vol. 68 , no. 12 , pp. 11847 - 11858 , Dec. 2019 .
  4. Y. Song, C. Liu, W. Wang, N. Cheng, M. Wang, W. Zhuang, and X. Shen, ``Domain selective precoding in 3-D massive MIMO systems" IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 5, pp. 1103 - 1118 , Sep. 2019 .
  5. W. Wang, N. Cheng, K. C. Teh, X. Lin, W. Zhuang, and X. Shen, “On countermeasures of pilot spoofing attack in massive MIMO systems: A double channel training based approach”, IEEE Transactions on Vehicular Technology, vol. 68 , no. 7, pp. 6697 - 6708 , Jul. 2019 .
  6. W. Wang, K. C. Teh, S. Luo, and K. H. Li, “Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach,” IEEE Transactions on Communications, vol. 66, no. 12, pp. 6437-6449, Dec. 2018.
  7. B. Li, R. Lu, K.-K. R. Choo, W. Wang, and S. Luo, “On reliability analysis of smart grids under topology attacks: A stochastic petri net approach,” ACM Transactions on Cyber-Physical Systems, vol. 3, no. 1, Jan. 2019.
  8. T. X. Tran, W. Wang, S. Luo, and K. C. Teh, “Nonlinear energy harvesting for millimeter wave networks with large-scale antennas,” IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9488-9498, Oct. 2018.
  9. W. Wang, K. C. Teh, K. H. Li, and S. Luo, “On the impact of adaptive eavesdroppers in multi-antenna cellular networks,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 269-279, Feb. 2018.
  10. W. Wang, K. C. Teh, and K. H. Li, “Artificial noise aided physical layer security in multi-antenna small-cell networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1470-1482, Jun. 2017.
  11. B. Li, R. Lu, W. Wang, and K. R. Choo, “Distributed host-based collaborative detection for false data injec- tion attacks in smart grid cyber-physical system,” Journal of Parallel and Distributed Computing, vol. 103, pp. 32-41, May 2017.
  12. W. Wang, K. C. Teh, and K. H. Li, “Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 505 - 515, Mar. 2017.
  13. W. Wang, K. C. Teh, and K. H. Li, “Enhanced physical layer security in D2D spectrum sharing networks,” IEEE Wireless Communications Letters, vol. 6, no. 1, pp. 106-109, Feb. 2017.
  14. D. Li, W. Wang, H. Liu, “ Focusing highly squinted azimuth variant bistatic SAR”, IEEE Transactions on Aerospace and Electronic Systems, vol. 52, no. 6, pp. 2715-2730, Dec. 2016.
  15. W. Wang, K. C. Teh, and K. H. Li, “Relay selection for secure successive AF relaying networks with un- trusted nodes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.
  16. B. Li, R. Lu, W. Wang, and K. R. Choo, “DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2415-2425, Nov. 2016.
  17. W. Wang, K. C. Teh, and K. H. Li, “Generalized relay selection for improved security in cooperative DF relay networks,” IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 28-31, Feb. 2016.
  18. W. Wang, G. Liao, D. Li, and Q. Xu, “Focus improvement of squint bistatic SAR data using azimuth non- linear chirp scaling,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.1, pp. 229-233, Jan. 2014.
  19. D. Li, G. Liao, W. Wang, and Q. Xu, “Extended nonlinear chirp scaling for bistatic SAR imaging in high resolution highly squint mode,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.6, pp. 1134-1138, Jun. 2014.
  20. K. Yang, G. Liao, W.Wang, and Q. Xu, “Three-dimensional imaging algorithm for forward-moving ROSAR,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.6, pp. 1076-1080, Jun. 2014.

Conference Proceedings:

  1. W. Wang, Z. Yin, J. Ni, X. Lin, and X. Shen, “Against pilot spoofing attack with double channel training in massive MIMO NOMA systems”, IEEE ICC, Shanghai, China, May 2019.
  2. Y. Cheng, K. H. Li, K. C. Teh, S. Luo, and W. Wang, “Joint user clustering and subcarrier allocation for downlink non-orthogonal multiple access systems”, IEEE Globecom, Abu Dhabi, UAE, Dec., 2018.
  3. W. Wang, K. C. Teh, S. Luo, and K. H. Li, “Secure transmission in MISOME wiretap channels with half and full-duplex active eavesdroppers,” IEEE Globecom, Singapore, Dec., 2017.
  4. S. Luo, X. T. Tran, W. Wang, K. C. Teh, and K. H. Li, “Macro spatial modulation for uplink mmWave communication systems,” IEEE Globecom Workshop, Singapore, Dec., 2017.
  5. W. Wang, K. C. Teh, and K. H. Li, “Interference exploitation for enhanced security in D2D spectrum sharing networks,” IEEE ICC, Paris, France, May, 2017.
  6. W. Wang, K. C. Teh, and K. H. Li, “Securing cooperative AF relaying networks with untrustworthy relay nodes,” IEEE Globecom, Washington D.C., US, Dec., 2016.
  7. S. Luo, K. C.T eh, W. Wang, “Wireless-powered cooperative communications with buffer-aided relay,”IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.
  8. W. Wang, G. Liao, D. Li, K. Yang and Q. Xu, “A novel high resolution imaging method for ROSAR,” IET International Radar Conference, Xi’an, April, 2013.
  9. K. Yang, G. Liao, W. Wang, Q. Xu and D. Li, “3-D Imaging Method for ROSAR,” IET International Radar Conference, Xi’an, April, 2013.