default search action
Xuan Guang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Ruze Zhang, Xuan Guang, Shenghao Yang, Xueyan Niu, Bo Bai:
Computation of Binary Arithmetic Sum Over an Asymmetric Diamond Network. IEEE J. Sel. Areas Inf. Theory 5: 585-596 (2024) - [j34]Yinfei Xu, Jian Lu, Xuan Guang, Wei Xu:
Information Embedding With Stegotext Reconstruction. IEEE Trans. Inf. Forensics Secur. 19: 1415-1428 (2024) - [j33]Xuan Guang, Yang Bai, Raymond W. Yeung:
Secure Network Function Computation for Linear Functions - Part I: Source Security. IEEE Trans. Inf. Theory 70(1): 676-697 (2024) - [j32]Xuan Guang, Ruze Zhang:
Zero-Error Distributed Compression of Binary Arithmetic Sum. IEEE Trans. Inf. Theory 70(5): 3100-3117 (2024) - [c20]Yang Bai, Xuan Guang, Raymond W. Yeung:
Secure Network Function Computation: Function-Security. ISIT 2024: 1514-1519 - [c19]Ruze Zhang, Xuan Guang, Shenghao Yang, Xueyan Niu, Bo Bai:
Computing Capacity of Binary Arithmetic Sum over Asymmetric Diamond Network. ISIT 2024: 1532-1537 - 2023
- [j31]Yang Bai, Xuan Guang, Raymond W. Yeung:
Multiple Linear-Combination Security Network Coding. Entropy 25(8): 1135 (2023) - [j30]Xuan Guang, Raymond W. Yeung:
A Revisit of Linear Network Error Correction Coding. IEEE J. Sel. Areas Inf. Theory 4: 514-523 (2023) - [c18]Ruze Zhang, Xuan Guang:
Zero-Error Distributed Function Compression. ISIT 2023: 874-879 - [i22]Xuan Guang, Ruze Zhang:
Zero-Error Distributed Function Compression for Binary Arithmetic Sum. CoRR abs/2305.06619 (2023) - 2022
- [c17]Xuan Guang, Yang Bai, Raymond W. Yeung:
An Improved Capacity Bound for Secure Network Function Computation. ISIT 2022: 1022-1027 - [i21]Xuan Guang, Yang Bai, Raymond W. Yeung:
Secure Network Function Computation for Linear Functions - Part I: Source Security. CoRR abs/2207.06757 (2022) - 2021
- [j29]Tao Guo, Xuan Guang, Kenneth W. Shum:
On the Rate Region of Symmetric Multilevel Imperfect Secret Sharing. IEEE Trans. Commun. 69(1): 470-485 (2021) - [j28]Yinfei Xu, Xuan Guang, Jian Lu, Jun Chen:
Vector Gaussian Successive Refinement With Degraded Side Information. IEEE Trans. Inf. Theory 67(11): 6963-6982 (2021) - [c16]Xuan Guang, Yang Bai, Raymond W. Yeung:
Secure Network Function Computation. ISIT 2021: 66-71 - [c15]Yinfei Xu, Qizhou Guo, Jian Lu, Zhicheng Liu, Xuan Guang:
Two-Way Lossy Compression of Product Sources With a Helper. ISIT 2021: 2155-2160 - [c14]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. USENIX Security Symposium 2021: 965-982 - [i20]Xuan Guang, Raymond W. Yeung:
Linear Network Error Correction Coding: A Revisit. CoRR abs/2103.08081 (2021) - 2020
- [j27]Xuan Guang, Raymond W. Yeung, Fang-Wei Fu:
Local-Encoding-Preserving Secure Network Coding. IEEE Trans. Inf. Theory 66(10): 5965-5994 (2020) - [c13]Xuan Guang, Raymond W. Yeung:
Linear Network Error Correction Coding Revisited. ISIT 2020: 1635-1640 - [i19]Yinfei Xu, Xuan Guang, Jian Lu, Jun Chen:
Vector Gaussian Successive Refinement With Degraded Side Information. CoRR abs/2002.07324 (2020) - [i18]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. IACR Cryptol. ePrint Arch. 2020: 1576 (2020)
2010 – 2019
- 2019
- [j26]Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li:
Improved Upper Bound on the Network Function Computing Capacity. IEEE Trans. Inf. Theory 65(6): 3790-3811 (2019) - [j25]Zhiheng Zhou, Congduan Li, Shenghao Yang, Xuan Guang:
Practical Inner Codes for BATS Codes in Multi-Hop Wireless Networks. IEEE Trans. Veh. Technol. 68(3): 2751-2762 (2019) - [c12]Xuan Guang, Raymond W. Yeung:
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension. ISIT 2019: 201-205 - [c11]Yinfei Xu, Xuan Guang, Jian Lu:
Vector Gaussian Successive Refinement With Degraded Side Information. ISIT 2019: 1832-1836 - 2018
- [j24]Congduan Li, Xuan Guang, Chee-Wei Tan, Raymond W. Yeung:
