Finite blocklength lossy source coding for discrete memoryless sources
Shannon propounded a theoretical framework (collectively called information theory) that
uses mathematical tools to understand, model and analyze modern mobile wireless …
uses mathematical tools to understand, model and analyze modern mobile wireless …
Cooperative Computing for Mobile Crowdsensing: Design and Optimization
X **e, T Bai, W Guo, Z Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing number of mobile devices, mobile crowdsensing (MCS) has garnered
significant attention in research. However, computing infrastructures such as edge/cloud …
significant attention in research. However, computing infrastructures such as edge/cloud …
Broadcast Modeling and Rate Optimization for Ad Hoc Networks using Epidemic Theory
Broadcast plays a vital role in wireless ad hoc networks for information dissemination, while
one of the key system parameters for maximizing broadcast performance is the transmission …
one of the key system parameters for maximizing broadcast performance is the transmission …
LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks
Recently, unmanned aerial vehicles (UAV) technology has been utilized to monitor and
capture images from disasters to analyze, process, and take action in real‐time for a speedy …
capture images from disasters to analyze, process, and take action in real‐time for a speedy …
Achievable Second-Order Asymptotics for MAC and RAC with Additive Non-Gaussian Noise
We first study the two-user additive noise multiple access channel (MAC) where the noise
distribution is arbitrary. For such a MAC, we use spherical codebooks and either joint …
distribution is arbitrary. For such a MAC, we use spherical codebooks and either joint …
The Dispersion of Broadcast Channels With Degraded Message Sets Using Gaussian Codebooks
We study the two-user broadcast channel with degraded message sets and derive second-
order achievability rate regions. Specifically, the channel noises are not necessarily …
order achievability rate regions. Specifically, the channel noises are not necessarily …
Successive refinement of shannon cipher system under maximal leakage
We study the successive refinement setting of Shannon cipher system (SCS) under the
maximal leakage secrecy metric for discrete memoryless sources under bounded distortion …
maximal leakage secrecy metric for discrete memoryless sources under bounded distortion …
On mismatched oblivious relaying
We consider the problem of reliable communication over a discrete memoryless channel
(DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no …
(DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no …
Codeword Decomposition: Successive Refinement Assisted Coding Scheme for Discrete Memoryless Sources
This paper proposes for memoryless discrete sources a new lossy coding scheme,
codeword decomposition, which can achieve low encoding and decoding complexity and …
codeword decomposition, which can achieve low encoding and decoding complexity and …