Search Results - "Chunxuan Ye"
-
1
Big Data Meet Cyber-Physical Systems: A Panoramic Survey
Published in IEEE access (2018)“…The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and…”
Get full text
Journal Article -
2
Information-Theoretically Secret Key Generation for Fading Wireless Channels
Published in IEEE transactions on information forensics and security (01-06-2010)“…The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying,…”
Get full text
Journal Article -
3
Secret Key and Private Key Constructions for Simple Multiterminal Source Models
Published in IEEE transactions on information theory (01-02-2012)“…We propose an approach for constructing secret and private keys based on the long-known Slepian-Wolf code, due to Wyner, for correlated sources connected by a…”
Get full text
Journal Article -
4
Secret Key Generation for a Pairwise Independent Network Model
Published in IEEE transactions on information theory (01-12-2010)“…We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent…”
Get full text
Journal Article -
5
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]
Published in IEEE wireless communications (01-10-2010)“…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
Get full text
Journal Article -
6
Performance Analysis of Different Types of Sensor Networks for Cognitive Radios
Published in Journal of electrical and computer engineering (01-01-2012)“…We consider the problem of using multiple sensors to detect whether a certain spectrum is occupied or not. Each sensor sends its spectrum sensing result to a…”
Get full text
Journal Article -
7
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks
Published in IEEE wireless communications (01-10-2010)“…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
Get full text
Journal Article -
8
Some basic properties of fix-free codes
Published in IEEE transactions on information theory (01-01-2001)“…A variable-length code is a fix-free code if no codeword is a prefix or a suffix of any other codeword. This class of codes is applied to speed up the decoding…”
Get full text
Journal Article -
9
A simple upper bound on the redundancy of Huffman codes
Published in IEEE transactions on information theory (01-07-2002)“…Upper bounds on the redundancy of Huffman codes have been extensively studied in the literature. Almost all of these bounds are in terms of the probability of…”
Get full text
Journal Article -
10
Extracting Secrecy from Jointly Gaussian Random Variables
Published in 2006 IEEE International Symposium on Information Theory (01-07-2006)“…We present a method for secrecy extraction from jointly Gaussian random sources. The approach is motivated by and has applications in enhancing security for…”
Get full text
Conference Proceeding -
11
Group Secret Key Generation Algorithms
Published in 2007 IEEE International Symposium on Information Theory (01-06-2007)“…We consider a pair-wise independent network in which every pair of terminals observes a common pair-wise source that is independent of all the sources…”
Get full text
Conference Proceeding -
12
Performance Analysis of Exponential Increase Exponential Decrease Back-Off Algorithm
Published in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (01-12-2010)“…Since the IEEE 802.11 DCF adopted the Binary Exponential Back-off (BEB) algorithm in its contention window adjustment scheme, many alternative back-off…”
Get full text
Conference Proceeding -
13
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks
Published in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (01-12-2010)“…We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with…”
Get full text
Conference Proceeding -
14
A simple secret key construction system for broadcasting model
Published in 2010 44th Annual Conference on Information Sciences and Systems (CISS) (01-03-2010)“…This paper considers the problem of generating a secret key from correlated random variables. These correlated random variables result from common BPSK…”
Get full text
Conference Proceeding -
15
Preliminary performance evaluation of sensor network with intermediate fusion helper for cognitive radios
Published in 2012 46th Annual Conference on Information Sciences and Systems (CISS) (01-03-2012)“…In this paper, we consider the problem of using three sensors to detect whether a certain spectrum is occupied or not. Each sensor sends its binary decision to…”
Get full text
Conference Proceeding -
16
The secret key~private key capacity region for three terminals
Published in Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 (2005)“…We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all…”
Get full text
Conference Proceeding -
17
Secret key and private key constructions for simple multiterminal source models
Published in Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 (2005)“…This work is motivated by recent results of Csiszar and Narayan (IEEE Trans, on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy…”
Get full text
Conference Proceeding -
18
Mobility management for dense networks
Published in 34th IEEE Sarnoff Symposium (01-05-2011)“…This paper considers a Wireless Local Area Network consisting of Access Points that can provide only a limited cone of coverage. A dense access point…”
Get full text
Conference Proceeding -
19
Secret key generation for a pairwise independent network model
Published in 2008 IEEE International Symposium on Information Theory (01-07-2008)“…We investigate secret key generation for a ldquopair-wise independent networkrdquo model in which every pair of terminals observes correlated sources which are…”
Get full text
Conference Proceeding -
20
Common Randomness, Multiuser Secrecy and Tree Packing
Published in 2008 46th Annual Allerton Conference on Communication, Control, and Computing (01-09-2008)“…Inherent connections are known to exist between common randomness generated by multiterminal source coding and channel coding on the one hand, and information…”
Get full text
Conference Proceeding