


default search action
Yiwei Zhang 0018
Person information
- affiliation: Shandong University, Qingdao, Shandong, China
Other persons with the same name
- Yiwei Zhang — disambiguation page
- Yiwei Zhang 0001 — University of Science and Technology of China, Hefei, China
- Yiwei Zhang 0002 — University of Bristol, UK
- Yiwei Zhang 0003 — University of Glasgow, UK
- Yiwei Zhang 0004
— Second Institute of Oceanography, Hangzhou, Zhejiang, China - Yiwei Zhang 0005
— Sanda University, Shanghai, China - Yiwei Zhang 0006
— Independent Researcher, Shoreline, USA - Yiwei Zhang 0007
— Xiangtan University, Hunan, Xiangtan, China - Yiwei Zhang 0008
— Purdue University, West Lafayette, IN, USA - Yiwei Zhang 0009
— University of Chinese Academy of Sciences, Beijing, China - Yiwei Zhang 0010
— University of WisconsinâMadison, Madison, WI, USA - Yiwei Zhang 0011
— University of Science and Technology of China, Hefei, China - Yiwei Zhang 0012
— Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China - Yiwei Zhang 0013
— University of Wollongong, Wollongong, NSW, Australia - Yiwei Zhang 0014
— University of Tokyo, Tokyo, Japan - Yiwei Zhang 0015
— Shanghai Jiao Tong University, Shanghai, China - Yiwei Zhang 0016
— Tsinghua University, Beijing, China - Yiwei Zhang 0017
— Huazhong University of Science and Technology, Wuhan, Hubei, China - Yiwei Zhang 0019
— Shenzhen University, Shenzhen, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j17]Xiangliang Kong
, Chen Wang
, Yiwei Zhang
:
Batch Array Codes. IEEE Trans. Inf. Theory 71(2): 936-954 (2025)
[j16]Yubo Sun
, Ziyang Lu
, Yiwei Zhang
, Gennian Ge
:
Asymptotically Optimal Codes for (t, s)-Burst Error. IEEE Trans. Inf. Theory 71(3): 1570-1584 (2025)- 2024
[j15]Chen Wang, Hui Chu
, Gennian Ge
, Yiwei Zhang
:
The Capacity of Secondary Structure Avoidance Codes for DNA Sequences. IEEE Trans. Mol. Biol. Multi Scale Commun. 10(2): 359-367 (2024)
[c14]Di Zhang, Gennian Ge, Yiwei Zhang:
Sequence Reconstruction over 3-Deletion Channels. ISIT 2024: 891-896
[c13]Shiqin Liu, Chen Wang, Gennian Ge, Yiwei Zhang:
Improving the Singleton-Type Upper Bounds for Non-Linear Deletion Correcting Codes. ISIT 2024: 1107-1112
[c12]Ziyang Lu, Han Mao Kiah, Yiwei Zhang, Robert N. Grass, Eitan Yaakobi:
Coding for Synthesis Defects. ITW 2024: 621-626
[c11]Chen Wang, Eitan Yaakobi, Yiwei Zhang:
How to Find Simple Conditions for Successful Sequence Reconstruction? ITW 2024: 627-632
[i16]Yubo Sun, Ziyang Lu, Yiwei Zhang, Gennian Ge:
Asymptotically Optimal Codes for (t, s)-Burst Error. CoRR abs/2403.11750 (2024)
[i15]Ziyang Lu, Han Mao Kiah, Yiwei Zhang, Robert N. Grass, Eitan Yaakobi:
Coding for Synthesis Defects. CoRR abs/2405.02080 (2024)- 2023
[j14]Yubo Sun
, Yiwei Zhang
, Gennian Ge
:
Improved Constructions of Permutation and Multi-Permutation Codes Correcting a Burst of Stable Deletions. IEEE Trans. Inf. Theory 69(7): 4429-4441 (2023)
[j13]Ziyang Lu
, Yiwei Zhang
:
t-Deletion-s-Insertion-Burst Correcting Codes. IEEE Trans. Inf. Theory 69(10): 6401-6413 (2023)
[c10]Chen Wang, Yiwei Zhang
:
PIR array codes: the optimality of Blackburn-Etzion construction. ISIT 2023: 1342-1347
[c9]Hongna Yang, Yujie Gu, Yiwei Zhang
:
Bounds for Binary Multimedia Codes with the Identifiable Parent Property. ISIT 2023: 2434-2439
[c8]Hui Chu, Chen Wang, Yiwei Zhang
:
Improved constructions of secondary structure avoidance codes for DNA sequences. ISTC 2023: 1-5- 2022
[c7]Ziyang Lu, Yiwei Zhang
:
t-Deletion-1-Insertion-Burst Correcting Codes. ISIT 2022: 808-813
[c6]Chen Wang, Ziyang Lu, Zhaojun Lan, Gennian Ge, Yiwei Zhang
:
Coding schemes for locally balanced constraints. ISIT 2022: 1342-1347
[c5]Hongna Yang, Yiwei Zhang
:
On an extremal problem of regular graphs related to fractional repetition codes. ISIT 2022: 1566-1571
[i14]Chen Wang, Ziyang Lu, Zhaojun Lan, Gennian Ge, Yiwei Zhang:
Coding schemes for locally balanced constraints. CoRR abs/2201.12238 (2022)
[i13]Yubo Sun, Yiwei Zhang, Gennian Ge:
Improved constructions of permutation and multi-permutation codes correcting a burst of stable deletions. CoRR abs/2208.10110 (2022)- 2021
[j12]Yiwei Zhang
, Eitan Yaakobi
, Tuvi Etzion
:
Private Proximity Retrieval Codes. IEEE Trans. Inf. Theory 67(11): 7458-7476 (2021)- 2020
[j11]Yiwei Zhang
, Tuvi Etzion
, Eitan Yaakobi
:
Bounds on the Length of Functional PIR and Batch Codes. IEEE Trans. Inf. Theory 66(8): 4917-4934 (2020)
[c4]Ryan Gabrys, Han Mao Kiah, Alexander Vardy, Eitan Yaakobi, Yiwei Zhang
:
Locally Balanced Constraints. ISIT 2020: 664-669
2010 – 2019
- 2019
[j10]Yiwei Zhang
, Gennian Ge:
A general private information retrieval scheme for MDS coded databases with colluding servers. Des. Codes Cryptogr. 87(11): 2611-2623 (2019)
[j9]Zixiang Xu
, Yiwei Zhang
, Gennian Ge:
New theoretical bounds and constructions of permutation codes under block permutation metric. Des. Codes Cryptogr. 87(11): 2625-2637 (2019)
[j8]Yiwei Zhang
, Xin Wang, Hengjia Wei
, Gennian Ge
:
On Private Information Retrieval Array Codes. IEEE Trans. Inf. Theory 65(9): 5565-5573 (2019)
[c3]Tuvi Etzion, Oliver W. Gnilke
, David A. Karpuk, Eitan Yaakobi, Yiwei Zhang
:
Private Proximity Retrieval. ISIT 2019: 2119-2123
[c2]Yiwei Zhang
, Eitan Yaakobi, Tuvi Etzion:
Bounds on the Length of Functional PIR and Batch Codes. ISIT 2019: 2129-2133
[c1]Yiwei Zhang
, Eitan Yaakobi, Tuvi Etzion, Moshe Schwartz:
On the Access Complexity of PIR Schemes. ISIT 2019: 2134-2138
[i12]Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion:
Bounds on the Length of Functional PIR and Batch codes. CoRR abs/1901.01605 (2019)
[i11]Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion:
Private Proximity Retrieval Codes. CoRR abs/1907.10724 (2019)- 2018
[j7]Baokun Ding, Gennian Ge, Jun Zhang, Tao Zhang
, Yiwei Zhang
:
New constructions of MDS symbol-pair codes. Des. Codes Cryptogr. 86(4): 841-859 (2018)
[j6]Chong Shangguan
, Yiwei Zhang
, Gennian Ge
:
Centralized Coded Caching Schemes: A Hypergraph Theoretical Approach. IEEE Trans. Inf. Theory 64(8): 5755-5766 (2018)
[i10]Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion, Moshe Schwartz:
On the Access Complexity of PIR Schemes. CoRR abs/1804.02692 (2018)
[i9]Zixiang Xu, Yiwei Zhang, Gennian Ge:
New Theoretical Bounds and Constructions of Permutation Codes under Block Permutation Metric. CoRR abs/1811.04600 (2018)- 2017
[j5]Xin Wang, Yiwei Zhang
, Yiting Yang, Gennian Ge:
New bounds of permutation codes under Hamming metric and Kendall's τ -metric. Des. Codes Cryptogr. 85(3): 533-545 (2017)
[j4]Yiwei Zhang
, Tao Zhang
, Xin Wang, Gennian Ge:
Invertible binary matrices with maximum number of 2-by-2 invertible submatrices. Discret. Math. 340(2): 201-208 (2017)
[j3]Yiting Yang, Yiwei Zhang
, Gennian Ge
:
New Lower Bounds for Secure Codes and Related Hash Families: A Hypergraph Theoretical Approach. IEEE Trans. Inf. Theory 63(4): 2446-2453 (2017)
[i8]Yiwei Zhang, Gennian Ge:
A general private information retrieval scheme for MDS coded databases with colluding servers. CoRR abs/1704.06785 (2017)
[i7]Yiwei Zhang, Gennian Ge:
Multi-file Private Information Retrieval from MDS Coded Databases with Colluding Servers. CoRR abs/1705.03186 (2017)- 2016
[j2]Yiwei Zhang
, Gennian Ge:
Snake-in-the-Box Codes for Rank Modulation Under Kendall's τ-Metric. IEEE Trans. Inf. Theory 62(1): 151-158 (2016)
[j1]Yiwei Zhang
, Gennian Ge:
Snake-in-the-Box Codes for Rank Modulation under Kendall's τ-Metric in S2n+2. IEEE Trans. Inf. Theory 62(9): 4814-4818 (2016)
[i6]Yiwei Zhang, Tao Zhang, Xin Wang, Gennian Ge:
Invertible binary matrix with maximum number of $2$-by-$2$ invertible submatrices. CoRR abs/1601.02109 (2016)
[i5]Baokun Ding, Gennian Ge, Jun Zhang, Tao Zhang, Yiwei Zhang:
New Constructions of MDS Symbol-Pair Codes. CoRR abs/1605.08859 (2016)
[i4]Chong Shangguan, Yiwei Zhang, Gennian Ge:
Centralized coded caching schemes: A hypergraph theoretical approach. CoRR abs/1608.03989 (2016)
[i3]Yiwei Zhang, Xin Wang, Hengjia Wei, Gennian Ge:
On private information retrieval array codes. CoRR abs/1609.09167 (2016)
[i2]Xin Wang, Yiwei Zhang, Yiting Yang, Gennian Ge:
New bounds of permutation codes under Hamming metric and Kendall's $τ$-metric. CoRR abs/1611.07188 (2016)- 2015
[i1]Yiwei Zhang, Gennian Ge:
Snake-in-the-Box Codes for Rank Modulation under Kendall's $τ$-Metric. CoRR abs/1506.02740 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-10 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







