头像

姓名:李古月

职称:副教授

电话:

办公室:

个人主页:https://www.researchgate.net/profile/Li_Guyue

邮箱:guyuelee@seu.edu.cn

教育背景

交流访问,巴黎高等电子与电工技术工程师学校(ESIEE Paris),法国,2019-2020;

工学博士(信息与通信工程),东南大学,中国,2017

交流访学,坦佩雷理工大学,芬兰,2014;

工学学士(信息科学与工程),东南大学,中国,2011

学术兼职

研究领域

物理层安全;无线通信安全

研究概况

长期从事无线通信物理层安全研究,研究方向包括面向未来通信的物理层密钥分发技术、基于设备指纹的新一代安全接入技术、波束成形、人工噪声、MIMO-OFDM技术等。研究通过物理层技术实现对接入设备的安全认证及密钥分发,保障无线通信空中接口的安全。重点研究TDD/FDD/IBFD系统下的基于无线信道互易性的密钥生成技术以及IoT通信中基于设备指纹和链路指纹的认证与识别技术。


欢迎有兴趣的本科生及研究生加入我们的PLS-LAB(Physical-Layer Security LAB)团队 :-)


研究课题

14.国家自然科学基金面上项目,面向海量用户的轻量级空口安全传输理论与方法研究,2022/01-2025/12,57万元,进行中,主持。

13.江苏省自然科学基金面上项目,面向5G海量物联网的空口内生安全传输理论与方法研究,2021/07-2024/06,10万元,进行中,主持。

12.无线通信的XXXX技术研究, 2020.12-2021.03, 10万元,已结题,主持。

11.国家重点研发项目国际科技创新合作重点专项,基于量子密钥的物联网安全体系和关键技术联合研发,2020.6-2023.5,835万,进行中,参与。

10.国家自然科学基金专项项目,61941115,动态构造物理特征的空口安全通信理论方法研究, 2020/01至2021/12, 81万元,进行中,参与。 

9. 江苏省重点研发计划产业前瞻与关键核心技术--竞争项目,BE2019109,2019/06-2022/06,250万元,进行中,参与。

8. 基本科研扶持项目,物联网边缘安全接入的关键技术研究,2019/03-2021/03,4万元,进行中,主持。

7. 国家自然科学基金青年科学基金项目,61801115,移动通信FDD信道密钥生成方法研究,2019/01-2021/12,22.5万元,进行中,主持。

6. 科技服务项目,江苏电力信息技术有限公司 基于设备指纹技术的无线接入安全管理平台委外研发服务采购, 2018-09-07-2019-12-30,116.1万元,进行中,主持。

5. 新进教师启动基金,3209008202,基于FDD信道特征的物理层安全技术研究 2018年3月-2019年12月,10万元,已结题,主持。

4. 国家自然科学基金青年科学基金项目,61602113,基于射频指纹的无线目标识别与定位技术研究,2017/01-2019/12,21万元,已结题,参与。

3. 国家自然科学基金青年科学基金项目,61601114,光通信系统基于物理层指纹的识别与认证安全技术研究,2017/01-2019/12,22万元,已结题,参与。

2. 江苏省自然科学基金青年项目, BK20160692,“基于物理层特征的无线通信安全技术”,2016/07-2019/6,20万元,已结题,参与。

1. 国家自然科学基金面上项目,61571110,“面向未来移动通信的物理层安全技术研究”,2016/01-2019/12,57万元,已结题,参与。


奖励与荣誉

东南大学授课竞赛三等奖

获得2019年东南大学至善青年学者B层次荣誉


课程信息

最优化理论与技术

通信原理

数字通信

学术成果


论文

2021年:

[49] X. Zhang, G. Li*, J. Zhang, A. Hu, Z. Hou and B. Xiao, “Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems”  accepted for publication in IEEE Internet of Things Journal.

[48] Y. Yang, A. Hu*, J. Yu, G. Li, Z. Zhang, Radio Frequency Fingerprint Identification Based on Stream Differential Constellation Trace Figures, accepted for publication in Physical Communication.

[47] H. Luo, G. Li*, L. Hu, “On the Security of RIS-assisted Manipulating Attack in MISO systems”, in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5. 

