Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huang Kaizhi is active.

Publication


Featured researches published by Huang Kaizhi.


SCIENTIA SINICA Informationis | 2017

Secret key generation scheme based on MIMO received signal spaces}{Secret key generation scheme based on MIMO received signal spaces

Lou Yangming; Jin Liang; Zhong Zhou; Huang Kaizhi; Zhang Shengjun

Conventional secret key generation scheme cannot achieve high key generation rate when the channel characteristics change slowly. To solve this problem, a secret key generation model based on the MIMO received signal space is investigated in this paper. In this model, the legitimate transmitter and receiver distill secret keys from the received signal space, and improve the randomness of the received signals by controlling the variance of the transmitted signals, so that the update of the secret key is independent of the time variance of the wireless channel. Then a specific key generation scheme is proposed, in which the legitimate nodes can obtain the same received signal space, from which common vectors can be selected to distill the keys. In addition, an optimal power allocation method to maximize the key rate is presented. The results of the simulation confirm the effectiveness of this scheme.


Scientia Sinica Informationis | 2014

Physical-layer authentication and key distribution mechanism based on equivalent channel

Dai Qiao; Song Huawei; Jin Liang; Huang Kaizhi

The authentication of transmitting terminal in present physical-layer security method based on wireless channel character is implemented by checking the pilot signal sent by it, and missing detection often happens. A new kind of physical-layer authentication and key distribution mechanism based on equivalent channel is presented. The equivalent channel is built by encrypting keys with channel character of multi time slots, as a result difference of different channels is mapped onto transmitting distortion. And mutual information of delivering and receiving terminals channel characters can be told by correctness of the transmission, thus the key distribution and authentication are implemented at the same time. Analysis and simulation reveal that key distribution performance in this method is same as the existing one, and the attack can be recognized in circumstances of channels with strong correlation.


international conference on networks | 2010

Research on the Identity in Heterogeneous Wireless Integrated Networks

Yang Xin; Li Chong; Ji Xinsheng; Huang Kaizhi

Through analyzing the factors affecting software trustworthy, established the index system of trustworthy software estimation. Apply Analytic Hierarchy Process (AHP) to determine the relative importance of factors and indicator items affecting software trustworthy, and then determine the score of estimation index system through fuzzy estimation model, use the combination of both to measure software trustworthy. Finally, this paper presents an example to validate the validity and objectivity of this model.


Archive | 2014

Dynamic compensation method for reducing LED (Light Emitting Diode) nonlinear distortion of visible light Flip-OFDM (Orthogonal Frequency Division Multiplexing) communication system

Lu Qingfeng; Zhong Zhou; Huang Kaizhi; Zhao Hua; Ji Xinsheng; Peng Jianhua; Luo Wenyu; Xiao Shuaifang; Zheng Haotian; Ma Keming; Xia Lu


Archive | 2014

Indoor visible light MIMO transmission scheme integrating spatial modulation and space multiplexing technology

Xiao Shuaifang; Huang Kaizhi; Zhong Zhou; Zhao Hua; Zhou Lei; Ji Xinsheng; Peng Jianhua; Bai Huiqing; Lu Qingfeng; Zheng Haotian; Yang Jing; Yang Meiyue


Archive | 2014

Indoor integration network system based on visible light communication and communication access method

Zhao Hua; Liu Yang; Huang Kaizhi; Peng Jianhua; Zhong Zhou; Yang Meiyue; Ji Xinsheng; Yu Hongyi; Wu Jiangxing; Li Qing; Zhu Yijun; Zhang Jian


Archive | 2013

Method and system for judging user positions

Wu Jiangxing; Huang Kaizhi; Xu Mingyan; Jin Liang; Ji Xinsheng; Peng Jianhua; Guo Suxia; Feng Tao; Tang Hongbo; Jiang Tao; Song Huawei; Yu Chunlai; Bai Yi; Yang Meiyue; Qin Xiaogang; Zhang Tianzhong


Archive | 2014

RGB-type LED-based visible light communication frequency modulation method

Yang Jing; Huang Kaizhi; Zhong Zhou; Zhao Hua; Ji Xinsheng; Peng Jianhua; Lu Qingfeng; Xiao Shuaifang; Yang Meiyue; Zheng Haotian; Fang Xinyu


Archive | 2017

Channel estimation-free type wireless secret key generation method

Lou Yangming; Jin Liang; Zhong Zhou; Yi Ming; Zhou You; Zhang Shengjun; Huang Yu; Huang Kaizhi; Li Mingliang; Liu Lu; Kang Xiaolei


Archive | 2017

Access layer and non-access layer secret key safety isolation device and method thereof

Zhao Hua; Jin Liang; Huang Kaizhi; Tang Hongbo; Zhu Keyun; Zhou You; Wang Xiaolei; Zhong Zhou; You Wei; Yang Meiyue; Zhao Yu; Chen Dan

Collaboration


Dive into the Huang Kaizhi's collaboration.

Top Co-Authors

Avatar

Ji Xinsheng

PLA Information Engineering University

View shared research outputs
Top Co-Authors

Avatar

Li Chong

PLA Information Engineering University

View shared research outputs
Top Co-Authors

Avatar

Liu Yang

Central China Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge