Yuan Luo
Orcid: 0000-0002-3910-5286Affiliations:
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
- Nankai University, Tianjin, China (PhD 1999)
According to our database1,
Yuan Luo
authored at least 123 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Commun., June, 2024
Des. Codes Cryptogr., May, 2024
IEEE Trans. Serv. Comput., 2024
Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks.
Perform. Evaluation, 2024
Sci. China Inf. Sci., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction.
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
ChronusFed: Reinforcement-Based Adaptive Partial Training for Heterogeneous Federated Learning.
Proceedings of the 53rd International Conference on Parallel Processing, 2024
2023
DIVINE: A pricing mechanism for outsourcing data classification service in data market.
Inf. Sci., July, 2023
CoRR, 2023
CoRR, 2023
Constructing MDS Array Codes with Small Repair Bandwidth under Sub-packetization Two.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
Some Upper Bounds and Exact Values on Linear Complexities Over F<sub>M</sub> of Sidelnikov Sequences for M = 2 and 3.
IEEE Trans. Inf. Theory, 2022
Binary Locally Repairable Codes With Large Availability and its Application to Private Information Retrieval.
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
Performance Improvement Validation of Decision Tree Algorithms with Non-normalized Information Distance in Experiments.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022
Incentive Mechanism Design for Uncertain Tasks in Mobile Crowd Sensing Systems Utilizing Smart Contract in Blockchain.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Optimization on data offloading ratio of designed caching in heterogeneous mobile wireless networks.
Inf. Sci., 2021
CoRR, 2021
Covert communication with beamforming over MISO channels in the finite blocklength regime.
Sci. China Inf. Sci., 2021
Strong Secrecy of Arbitrarily Varying Wiretap Channels with Constraints by Stochastic Code.
Proceedings of the IEEE International Symposium on Information Theory, 2021
2020
Enhancing Physical Layer Security in Internet of Things via Feedback: A General Framework.
IEEE Internet Things J., 2020
Storage and repair bandwidth tradeoff for heterogeneous cluster distributed storage systems.
Sci. China Inf. Sci., 2020
Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile Crowdsensing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Privacy Aware Contact Tracing by Exploiting Social Networks in Viral Disease Outbreaks.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
IEEE Trans. Inf. Theory, 2019
IEEE Trans. Inf. Forensics Secur., 2019
The FM-linear Complexity of M-ary Sidel'nikov Sequences of Period p - 1 = f • M<sup>λ</sup>.
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Dirichlet Latent Variable Hierarchical Recurrent Encoder-Decoder in Dialogue Generation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
Investigating Deep Neural Networks for Gravitational Wave Detection in Advanced LIGO Data.
Proceedings of the 2nd International Conference on Computer Science and Software Engineering, 2019
2018
Toward 5G Wireless Interface Technology: Enabling Nonorthogonal Multiple Access in the Sparse Code Domain.
IEEE Veh. Technol. Mag., 2018
IEEE Trans. Wirel. Commun., 2018
CoRR, 2018
Storage and repair bandwidth tradeoff for distributed storage systems with clusters and separate nodes.
Sci. China Inf. Sci., 2018
Proceedings of the IEEE Information Theory Workshop, 2018
2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Inf. Theory, 2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Generalized Bidirectional Limited Magnitude Error Correcting Code for MLC Flash Memories.
Proceedings of the Combinatorial Optimization and Applications, 2017
2016
IEEE Trans. Veh. Technol., 2016
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
2015
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback.
J. Commun. Networks, 2015
IET Commun., 2015
Des. Codes Cryptogr., 2015
On the bounds and achievability about the ODPC of GRM(2,m)<sup>∗</sup>over prime fields for increasing message length.
Des. Codes Cryptogr., 2015
Comput. Secur., 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Threshold optimization for ISI-free region detection in high-mobility fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2015
2014
IEEE Trans. Inf. Theory, 2014
A Construction of Long-Period Sequences Based on Lightweight Generation and High Probability.
IEEE Trans. Commun., 2014
On the Optimum Cyclic Subcode Chains of RM(2, m)<sup>*</sup> for Increasing Message Length.
IEEE Trans. Commun., 2014
The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over 𝔽<sub>3</sub>.
J. Appl. Math., 2014
A Note on the Five Valued Conjectures of Johansen, Helleseth and Kholosha and Zeta Functions.
IEEE Commun. Lett., 2014
The weight distributions of some cyclic codes with three or four nonzeros over 𝔽<sub>3</sub>.
Des. Codes Cryptogr., 2014
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing.
Comput. Secur., 2014
New binary sequences with good correlation based on high-order difference and interleaving techniques.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Low-complexity ISI-free region detection for OFDM systems in high-mobility fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2014
2013
IEEE Trans. Computers, 2013
J. Appl. Math., 2013
Des. Codes Cryptogr., 2013
CoRR, 2013
CoRR, 2013
On the Optimum Cyclic Subcode Chains of (2, m)<sup>*</sup> for Increasing Message Length.
CoRR, 2013
CoRR, 2013
On the bounds and achievability about the ODPC of $\mathcal{GRM}(2, m)^*$ over prime field for increasing message length.
CoRR, 2013
Proceedings of the 21st IEEE/ACM International Symposium on Quality of Service, 2013
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
A novel vehicular location prediction based on mobility patterns for routing in urban VANET.
EURASIP J. Wirel. Commun. Netw., 2012
CoRR, 2012
Rotating-table game and construction of periodic sequences with lightweight calculation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
SNPdisk: an efficient para-virtualization snapshot mechanism for virtual disks in private clouds.
IEEE Netw., 2011
2010
IEEE Trans. Inf. Theory, 2010
IEEE Secur. Priv., 2010
Proceedings of the Advances in Neural Networks, 2010
Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010
2009
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009
2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
2004
Achieving the perfect secrecy for the Gaussian wiretap channel with side information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2001