网站管理学校官网返回学院首页
骨干教师:王 威


王威,博士,硕士生导师,现任南京航空航天大学电子信息工程学院研究员,入选南京航空航天大学“长空之星”,江苏省双创博士。分别于20117月和20143月获得西安电子科技大学学士及硕士学位,并于20186月获得新加坡南洋理工大学博士学位。20183月至20188月任南洋理工大学助理研究员、副研究员。20189月至20198月在加拿大滑铁卢大学从事博士后研究,指导老师为无线通信和网络领域国际知名专家、中国工程院外籍院士沈学民(Sherman Shen)教授。主持承担了国家自然科学基金、江苏省自然科学基金等项目,作为技术负责人参与国家重点研发计划项目1项,20112019年先后参与国家973计划、国家自然科学基金、新加坡教育部、加拿大自然与科学工程委员会等重点/重大项目多项。目前主要从事无线通信系统安全高效传输技术、智能通信与智能网络、空天地一体化信息网络、和电磁频谱安全等前沿领域的研究。在IEEE汇刊及通信领域旗舰会议上发表文章30余篇,获2018年度国家留学基金委优秀自费留学生奖学金。

教育经历

2014.8-2018.6   新加坡南洋理工大学博士  通信工程     

2011.8-2014.3   西安电子科技大学硕士    信号与信息处理  

2007.9-2011.6   西安电子科技大学本科    信息对抗技术 

 工作经历

2019.9-至今  南京航空航天大学研究员

2018.9-2019.8    加拿大滑铁卢大学博士后   

2018.3-2018.8    南洋理工大学助理研究员、副研究员    

 研究方向

无线通信,空天地一体化网络,电磁频谱安全,无线通信物理层安全等

主持/参与科研项目

1.   联盟链监管关键技术,国家重点研发计划“云计算与大数据”重点专项项目,1959万,2020.11-2023.10,项目秘书兼子课题负责人

2.   基于区块链的动态频谱共享技术,国家自然科学基金青年项目,24万,2021.1-2023.12,主持

3.   边缘计算辅助的频谱区块链关键技术,江苏省自然科学基金青年项目,20万,2020.7-2023.6,主持

4.   江苏省双创博士课题,15万,2020-2022,主持 

5.   空地一体频谱资源高效共享关键技术,中央高校基本科研业务费,10万,2020-2021,主持 

6.   频谱区块链关键技术,2020-2022, 40万,主持 

7.   通信网络xxx技术,航天科工xxx所,32万,2020.4-2020.12,主持

8.   下一代用户中心无线网络关键技术研究(2019,加拿大自然科学与工程研究基金与华为加拿大研究所合作项目),参与

9.   毫米波雷达通信一体化设备研发(2017-2018NTU-Shaeffler联合项目),参与

10.面向5G的大规模阵列天线技术(2016-2017,新加坡教育部 MOE Tier I,参与

11.空域环境要素的完备认知理论与方法(2011-2014973子课题),参与

PUBLICATIONS    Google Scholar                 Research Gate

Book Chapter:

Wang W. (2019) Pilot Spoofing Attack. In: Shen X., Lin X., Zhang K. (eds) Encyclopedia of Wireless Networks. Springer, Cham

Journal Articles:

[1]      Zhou H, Xu W, Chen J, et al. Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proceedings of the IEEE, 2020, 108(2): 308-323.

[2]      Liu Y, Wang W, Chen H H, et al. Secrecy rate maximization via radio resource allocation in cellular underlaying V2V communications. IEEE Transactions on Vehicular Technology, 2020, 69(7): 7281-7294.

[3]      Y. Song, C. Liu, W. Wang, N. Cheng, M. Wang, W. Zhuang, and X. Shen, “Domain selective precoding in 3-D massive MIMO systems” IEEE Journal of Selected Topics in Signal Processing, Accepted.

[4]      Y. Liu, W. Wang, H.-H. Chen, W. Meng, X. Shen, “ Resource allocation for secrecy rate maximization in D2D-enabled V2V channels: A hypergraph-based approach”, IEEE Transactions on Vehicular Technology, submitted.

[5]      Z. Yin, M. Jia, W. Wang, N. Cheng, F. Lyu, Q. Guo, and X. Shen, “Secrecy rate analysis of satellite communications with frequency domain NOMA”, IEEE Transactions on Vehicular Technology, Major Revision.

[6]      Y. Cheng, K. H. Li, K. C. Teh, S. Luo, and W. Wang,“On performance analysis for cooperative NOMA systems with subchannel allocation and adaptive mode selection”, IEEE Transactions on Vehicular Technology, Accepted.

[7]      W. Wang, N. Cheng, K. C. Teh, X. Lin, W. Zhuang, and X. Shen, “On countermeasures of pilot spoofing attack in massive MIMO systems: A double channel training based approach”, IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 6697–6708, Jul. 2019.

[8]      B. Li, R. Lu, K.-K. R. Choo, W. Wang, and S. Luo, “On reliability analysis of smart grids under topology attacks: A stochastic petri net approach,” ACM Transactions on Cyber-Physical Systems, vol. 3, no. 1, Jan. 2019.

