Selected Publications of Rui Zhang on Wireless Eavesdropping and Spoofing
  ♦Overview:  
    ♠ J. Xu, L. Duan, and R. Zhang, “Surveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm,” IEEE Wireless Communications,vol. 24, no. 4, pp.152-159, August 2017.
  ♦Jamming-assisted Eavesdropping:  
   

♠ H. Zhang, L. Duan, and R. Zhang, “Jamming-assisted proactive eavesdropping over two suspicious communication links,”IEEE Transactions on Wireless Communications, vol. 19, no. 7, pp. 4817-4830, July 2020.
♠ Y. Han, L. Duan, and R. Zhang, “Jamming-assisted eavesdropping over parallel fading channels,” IEEE Transactions on Information Forensics & Security, vol. 14, no. 9, pp. 2486-2499, September, 2019.
♠ J. Xu, K. Li, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming over HARQ-based communications,” IEEE Global Communications Conference (Globecom), 2017.
♠ G. Ma, J. Xu, L. Duan, and R. Zhang, “Wireless surveillance of two-hop communications,” IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC), 2017.
♠ Y. Zeng and R. Zhang, “Wireless information surveillance via proactive eavesdropping with spoofing relay,” IEEE Journal of Selected Topics in Signal Processing, special issue on exploiting interference towards energy efficient and secure wireless communications, vol. 10, no. 8, pp. 1449-1461, December 2016.
♠ Y. Zeng and R. Zhang, “Active eavesdropping via spoofing relay attack,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2016.
♠ J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via cognitive jamming in fading channels,” IEEE Transactions on Wireless Communications, vol. 16, no. 5, pp. 2790-2806, May 2017.
♠ J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels,” IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 80-83, February 2016.

  ♦ Physical-layer Spoofing:
   

J. Xu, L. Duan, and R. Zhang, “Transmit optimization for symbol-level spoofing,” IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 41-55, January 2018.
♠ J. Xu, L. Duan, and R. Zhang, “Fundamental rate limits of physical layer spoofing,IEEE Wireless Communications Letters, vol. 6 , no. 2, pp.154-157, April 2017.