Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei Kang 0002
@article{DBLP:journals/entropy/ChengLK23, author = {Jiale Cheng and Nan Liu and Wei Kang}, title = {On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection}, journal = {Entropy}, volume = {25}, number = {4}, pages = {625}, year = {2023}, url = {https://doi.org/10.3390/e25040625}, doi = {10.3390/E25040625}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ChengLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/WuLK23, author = {Jiahong Wu and Nan Liu and Wei Kang}, title = {A Numerical Study on the Capacity Region of a Three-Layer Wiretap Network}, journal = {Entropy}, volume = {25}, number = {12}, pages = {1566}, year = {2023}, url = {https://doi.org/10.3390/e25121566}, doi = {10.3390/E25121566}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/WuLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WangLK23, author = {Wuqu Wang and Nan Liu and Wei Kang}, title = {Three-User {D2D} Coded Caching With Two Random Requesters and One Sender}, journal = {{IEEE} Trans. Commun.}, volume = {71}, number = {12}, pages = {6967--6978}, year = {2023}, url = {https://doi.org/10.1109/TCOMM.2023.3310506}, doi = {10.1109/TCOMM.2023.3310506}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/WangLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YaoLKL23, author = {Yucheng Yao and Nan Liu and Wei Kang and Chunguo Li}, title = {Secure Distributed Matrix Multiplication Under Arbitrary Collusion Pattern}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {85--100}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3217383}, doi = {10.1109/TIFS.2022.3217383}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YaoLKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cniot/LuoLK23, author = {Zhiqiang Luo and Nan Liu and Wei Kang}, title = {Capacity Results of Coded Caching: The Pareto Optimal Frontier of the Two-User Case}, booktitle = {Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things, {CNIOT} 2023, Xiamen, China, May 26-28, 2023}, pages = {975--982}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603781.3604224}, doi = {10.1145/3603781.3604224}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cniot/LuoLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/PeiKL23, author = {Tianyou Pei and Wei Kang and Nan Liu}, title = {The Capacity of Oblivious Transfer with Replicated Databases and Binary Erasure Multiple Access Channel}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1592--1596}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206863}, doi = {10.1109/ISIT54713.2023.10206863}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/PeiKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/WangLK23, author = {Wuqu Wang and Nan Liu and Wei Kang}, title = {Coded Caching in Request-robust {D2D} Communication Networks}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323632}, doi = {10.1109/ISNCC58260.2023.10323632}, timestamp = {Thu, 07 Dec 2023 20:38:52 +0100}, biburl = {https://dblp.org/rec/conf/isncc/WangLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/WuLK23, author = {Jiahong Wu and Nan Liu and Wei Kang}, title = {The Closure of the Entropy Region is Not Closed Under Polymatroid Duality for Four Discrete Random Variables}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323996}, doi = {10.1109/ISNCC58260.2023.10323996}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/WuLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-03920, author = {Jiahong Wu and Nan Liu and Wei Kang}, title = {The Capacity Region of Distributed Multi-User Secret Sharing under The Perfect Privacy Condition}, journal = {CoRR}, volume = {abs/2302.03920}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.03920}, doi = {10.48550/ARXIV.2302.03920}, eprinttype = {arXiv}, eprint = {2302.03920}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-03920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04922, author = {Zeru Chen and Nan Liu and Wei Kang}, title = {A Cyclic Placement Strategy for Multi-access Coded Caching}, journal = {CoRR}, volume = {abs/2312.04922}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04922}, doi = {10.48550/ARXIV.2312.04922}, eprinttype = {arXiv}, eprint = {2312.04922}, timestamp = {Tue, 09 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05737, author = {Jiahong Wu and Nan Liu and Wei Kang}, title = {Multiple Threshold Schemes Under The Weak Secure Condition}, journal = {CoRR}, volume = {abs/2312.05737}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05737}, doi = {10.48550/ARXIV.2312.05737}, eprinttype = {arXiv}, eprint = {2312.05737}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05737.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengLKL22, author = {Jiale Cheng and Nan Liu and Wei Kang and Yang Li}, title = {The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3037--3050}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3201375}, doi = {10.1109/TIFS.2022.3201375}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengLKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/WuLK22, author = {Jiahong Wu and Nan Liu and Wei Kang}, title = {All Integral Points Satisfying Linear Rank Inequalities on Four or Less Variables are Representable}, booktitle = {14th International Conference on Wireless Communications and Signal Processing, {WCSP} 2022, Nanjing, China, November 1-3, 2022}, pages = {383--387}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCSP55476.2022.10039300}, doi = {10.1109/WCSP55476.2022.10039300}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/WuLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-06363, author = {Tianyou Pei and Wei Kang and Nan Liu}, title = {Capacity Results for the Wiretapped Oblivious Transfer}, journal = {CoRR}, volume = {abs/2207.06363}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.06363}, doi = {10.48550/ARXIV.2207.06363}, eprinttype = {arXiv}, eprint = {2207.06363}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-06363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-10225, author = {Wuqu Wang and Nan Liu and Wei Kang}, title = {On the Rate-Memory Tradeoff of {D2D} Coded Caching with Three Users}, journal = {CoRR}, volume = {abs/2209.10225}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.10225}, doi = {10.48550/ARXIV.2209.10225}, eprinttype = {arXiv}, eprint = {2209.10225}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-10225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-05914, author = {Jiale Cheng and Nan Liu and Wei Kang}, title = {On the Asymptotic Capacity of Information Theoretical Privacy-preserving Epidemiological Data Collection}, journal = {CoRR}, volume = {abs/2212.05914}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.05914}, doi = {10.48550/ARXIV.2212.05914}, eprinttype = {arXiv}, eprint = {2212.05914}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-05914.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YaoLK21, author = {Xinyu Yao and Nan Liu and Wei Kang}, title = {The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns for Replicated Databases}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {10}, pages = {6841--6855}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3100476}, doi = {10.1109/TIT.2021.3100476}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/YaoLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinacom/Li0K20, author = {Yang Li and Nan Liu and Wei Kang}, editor = {Honghao Gao and Pingyi Fan and Jun Wun and Xiaoping Xue and Jun Yu and Yi Wang}, title = {Cache-Aided Multi-message Private Information Retrieval}, booktitle = {Communications and Networking - 15th {EAI} International Conference, ChinaCom 2020, Shanghai, China, November 20-21, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {352}, pages = {127--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-67720-6\_9}, doi = {10.1007/978-3-030-67720-6\_9}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chinacom/Li0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Yao0020, author = {Xinyu Yao and Nan Liu and Wei Kang}, title = {The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2020, Los Angeles, CA, USA, June 21-26, 2020}, pages = {1041--1046}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIT44484.2020.9174094}, doi = {10.1109/ISIT44484.2020.9174094}, timestamp = {Tue, 15 Sep 2020 10:18:53 +0200}, biburl = {https://dblp.org/rec/conf/isit/Yao0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03843, author = {Xinyu Yao and Nan Liu and Wei Kang}, title = {The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns}, journal = {CoRR}, volume = {abs/2001.03843}, year = {2020}, url = {https://arxiv.org/abs/2001.03843}, eprinttype = {arXiv}, eprint = {2001.03843}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-08249, author = {Jiale Cheng and Nan Liu and Wei Kang}, title = {The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns}, journal = {CoRR}, volume = {abs/2010.08249}, year = {2020}, url = {https://arxiv.org/abs/2010.08249}, eprinttype = {arXiv}, eprint = {2010.08249}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-08249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/CaoZCLKG19, author = {Daming Cao and Deyao Zhang and Pengyao Chen and Nan Liu and Wei Kang and Deniz G{\"{u}}nd{\"{u}}z}, title = {Coded Caching With Asymmetric Cache Sizes and Link Qualities: The Two-User Case}, journal = {{IEEE} Trans. Commun.}, volume = {67}, number = {9}, pages = {6112--6126}, year = {2019}, url = {https://doi.org/10.1109/TCOMM.2019.2921711}, doi = {10.1109/TCOMM.2019.2921711}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/CaoZCLKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YangLKS19, author = {Tianyu Yang and Nan Liu and Wei Kang and Shlomo Shamai Shitz}, title = {Converse Results for the Downlink Multicell Processing With Finite Backhaul Capacity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {1}, pages = {368--379}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2869881}, doi = {10.1109/TIT.2018.2869881}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YangLKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Yao0019, author = {Xinyu Yao and Nan Liu and Wei Kang}, title = {The Capacity of Multi-round Private Information Retrieval from Byzantine Databases}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {2124--2128}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849275}, doi = {10.1109/ISIT.2019.8849275}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Yao0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-06907, author = {Xinyu Yao and Nan Liu and Wei Kang}, title = {The Capacity of Multi-round Private Information Retrieval from Byzantine Databases}, journal = {CoRR}, volume = {abs/1901.06907}, year = {2019}, url = {http://arxiv.org/abs/1901.06907}, eprinttype = {arXiv}, eprint = {1901.06907}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-06907.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CaoZCL0G18, author = {Daming Cao and Deyao Zhang and Pengyao Chen and Nan Liu and Wei Kang and Deniz G{\"{u}}nd{\"{u}}z}, title = {Coded Caching with Heterogeneous Cache Sizes and Link Qualities: The Two-User Case}, booktitle = {2018 {IEEE} International Symposium on Information Theory, {ISIT} 2018, Vail, CO, USA, June 17-22, 2018}, pages = {1545--1549}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISIT.2018.8437635}, doi = {10.1109/ISIT.2018.8437635}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/CaoZCL0G18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/0002L18, author = {Wei Kang and Nan Liu}, title = {An Upper bound on the Error Exponent in Lossless Source Coding with a Helper}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China, November 25-29, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ITW.2018.8613497}, doi = {10.1109/ITW.2018.8613497}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/0002L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-02706, author = {Daming Cao and Deyao Zhang and Pengyao Chen and Nan Liu and Wei Kang and Deniz G{\"{u}}nd{\"{u}}z}, title = {Coded Caching with Heterogeneous Cache Sizes and Link Qualities: The Two-User Case}, journal = {CoRR}, volume = {abs/1802.02706}, year = {2018}, url = {http://arxiv.org/abs/1802.02706}, eprinttype = {arXiv}, eprint = {1802.02706}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-02706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiuK17, author = {Nan Liu and Wei Kang}, title = {The Capacity of a Class of Channels With Coded Side Information at the Decoder}, journal = {{IEEE} Trans. Inf. Theory}, volume = {63}, number = {1}, pages = {72--80}, year = {2017}, url = {https://doi.org/10.1109/TIT.2016.2628724}, doi = {10.1109/TIT.2016.2628724}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/YangL0S17, author = {Tianyu Yang and Nan Liu and Wei Kang and Shlomo Shamai Shitz}, title = {An upper bound on the sum capacity of the downlink multicell processing with finite backhaul capacity}, booktitle = {2017 {IEEE} International Symposium on Information Theory, {ISIT} 2017, Aachen, Germany, June 25-30, 2017}, pages = {2053--2057}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISIT.2017.8006890}, doi = {10.1109/ISIT.2017.8006890}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/YangL0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/Cao017, author = {Daming Cao and Wei Kang}, title = {Secret key generation from correlated sources and secure link}, booktitle = {9th International Conference on Wireless Communications and Signal Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCSP.2017.8171157}, doi = {10.1109/WCSP.2017.8171157}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/Cao017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Cao017, author = {Daming Cao and Wei Kang}, title = {Secret Key Generation from Correlated Sources and Secure Link}, journal = {CoRR}, volume = {abs/1704.05220}, year = {2017}, url = {http://arxiv.org/abs/1704.05220}, eprinttype = {arXiv}, eprint = {1704.05220}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Cao017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KangL16, author = {Wei Kang and Nan Liu}, title = {Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {12}, pages = {7153--7163}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2615322}, doi = {10.1109/TIT.2016.2615322}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YangL0S16, author = {Tianyu Yang and Nan Liu and Wei Kang and Shlomo Shamai}, title = {An Upper Bound on the Sum Capacity of the Downlink Multicell Processing with Finite Backhaul Capacity}, journal = {CoRR}, volume = {abs/1609.00833}, year = {2016}, url = {http://arxiv.org/abs/1609.00833}, eprinttype = {arXiv}, eprint = {1609.00833}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YangL0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KangCL15, author = {Wei Kang and Daming Cao and Nan Liu}, title = {Deception With Side Information in Biometric Authentication Systems}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {3}, pages = {1344--1350}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2389825}, doi = {10.1109/TIT.2015.2389825}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/KangCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KangLC15, author = {Wei Kang and Nan Liu and Weiwei Chong}, title = {The Gaussian Multiple Access Diamond Channel}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {11}, pages = {6049--6059}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2479923}, doi = {10.1109/TIT.2015.2479923}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KangL15, author = {Wei Kang and Nan Liu}, title = {A permutation-based code for the wiretap channel}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {2306--2310}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282867}, doi = {10.1109/ISIT.2015.7282867}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/KangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuK15, author = {Nan Liu and Wei Kang}, title = {The multiple access diamond channel with caching relays}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {2862--2866}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282979}, doi = {10.1109/ISIT.2015.7282979}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CaoK15, author = {Daming Cao and Wei Kang}, title = {Message authentication with correlated sources}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {2934--2938}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282994}, doi = {10.1109/ISIT.2015.7282994}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/CaoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiuK14, author = {Nan Liu and Wei Kang}, title = {The Capacity Region of a Class of {Z} Channels With Degraded Message Sets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {10}, pages = {6144--6153}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2345653}, doi = {10.1109/TIT.2014.2345653}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuK14, author = {Nan Liu and Wei Kang}, title = {A new achievability scheme for downlink multicell processing with finite backhaul capacity}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1006--1010}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6874984}, doi = {10.1109/ISIT.2014.6874984}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KangCL14, author = {Wei Kang and Daming Cao and Nan Liu}, title = {Authentication with side information}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1722--1726}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875128}, doi = {10.1109/ISIT.2014.6875128}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KangCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangCL14, author = {Wei Kang and Daming Cao and Nan Liu}, title = {Deception with Side Information in Biometric Authentication Systems}, journal = {CoRR}, volume = {abs/1406.3103}, year = {2014}, url = {http://arxiv.org/abs/1406.3103}, eprinttype = {arXiv}, eprint = {1406.3103}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KangCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangL14, author = {Wei Kang and Nan Liu}, title = {Compressing Encrypted Data and Permutation Cipher}, journal = {CoRR}, volume = {abs/1408.5666}, year = {2014}, url = {http://arxiv.org/abs/1408.5666}, eprinttype = {arXiv}, eprint = {1408.5666}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuK13, author = {Nan Liu and Wei Kang}, title = {A new outer bound on the capacity region of a class of Z-interference channels}, booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information Theory, Istanbul, Turkey, July 7-12, 2013}, pages = {2049--2053}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIT.2013.6620586}, doi = {10.1109/ISIT.2013.6620586}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KangL13, author = {Wei Kang and Nan Liu}, title = {The Ahlswede-Han conjecture on channel with coded side information at the decoder}, booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information Theory, Istanbul, Turkey, July 7-12, 2013}, pages = {3075--3079}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIT.2013.6620791}, doi = {10.1109/ISIT.2013.6620791}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/LiuK12, author = {Nan Liu and Wei Kang}, title = {Capacity results for a class of {Z} channels with degraded message sets}, booktitle = {50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park {\&} Retreat Center, Monticello, IL, USA, October 1-5, 2012}, pages = {1225--1231}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/Allerton.2012.6483358}, doi = {10.1109/ALLERTON.2012.6483358}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/allerton/LiuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/KangL12, author = {Wei Kang and Nan Liu}, title = {Compressing encrypted data: {A} permutation approach}, booktitle = {50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park {\&} Retreat Center, Monticello, IL, USA, October 1-5, 2012}, pages = {1382--1386}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/Allerton.2012.6483379}, doi = {10.1109/ALLERTON.2012.6483379}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/allerton/KangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/ChongK12, author = {Weiwei Chong and Wei Kang}, title = {Joint decode-compress-forward for the broadcast diamond channel}, booktitle = {2012 1st {IEEE} International Conference on Communications in China (ICCC), Beijing, China, August 15-17, 2012}, pages = {191--196}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCChina.2012.6356876}, doi = {10.1109/ICCCHINA.2012.6356876}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/ChongK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KangU11, author = {Wei Kang and Sennur Ulukus}, title = {A New Data Processing Inequality and Its Applications in Distributed Source and Channel Coding}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {1}, pages = {56--69}, year = {2011}, url = {https://doi.org/10.1109/TIT.2010.2090211}, doi = {10.1109/TIT.2010.2090211}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KangU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KangU11a, author = {Wei Kang and Sennur Ulukus}, title = {Capacity of a Class of Diamond Channels}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {8}, pages = {4955--4960}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2158877}, doi = {10.1109/TIT.2011.2158877}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KangU11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinacom/LiuGK11, author = {Nan Liu and Deniz G{\"{u}}nd{\"{u}}z and Wei Kang}, title = {Capacity results for a class of deterministic Z-interference channels with unidirectional receiver conferencing}, booktitle = {6th International {ICST} Conference on Communications and Networking in China, {CHINACOM} 2011, Harbin, China, August 17-19, 2011}, pages = {580--584}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ChinaCom.2011.6158221}, doi = {10.1109/CHINACOM.2011.6158221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chinacom/LiuGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuK11, author = {Nan Liu and Wei Kang}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {The secrecy capacity region of a special class of multiple access channels}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {623--627}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6034205}, doi = {10.1109/ISIT.2011.6034205}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KangL11, author = {Wei Kang and Nan Liu}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {The Gaussian multiple access diamond channel}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {1499--1503}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6033791}, doi = {10.1109/ISIT.2011.6033791}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-3300, author = {Wei Kang and Nan Liu}, title = {The Gaussian Multiple Access Diamond Channel}, journal = {CoRR}, volume = {abs/1104.3300}, year = {2011}, url = {http://arxiv.org/abs/1104.3300}, eprinttype = {arXiv}, eprint = {1104.3300}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-3300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/0002L10, author = {Wei Kang and Nan Liu}, editor = {Marcus Greferath and Joachim Rosenthal and Alexander Barg and Gilles Z{\'{e}}mor}, title = {Wiretap channel with shared key}, booktitle = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland, August 30 - September 3, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CIG.2010.5592665}, doi = {10.1109/CIG.2010.5592665}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/itw/0002L10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KangL09, author = {Wei Kang and Nan Liu}, title = {The secrecy capacity of the semi-deterministic broadcast channel}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings}, pages = {2767--2771}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISIT.2009.5205819}, doi = {10.1109/ISIT.2009.5205819}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/KangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Kang08, author = {Wei Kang}, title = {Correlation and cooperation in network information theory}, school = {University of Maryland, College Park, MD, {USA}}, year = {2008}, url = {https://hdl.handle.net/1903/8355}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Kang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/KangU08, author = {Wei Kang and Sennur Ulukus}, title = {Capacity of a class of diamond channels}, booktitle = {46th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2008, Monticello, IL, USA, September 24-26, 2008}, pages = {1426--1431}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ALLERTON.2008.4797730}, doi = {10.1109/ALLERTON.2008.4797730}, timestamp = {Wed, 22 Nov 2023 08:29:09 +0100}, biburl = {https://dblp.org/rec/conf/allerton/KangU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-0948, author = {Wei Kang and Sennur Ulukus}, title = {Capacity of a Class of Diamond Channels}, journal = {CoRR}, volume = {abs/0808.0948}, year = {2008}, url = {http://arxiv.org/abs/0808.0948}, eprinttype = {arXiv}, eprint = {0808.0948}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-0948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0710-0900, author = {Wei Kang and Sennur Ulukus}, title = {A New Achievability Scheme for the Relay Channel}, journal = {CoRR}, volume = {abs/0710.0900}, year = {2007}, url = {http://arxiv.org/abs/0710.0900}, eprinttype = {arXiv}, eprint = {0710.0900}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0710-0900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/0002U06, author = {Wei Kang and Sennur Ulukus}, title = {An Outer Bound for Multiple Access Channels with Correlated Sources}, booktitle = {40th Annual Conference on Information Sciences and Systems, {CISS} 2006, Princeton, NJ, USA, 22-24 March 2006}, pages = {240--244}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CISS.2006.286470}, doi = {10.1109/CISS.2006.286470}, timestamp = {Wed, 10 May 2023 17:14:27 +0200}, biburl = {https://dblp.org/rec/conf/ciss/0002U06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/0002U06, author = {Wei Kang and Sennur Ulukus}, title = {An Outer Bound for the Multi-Terminal Rate-Distortion Region}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1419--1423}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262080}, doi = {10.1109/ISIT.2006.262080}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/0002U06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0605129, author = {Wei Kang and Sennur Ulukus}, title = {An Outer Bound for the Multi-Terminal Rate-Distortion Region}, journal = {CoRR}, volume = {abs/cs/0605129}, year = {2006}, url = {http://arxiv.org/abs/cs/0605129}, eprinttype = {arXiv}, eprint = {cs/0605129}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0605129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611017, author = {Wei Kang and Sennur Ulukus}, title = {A New Data Processing Inequality and Its Applications in Distributed Source and Channel Coding}, journal = {CoRR}, volume = {abs/cs/0611017}, year = {2006}, url = {http://arxiv.org/abs/cs/0611017}, eprinttype = {arXiv}, eprint = {cs/0611017}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0511096, author = {Wei Kang and Sennur Ulukus}, title = {A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources}, journal = {CoRR}, volume = {abs/cs/0511096}, year = {2005}, url = {http://arxiv.org/abs/cs/0511096}, eprinttype = {arXiv}, eprint = {cs/0511096}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0511096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.