scispace - formally typeset
C

Chao Li

Researcher at Guangzhou University

Publications -  10
Citations -  226

Chao Li is an academic researcher from Guangzhou University. The author has contributed to research in topics: Communication channel & Spoofing attack. The author has an hindex of 6, co-authored 9 publications receiving 164 citations.

Papers
More filters
Journal ArticleDOI

Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation

TL;DR: To deal with the joint impact of smart attack and imperfect channel estimation, the non-cooperative game theory is used to propose a Q-learning-based power control algorithm in order to obtain an adaptive policy for the transmitter and, meanwhile, suppress the smart attack from the UAV.
Journal ArticleDOI

Enhanced Secure Transmission Against Intelligent Attacks

TL;DR: An enhanced secure scheme for the wireless communication system threatened by an intelligent attacker, which can work in eavesdropping, jamming, and spoofing modes, which outperforms the conventional scheme in the secrecy performance.
Journal ArticleDOI

A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment

TL;DR: This paper proposes a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions and semantically model such protocol and analyze the security properties.
Journal ArticleDOI

Cache-aided mobile edge computing for B5G wireless communication networks

TL;DR: The analysis suggests that caching can significantly alleviate the impact of increasing the size of computation task, since only half of the transmission time of cache-free network is required.
Journal ArticleDOI

Cache-enabled physical-layer secure game against smart uAV-assisted attacks in b5G NOMA networks

TL;DR: This paper proposes an algorithm which can adaptively control the power allocation factor for the source station in NOMA network based on reinforcement learning, and presents a power allocation strategy to enhance the transmission security.