High-agreement uncorrelated secret key generation based on principal component analysis preprocessing G Li, A Hu, J Zhang, L Peng, C Sun, D Cao
IEEE Transactions on Communications 66 (7), 3022-3034, 2018
138 2018 Coded caching with asymmetric cache sizes and link qualities: The two-user case D Cao, D Zhang, P Chen, N Liu, W Kang, D Gündüz
IEEE Transactions on Communications 67 (9), 6112-6126, 2019
34 2019 Coded caching with heterogeneous cache sizes and link qualities: The two-user case D Cao, D Zhang, P Chen, N Liu, W Kang, D Gunduz
2018 IEEE International Symposium on Information Theory (ISIT), 1545-1549, 2018
23 2018 A strong converse theorem for hypothesis testing against independence over a two-hop network D Cao, L Zhou, VYF Tan
Entropy 21 (12), 1171, 2019
14 2019 Covert communication gains from adversary’s uncertainty of phase angles S Qiao, D Cao, Q Zhang, Y Xu, G Liu
IEEE Transactions on Information Forensics and Security 18, 2899-2912, 2023
9 2023 Deception with side information in biometric authentication systems W Kang, D Cao, N Liu
IEEE Transactions on information Theory 61 (3), 1344-1350, 2015
9 2015 Privacy-utility tradeoff for hypothesis testing over a noisy channel L Zhou, D Cao
IEEE Transactions on Information Forensics and Security 16, 4078-4091, 2021
4 2021 Secret key generation from vector Gaussian sources with public and private communications Y Xu, D Cao
IEEE Transactions on Information Theory 67 (8), 5420-5431, 2021
4 2021 Characterizing Linear Memory-Rate Tradeoff of Coded Caching: The Case D Cao, Y Xu
arXiv preprint arXiv:2005.05548, 2020
4 2020 Exact error and erasure exponents for the asymmetric broadcast channel D Cao, VYF Tan
IEEE Transactions on Information Theory 66 (2), 865-885, 2019
4 2019 Discrete Age of Information for Bufferless System with Multiple Prioritized Sources J Zhang, H Xu, D Cao, Y Xu
IEEE Internet of Things Journal, 2024
3 2024 Secret key generation from correlated sources and secure link D Cao, W Kang
2017 9th International Conference on Wireless Communications and Signal …, 2017
3 2017 Authentication with side information W Kang, D Cao, N Liu
2014 IEEE International Symposium on Information Theory, 1722-1726, 2014
3 2014 Message authentication with correlated sources D Cao, W Kang
2015 IEEE International Symposium on Information Theory (ISIT), 2934-2938, 2015
2 2015 Enhancing Covert Communication in OOK Schemes by Phase Deflection X Ji, R Zhu, Q Zhang, C Li, D Cao
IEEE Transactions on Information Forensics and Security, 2024
1 2024 Capacity-Distortion Tradeoff of Noisy Gaussian State Amplification Y Xu, T Guo, D Cao, W Xu
2023 IEEE International Symposium on Information Theory (ISIT), 1836-1841, 2023
2023 Hypothesis Testing with A Privacy Constraint Over A Noisy Channel L Zhou, D Cao
CoRR, 2020
2020