Wentao Huang
Title
Cited by
Cited by
Year
Delay and capacity tradeoff analysis for motioncast
X Wang, W Huang, S Wang, J Zhang, C Hu
IEEE/ACM transactions on networking 19 (5), 1354-1367, 2011
2092011
Capacity scaling of general cognitive networks
W Huang, X Wang
IEEE/ACM Transactions on Networking (TON) 20 (5), 1501-1513, 2012
105*2012
Capacity scaling in mobile wireless ad hoc network with infrastructure support
W Huang, X Wang, Q Zhang
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
512010
Communication efficient secret sharing
W Huang, M Langberg, J Kliewer, J Bruck
IEEE Transactions on Information Theory 62 (12), 7195-7206, 2016
502016
Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding
W Huang, T Ho, M Langberg, J Kliewer
IEEE Transactions on Information Theory, 2018
23*2018
Capacity of Wireless Networks With Social Characteristics
L Fu, W Huang, X Gan, F Yang, X Wang
IEEE Transactions on Wireless Communications 15 (2), 1505-1516, 2016
232016
Rewriting flash memories by message passing
EE Gad, W Huang, Y Li, J Bruck
2015 IEEE International Symposium on Information Theory (ISIT), 646-650, 2015
20*2015
On rumour spreading with skepticism and denial
W Huang
Tech. Rep, 2011
202011
Multicast capacity in mobile wireless ad hoc network with infrastructure support
X Chen, W Huang, X Wang, X Lin
2012 Proceedings IEEE INFOCOM, 271-279, 2012
172012
Multicast capacity in MANET with infrastructure support
Z Qian, X Tian, X Chen, W Huang, X Wang
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1808-1818, 2014
162014
Secure RAID schemes for distributed storage
W Huang, J Bruck
2016 IEEE International Symposium on Information Theory (ISIT), 1401-1405, 2016
132016
A low-overhead energy-efficient ARQ protocol for wireless sensor networks
Y Wei, Y Mao, S Leng, W Huang
China Communications 11 (10), 74-87, 2014
112014
Rateless and pollution-attack-resilient network coding
W Huang, T Wang, X Hu, J Jang, T Salonidis
2015 IEEE International Symposium on Information Theory (ISIT), 2623-2627, 2015
82015
Rateless resilient network coding against byzantine adversaries
W Huang, T Ho, H Yao, S Jaggi
2013 Proceedings IEEE INFOCOM, 265-269, 2013
82013
How to best share a big secret
R Shor, G Yadgar, W Huang, E Yaakobi, J Bruck
Proceedings of the 11th ACM International Systems and Storage Conference, 76-88, 2018
62018
Secret sharing with optimal decoding and repair bandwidth
W Huang, J Bruck
2017 IEEE International Symposium on Information Theory (ISIT), 1813-1817, 2017
62017
Generic Secure Repair for Distributed Storage
W Huang, J Bruck
arXiv preprint arXiv:1706.00500, 2017
62017
Connecting multiple-unicast and network error correction: Reduction and unachievability
W Huang, M Langberg, J Kliewer
Information Theory (ISIT), 2015 IEEE International Symposium on, 361-365, 2015
62015
Coding for Security and Reliability in Distributed Systems
W Huang
California Institute of Technology, 2017
52017
Secure RAID schemes from EVENODD and STAR codes
W Huang, J Bruck
IEEE International Symposium on Information Theory (ISIT), 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20