Search Results - "Chunxuan Ye"

Refine Results
  1. 1

    Big Data Meet Cyber-Physical Systems: A Panoramic Survey by Atat, Rachad, Lingjia Liu, Jinsong Wu, Guangyu Li, Chunxuan Ye, Yang Yi

    Published in IEEE access (2018)
    “…The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and…”
    Get full text
    Journal Article
  2. 2

    Information-Theoretically Secret Key Generation for Fading Wireless Channels by Chunxuan Ye, Mathur, Suhas, Reznik, Alex, Shah, Yogendra, Trappe, Wade, Mandayam, Narayan B

    “…The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying,…”
    Get full text
    Journal Article
  3. 3

    Secret Key and Private Key Constructions for Simple Multiterminal Source Models by Chunxuan Ye, Narayan, P.

    Published in IEEE transactions on information theory (01-02-2012)
    “…We propose an approach for constructing secret and private keys based on the long-known Slepian-Wolf code, due to Wyner, for correlated sources connected by a…”
    Get full text
    Journal Article
  4. 4

    Secret Key Generation for a Pairwise Independent Network Model by Nitinawarat, S, Chunxuan Ye, Barg, A, Narayan, P, Reznik, A

    Published in IEEE transactions on information theory (01-12-2010)
    “…We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent…”
    Get full text
    Journal Article
  5. 5

    Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] by Mathur, Suhas, Reznik, Alex, Chunxuan Ye, Mukherjee, Rajat, Rahman, Akbar, Shah, Yogendra, Trappe, Wade, Mandayam, Narayan

    Published in IEEE wireless communications (01-10-2010)
    “…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
    Get full text
    Journal Article
  6. 6

    Performance Analysis of Different Types of Sensor Networks for Cognitive Radios by Ye, Chunxuan, Lin, Zinan, Demir, Alpaslan, Li, Yan

    “…We consider the problem of using multiple sensors to detect whether a certain spectrum is occupied or not. Each sensor sends its spectrum sensing result to a…”
    Get full text
    Journal Article
  7. 7

    Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks by Mathur, Suhas, Reznik, Alex, Ye, Chunxuan, Mukherjee, Rajat, Rahman, Akbar, Shah, Yogendra, Trappe, Wade, Mandayam, Narayan

    Published in IEEE wireless communications (01-10-2010)
    “…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
    Get full text
    Journal Article
  8. 8

    Some basic properties of fix-free codes by Chunxuan Ye, Yeung, R.W.

    Published in IEEE transactions on information theory (01-01-2001)
    “…A variable-length code is a fix-free code if no codeword is a prefix or a suffix of any other codeword. This class of codes is applied to speed up the decoding…”
    Get full text
    Journal Article
  9. 9

    A simple upper bound on the redundancy of Huffman codes by Chunxuan Ye, Yeung, R.W.

    Published in IEEE transactions on information theory (01-07-2002)
    “…Upper bounds on the redundancy of Huffman codes have been extensively studied in the literature. Almost all of these bounds are in terms of the probability of…”
    Get full text
    Journal Article
  10. 10

    Extracting Secrecy from Jointly Gaussian Random Variables by Chunxuan Ye, Reznik, A., Shah, Y.

    “…We present a method for secrecy extraction from jointly Gaussian random sources. The approach is motivated by and has applications in enhancing security for…”
    Get full text
    Conference Proceeding
  11. 11

    Group Secret Key Generation Algorithms by Chunxuan Ye, Reznik, A.

    “…We consider a pair-wise independent network in which every pair of terminals observes a common pair-wise source that is independent of all the sources…”
    Get full text
    Conference Proceeding
  12. 12

    Performance Analysis of Exponential Increase Exponential Decrease Back-Off Algorithm by Chunxuan Ye, Yan Li, Reznik, Alex

    “…Since the IEEE 802.11 DCF adopted the Binary Exponential Back-off (BEB) algorithm in its contention window adjustment scheme, many alternative back-off…”
    Get full text
    Conference Proceeding
  13. 13

    PHY-Authentication Protocol for Spoofing Detection in Wireless Networks by Liang Xiao, Reznik, A, Trappe, W, Chunxuan Ye, Shah, Y, Greenstein, L, Mandayam, N

    “…We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with…”
    Get full text
    Conference Proceeding
  14. 14

    A simple secret key construction system for broadcasting model by Chunxuan Ye, Reznik, Alex

    “…This paper considers the problem of generating a secret key from correlated random variables. These correlated random variables result from common BPSK…”
    Get full text
    Conference Proceeding
  15. 15

    Preliminary performance evaluation of sensor network with intermediate fusion helper for cognitive radios by Chunxuan Ye, Demir, A., Yan Li

    “…In this paper, we consider the problem of using three sensors to detect whether a certain spectrum is occupied or not. Each sensor sends its binary decision to…”
    Get full text
    Conference Proceeding
  16. 16

    The secret key~private key capacity region for three terminals by Chunxuan Ye, Narayan, P.

    “…We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all…”
    Get full text
    Conference Proceeding
  17. 17

    Secret key and private key constructions for simple multiterminal source models by Chunxuan Ye, Narayan, P.

    “…This work is motivated by recent results of Csiszar and Narayan (IEEE Trans, on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy…”
    Get full text
    Conference Proceeding
  18. 18

    Mobility management for dense networks by Reznik, A., Chunxuan Ye, Yuying Dai, Kaur, S., Tomici, J.

    Published in 34th IEEE Sarnoff Symposium (01-05-2011)
    “…This paper considers a Wireless Local Area Network consisting of Access Points that can provide only a limited cone of coverage. A dense access point…”
    Get full text
    Conference Proceeding
  19. 19

    Secret key generation for a pairwise independent network model by Nitinawarat, S., Chunxuan Ye, Barg, A., Narayan, P., Reznik, A.

    “…We investigate secret key generation for a ldquopair-wise independent networkrdquo model in which every pair of terminals observes correlated sources which are…”
    Get full text
    Conference Proceeding
  20. 20

    Common Randomness, Multiuser Secrecy and Tree Packing by Nitinawarat, S., Chunxuan Ye, Barg, A., Narayan, P., Reznik, A.

    “…Inherent connections are known to exist between common randomness generated by multiterminal source coding and channel coding on the one hand, and information…”
    Get full text
    Conference Proceeding