Fundamental Limits on a Class of Secure Asymmetric Multilevel Diversity Coding Systems. IEEE J. Sel. Areas Commun. 36(4): 737-747 (2018) - [j23]Dan Li, Xuan Guang, Zhiheng Zhou, Congduan Li, Chee-Wei Tan:
Hierarchical Performance Analysis on Random Linear Network Coding. IEEE Trans. Commun. 66(5): 2009-2021 (2018) - [j22]Xuan Guang, Raymond W. Yeung:
Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach. IEEE Trans. Inf. Theory 64(6): 4513-4529 (2018) - [j21]Cupjin Huang, Zihan Tan, Shenghao Yang, Xuan Guang:
Comments on Cut-Set Bounds on Network Function Computation. IEEE Trans. Inf. Theory 64(9): 6454-6459 (2018) - [c10]Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li:
An Enhanced Capacity Bound for Network Function Computation. ISIT 2018: 1819-1823 - [c9]Tao Guo, Xuan Guang, Kenneth W. Shum:
Symmetric Multilevel Imperfect Secret Sharing. ITW 2018: 1-5 - [i17]Xuan Guang, Raymond W. Yeung, Fang-Wei Fu:
Local-Encoding-Preserving Secure Network Coding - Part I: Fixed Security Level. CoRR abs/1811.02388 (2018) - [i16]Xuan Guang, Raymond W. Yeung, Fang-Wei Fu:
Local-Encoding-Preserving Secure Network Coding - Part II: Flexible Rate and Security Level. CoRR abs/1811.02390 (2018) - 2017
- [j20]Lei Sun, Fang-Wei Fu, Xuan Guang:
Two Classes of 1-Resilient Prime-Variable Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 902-907 (2017) - [j19]Congduan Li, Xuan Guang:
Asymmetric Multilevel Diversity Coding Systems With Perfect Secrecy. IEEE Trans. Veh. Technol. 66(9): 8558-8562 (2017) - [c8]Zhiheng Zhou, Congduan Li, Xuan Guang:
Practical Inner Codes for Batched Sparse Codes. GLOBECOM 2017: 1-6 - [c7]Congduan Li, Xuan Guang, Chee Wei Tan, Raymond W. Yeung:
On secure asymmetric multilevel diversity coding systems. ISIT 2017: 2138-2142 - [c6]Xuan Guang, Raymond W. Yeung:
Alphabet size reduction for secure network coding. ITW 2017: 309-313 - [c5]Congduan Li, Fangwei Ye, Xuan Guang, Zhiheng Zhou, Chee-Wei Tan, Raymond W. Yeung:
On independent distributed source coding problems with exact repair. ITW 2017: 579-583 - [i15]Zhiheng Zhou, Congduan Li, Shenghao Yang, Xuan Guang:
Practical Inner Codes for Batched Sparse Codes in Wireless Multihop Networks. CoRR abs/1709.00588 (2017) - [i14]Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li:
Improved Upper Bound on the Network Function Computing Capacity. CoRR abs/1710.02252 (2017) - 2016
- [j18]Jiyong Lu, Xuan Guang, Linzhi Shen, Fang-Wei Fu:
Cooperative Local Repair with Multiple Erasure Tolerance. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(3): 765-769 (2016) - [j17]Xianfang Wang, Fang-Wei Fu, Xuan Guang:
Probabilistic Secret Sharing Schemes for Multipartite Access Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 856-862 (2016) - [j16]Dan Li, Xuan Guang, Fang-Wei Fu:
The Failure Probabilities of Random Linear Network Coding at Sink Nodes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1255-1259 (2016) - [j15]Jiyong Lu, Jun Zhang, Xuan Guang, Fang-Wei Fu:
Multiple Repair Localities with Distinct Erasure Tolerance. Int. J. Found. Comput. Sci. 27(6): 665-674 (2016) - [j14]Xuan Guang, Fang-Wei Fu, Zhen Zhang:
Variable-Rate Linear Network Error Correction MDS Codes. IEEE Trans. Inf. Theory 62(6): 3147-3164 (2016) - [c4]Xuan Guang, Shenghao Yang, Congduan Li:
An improved upper bound on network function computation using cut-set partition. ITW 2016: 11-15 - [i13]Xuan Guang, Raymond W. Yeung:
Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach. CoRR abs/1611.09104 (2016) - 2015
- [j13]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Small Field Size for Secure Network Coding. IEEE Commun. Lett. 19(3): 375-378 (2015) - [j12]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
On the Optimality of Secure Network Coding. IEEE Commun. Lett. 19(7): 1165-1168 (2015) - [j11]Xinran Li, Fang-Wei Fu, Xuan Guang:
Multiple Impossible Differential Cryptanalysis on Reduced FOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 906-911 (2015) - [j10]Lin-Zhi Shen, Xuan Guang:
A Note on Two-Dimensional Optical Orthogonal Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10): 2207-2208 (2015) - [j9]Lin-Zhi Shen, Fang-Wei Fu, Xuan Guang:
On the Locality and Availability of Linear Codes Based on Finite Geometry. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2354-2355 (2015) - [j8]Lin-Zhi Shen, Fang-Wei Fu, Xuan Guang:
Unique Decoding of Certain Reed-Solomon Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2728-2732 (2015) - [c3]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Variable-security-level secure network coding. ITW Fall 2015: 34-38 - [i12]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
On the Optimality of Secure Network Coding. CoRR abs/1505.01390 (2015) - 2014
- [b1]Xuan Guang, Zhen Zhang:
Linear Network Error Correction Coding. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-0587-4, pp. 1-103 - [j7]Jian Liu, Lusheng Chen, Xuan Guang:
Highly Nonlinear Resilient Functions without Linear Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1405-1417 (2014) - [j6]Qiuyan Wang, Dongdai Lin, Xuan Guang:
On the Linear Complexity of Legendre Sequences Over Fq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(7): 1627-1630 (2014) - [j5]Minghui Yang, Dongdai Lin, Xuan Guang:
Generalized Fourier Transform and the Joint N-Adic Complexity of a Multisequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(9): 1982-1986 (2014) - [j4]Qiuyan Wang, Yupeng Jiang, Dongdai Lin, Xuan Guang:
On the Linear Complexity of New Modified Jacobi Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2263-2266 (2014) - [c2]Jiyong Lu, Xuan Guang, Fang-Wei Fu:
Distributed storage over unidirectional ring networks. ISITA 2014: 368-372 - [c1]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Locality-preserving secure network coding. ITW 2014: 396-400 - [i11]Jiyong Lu, Xuan Guang, Fang-Wei Fu:
Distributed Storage Schemes over Unidirectional Ring Networks. CoRR abs/1401.5168 (2014) - [i10]Jiyong Lu, Xuan Guang, Fang-Wei Fu:
Distributed Storage over Unidirectional Ring Networks. CoRR abs/1402.4310 (2014) - [i9]Xuan Guang, Fang-Wei Fu, Zhen Zhang:
Variable-Rate Linear Network Error Correction MDS Codes. CoRR abs/1403.0214 (2014) - [i8]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Repairable Threshold Secret Sharing Schemes. CoRR abs/1410.7190 (2014) - [i7]Xuan Guang, Jiyong Lu, Fang-Wei Fu:
Small Field Size for Secure Network Coding. CoRR abs/1412.6266 (2014) - 2013
- [j3]Xuan Guang, Fang-Wei Fu, Lusheng Chen:
The existence and synchronization properties of symmetric fix-free codes. Sci. China Inf. Sci. 56(9): 1-9 (2013) - [j2]Xuan Guang, Fang-Wei Fu, Zhen Zhang:
Construction of Network Error Correction Codes in Packet Networks. IEEE Trans. Inf. Theory 59(2): 1030-1047 (2013) - [i6]Xuan Guang, Fang-Wei Fu:
Linear Network Error Correction Multicast/Broadcast/Dispersion Codes. CoRR abs/1302.4146 (2013) - [i5]Xuan Guang, Fang-Wei Fu:
The Failure Probability of Random Linear Network Coding for Networks. CoRR abs/1302.4147 (2013) - [i4]Xuan Guang, Fang-Wei Fu:
Linear Network Error Correction Multicast/Broadcast/Dispersion/Generic Codes. CoRR abs/1311.7466 (2013) - 2011
- [j1]Xuan Guang, Fang-Wei Fu:
The Average Failure Probabilities of Random Linear Network Coding. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(10): 1991-2001 (2011) - 2010
- [i3]Xuan Guang, Fang-Wei Fu:
On Random Linear Network Coding for Butterfly Network. CoRR abs/1001.2077 (2010) - [i2]Xuan Guang, Fang-Wei Fu:
The Failure Probability at Sink Node of Random Linear Network Coding. CoRR abs/1010.1899 (2010) - [i1]Xuan Guang, Fang-Wei Fu, Zhen Zhang:
Construction of Network Error Correction Codes in Packet Networks. CoRR abs/1011.1377 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint