Finite blocklength lossy source coding for discrete memoryless sources

L Zhou, M Motani - Foundations and Trends® in …, 2023 - nowpublishers.com
Shannon propounded a theoretical framework (collectively called information theory) that
uses mathematical tools to understand, model and analyze modern mobile wireless …

Cooperative Computing for Mobile Crowdsensing: Design and Optimization

X **e, T Bai, W Guo, Z Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing number of mobile devices, mobile crowdsensing (MCS) has garnered
significant attention in research. However, computing infrastructures such as edge/cloud …

Broadcast Modeling and Rate Optimization for Ad Hoc Networks using Epidemic Theory

L Bai, Y Su, J Liu, D Liu, J Choi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Broadcast plays a vital role in wireless ad hoc networks for information dissemination, while
one of the key system parameters for maximizing broadcast performance is the transmission …

LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks

F Syed, SH Alsamhi, SK Gupta… - … and Computation: Practice …, 2024 - Wiley Online Library
Recently, unmanned aerial vehicles (UAV) technology has been utilized to monitor and
capture images from disasters to analyze, process, and take action in real‐time for a speedy …

Achievable Second-Order Asymptotics for MAC and RAC with Additive Non-Gaussian Noise

Y Wang, L Bai, Z Wu, L Zhou - arxiv preprint arxiv:2410.10312, 2024 - arxiv.org
We first study the two-user additive noise multiple access channel (MAC) where the noise
distribution is arbitrary. For such a MAC, we use spherical codebooks and either joint …

The Dispersion of Broadcast Channels With Degraded Message Sets Using Gaussian Codebooks

Z Wu, L Bai, J Xu, L Zhou, M Motani - arxiv preprint arxiv:2410.17540, 2024 - arxiv.org
We study the two-user broadcast channel with degraded message sets and derive second-
order achievability rate regions. Specifically, the channel noises are not necessarily …

Successive refinement of shannon cipher system under maximal leakage

Z Wu, L Bai, L Zhou - IEEE Transactions on Information Theory, 2024 - ieeexplore.ieee.org
We study the successive refinement setting of Shannon cipher system (SCS) under the
maximal leakage secrecy metric for discrete memoryless sources under bounded distortion …

On mismatched oblivious relaying

M Dikshtein, N Weinberger… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We consider the problem of reliable communication over a discrete memoryless channel
(DMC) with the help of a relay, termed the information bottleneck (IB) channel. There is no …

Codeword Decomposition: Successive Refinement Assisted Coding Scheme for Discrete Memoryless Sources

Y Lian, G Li, W Lin, L Li, R Asvadi… - 2024 12th …, 2024 - ieeexplore.ieee.org
This paper proposes for memoryless discrete sources a new lossy coding scheme,
codeword decomposition, which can achieve low encoding and decoding complexity and …