Obserwuj
Daming Cao
Tytuł
Cytowane przez
Cytowane przez
Rok
High-agreement uncorrelated secret key generation based on principal component analysis preprocessing
G Li, A Hu, J Zhang, L Peng, C Sun, D Cao
IEEE Transactions on Communications 66 (7), 3022-3034, 2018
1382018
Coded caching with asymmetric cache sizes and link qualities: The two-user case
D Cao, D Zhang, P Chen, N Liu, W Kang, D Gündüz
IEEE Transactions on Communications 67 (9), 6112-6126, 2019
342019
Coded caching with heterogeneous cache sizes and link qualities: The two-user case
D Cao, D Zhang, P Chen, N Liu, W Kang, D Gunduz
2018 IEEE International Symposium on Information Theory (ISIT), 1545-1549, 2018
232018
A strong converse theorem for hypothesis testing against independence over a two-hop network
D Cao, L Zhou, VYF Tan
Entropy 21 (12), 1171, 2019
142019
Covert communication gains from adversary’s uncertainty of phase angles
S Qiao, D Cao, Q Zhang, Y Xu, G Liu
IEEE Transactions on Information Forensics and Security 18, 2899-2912, 2023
92023
Deception with side information in biometric authentication systems
W Kang, D Cao, N Liu
IEEE Transactions on information Theory 61 (3), 1344-1350, 2015
92015
Privacy-utility tradeoff for hypothesis testing over a noisy channel
L Zhou, D Cao
IEEE Transactions on Information Forensics and Security 16, 4078-4091, 2021
42021
Secret key generation from vector Gaussian sources with public and private communications
Y Xu, D Cao
IEEE Transactions on Information Theory 67 (8), 5420-5431, 2021
42021
Characterizing Linear Memory-Rate Tradeoff of Coded Caching: The Case
D Cao, Y Xu
arXiv preprint arXiv:2005.05548, 2020
42020
Exact error and erasure exponents for the asymmetric broadcast channel
D Cao, VYF Tan
IEEE Transactions on Information Theory 66 (2), 865-885, 2019
42019
Discrete Age of Information for Bufferless System with Multiple Prioritized Sources
J Zhang, H Xu, D Cao, Y Xu
IEEE Internet of Things Journal, 2024
32024
Secret key generation from correlated sources and secure link
D Cao, W Kang
2017 9th International Conference on Wireless Communications and Signal …, 2017
32017
Authentication with side information
W Kang, D Cao, N Liu
2014 IEEE International Symposium on Information Theory, 1722-1726, 2014
32014
Message authentication with correlated sources
D Cao, W Kang
2015 IEEE International Symposium on Information Theory (ISIT), 2934-2938, 2015
22015
Enhancing Covert Communication in OOK Schemes by Phase Deflection
X Ji, R Zhu, Q Zhang, C Li, D Cao
IEEE Transactions on Information Forensics and Security, 2024
12024
Capacity-Distortion Tradeoff of Noisy Gaussian State Amplification
Y Xu, T Guo, D Cao, W Xu
2023 IEEE International Symposium on Information Theory (ISIT), 1836-1841, 2023
2023
Hypothesis Testing with A Privacy Constraint Over A Noisy Channel
L Zhou, D Cao
CoRR, 2020
2020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–17