Chunxuan Ye

According to our database1, Chunxuan Ye authored at least 23 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Big Data Meet Cyber-Physical Systems: A Panoramic Survey.
IEEE Access, 2018

A Simple Relaxation Scheme for Polar Codes.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

A Polar Code Hybrid Rate Matching Scheme.
Proceedings of the 2018 European Conference on Networks and Communications, 2018

2012
Secret Key and Private Key Constructions for Simple Multiterminal Source Models.
IEEE Trans. Inf. Theory, 2012

Performance Analysis of Different Types of Sensor Networks for Cognitive Radios.
J. Electr. Comput. Eng., 2012

Preliminary performance evaluation of sensor network with intermediate fusion helper for cognitive radios.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2010
Exploiting the physical layer for enhanced security.
IEEE Wirel. Commun., 2010

Secret Key Generation for a Pairwise Independent Network Model.
IEEE Trans. Inf. Theory, 2010

Information-theoretically secret key generation for fading wireless channels.
IEEE Trans. Inf. Forensics Secur., 2010

Performance Analysis of Exponential Increase Exponential Decrease Back-Off Algorithm.
Proceedings of the Global Communications Conference, 2010

PHY-Authentication Protocol for Spoofing Detection in Wireless Networks.
Proceedings of the Global Communications Conference, 2010

A simple secret key construction system for broadcasting model.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
Perfect secrecy, perfect omniscience and steiner tree packing.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Common Randomness, Multiuser Secrecy and Tree Packing.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
On the Secrecy Capabilities of ITU Channels.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Group Secret Key Generation Algorithms.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Extracting Secrecy from Jointly Gaussian Random Variables.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Information Theoretic Generation of Multiple Secret Keys.
PhD thesis, 2005

The secret key~private key capacity region for three terminals.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
The private key capacity region for three terminals.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2002
A simple upper bound on the redundancy of Huffman codes.
IEEE Trans. Inf. Theory, 2002

2001
Some basic properties of fix-free codes.
IEEE Trans. Inf. Theory, 2001


  Loading...