Yuan Luo

Orcid: 0000-0002-3910-5286

Affiliations:
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
  • Nankai University, Tianjin, China (PhD 1999)


According to our database1, Yuan Luo authored at least 123 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Constructions of Binary MDS Array Codes With Optimal Repair/Access Bandwidth.
IEEE Trans. Commun., June, 2024

Optimal binary and ternary locally repairable codes with minimum distance 6.
Des. Codes Cryptogr., May, 2024

Incentive Mechanism for Uncertain Tasks Under Differential Privacy.
IEEE Trans. Serv. Comput., 2024

Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks.
Perform. Evaluation, 2024

Constructions of optimal binary locally repairable codes via intersection subspaces.
Sci. China Inf. Sci., 2024

DGMamba: Domain Generalization via Generalized State Space Model.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Sparse Gaussian Gradient Code.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Repairing with Zero Skip Cost.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Privacy-Preserving UCB Decision Process Verification via zk-SNARKs.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

ChronusFed: Reinforcement-Based Adaptive Partial Training for Heterogeneous Federated Learning.
Proceedings of the 53rd International Conference on Parallel Processing, 2024

2023
DIVINE: A pricing mechanism for outsourcing data classification service in data market.
Inf. Sci., July, 2023

On General Capacity-Distortion Formulas of Integrated Sensing and Communication.
CoRR, 2023

Rethinking Domain Generalization: Discriminability and Generalizability.
CoRR, 2023

Diverse Target and Contribution Scheduling for Domain Generalization.
CoRR, 2023

On Strong Secrecy for Multiple Access Channels with States and Causal CSI.
CoRR, 2023

Incentive Mechanism for Uncertain Tasks under Differential Privacy.
CoRR, 2023

Constructing MDS Array Codes with Small Repair Bandwidth under Sub-packetization Two.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

New Constructions of Binary MDS Array Codes with Optimal Repair Bandwidth.
Proceedings of the IEEE International Symposium on Information Theory, 2023

On Strong Secrecy for Multiple Access Channel with States and causal CSI.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
Some Upper Bounds and Exact Values on Linear Complexities Over F<sub>M</sub> of Sidelnikov Sequences for M = 2 and 3.
IEEE Trans. Inf. Theory, 2022

Binary Locally Repairable Codes With Large Availability and its Application to Private Information Retrieval.
IEEE Trans. Inf. Theory, 2022

Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints.
IEEE Trans. Inf. Theory, 2022

Pricing GAN-based data generators under Rényi differential privacy.
Inf. Sci., 2022

Performance Improvement Validation of Decision Tree Algorithms with Non-normalized Information Distance in Experiments.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Incentive Mechanism Design for Uncertain Tasks in Mobile Crowd Sensing Systems Utilizing Smart Contract in Blockchain.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint.
IEEE Trans. Inf. Forensics Secur., 2021

Strong Secrecy of Arbitrarily Varying Multiple Access Channels.
IEEE Trans. Inf. Forensics Secur., 2021

Optimization on data offloading ratio of designed caching in heterogeneous mobile wireless networks.
Inf. Sci., 2021

Constructions of Binary Optimal Locally Repairable Codes via Intersection Subspaces.
CoRR, 2021

Covert communication with beamforming over MISO channels in the finite blocklength regime.
Sci. China Inf. Sci., 2021

Strong Secrecy of Arbitrarily Varying Wiretap Channels with Constraints by Stochastic Code.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Enhancing Physical Layer Security in Internet of Things via Feedback: A General Framework.
IEEE Internet Things J., 2020

Storage and repair bandwidth tradeoff for heterogeneous cluster distributed storage systems.
Sci. China Inf. Sci., 2020

Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile Crowdsensing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

CHASTE: Incentive Mechanism in Edge-Assisted Mobile Crowdsensing.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Improving Gravitational Wave Detection with 2D Convolutional Neural Networks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Privacy Aware Contact Tracing by Exploiting Social Networks in Viral Disease Outbreaks.
Proceedings of the IEEE Global Communications Conference, 2020

Privacy-Friendly Decentralized Data Aggregation For Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes.
IEEE Trans. Inf. Theory, 2019

An Improved Feedback Coding Scheme for the Wire-Tap Channel.
IEEE Trans. Inf. Forensics Secur., 2019

Capacity of Distributed Storage Systems with Clusters and Separate Nodes.
CoRR, 2019

The FM-linear Complexity of M-ary Sidel'nikov Sequences of Period p - 1 = f • M<sup>λ</sup>.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Self-Attentive Networks for one-shot Image Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Symmetric Cross Entropy for Robust Learning With Noisy Labels.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Dirichlet Latent Variable Hierarchical Recurrent Encoder-Decoder in Dialogue Generation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Investigating Deep Neural Networks for Gravitational Wave Detection in Advanced LIGO Data.
Proceedings of the 2nd International Conference on Computer Science and Software Engineering, 2019

2018
Toward 5G Wireless Interface Technology: Enabling Nonorthogonal Multiple Access in the Sparse Code Domain.
IEEE Veh. Technol. Mag., 2018

A Low-Complexity SCMA Detector Based on Discretization.
IEEE Trans. Wirel. Commun., 2018

Repairing Algebraic Geometry Codes.
IEEE Trans. Inf. Theory, 2018

Correct Undetected Errors with List Decoding in ARQ Error-control Systems.
CoRR, 2018

Storage and repair bandwidth tradeoff for distributed storage systems with clusters and separate nodes.
Sci. China Inf. Sci., 2018

An Improved A<sup>*</sup> Decoding Algorithm With List Decoding.
IEEE Access, 2018

New Results on the Wire-tap Channel with Noiseless Feedback.
Proceedings of the IEEE Information Theory Workshop, 2018