[9]      W. Wang, K. C. Teh, S. Luo, and K. H. Li, “Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach,” IEEE Transactions on Communications, vol. 66, no. 12, pp. 6437-6449, Dec. 2018.

[10]   T. X. Tran, W. Wang, S. Luo, and K. C. Teh, “Nonlinear energy harvesting for millimeter wave networks with large-scale antennas,” IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9488-9498, Oct. 2018.

[11]   W. Wang, K. C. Teh, K. H. Li, and S. Luo, “On the impact of adaptive eavesdroppers in multi-antenna cellular networks,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 269-279, Feb. 2018.

[12]   W. Wang, K. C. Teh, and K. H. Li, “Artificial noise aided physical layer security in multi-antenna small-cell networks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1470-1482, Jun. 2017.

[13]   W. Wang, K. C. Teh, and K. H. Li, “Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 505 - 515, Mar. 2017.

[14]   W. Wang, K. C. Teh, and K. H. Li, “Enhanced physical layer security in D2D spectrum sharing networks,” IEEE Wireless Communications Letters, vol. 6, no. 1, pp. 106-109, Feb. 2017.

[15]   B. Li, R. Lu, W. Wang, and K. R. Choo, “Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system,” Journal of Parallel and Distributed Computing, vol. 103, pp. 32-41, May 2017.

[16]D. Li, W. Wang, and H. Liu, “ Focusing highly squinted azimuth variant bistatic SAR”, IEEE Transactions on Aerospace and Electronic Systems, vol. 52, no. 6, pp. 2715-2730, Dec. 2016. 

[17]   W. Wang, K. C. Teh, and K. H. Li, “Relay selection for secure successive AF relaying networks with untrusted nodes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.

[18]   B. Li, R. Lu, W. Wang, and K. R. Choo, “DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2415-2425, Nov. 2016.

[19]   W. Wang, K. C. Teh, and K. H. Li, “Generalized relay selection for improved security in cooperative DF relay networks,” IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 28-31, Feb. 2016.

[20]   W. Wang, G. Liao, D. Li, and Q. Xu, “Focus improvement of squint bistatic SAR data using azimuth non-linear chirp scaling,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.1, pp. 229-233, Jan. 2014.

[21]   D. Li, G. Liao, W. Wang, and Q. Xu, “Extended azimuth nonlinear chirp scaling algorithm for bistatic SAR processing in high-resolution highly squinted mode,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.6, pp. 1134-1138, Jun. 2014.

[22]   K. Yang, G. Liao, W. Wang, and Q.Xu, “Three-dimensional imaging algorithm for forward-moving ROSAR,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no.6, pp. 1076-1080, Jun. 2014.

Conference Proceedings:

[1]    Wang W, Zhou C, He H, et al. Cellular Traffic Load Prediction with LSTM and Gaussian Process Regression, IEEE International Conference on Communications (ICC), 2020: 1-6.

[2]    W. Wang, Z. Yin, F. Lyu, H. Wu, Q. Wu, and X. Shen, “Pilot spoofing attack detection and downlink precoding in massive MIMO systems”, WCSP’19, Xi’an, China. .

[3]    W. Wang, Z. Yin, J. Ni, X. Lin, and X. Shen, “Against pilot spoofing attack with double channel training in massive MIMO NOMA systems”, IEEE ICC, Shanghai, China, May 2019.

[4]    W. Wang, K. C. Teh, S. Luo, and K. H. Li, “Secure transmission in MISOME wiretap channels with half and full-duplex active eavesdroppers,” IEEE Globecom, Singapore, Dec., 2017.

[5]    W. Wang, K. C. Teh, and K. H. Li, “Interference exploitation for enhanced security in D2D spectrum sharing networks,” IEEE ICC, Paris, France, May, 2017.

[6]    W. Wang, K. C. Teh, and K. H. Li, “Securing cooperative AF relaying networks with untrustworthy relay nodes,” IEEE Globecom, Washington D.C., US, Dec., 2016.

[7]    W. Wang, G. Liao, D. Li, K. Yang and Q. Xu, “A novel high resolution imaging method for ROSAR,” IET International Radar Conference, Xi’an, April, 2013.

[8]    Y. Cheng, K. H. Li, K. C. Teh, and W. Wang, “Joint user clustering and subcarrier allocation for downlink non-orthogonal multiple access systems”, IEEE Globecom, Abu Dhabi, UAE, Dec., 2018.

[9]    S. Luo, X. T. Tran, W. Wang, K. C. Teh, and K. H. Li, “Macro spatial modulation for uplink mmWave communication systems,” IEEE Globecom Workshop, Singapore, Dec., 2017.

[10]S. Luo, K. C. Teh, and W. Wang, “Wireless-powered cooperative communications with buffer-aided relay,” IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.

[11]K. Yang, G. Liao, W. Wang, Q. Xu and D. Li, “3-D Imaging Method for ROSAR,” IET International Radar Conference, Xi’an, April, 2013.