


default search action
Hongliang He 0004
Person information
- affiliation: China University of Geosciences, Wuhan, China
Other persons with the same name
- Hongliang He — disambiguation page
- Hongliang He 0001
— Southeast University: Nanjing, Jiangsu, China - Hongliang He 0002
— Zhejiang University, Hangzhou, China - Hongliang He 0003
— Peking University, BeiJing, China
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j23]Hongliang He
, Xingmei Li
, Ce Zheng:
Secure Transmission via Constellation Splitting. IEEE Commun. Lett. 29(6): 1416-1420 (2025)
[j22]Jing Liang
, Peiya Li
, Zhiquan Liu
, Hongliang He
:
Privacy-Preserving Clustering-Based Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 12(12): 20484-20497 (2025)
[j21]Hongliang He
, Nengcheng Chen
:
Parallel PAM for Secure Transmission. IEEE Trans. Inf. Forensics Secur. 20: 3374-3386 (2025)
[c10]Yanfeng Chen, Jing Liang, Hongliang He, Peiya Li:
A New End-to-End Encrypted Image Retrieval Scheme in Cloud Environment. TrustCom 2025: 2149-2155- 2024
[j20]Hongliang He
, Xingmei Li:
Secure transmission in wireless ad-hoc networks without CSI at the destination. Ad Hoc Networks 152: 103310 (2024)
[j19]Hongliang He
, Nengcheng Chen
, Di Gao
, Xingmei Li, Min Yang:
Secure and Interference-Free Transmission in Wireless Multiuser Networks. IEEE Commun. Lett. 28(10): 2238-2242 (2024)
[j18]Hongliang He
, Xingmei Li:
Social credit driven cooperative secure transmission in multiuser networks. Phys. Commun. 62: 102252 (2024)
[j17]Jiawei Zhao, Hongliang He
, Nengcheng Chen
:
Constellation Superposition and Artificial Noise Against Interior and Exterior Eavesdropping in Bidirectional Untrusted Relaying Systems. IEEE Wirel. Commun. Lett. 13(12): 3648-3652 (2024)- 2023
[j16]Zikang Chen
, Wenping Ge, Juan Chen, Jiguang He
, Hongliang He
:
A Novel Image-Classification-Based Decoding Strategy for Downlink Sparse Code Multiple Access Systems. Entropy 25(11): 1514 (2023)
[j15]Xiao Tang
, Hongliang He
, Limeng Dong
, Lixin Li
, Qinghe Du
, Zhu Han
:
Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission. IEEE Internet Things J. 10(14): 12562-12576 (2023)
[j14]Hongliang He
, Shanxiang Lyu
, Bingwen Feng:
Secure Transmission Over Multiple Access Wiretap Channel by Cross-Time Interference Injection. IEEE Trans. Commun. 71(1): 370-380 (2023)
[i1]Xiao Tang
, Hongliang He, Limeng Dong, Lixin Li, Qinghe Du, Zhu Han:
Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission. CoRR abs/2302.14764 (2023)- 2022
[j13]Kaimin Wei
, Kai Huang
, Yongdong Wu
, Zhetao Li
, Hongliang He
, Jilian Zhang, Jinpeng Chen
, Song Guo
:
High-Performance UAV Crowdsensing: A Deep Reinforcement Learning Approach. IEEE Internet Things J. 9(19): 18487-18499 (2022)- 2021
[j12]Shanxiang Lyu
, Zheng Wang, Zhen Gao
, Hongliang He
, Lajos Hanzo
:
Lattice-Based mmWave Hybrid Beamforming. IEEE Trans. Commun. 69(7): 4907-4920 (2021)
[j11]Hongliang He
, Xizhao Luo
, Jian Weng
, Kaimin Wei
:
Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI. IEEE Trans. Inf. Forensics Secur. 16: 3401-3411 (2021)
[j10]Shanxiang Lyu
, Zheng Wang, Ling Liu, Hongliang He
, Guanggang Geng:
Boosting Low-Complexity Vector Perturbation Variants Based on Rectangular Shaping. IEEE Trans. Veh. Technol. 70(7): 7211-7215 (2021)- 2020
[j9]Hongliang He
, Xiao Tang
, Dawei Wang
:
Achieving Positive Secrecy Rate in Wireless Multiple Access Wiretap Channels. IEEE Trans. Veh. Technol. 69(8): 9121-9125 (2020)
[j8]Hongliang He
, Shanxiang Lyu
, Qinghao He, Dongyang Xu
:
Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks. IEEE Trans. Veh. Technol. 69(8): 9196-9200 (2020)
2010 – 2019
- 2019
[j7]Hongliang He
, Pinyi Ren
:
Secure Communications in Cooperative D2D Networks by Jointing Wyner's Code and Network Coding. IEEE Access 7: 34533-34540 (2019)
[j6]Hongliang He
, Pinyi Ren
, Xiao Tang
:
Joint Network Coding and ARQ Design Toward Secure Wireless Communications. IEEE Trans. Commun. 67(5): 3351-3362 (2019)
[j5]Hongliang He
, Pinyi Ren
:
Joint Artificial Noise and Repetition Coding for Secure Wireless Communications in TDD Systems. IEEE Wirel. Commun. Lett. 8(6): 1700-1703 (2019)
[c9]Dongyang Xu, Pinyi Ren, Hongliang He, Qiang Li:
Jamming-Immune Receiver Design for MIMO-NOMA Systems Using Optimal Manifold Filtering. WCNC 2019: 1-6- 2018
[j4]Hongliang He
, Pinyi Ren
:
Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design. IEEE Trans. Veh. Technol. 67(8): 7158-7169 (2018)
[c8]Qian Xu, Pinyi Ren, Hongliang He, Dongyang Xu:
Security-aware routing for artificial-noise-aided multi-hop secondary communications. WCNC 2018: 1-6
[c7]Dongyang Xu, Pinyi Ren, James A. Ritcey, Hongliang He, Qian Xu:
ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems. WCNC 2018: 1-6- 2017
[j3]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun
, Yichen Wang:
Traffic-aware overload control scheme in 5G ultra-dense M2M networks. Trans. Emerg. Telecommun. Technol. 28(9) (2017)
[j2]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Enhancing physical-layer security via big-data-aided hybrid relay selection. J. Commun. Inf. Networks 2(1): 97-110 (2017)
[j1]Hongliang He
, Pinyi Ren
, Qinghe Du
, Hai Lin:
Joint Feedback and Artificial Noise Design for Secure Communications Over Fading Channels Without Eavesdropper's CSI. IEEE Trans. Veh. Technol. 66(12): 11414-11418 (2017)- 2016
[c6]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun
, Yichen Wang:
Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security. GLOBECOM Workshops 2016: 1-6
[c5]Hongliang He, Pinyi Ren, Li Sun
, Qinghe Du, Yichen Wang:
Secure Communication Using Noisy Feedback. GLOBECOM 2016: 1-6
[c4]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun
:
Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy. VTC Spring 2016: 1-5
[c3]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun
, Yichen Wang:
Secure and Energy Efficient Transmission in Multiuser Uplink Wireless Networks. VTC Fall 2016: 1-5- 2015
[c2]Hongliang He, Qinghe Du, Houbing Song
, Wanyu Li, Yichen Wang, Pinyi Ren:
Traffic-aware ACB scheme for massive access in machine-to-machine networks. ICC 2015: 617-622
[c1]Hongliang He, Pinyi Ren, Qinghe Du, Li Sun
:
Estimation Based Adaptive ACB Scheme for M2M Communications. WASA 2015: 165-174
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-04 00:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