[46] L. Hu, G. Li*, H. Luo, and A. Hu, “On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation”, in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5. 

[45] X. Zhang, G. Li*, Z. Hou and A. Hu, “Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network” in Proc. IEEE VTC, Virtual Conference, 27-30 September 2021, pp. 1-5.

[44] L. Hu, Y. Chen, G. Li* and A. Hu, Exploiting Artificial Randomness for Fast Secret Key Generation in Quasi-static Environments, in Proc. IEEE 6th International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 9-11, Jul. 2021, pp. 1-5.

[43] Y. Xu, A. Hu* and G. Li, LOBBY: A Novel Physical-layer Key Generation Method, in Proc. 2021 4th International Conference on Communication Engineering and Technology (ICCET), Shanghai, China, 25-27, Feb. 2021, pp. 1-5.

[42] X. Zhou, A. Hu*, G. Li, L. Peng, Y. Xing and J. Yu, A Robust Radio Frequency Fingerprint Extraction Scheme for Practical Device Recognition, in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3051402. (Early Access Article)

[41] G. Li, C. Sun*, E. Jorswieck, J. Zhang  and A. Hu. Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks, IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 968-982, 2021.

[40] G. Li*, Z. Zhang, J. Zhang and A. Hu, Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation, in IEEE Internet of Things Journal, vol. 8, no. 1, pp. 357-369, 2021.


2020年:

[39] C. Sun, H. Yang and G. Li*, AmpRmdr: Remainder-Based Secret Key Generation Using Wireless Channel Amplitude, IEEE Access, vol. 8, pp. 228178 - 228187, 2020.

[38] C. Sun and G. Li*, Power Allocation and Beam Scheduling for Multi-User Massive MIMO Secret Key Generation, IEEE Access, vol. 8, pp. 164580-164592, 2020.

[37]  J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels, IEEE Access, vol. 8, pp. 138406 - 138446, 2020.

[36] Y. Xing, T. Wang, F. Zhou, A. Hu*, G. Li, and L. Peng, “EVAL cane: Non-intrusive monitoring platform with a novel gait-based user identification scheme,” IEEE Trans. Instrum. Meas., vol. 70: 2500115, 2020.

[35] Y. Xing, A. Hu*, J. Zhang, J. Yu, G. Li, and T. Wang, “Design of a robust radio frequency fingerprint identification scheme for multi-mode LFM radar,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10581-10593, 2020.

[34] 李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密码学报, 2020, 7(2): 224-248.

[33] 袁瑞, 彭林宁, 李古月, 付华. 不同环境下无线信道密钥生成性能研究[J]. 密码学报, 2020, 7(2): 261-273.

[32] Y. Chen, G. Li*, C. Sun, J. Zhang, E. Jorswieck and B. Xiao. Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks, in Proc. IEEE ICC, Virtual Conference, 7-11. June, 2020, pp. 1-6.


2019年:

[31] G. Li, J. Yu, Y. Xing, and A. Hu. Location-invariant physical layer identification approach for WiFi devices. IEEE Access, pages 106974 - 106986, 2019.

[30] J. Yu, A. Hu, F. Zhou, Y. Xing, Y. Yu, G. Li, and L. Peng. Radio frequency fingerprint identification based on denoising autoencoders. In Proc. 15th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob), pages 1–6, Barcelona, Spain, Oct. 2019.

[29] Y. Xing, A. Hu, J. Yu, G. Li, L. Peng and F. Zhou, A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars, in Proc. IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21 - 23 Oct, 2019, pp. 1-6.

[28] G. Li, Z. Zhang, Y. Yu and A. Hu, A Hybrid Information Reconciliation Method for Physical-layer Key Generation, Entropy. 2019; 21(7):688.

[27] 胡爱群,李古月, 彭林宁, 李涛. 融入思政的网络空间安全前沿技术教学探索[J]. 网络与信息安全学报, 2019, 5(3): 54-66.

[26] B. Liu, A. Hu and G. Li, Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems, IEEE Communications Letters, vol. 23, no. 9, pp. 1493 - 1496, 2019.

[25] J. Zhang, M. Ding, G. Li and A. Marshall, Key Generation Based on Large Scale Fading, IEEE Transactions on Vehicular Technology, vol. 68, no. 8, pp. 8222 – 8226, 2019. 

[24] G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao and A Hu. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy. 2019; 21(5):497.

[23]J. Yu, A. Hu, G. Li and L. Peng, A Robust RF Fingerprinting Approach Using Multi-Sampling Convolutional Neural Network, in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6786-6799, Aug. 2019.

[22] X. Zhou, A. Hu, G. Li, L. Peng, Y. Xing and J. Yu, Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification, in Proc. IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, 10-12 Jun. 2019, pp. 1-9.

[21] G. Li, L. Hu, and A. Hu, Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks, in Proc. IEEE ICC Workshops (WPLS), Shanghai, China, 20-24. May, 2019, pp. 1-6.

[20] Z. Zhang, G. Li and A. Hu, An Adaptive Information Reconciliation Protocol for Physical-layer Based Secret Key Generation, in Proc. IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lumpur, Malaysia, 28 April – 1 May, 2019, pp. 1-5.

[19] J. Yu, A. Hu, G. Li and L. Peng, A Multi-Sampling Convolutional Neural Network-Based RF Fingerprinting Approach for Low-Power Devices, in Proc. IEEE INFOCOM Workshop Internet of Things for Adversarial Environments (IoTAE), Paris, France, 29 April - 2 May, 2019, pp.1-6.

[18] L. Peng, G. Li, J. Zhang, R. Woods, M. Liu, and A. Hu, An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation,  IEEE Transactions on Mobile Computing, vol.18, no.3, pp.507-519, 2019.


2018年:


17] G. Li, A. Hu, C. Sun and J. Zhang, Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems, IEEE Communications Letters, vol.22, no.12, pp.2487-2490, 2018.

[16] Y. Xing, A. Hu, J. Zhang, L. Peng and G. Li, On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios, IEEE Communications Letters, vol.22, no.11, pp.2326-2329, 2018.

[15] L. Peng, G. Li, J. Zhang, and A. Hu, Securing M2M Transmissions Using Nonreconciled Secret Keys Generated from Wireless Channels Measurements, in Proc. IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Abu Dhabi, UAE, 9-13 Dec. 2018, pp.1-6.

[14] L. Hu, G. Li, A. Hu and C. Cao, Lightweight group key distribution method based on high similar wireless channel characteristics, in Proc. of 18th  IEEE International Conference on Communication Technology (ICCT 2018), Chongqing,8-11 Oct.2018, pp.1-5.

[13] G. Li, A. Hu, J. Zhang, L. Peng, C. Sun and D. Cao, High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing, in IEEE Transactions on Communications, vol. 66, no. 7, pp. 3022-3034, July 2018.


2017年:

[12] G. Li, A. Hu, J. Zhang, and B. Xiao, Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation, in Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6.

[11] L. Peng, G. Li and A. Hu, Channel Reciprocity Improvement of Secret Key Generation with Loop-back Transmissions, in Proc. of the 17th IEEE International Conference on Communication Technology (ICCT 2017), Chengdu, 27-30 Oct. 2017, pp. 1-6.

[10] 李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208


2016年及之前:

[9] G. Li, and A. Hu, Virtual MIMO-based Cooperative Beamforming and Jamming Scheme for the Clustered Wireless Sensor Network Security, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2246-2250.

[8] G. Li, and A. Hu, MISO Secrecy Transmission via Designing Artificial Noise by Receiver under Perfect and Imperfect CSI”, in Proc. of IEEE International Conference on Computer and Communications (ICCC), Chengdu, 14-17 Oct. 2016, pp.2664-2668.

[7] G. Li, A. Hu, L. Peng, and C. Sun, “The optimal preprocessing approach for secret key generation from OFDM channel measurements,” in Proc.IEEE GLOBECOM Workshop Trusted Commun. with Physical Layer Security (TCPLS), Washington DC, Dec. 2016, pp.1-6.

[6] G. Li, A. Hu, Y. Zou, L. Peng, M. Valkama, A Novel Transform for Secret Key Generation in Time-varying TDD Channel under Hardware Fingerprint Deviation, in Proc.IEEE 82th Vehicular Technology Conference (VTC2015-Fall), Boston, Sep. 2015, pp.1-5.

[5] G. Li, A. Hu and Y. Huang, A Novel Artificial Noise Aided Security Scheme to Resist Blind Source Separation Attacks, Chinese Science Bulletin, 2014,59(32):4225-4234.

[4] 李古月,胡爱群,石乐.无线信道的密钥生成方法[J]. 密码学报, 2014, 1(3): 211–224.

[3] 胡爱群,李古月.无线通信物理层安全方法综述[J]. 数据采集与处理 , 2014, 29(3): 341–350.

[2] G. Li and A. Hu, An Approach to Resist Blind Source Separation Attacks of Speech Signals, IET CSC2014: 1-7.

[1] M. Xue, A. Hu, Yi. Huang and G. Li, Monte Carlo based Test Pattern Generation for Hardware Trojan Detection, IEEE DASC2013:131 - 136.


  

专利

[1]李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法 2020.08.11 中国CN201910729172.5(授权)  

[2]李古月,胡爱群,王栋,韩远致,李晶琪 基于主成分分析的信道互易性增强方法2019.04.30 中国 CN201610539867.3(授权)

[3]李古月,胡爱群,李晶琪,王栋,韩远致 基于酉变换预处理的无线信道特征变级量化方法2016.10.12 中国 CN201610539956.8(授权)

[4]胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.09.21 国际PCT/CN2020/116433

[5]李古月,胥英豪,胡爱群 一种防近端窃听的主动信道密钥生成方法及系统2020.08.25 中国 CN202010343569.3

[6]胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.08.18 中国 CN202010344216.5

[7]李古月,胥英豪,胡爱群 一种基于矩阵特征值的主动信道密钥生成方法及系统2020.08.07 中国 CN202010343555.1

[8]刘瑞之,李锦辉,刘余文,雷重庆,何川,李古月 一种基于接收信号强度的无线通信安全认证方法2020.04.17 中国 CN201911166170.6

[9]李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法2019.09.20 国际PCT/CN2019/10688

[10]李古月,杨海誉,何川 基于幅度取余的无线信道密钥随机性增强方法2019.08.23 中国 CN201910375302.X

[11]李古月,胡爱群,张喆颖 一种基于初始密钥不一致率的生成密钥自适应调和方法2019.08.02 中国 CN201910333552.7

[12]李古月,胡爱群,张喆颖 一种结合BBBSS协议与BCH码的生成密钥部分调和方法2019.07.30 中国 CN201910333854.4(授权)

[13]胡爱群,俞佳宝,彭林宁,李古月 一种鲁棒的低功耗设备射频指纹识别方法2019.06.21 中国 CN201910080693.2

[14]胡爱群,俞佳宝,李古月,彭林宁 一种基于多采样卷积神经网络的射频指纹提取和识别方法2019.06.21 中国 CN201910080034.9

[15]胡爱群,刘博谦,李古月,一种频分双工系统中的密钥提取方法2019.04.12 中国 CN201910067771.5

[16]李古月,胡爱群,刘博谦, 基于多径分离的频分双工系统中互易信道系数构建方法2019.01.25 中国 CN201810830831.X (授权)

[17]李古月,胡爱群,刘博谦 ,一种基于路径相位差分的频分双工系统互易信道参数构建方法2018.12.18 中国 ZL201810830831.X (授权)

[18]李古月,胡爱群,胡良君,基于无线信道特征的轻量级组密钥分发方法2021.03.05 中国 ZL201810513227.4(授权)

[19]李古月,何川,胡爱群,庄浩宇,杨海誉,基于前导差分谱的OFDM设备识别方法及装置 2019.07.23 CN11-417701 B(授权)

[20] 李古月;张鑫伟;侯宗越;王星宇,一种基于深度学习的频分双工系统密钥生成方法,受理,2021.3.24202110312897.1


其他

IEEE会员,中国通信学会高级会员,江苏省网络空间安全学会会员,担任国际SCI期刊IEEE TIFSJSACTWCTCOM等期刊审稿人和IEEE ICCIEEE Globecom等国际旗舰会议的程序委员会委员。