default search action
Kehao Wang 0001
Person information
- affiliation: Wuhan University of Technology, School of Information Engineering, Wuhan, China
Other persons with the same name
- Kehao Wang 0002 — Beihang University, Beijing Advanced Innovation Center for Biomedical Engineering, Beijing, China (and 1 more)
- Kehao Wang 0003 — Northwestern Polytechnical University, School of Computer Science, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Lin Chen, Weijia Wang, Yichuan Song, Jihong Yu, Kehao Wang, Shurong Zhang, Weihua Yang, Celimuge Wu:
Meet in the air: Distributed neighbor discovery in 3D networks with directional transceivers. Comput. Networks 241: 110201 (2024) - [j53]Kehao Wang, Han Zou:
Social-ATPGNN: Prediction of multi-modal pedestrian trajectory of non-homogeneous social interaction. IET Comput. Vis. 18(7): 907-921 (2024) - 2023
- [j52]Lian Xue, Kehao Wang, Zufang Yang, Min Peng:
Max-Min Energy-Efficiency Fair Optimization in STAR-RIS Assisted Communication System. IEEE Access 11: 51106-51116 (2023) - [j51]Kehao Wang, Yuhui Wang, Ruiqi Ren, Han Zou, Zhichao Shao:
Transformer-Based Feature Aggregation and Stitching Network for Crowd Counting. IEEE Access 11: 124833-124844 (2023) - [j50]Kehao Wang, Pei Liu, Kezhong Liu, Lin Chen, Hyundong Shin, Tony Q. S. Quek:
Joint beamforming and phase-shifting design for energy efficiency in RIS-assisted MISO communication with statistical CSI. Phys. Commun. 59: 102080 (2023) - [j49]Fan Zhang, Hui Cao, Kehao Wang:
Coherent DOA Estimation Algorithm with Co-Prime Arrays for Low SNR Signals. Sensors 23(23): 9320 (2023) - [c17]Jiaxi Cui, Pei Liu, Kehao Wang, Hongkuan Zhou, Yue Zhang, Xinghua Sun, Stefano Buzzi:
Spectral Efficiency Analysis of Downlink Transmission for Two-Way Cell-Free Massive MIMO System With Few-Bit ADCs. PIMRC 2023: 1-7 - 2022
- [j48]Helong Shen, Kehao Wang, Jihong Yu, Lin Chen:
Multi-channel opportunistic spectrum access: A mixed-scale decision perspective. Comput. Commun. 184: 118-127 (2022) - [j47]Yuchuan Deng, Hao Jiang, Peijing Cai, Tong Wu, Pan Zhou, Beibei Li, Hao Lu, Jing Wu, Xin Chen, Kehao Wang:
Resource Provisioning for Mitigating Edge DDoS Attacks in MEC-Enabled SDVN. IEEE Internet Things J. 9(23): 24264-24280 (2022) - [j46]Kehao Wang, Jihong Yu, Lin Chen, Pan Zhou, Moe Z. Win:
Optimal Myopic Policy for Restless Bandit: A Perspective of Eigendecomposition. IEEE J. Sel. Top. Signal Process. 16(3): 420-433 (2022) - [j45]Mengda Chen, Jie Ma, Xuming Zeng, Kezhong Liu, Mozi Chen, Kai Zheng, Kehao Wang:
MD-Alarm: A Novel Manpower Detection Method for Ship Bridge Watchkeeping Using Wi-Fi Signals. IEEE Trans. Instrum. Meas. 71: 1-13 (2022) - [j44]Lin Chen, Yijin Zhang, Kehao Wang, Meng Zheng, Jihong Yu, Wei Liang:
Deterministic Collision-Resilient Channel Rendezvous: Theory and Algorithm. IEEE Trans. Wirel. Commun. 21(11): 8967-8978 (2022) - [c16]Kehao Wang, Shuaifu Li, Yang Wang, Jing Xi:
Smooth-RRT*: An Improved Motion Planner for Underwater Robot. APCC 2022: 353-358 - [c15]Kehao Wang, Chenglin Li, Ruiqi Ren:
High-Resolution with Global Context Network for Human Pose Estimation. APCC 2022: 621-626 - [c14]Kehao Wang, Yongguang Lu, Pei Liu, Xiaobai Li, Guangyu Li, Hyundong Shin:
Trajectory and Power Design to Balance UAV Communication Capacity and Unintentional Interference. GLOBECOM 2022: 5565-5570 - 2021
- [j43]Kehao Wang, Hantao Qian, Xuming Zeng, Mozi Chen, Kezhong Liu, Kai Zheng, Pan Zhou, Dapeng Wu:
ATPGNN: Reconstruction of Neighborhood in Graph Neural Networks With Attention-Based Topological Patterns. IEEE Access 9: 9218-9234 (2021) - [j42]Jihong Yu, Pengfei Zhang, Lin Chen, Jiangchuan Liu, Rongrong Zhang, Kehao Wang, Jianping An:
Stabilizing Frame Slotted Aloha-Based IoT Systems: A Geometric Ergodicity Perspective. IEEE J. Sel. Areas Commun. 39(3): 714-725 (2021) - [j41]Kehao Wang, Zhixin Hu, Qingsong Ai, Quan Liu, Mozi Chen, Kezhong Liu, Yirui Cong:
Membership Inference Attack with Multi-Grade Service Models in Edge Intelligence. IEEE Netw. 35(1): 184-189 (2021) - [j40]Pei Liu, Dejin Kong, Jie Ding, Yue Zhang, Kehao Wang, Jinho Choi:
Channel Estimation Aware Performance Analysis for Massive MIMO With Rician Fading. IEEE Trans. Commun. 69(7): 4373-4386 (2021) - [j39]Pan Zhou, Kehao Wang, Linke Guo, Shimin Gong, Bolong Zheng:
A Privacy-Preserving Distributed Contextual Federated Online Learning Framework with Big Data Support in Social Recommender Systems. IEEE Trans. Knowl. Data Eng. 33(3): 824-838 (2021) - [c13]Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou:
Anti-jamming strategy based on game theory in single-channel UAV communication network. FMEC 2021: 1-7 - [c12]Kehao Wang, Zheng Tang, Pei Liu, Yirui Cong, Xiangke Wang, Dejin Kong, Yitong Li:
UAV-Based and Energy-Constrained Data Collection System with Trajectory, Time, and Collection Scheduling Optimization. ICCC 2021: 893-898 - [c11]Kehao Wang, Ruiqi Ren, Chenglin Li:
Multi-task Scale Adaptive Ladder Network for Crowd Counting. ICTAI 2021: 758-762 - [i7]Ruitianyi Lu, Kehao Wang:
Max-Min Energy-Efficiency Fair Optimization in STAR-RIS Assisted System. CoRR abs/2112.06495 (2021) - 2020
- [j38]Kehao Wang, Guohua Chen, Qingsong Ai, Hui Cao, Pan Zhou, Dapeng Wu:
Reversible Data Hiding Based on Structural Similarity Block Selection. IEEE Access 8: 20375-20385 (2020) - [j37]Yuting Ma, Kezhong Liu, Mozi Chen, Jie Ma, Xuming Zeng, Kehao Wang, Cong Liu:
ANT: Deadline-Aware Adaptive Emergency Navigation Strategy for Dynamic Hazardous Ship Evacuation With Wireless Sensor Networks. IEEE Access 8: 135758-135769 (2020) - [j36]Kehao Wang, Zhenhua Xiong, Lin Chen, Pan Zhou, Hyundong Shin:
Joint time delay and energy optimization with intelligent overclocking in edge computing. Sci. China Inf. Sci. 63(4) (2020) - [j35]Junyi Yu, Wei Chen, Fang Li, Changzhen Li, Kehao Wang, Kun Yang, Fuxing Chang:
Measurement-based V2V radio channel analysis and modelling for bridge scenarios at 5.9 GHz. IET Commun. 14(3): 376-386 (2020) - [j34]Kehao Wang, Zhixin Hu, Qingsong Ai, Yi Zhong, Jihong Yu, Pan Zhou, Lin Chen, Hyundong Shin:
Joint Offloading and Charge Cost Minimization in Mobile Edge Computing. IEEE Open J. Commun. Soc. 1: 205-216 (2020) - [j33]Pan Zhou, Jie Xu, Wei Wang, Changkun Jiang, Kehao Wang, Jia Hu:
