Xiang He
Affiliations:- Pennsylvania State University, University Park, PA, USA
According to our database1,
Xiang He
authored at least 37 papers
between 2008 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Commun., 2014
2013
IEEE Trans. Wirel. Commun., 2013
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Inf. Theory, 2013
MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Inf. Theory, 2013
IEEE Signal Process. Mag., 2013
2012
The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
2011
IEEE Trans. Inf. Theory, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
2010
IEEE Trans. Inf. Theory, 2010
Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010
CoRR, 2010
Proceedings of the IEEE 21st International Symposium on Personal, 2010
A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Global Communications Conference, 2010
Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010
2009
EURASIP J. Wirel. Commun. Netw., 2009
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
CoRR, 2009
Proceedings of the 2009 IEEE Information Theory Workshop, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008