Xiang He

Affiliations:
  • Pennsylvania State University, University Park, PA, USA


According to our database1, Xiang He authored at least 37 papers between 2008 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States.
IEEE Trans. Inf. Theory, 2014

Providing Secrecy With Structured Codes: Two-User Gaussian Channels.
IEEE Trans. Inf. Theory, 2014

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Commun., 2014

2013
End-to-End Secure Multi-Hop Communication with Untrusted Relays.
IEEE Trans. Wirel. Commun., 2013

The Role of Feedback in Two-Way Secure Communications.
IEEE Trans. Inf. Theory, 2013

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Inf. Theory, 2013

MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Inf. Theory, 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

2012
The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
The Gaussian Many-to-One Interference Channel With Confidential Messages.
IEEE Trans. Inf. Theory, 2011

Secrecy when the eavesdropper controls its channel states.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011

MIMO multiple access channel with an arbitrarily varying eavesdropper.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Cooperation with an untrusted relay: a secrecy perspective.
IEEE Trans. Inf. Theory, 2010

Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
CoRR, 2010

The Gaussian Many-to-1 Interference Channel with Confidential Messages
CoRR, 2010

The role of channel states in secret key generation.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010

Providing Secrecy Irrespective of Eavesdropper's Channel State.
Proceedings of the Global Communications Conference, 2010

Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Two-Hop Secure Communication Using an Untrusted Relay.
EURASIP J. Wirel. Commun. Netw., 2009

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
CoRR, 2009

K-user interference channels: Achievable secrecy rate and degrees of freedom.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Secure communication with a Byzantine relay.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A new outer bound for the gaussian interference channel with confidential messages.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Interference channels with strong secrecy.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
The role of an untrusted relay in secret communication.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008

Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the energy-delay trade-off of a two-way relay network.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

Providing secrecy with lattice codes.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

On the role of feedback in two-way secure communication.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

End-to-end secure multi-hop communication with untrusted relays is possible.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008


  Loading...