Human-Behavior and QoE-Aware Dynamic Channel Allocation for 5G Networks: A Latent Contextual Bandit Learning Approach. IEEE Trans. Cogn. Commun. Netw. 6(2): 436-451 (2020) - [j32]Jihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen, Kehao Wang, Rongrong Zhang:
Missing Tag Identification in COTS RFID Systems: Bridging the Gap between Theory and Practice. IEEE Trans. Mob. Comput. 19(1): 130-141 (2020) - [j31]Pan Zhou, Qiben Yan, Kehao Wang, Zichuan Xu, Shouling Ji, Kaigui Bian:
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack. IEEE Trans. Netw. Sci. Eng. 7(3): 1862-1878 (2020) - [c10]Kehao Wang, Zhenhua Xiong, Zhixin Hu, Xueyan Chen, Lin Chen:
Joint Beamforming and Phase-Shifting Optimization in MISO with RIS-Assisted Communication. ICCC 2020: 348-353
2010 – 2019
- 2019
- [j30]Kehao Wang, Lin Chen, Kaigui Bian, Wei Wang, Pan Zhou:
On Cooperative Channel Rendezvous in Cognitive Radio Networks. IEEE Access 7: 57500-57515 (2019) - [j29]Lin Chen, Kaigui Bian, Xiaohu Ge, Wei Chen, Qingsong Ai, Kehao Wang:
Multi-radio channel rendezvous in cognitive radio networks. IET Commun. 13(10): 1433-1442 (2019) - [j28]Shoujun Liu, Kehao Wang, Kezhong Liu, Wei Chen:
Noncoherent Decision Fusion over Fading Hybrid MACs in Wireless Sensor Networks. Sensors 19(1): 120 (2019) - [j27]Pan Zhou, Kehao Wang, Jie Xu, Dapeng Oliver Wu:
Differentially-Private and Trustworthy Online Social Multimedia Big Data Retrieval in Edge Computing. IEEE Trans. Multim. 21(3): 539-554 (2019) - [j26]Jihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen, Kehao Wang:
On Efficient Tree-Based Tag Search in Large-Scale RFID Systems. IEEE/ACM Trans. Netw. 27(1): 42-55 (2019) - [j25]Kehao Wang, Jihong Yu, Lin Chen, Pan Zhou, Xiaohu Ge, Moe Z. Win:
Opportunistic Scheduling Revisited Using Restless Bandits: Indexability and Index Policy. IEEE Trans. Wirel. Commun. 18(10): 4997-5010 (2019) - [c9]Weiguang Zhao, Mingxuan Chen, Difan Mu, Pan Zhou, Kehao Wang:
Differentially Private Tree-Based Contextual Online Learning for Service Big Data Selection in IoT. GLOBECOM 2019: 1-6 - [c8]Zhikui Zhu, Jun Ruan, Kehao Wang, Jingfan Zhou, Guanglu Ye, Chenchen Wu:
A Densely Connected Transformer for Machine Translation. ISCID (1) 2019: 221-224 - [c7]Xueyan Chen, Kehao Wang, Jihon Yu, Lin Chen, Pan Zhou:
Energy-Efficient Base Station Deployment in Heterogeneous Communication Network. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1644-1649 - 2018
- [j24]Wenbo Chen, Pan Zhou, Shaokang Dong, Shimin Gong, Menglan Hu, Kehao Wang, Dapeng Oliver Wu:
Tree-Based Contextual Learning for Online Job or Candidate Recommendation With Big Data Support in Professional Social Networks. IEEE Access 6: 77725-77739 (2018) - [j23]Kehao Wang, Quan Liu, Qingju Fan, Qingsong Ai:
Optimally Probing Channel in Opportunistic Spectrum Access. IEEE Commun. Lett. 22(7): 1426-1429 (2018) - [j22]Kehao Wang:
Optimally Myopic Scheduling Policy for Downlink Channels With Imperfect State Observation. IEEE Trans. Veh. Technol. 67(7): 5856-5867 (2018) - [j21]Kehao Wang, Lin Chen, Jihong Yu, Qingju Fan, Yang Zhang, Wei Chen, Pan Zhou, Yi Zhong:
