High-agreement uncorrelated secret key generation based on principal component analysis preprocessing G Li, A Hu, J Zhang, L Peng, C Sun, D Cao IEEE Transactions on Communications 66 (7), 3022-3034, 2018 | 138 | 2018 |
Coded caching with asymmetric cache sizes and link qualities: The two-user case D Cao, D Zhang, P Chen, N Liu, W Kang, D Gündüz IEEE Transactions on Communications 67 (9), 6112-6126, 2019 | 34 | 2019 |
Coded caching with heterogeneous cache sizes and link qualities: The two-user case D Cao, D Zhang, P Chen, N Liu, W Kang, D Gunduz 2018 IEEE International Symposium on Information Theory (ISIT), 1545-1549, 2018 | 24 | 2018 |
A strong converse theorem for hypothesis testing against independence over a two-hop network D Cao, L Zhou, VYF Tan Entropy 21 (12), 1171, 2019 | 14 | 2019 |
Covert communication gains from adversary’s uncertainty of phase angles S Qiao, D Cao, Q Zhang, Y Xu, G Liu IEEE Transactions on Information Forensics and Security 18, 2899-2912, 2023 | 10 | 2023 |
Deception with side information in biometric authentication systems W Kang, D Cao, N Liu IEEE Transactions on information Theory 61 (3), 1344-1350, 2015 | 9 | 2015 |
Privacy-utility tradeoff for hypothesis testing over a noisy channel L Zhou, D Cao IEEE Transactions on Information Forensics and Security 16, 4078-4091, 2021 | 4 | 2021 |
Secret key generation from vector Gaussian sources with public and private communications Y Xu, D Cao IEEE Transactions on Information Theory 67 (8), 5420-5431, 2021 | 4 | 2021 |
Characterizing Linear Memory-Rate Tradeoff of Coded Caching: The Case D Cao, Y Xu arXiv preprint arXiv:2005.05548, 2020 | 4 | 2020 |
Exact error and erasure exponents for the asymmetric broadcast channel D Cao, VYF Tan IEEE Transactions on Information Theory 66 (2), 865-885, 2019 | 4 | 2019 |
Discrete Age of Information for Bufferless System with Multiple Prioritized Sources J Zhang, H Xu, D Cao, Y Xu IEEE Internet of Things Journal, 2024 | 3 | 2024 |
Secret key generation from correlated sources and secure link D Cao, W Kang 2017 9th International Conference on Wireless Communications and Signal …, 2017 | 3 | 2017 |
Authentication with side information W Kang, D Cao, N Liu 2014 IEEE International Symposium on Information Theory, 1722-1726, 2014 | 3 | 2014 |
Message authentication with correlated sources D Cao, W Kang 2015 IEEE International Symposium on Information Theory (ISIT), 2934-2938, 2015 | 2 | 2015 |
Enhancing Covert Communication in OOK Schemes by Phase Deflection X Ji, R Zhu, Q Zhang, C Li, D Cao IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Capacity-Distortion Tradeoff of Noisy Gaussian State Amplification Y Xu, T Guo, D Cao, W Xu 2023 IEEE International Symposium on Information Theory (ISIT), 1836-1841, 2023 | | 2023 |
Hypothesis Testing with A Privacy Constraint Over A Noisy Channel L Zhou, D Cao CoRR, 2020 | | 2020 |