2017
Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles.
IEEE Trans. Mob. Comput., 2017

Construction of Sequences With High Nonlinear Complexity From Function Fields.
IEEE Trans. Inf. Theory, 2017

Finite State Markov Wiretap Channel With Delayed Feedback.
IEEE Trans. Inf. Forensics Secur., 2017

Efficiently repairing algebraic geometry codes.
CoRR, 2017

Finite State Multiple-Access Wiretap Channel with Delayed Feedback.
CoRR, 2017

Approximating the Differential Entropy of Gaussian Mixtures.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Generalized Bidirectional Limited Magnitude Error Correcting Code for MLC Flash Memories.
Proceedings of the Combinatorial Optimization and Applications, 2017

2016
An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail.
IEEE Trans. Veh. Technol., 2016

Training-Free Indoor White Space Exploration.
IEEE J. Sel. Areas Commun., 2016

A new construction of threshold cryptosystems based on RSA.
Inf. Sci., 2016

A Low Complexity Detection Algorithm for SCMA.
CoRR, 2016

Optimal Repair for Distributed Storage Codes in Vehicular Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

I/O Optimized Recovery Algorithm in Vehicular Network Using PM-RBT Codes.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

2015
TSAC: Enforcing Isolation ofVirtual Machines in Clouds.
IEEE Trans. Computers, 2015

Capacity-equivocation region of a special case of wiretap channel with noiseless feedback.
J. Commun. Networks, 2015

Secure error-correcting network codes with side information leakage.
IET Commun., 2015

Sequences with good correlation property based on depth and interleaving techniques.
Des. Codes Cryptogr., 2015

On the bounds and achievability about the ODPC of GRM(2,m)<sup>∗</sup>over prime fields for increasing message length.
Des. Codes Cryptogr., 2015

SECO: Secure and scalable data collaboration services in cloud computing.
Comput. Secur., 2015

Differentially Private Wireless Data Publication in Large-Scale WLAN Networks.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Threshold optimization for ISI-free region detection in high-mobility fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2015

2014
Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes.
IEEE Trans. Inf. Theory, 2014

A Construction of Long-Period Sequences Based on Lightweight Generation and High Probability.
IEEE Trans. Commun., 2014

On the Optimum Cyclic Subcode Chains of RM(2, m)<sup>*</sup> for Increasing Message Length.
IEEE Trans. Commun., 2014

The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over 𝔽<sub>3</sub>.
J. Appl. Math., 2014

A Note on the Five Valued Conjectures of Johansen, Helleseth and Kholosha and Zeta Functions.
IEEE Commun. Lett., 2014

On the relative profiles of a linear code and a subcode.
Des. Codes Cryptogr., 2014

The weight distributions of some cyclic codes with three or four nonzeros over 𝔽<sub>3</sub>.
Des. Codes Cryptogr., 2014

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing.
Comput. Secur., 2014

New binary sequences with good correlation based on high-order difference and interleaving techniques.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Low-complexity ISI-free region detection for OFDM systems in high-mobility fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2014

2013
Hybrid CPU Management for Adapting to the Diversity of Virtual Machines.
IEEE Trans. Computers, 2013

Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback.
J. Appl. Math., 2013

Capacity Region of a New Bus Communication Model.
Entropy, 2013

Wiretap Channel with Action-Dependent Channel State Information.
Entropy, 2013

Code constructions and existence bounds for relative generalized Hamming weight.
Des. Codes Cryptogr., 2013

The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3
CoRR, 2013

The weight distributions of some cyclic codes with three or four nonzeros over F3
CoRR, 2013

On the Optimum Cyclic Subcode Chains of (2, m)<sup>*</sup> for Increasing Message Length.
CoRR, 2013

A particular case of the conjectures of Johansen and Helleseth and zeta functions.
CoRR, 2013

On the bounds and achievability about the ODPC of $\mathcal{GRM}(2, m)^*$ over prime field for increasing message length.
CoRR, 2013

Achieving secure and efficient data collaboration in cloud computing.
Proceedings of the 21st IEEE/ACM International Symposium on Quality of Service, 2013

A Novel Taxi Dispatch System for Smart City.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2013

P2E: Privacy-preserving and effective cloud data sharing service.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Virtualization I/O optimization based on shared memory.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
Some New Results on the Wiretap Channel with Side Information.
Entropy, 2012

A novel vehicular location prediction based on mobility patterns for routing in urban VANET.
EURASIP J. Wirel. Commun. Netw., 2012

Information-Theoretical Security for Several Models of Multiple-Access Channel
CoRR, 2012

Rotating-table game and construction of periodic sequences with lightweight calculation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Capacity region of non-degraded wiretap channel with noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
SNPdisk: an efficient para-virtualization snapshot mechanism for virtual disks in private clouds.
IEEE Netw., 2011

2010
On the optimum distance profiles about linear block codes.
IEEE Trans. Inf. Theory, 2010

An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds.
IEEE Secur. Priv., 2010

Information Distances over Clusters.
Proceedings of the Advances in Neural Networks, 2010

Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010

2009
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Dynamic Malicious Code Detection Based on Binary Translator.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

2008
A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Wiretap Channel with Side Information from Part of Encoder.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Optimum distance profiles of linear block codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

A BLP-Based Access Control Mechanism for the Virtual Machine System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Reasonable Approach for Defining Load Index in Parallel Computing.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Abstract Model for Intrusion Detection on Multi-Core Platform.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2004
Achieving the perfect secrecy for the Gaussian wiretap channel with side information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

A generalization of MDS codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2001
On Equidistant Constant Weight Codes.
Electron. Notes Discret. Math., 2001


  Loading...