On Optimality of Second-Highest Policy for Opportunistic Multichannel Access. IEEE Trans. Veh. Technol. 67(12): 12013-12024 (2018) - [j20]Duzhong Zhang, Quan Liu, Lin Chen, Wenjun Xu, Kehao Wang:
Multi-layer based multi-path routing algorithm for maximizing spectrum availability. Wirel. Networks 24(3): 897-909 (2018) - [c6]Kehao Wang, Lin Chen, Jihong Yu, Moe Z. Win:
Opportunistic Multichannel Access with Imperfect Observation: A Fixed Point Analysis on Indexability and Index-based Policy. INFOCOM 2018: 1898-1906 - 2017
- [j19]Duzhong Zhang, Quan Liu, Lin Chen, Wenjun Xu, Kehao Wang:
Mirror-image-based disjoint multi-paths routing algorithm for maximizing communication efficiency. EURASIP J. Wirel. Commun. Netw. 2017: 114 (2017) - [j18]Kehao Wang, Lin Chen, Jihong Yu:
On Optimality of Myopic Policy in Multi-Channel Opportunistic Access. IEEE Trans. Commun. 65(2): 677-690 (2017) - [j17]Jihong Yu, Lin Chen, Rongrong Zhang, Kehao Wang:
Finding Needles in a Haystack: Missing Tag Detection in Large RFID Systems. IEEE Trans. Commun. 65(5): 2036-2047 (2017) - [j16]Duzhong Zhang, Quan Liu, Lin Chen, Wenjun Xu, Kehao Wang:
On-demand ecology-inspired spectrum allocation mechanism for heterogeneous cognitive radio networks. Telecommun. Syst. 66(4): 589-601 (2017) - [j15]Jihong Yu, Lin Chen, Rongrong Zhang, Kehao Wang:
On Missing Tag Detection in Multiple-Group Multiple-Region RFID Systems. IEEE Trans. Mob. Comput. 16(5): 1371-1381 (2017) - [c5]Kehao Wang, Jihong Yu, Lin Chen, Moe Z. Win:
Opportunistic Scheduling Revisited Using Restless Bandits: Indexability and Index Policy. GLOBECOM 2017: 1-6 - 2016
- [j14]Kehao Wang, Lin Chen, Jihong Yu, Duzhong Zhang:
Optimality of Myopic Policy for Multistate Channel Access. IEEE Commun. Lett. 20(2): 300-303 (2016) - [j13]Jihong Yu, Lin Chen, Rongrong Zhang, Kehao Wang:
From Static to Dynamic Tag Population Estimation: An Extended Kalman Filter Perspective. IEEE Trans. Commun. 64(11): 4706-4719 (2016) - [j12]Kehao Wang, Francis C. M. Lau, Lin Chen, Robert Schober:
Pricing Mobile Data Offloading: A Distributed Market Framework. IEEE Trans. Wirel. Commun. 15(2): 913-927 (2016) - [c4]Kehao Wang:
Optimality of Myopic Policy for Restless Multiarmed Bandit with Imperfect Observation. GLOBECOM 2016: 1-6 - [c3]Kehao Wang, Lin Chen, Jihong Yu:
On optimality of myopic policy in multi-channel opportunistic access. ICC 2016: 1-6 - 2015
- [j11]Kehao Wang, Quan Liu, Fangmin Li, Lin Chen, Xiaolin Ma:
Myopic policy for opportunistic access in cognitive radio networks by exploiting primary user feedbacks. IET Commun. 9(7): 1017-1025 (2015) - [j10]Kehao Wang:
Spectrum Search Over Multiple Homogeneous Channels. IEEE Trans. Veh. Technol. 64(10): 4881-4887 (2015) - [j9]Kehao Wang, Lin Chen, Quan Liu, Wei Wang, Fangmin Li:
One Step Beyond Myopic Probing Policy: A Heuristic Lookahead Policy for Multi-Channel Opportunistic Access. IEEE Trans. Wirel. Commun. 14(2): 759-769 (2015) - [c2]Kehao Wang, Francis C. M. Lau, Lin Chen, Robert Schober:
