BibTeX records: Wei Kang 0002

download as .bib file

@article{DBLP:journals/entropy/ChengLK23,
  author       = {Jiale Cheng and
                  Nan Liu and
                  Wei Kang},
  title        = {On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving
                  Epidemiological Data Collection},
  journal      = {Entropy},
  volume       = {25},
  number       = {4},
  pages        = {625},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25040625},
  doi          = {10.3390/E25040625},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ChengLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/WuLK23,
  author       = {Jiahong Wu and
                  Nan Liu and
                  Wei Kang},
  title        = {A Numerical Study on the Capacity Region of a Three-Layer Wiretap
                  Network},
  journal      = {Entropy},
  volume       = {25},
  number       = {12},
  pages        = {1566},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25121566},
  doi          = {10.3390/E25121566},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/WuLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/WangLK23,
  author       = {Wuqu Wang and
                  Nan Liu and
                  Wei Kang},
  title        = {Three-User {D2D} Coded Caching With Two Random Requesters and One
                  Sender},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {71},
  number       = {12},
  pages        = {6967--6978},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCOMM.2023.3310506},
  doi          = {10.1109/TCOMM.2023.3310506},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/WangLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoLKL23,
  author       = {Yucheng Yao and
                  Nan Liu and
                  Wei Kang and
                  Chunguo Li},
  title        = {Secure Distributed Matrix Multiplication Under Arbitrary Collusion
                  Pattern},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {85--100},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3217383},
  doi          = {10.1109/TIFS.2022.3217383},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YaoLKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cniot/LuoLK23,
  author       = {Zhiqiang Luo and
                  Nan Liu and
                  Wei Kang},
  title        = {Capacity Results of Coded Caching: The Pareto Optimal Frontier of
                  the Two-User Case},
  booktitle    = {Proceedings of the 2023 4th International Conference on Computing,
                  Networks and Internet of Things, {CNIOT} 2023, Xiamen, China, May
                  26-28, 2023},
  pages        = {975--982},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603781.3604224},
  doi          = {10.1145/3603781.3604224},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cniot/LuoLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/PeiKL23,
  author       = {Tianyou Pei and
                  Wei Kang and
                  Nan Liu},
  title        = {The Capacity of Oblivious Transfer with Replicated Databases and Binary
                  Erasure Multiple Access Channel},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {1592--1596},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206863},
  doi          = {10.1109/ISIT54713.2023.10206863},
  timestamp    = {Mon, 28 Aug 2023 17:20:14 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/PeiKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/WangLK23,
  author       = {Wuqu Wang and
                  Nan Liu and
                  Wei Kang},
  title        = {Coded Caching in Request-robust {D2D} Communication Networks},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323632},
  doi          = {10.1109/ISNCC58260.2023.10323632},
  timestamp    = {Thu, 07 Dec 2023 20:38:52 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/WangLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/WuLK23,
  author       = {Jiahong Wu and
                  Nan Liu and
                  Wei Kang},
  title        = {The Closure of the Entropy Region is Not Closed Under Polymatroid
                  Duality for Four Discrete Random Variables},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323996},
  doi          = {10.1109/ISNCC58260.2023.10323996},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/WuLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-03920,
  author       = {Jiahong Wu and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity Region of Distributed Multi-User Secret Sharing under
                  The Perfect Privacy Condition},
  journal      = {CoRR},
  volume       = {abs/2302.03920},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.03920},
  doi          = {10.48550/ARXIV.2302.03920},
  eprinttype    = {arXiv},
  eprint       = {2302.03920},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-03920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04922,
  author       = {Zeru Chen and
                  Nan Liu and
                  Wei Kang},
  title        = {A Cyclic Placement Strategy for Multi-access Coded Caching},
  journal      = {CoRR},
  volume       = {abs/2312.04922},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04922},
  doi          = {10.48550/ARXIV.2312.04922},
  eprinttype    = {arXiv},
  eprint       = {2312.04922},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-05737,
  author       = {Jiahong Wu and
                  Nan Liu and
                  Wei Kang},
  title        = {Multiple Threshold Schemes Under The Weak Secure Condition},
  journal      = {CoRR},
  volume       = {abs/2312.05737},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.05737},
  doi          = {10.48550/ARXIV.2312.05737},
  eprinttype    = {arXiv},
  eprint       = {2312.05737},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-05737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengLKL22,
  author       = {Jiale Cheng and
                  Nan Liu and
                  Wei Kang and
                  Yang Li},
  title        = {The Capacity of Symmetric Private Information Retrieval Under Arbitrary
                  Collusion and Eavesdropping Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3037--3050},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3201375},
  doi          = {10.1109/TIFS.2022.3201375},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengLKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/WuLK22,
  author       = {Jiahong Wu and
                  Nan Liu and
                  Wei Kang},
  title        = {All Integral Points Satisfying Linear Rank Inequalities on Four or
                  Less Variables are Representable},
  booktitle    = {14th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2022, Nanjing, China, November 1-3, 2022},
  pages        = {383--387},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WCSP55476.2022.10039300},
  doi          = {10.1109/WCSP55476.2022.10039300},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcsp/WuLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-06363,
  author       = {Tianyou Pei and
                  Wei Kang and
                  Nan Liu},
  title        = {Capacity Results for the Wiretapped Oblivious Transfer},
  journal      = {CoRR},
  volume       = {abs/2207.06363},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.06363},
  doi          = {10.48550/ARXIV.2207.06363},
  eprinttype    = {arXiv},
  eprint       = {2207.06363},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-06363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-10225,
  author       = {Wuqu Wang and
                  Nan Liu and
                  Wei Kang},
  title        = {On the Rate-Memory Tradeoff of {D2D} Coded Caching with Three Users},
  journal      = {CoRR},
  volume       = {abs/2209.10225},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.10225},
  doi          = {10.48550/ARXIV.2209.10225},
  eprinttype    = {arXiv},
  eprint       = {2209.10225},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-10225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-05914,
  author       = {Jiale Cheng and
                  Nan Liu and
                  Wei Kang},
  title        = {On the Asymptotic Capacity of Information Theoretical Privacy-preserving
                  Epidemiological Data Collection},
  journal      = {CoRR},
  volume       = {abs/2212.05914},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.05914},
  doi          = {10.48550/ARXIV.2212.05914},
  eprinttype    = {arXiv},
  eprint       = {2212.05914},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-05914.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YaoLK21,
  author       = {Xinyu Yao and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Private Information Retrieval Under Arbitrary Collusion
                  Patterns for Replicated Databases},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {10},
  pages        = {6841--6855},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3100476},
  doi          = {10.1109/TIT.2021.3100476},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/YaoLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/Li0K20,
  author       = {Yang Li and
                  Nan Liu and
                  Wei Kang},
  editor       = {Honghao Gao and
                  Pingyi Fan and
                  Jun Wun and
                  Xiaoping Xue and
                  Jun Yu and
                  Yi Wang},
  title        = {Cache-Aided Multi-message Private Information Retrieval},
  booktitle    = {Communications and Networking - 15th {EAI} International Conference,
                  ChinaCom 2020, Shanghai, China, November 20-21, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {352},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-67720-6\_9},
  doi          = {10.1007/978-3-030-67720-6\_9},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chinacom/Li0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Yao0020,
  author       = {Xinyu Yao and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Private Information Retrieval Under Arbitrary Collusion
                  Patterns},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2020,
                  Los Angeles, CA, USA, June 21-26, 2020},
  pages        = {1041--1046},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISIT44484.2020.9174094},
  doi          = {10.1109/ISIT44484.2020.9174094},
  timestamp    = {Tue, 15 Sep 2020 10:18:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Yao0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-03843,
  author       = {Xinyu Yao and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Private Information Retrieval Under Arbitrary Collusion
                  Patterns},
  journal      = {CoRR},
  volume       = {abs/2001.03843},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.03843},
  eprinttype    = {arXiv},
  eprint       = {2001.03843},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-03843.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-08249,
  author       = {Jiale Cheng and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Symmetric Private Information Retrieval under Arbitrary
                  Collusion and Eavesdropping Patterns},
  journal      = {CoRR},
  volume       = {abs/2010.08249},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.08249},
  eprinttype    = {arXiv},
  eprint       = {2010.08249},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-08249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/CaoZCLKG19,
  author       = {Daming Cao and
                  Deyao Zhang and
                  Pengyao Chen and
                  Nan Liu and
                  Wei Kang and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Coded Caching With Asymmetric Cache Sizes and Link Qualities: The
                  Two-User Case},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {67},
  number       = {9},
  pages        = {6112--6126},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCOMM.2019.2921711},
  doi          = {10.1109/TCOMM.2019.2921711},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/CaoZCLKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YangLKS19,
  author       = {Tianyu Yang and
                  Nan Liu and
                  Wei Kang and
                  Shlomo Shamai Shitz},
  title        = {Converse Results for the Downlink Multicell Processing With Finite
                  Backhaul Capacity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {1},
  pages        = {368--379},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2869881},
  doi          = {10.1109/TIT.2018.2869881},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YangLKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Yao0019,
  author       = {Xinyu Yao and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Multi-round Private Information Retrieval from Byzantine
                  Databases},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {2124--2128},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849275},
  doi          = {10.1109/ISIT.2019.8849275},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Yao0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-06907,
  author       = {Xinyu Yao and
                  Nan Liu and
                  Wei Kang},
  title        = {The Capacity of Multi-round Private Information Retrieval from Byzantine
                  Databases},
  journal      = {CoRR},
  volume       = {abs/1901.06907},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.06907},
  eprinttype    = {arXiv},
  eprint       = {1901.06907},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-06907.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CaoZCL0G18,
  author       = {Daming Cao and
                  Deyao Zhang and
                  Pengyao Chen and
                  Nan Liu and
                  Wei Kang and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Coded Caching with Heterogeneous Cache Sizes and Link Qualities: The
                  Two-User Case},
  booktitle    = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
                  2018, Vail, CO, USA, June 17-22, 2018},
  pages        = {1545--1549},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISIT.2018.8437635},
  doi          = {10.1109/ISIT.2018.8437635},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CaoZCL0G18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/0002L18,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {An Upper bound on the Error Exponent in Lossless Source Coding with
                  a Helper},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China,
                  November 25-29, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ITW.2018.8613497},
  doi          = {10.1109/ITW.2018.8613497},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/0002L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-02706,
  author       = {Daming Cao and
                  Deyao Zhang and
                  Pengyao Chen and
                  Nan Liu and
                  Wei Kang and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Coded Caching with Heterogeneous Cache Sizes and Link Qualities: The
                  Two-User Case},
  journal      = {CoRR},
  volume       = {abs/1802.02706},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.02706},
  eprinttype    = {arXiv},
  eprint       = {1802.02706},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-02706.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiuK17,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {The Capacity of a Class of Channels With Coded Side Information at
                  the Decoder},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {63},
  number       = {1},
  pages        = {72--80},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIT.2016.2628724},
  doi          = {10.1109/TIT.2016.2628724},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangL0S17,
  author       = {Tianyu Yang and
                  Nan Liu and
                  Wei Kang and
                  Shlomo Shamai Shitz},
  title        = {An upper bound on the sum capacity of the downlink multicell processing
                  with finite backhaul capacity},
  booktitle    = {2017 {IEEE} International Symposium on Information Theory, {ISIT}
                  2017, Aachen, Germany, June 25-30, 2017},
  pages        = {2053--2057},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISIT.2017.8006890},
  doi          = {10.1109/ISIT.2017.8006890},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangL0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/Cao017,
  author       = {Daming Cao and
                  Wei Kang},
  title        = {Secret key generation from correlated sources and secure link},
  booktitle    = {9th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCSP.2017.8171157},
  doi          = {10.1109/WCSP.2017.8171157},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/Cao017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Cao017,
  author       = {Daming Cao and
                  Wei Kang},
  title        = {Secret Key Generation from Correlated Sources and Secure Link},
  journal      = {CoRR},
  volume       = {abs/1704.05220},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.05220},
  eprinttype    = {arXiv},
  eprint       = {1704.05220},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Cao017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KangL16,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {Compressing Encrypted Data: Achieving Optimality and Strong Secrecy
                  via Permutations},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {62},
  number       = {12},
  pages        = {7153--7163},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIT.2016.2615322},
  doi          = {10.1109/TIT.2016.2615322},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YangL0S16,
  author       = {Tianyu Yang and
                  Nan Liu and
                  Wei Kang and
                  Shlomo Shamai},
  title        = {An Upper Bound on the Sum Capacity of the Downlink Multicell Processing
                  with Finite Backhaul Capacity},
  journal      = {CoRR},
  volume       = {abs/1609.00833},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.00833},
  eprinttype    = {arXiv},
  eprint       = {1609.00833},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YangL0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KangCL15,
  author       = {Wei Kang and
                  Daming Cao and
                  Nan Liu},
  title        = {Deception With Side Information in Biometric Authentication Systems},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {3},
  pages        = {1344--1350},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2389825},
  doi          = {10.1109/TIT.2015.2389825},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/KangCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KangLC15,
  author       = {Wei Kang and
                  Nan Liu and
                  Weiwei Chong},
  title        = {The Gaussian Multiple Access Diamond Channel},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {11},
  pages        = {6049--6059},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2479923},
  doi          = {10.1109/TIT.2015.2479923},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KangL15,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {A permutation-based code for the wiretap channel},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {2306--2310},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282867},
  doi          = {10.1109/ISIT.2015.7282867},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuK15,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {The multiple access diamond channel with caching relays},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {2862--2866},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282979},
  doi          = {10.1109/ISIT.2015.7282979},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CaoK15,
  author       = {Daming Cao and
                  Wei Kang},
  title        = {Message authentication with correlated sources},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {2934--2938},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282994},
  doi          = {10.1109/ISIT.2015.7282994},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CaoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiuK14,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {The Capacity Region of a Class of {Z} Channels With Degraded Message
                  Sets},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {10},
  pages        = {6144--6153},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2345653},
  doi          = {10.1109/TIT.2014.2345653},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuK14,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {A new achievability scheme for downlink multicell processing with
                  finite backhaul capacity},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1006--1010},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6874984},
  doi          = {10.1109/ISIT.2014.6874984},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KangCL14,
  author       = {Wei Kang and
                  Daming Cao and
                  Nan Liu},
  title        = {Authentication with side information},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1722--1726},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875128},
  doi          = {10.1109/ISIT.2014.6875128},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KangCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangCL14,
  author       = {Wei Kang and
                  Daming Cao and
                  Nan Liu},
  title        = {Deception with Side Information in Biometric Authentication Systems},
  journal      = {CoRR},
  volume       = {abs/1406.3103},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.3103},
  eprinttype    = {arXiv},
  eprint       = {1406.3103},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KangCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangL14,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {Compressing Encrypted Data and Permutation Cipher},
  journal      = {CoRR},
  volume       = {abs/1408.5666},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.5666},
  eprinttype    = {arXiv},
  eprint       = {1408.5666},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuK13,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {A new outer bound on the capacity region of a class of Z-interference
                  channels},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {2049--2053},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620586},
  doi          = {10.1109/ISIT.2013.6620586},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KangL13,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {The Ahlswede-Han conjecture on channel with coded side information
                  at the decoder},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {3075--3079},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620791},
  doi          = {10.1109/ISIT.2013.6620791},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/LiuK12,
  author       = {Nan Liu and
                  Wei Kang},
  title        = {Capacity results for a class of {Z} channels with degraded message
                  sets},
  booktitle    = {50th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2012, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, October 1-5, 2012},
  pages        = {1225--1231},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/Allerton.2012.6483358},
  doi          = {10.1109/ALLERTON.2012.6483358},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/LiuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/KangL12,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {Compressing encrypted data: {A} permutation approach},
  booktitle    = {50th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2012, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, October 1-5, 2012},
  pages        = {1382--1386},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/Allerton.2012.6483379},
  doi          = {10.1109/ALLERTON.2012.6483379},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/KangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/ChongK12,
  author       = {Weiwei Chong and
                  Wei Kang},
  title        = {Joint decode-compress-forward for the broadcast diamond channel},
  booktitle    = {2012 1st {IEEE} International Conference on Communications in China
                  (ICCC), Beijing, China, August 15-17, 2012},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCChina.2012.6356876},
  doi          = {10.1109/ICCCHINA.2012.6356876},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/ChongK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KangU11,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {A New Data Processing Inequality and Its Applications in Distributed
                  Source and Channel Coding},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {1},
  pages        = {56--69},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2010.2090211},
  doi          = {10.1109/TIT.2010.2090211},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KangU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KangU11a,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {Capacity of a Class of Diamond Channels},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {8},
  pages        = {4955--4960},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2158877},
  doi          = {10.1109/TIT.2011.2158877},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KangU11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/LiuGK11,
  author       = {Nan Liu and
                  Deniz G{\"{u}}nd{\"{u}}z and
                  Wei Kang},
  title        = {Capacity results for a class of deterministic Z-interference channels
                  with unidirectional receiver conferencing},
  booktitle    = {6th International {ICST} Conference on Communications and Networking
                  in China, {CHINACOM} 2011, Harbin, China, August 17-19, 2011},
  pages        = {580--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ChinaCom.2011.6158221},
  doi          = {10.1109/CHINACOM.2011.6158221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chinacom/LiuGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuK11,
  author       = {Nan Liu and
                  Wei Kang},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {The secrecy capacity region of a special class of multiple access
                  channels},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {623--627},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6034205},
  doi          = {10.1109/ISIT.2011.6034205},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KangL11,
  author       = {Wei Kang and
                  Nan Liu},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {The Gaussian multiple access diamond channel},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {1499--1503},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6033791},
  doi          = {10.1109/ISIT.2011.6033791},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-3300,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {The Gaussian Multiple Access Diamond Channel},
  journal      = {CoRR},
  volume       = {abs/1104.3300},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.3300},
  eprinttype    = {arXiv},
  eprint       = {1104.3300},
  timestamp    = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-3300.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/0002L10,
  author       = {Wei Kang and
                  Nan Liu},
  editor       = {Marcus Greferath and
                  Joachim Rosenthal and
                  Alexander Barg and
                  Gilles Z{\'{e}}mor},
  title        = {Wiretap channel with shared key},
  booktitle    = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland,
                  August 30 - September 3, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIG.2010.5592665},
  doi          = {10.1109/CIG.2010.5592665},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/0002L10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KangL09,
  author       = {Wei Kang and
                  Nan Liu},
  title        = {The secrecy capacity of the semi-deterministic broadcast channel},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2009,
                  June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  pages        = {2767--2771},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISIT.2009.5205819},
  doi          = {10.1109/ISIT.2009.5205819},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Kang08,
  author       = {Wei Kang},
  title        = {Correlation and cooperation in network information theory},
  school       = {University of Maryland, College Park, MD, {USA}},
  year         = {2008},
  url          = {https://hdl.handle.net/1903/8355},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Kang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/KangU08,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {Capacity of a class of diamond channels},
  booktitle    = {46th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2008, Monticello, IL, USA, September 24-26, 2008},
  pages        = {1426--1431},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ALLERTON.2008.4797730},
  doi          = {10.1109/ALLERTON.2008.4797730},
  timestamp    = {Wed, 22 Nov 2023 08:29:09 +0100},
  biburl       = {https://dblp.org/rec/conf/allerton/KangU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-0948,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {Capacity of a Class of Diamond Channels},
  journal      = {CoRR},
  volume       = {abs/0808.0948},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.0948},
  eprinttype    = {arXiv},
  eprint       = {0808.0948},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-0948.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0710-0900,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {A New Achievability Scheme for the Relay Channel},
  journal      = {CoRR},
  volume       = {abs/0710.0900},
  year         = {2007},
  url          = {http://arxiv.org/abs/0710.0900},
  eprinttype    = {arXiv},
  eprint       = {0710.0900},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0710-0900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/0002U06,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {An Outer Bound for Multiple Access Channels with Correlated Sources},
  booktitle    = {40th Annual Conference on Information Sciences and Systems, {CISS}
                  2006, Princeton, NJ, USA, 22-24 March 2006},
  pages        = {240--244},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CISS.2006.286470},
  doi          = {10.1109/CISS.2006.286470},
  timestamp    = {Wed, 10 May 2023 17:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/0002U06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/0002U06,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {An Outer Bound for the Multi-Terminal Rate-Distortion Region},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {1419--1423},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.262080},
  doi          = {10.1109/ISIT.2006.262080},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/0002U06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0605129,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {An Outer Bound for the Multi-Terminal Rate-Distortion Region},
  journal      = {CoRR},
  volume       = {abs/cs/0605129},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0605129},
  eprinttype    = {arXiv},
  eprint       = {cs/0605129},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0605129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611017,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {A New Data Processing Inequality and Its Applications in Distributed
                  Source and Channel Coding},
  journal      = {CoRR},
  volume       = {abs/cs/0611017},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611017},
  eprinttype    = {arXiv},
  eprint       = {cs/0611017},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0511096,
  author       = {Wei Kang and
                  Sennur Ulukus},
  title        = {A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels
                  with Correlated Sources},
  journal      = {CoRR},
  volume       = {abs/cs/0511096},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0511096},
  eprinttype    = {arXiv},
  eprint       = {cs/0511096},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0511096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics