Seuraa
Daming Cao
Daming Cao
Vahvistettu sähköpostiosoite verkkotunnuksessa nuist.edu.cn
Nimike
Viittaukset
Viittaukset
Vuosi
High-agreement uncorrelated secret key generation based on principal component analysis preprocessing
G Li, A Hu, J Zhang, L Peng, C Sun, D Cao
IEEE Transactions on Communications 66 (7), 3022-3034, 2018
1142018
Coded caching with asymmetric cache sizes and link qualities: The two-user case
D Cao, D Zhang, P Chen, N Liu, W Kang, D Gündüz
IEEE Transactions on Communications 67 (9), 6112-6126, 2019
312019
Coded caching with heterogeneous cache sizes and link qualities: The two-user case
D Cao, D Zhang, P Chen, N Liu, W Kang, D Gunduz
2018 IEEE International Symposium on Information Theory (ISIT), 1545-1549, 2018
232018
Strong converse for hypothesis testing against independence over a two-hop network
D Cao, L Zhou, VYF Tan
2019 IEEE International Symposium on Information Theory (ISIT), 1994-1998, 2019
92019
A strong converse theorem for hypothesis testing against independence over a two-hop network
D Cao, L Zhou, VYF Tan
Entropy 21 (12), 1171, 2019
82019
Deception with side information in biometric authentication systems
W Kang, D Cao, N Liu
IEEE Transactions on information Theory 61 (3), 1344-1350, 2015
82015
Covert communication gains from adversary’s uncertainty of phase angles
S Qiao, D Cao, Q Zhang, Y Xu, G Liu
IEEE Transactions on Information Forensics and Security, 2023
72023
Privacy-utility tradeoff for hypothesis testing over a noisy channel
L Zhou, D Cao
IEEE Transactions on Information Forensics and Security 16, 4078-4091, 2021
42021
Secret key generation from vector Gaussian sources with public and private communications
Y Xu, D Cao
IEEE Transactions on Information Theory 67 (8), 5420-5431, 2021
32021
Characterizing Linear Memory-Rate Tradeoff of Coded Caching: The Case
D Cao, Y Xu
arXiv preprint arXiv:2005.05548, 2020
32020
Secret key generation from correlated sources and secure link
D Cao, W Kang
2017 9th International Conference on Wireless Communications and Signal …, 2017
32017
Authentication with side information
W Kang, D Cao, N Liu
2014 IEEE International Symposium on Information Theory, 1722-1726, 2014
32014
Exact error and erasure exponents for the asymmetric broadcast channel
D Cao, VYF Tan
IEEE Transactions on Information Theory 66 (2), 865-885, 2019
22019
Message authentication with correlated sources
D Cao, W Kang
2015 IEEE International Symposium on Information Theory (ISIT), 2934-2938, 2015
22015
Capacity-Distortion Tradeoff of Noisy Gaussian State Amplification
Y Xu, T Guo, D Cao, W Xu
2023 IEEE International Symposium on Information Theory (ISIT), 1836-1841, 2023
2023
Hypothesis Testing with A Privacy Constraint Over A Noisy Channel
L Zhou, D Cao
CoRR, 2020
2020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–16