A distributed market framework for mobile data offloading. ICC 2015: 3063-3068 - [i6]Jihong Yu, Lin Chen, Kehao Wang:
Finding Needles in a Haystack: Missing Tag Detection in Large RFID Systems. CoRR abs/1512.05228 (2015) - 2014
- [j8]Kehao Wang, Lin Chen, Quan Liu:
On Optimality of Myopic Policy for Opportunistic Access With Nonidentical Channels and Imperfect Sensing. IEEE Trans. Veh. Technol. 63(5): 2478-2483 (2014) - [c1]Kehao Wang:
Multicast Rendezvous in Cognitive Radio Networks: A Hypercube Approach. CSE 2014: 1175-1180 - [i5]Kehao Wang, Francis C. M. Lau, Lin Chen, Robert Schober:
Pricing Mobile Data Offloading: A Distributed Market Framework. CoRR abs/1409.4560 (2014) - 2013
- [j7]Kehao Wang, Lin Chen, Quan Liu:
Opportunistic Spectrum Access by Exploiting Primary User Feedbacks in Underlay Cognitive Radio Systems: An Optimality Analysis. IEEE J. Sel. Top. Signal Process. 7(5): 869-882 (2013) - [j6]Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:
On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-Channel Opportunistic Access. IEEE Trans. Commun. 61(9): 3854-3862 (2013) - [j5]Kehao Wang, Quan Liu, Francis C. M. Lau:
Multichannel Opportunistic Access by Overhearing Primary ARQ Messages. IEEE Trans. Veh. Technol. 62(7): 3486-3492 (2013) - 2012
- [b1]Kehao Wang:
Multi-channel opportunistic access : a restless multi-armed bandit perspective. (Accès opportuniste dans les systèmes de communication multi-canaux : une perspective du problème de bandit-manchot). University of Paris-Sud, Orsay, France, 2012 - [j4]Kehao Wang, Quan Liu, Lin Chen:
Optimality of greedy policy for a class of standard reward function of restless multi-armed bandit problem. IET Signal Process. 6(6): 584-593 (2012) - [j3]Kehao Wang, Quan Liu, Lin Chen:
Hierarchical reversible data hiding based on statistical information: Preventing embedding unbalance. Signal Process. 92(12): 2888-2900 (2012) - [j2]Kehao Wang, Lin Chen:
On Optimality of Myopic Policy for Restless Multi-Armed Bandit Problem: An Axiomatic Approach. IEEE Trans. Signal Process. 60(1): 300-309 (2012) - [j1]Kehao Wang, Lin Chen, Khaldoun Al Agha, Quan Liu:
On Optimality of Myopic Policy in Opportunistic Spectrum Access: The Case of Sensing Multiple Channels and Accessing One Channel. IEEE Wirel. Commun. Lett. 1(5): 452-455 (2012) - [i4]Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:
On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-channel Opportunistic Access. CoRR abs/1202.0477 (2012) - [i3]Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:
On Optimality of Myopic Policy for Restless Multi-armed Bandit Problem with Non i.i.d. Arms and Imperfect Detection. CoRR abs/1205.5375 (2012) - 2011
- [i2]Kehao Wang, Lin Chen:
On the Optimality of Myopic Sensing in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels. CoRR abs/1103.1784 (2011) - [i1]Quan Liu, Kehao Wang, Lin Chen:
On Optimality of Greedy Policy for a Class of Standard Reward Function of Restless Multi-armed Bandit Problem. CoRR abs/1104.5391 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint