Chenhao Ying

ORCID: 0000-0002-3235-4626
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Wireless Communication Security Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Error Correcting Code Techniques
  • Privacy, Security, and Data Protection
  • Advanced Wireless Communication Techniques
  • Blockchain Technology Applications and Security
  • Human Mobility and Location-Based Analysis
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Auction Theory and Applications
  • Machine Learning and Data Classification
  • Advanced Steganography and Watermarking Techniques
  • Energy Harvesting in Wireless Networks
  • Adversarial Robustness in Machine Learning
  • Geographic Information Systems Studies
  • Advanced Data Storage Technologies
  • Multimodal Machine Learning Applications
  • Cognitive Radio Networks and Spectrum Sensing
  • Domain Adaptation and Few-Shot Learning
  • Coding theory and cryptography
  • Imbalanced Data Classification Techniques
  • DNA and Biological Computing

Shanghai Jiao Tong University
2018-2024

China United Network Communications Group (China)
2020

Hong Kong University of Science and Technology
2009

University of Hong Kong
2009

Exploiting the computing capability of mobile devices with specialized engines (e.g., Neural Engine in iPhone), an attractive paradigm federated learning that combines crowdsensing (MCS) has been deeply investigated recently Google AI and Nvidia), where training task is offloaded to crowd. However, this new still numerous problems. Since executing costly for individual workers, first problem how attract more participants. Following incentive requirement, second preserve workers' bid privacy...

10.1109/srds51746.2020.00016 article EN 2020-09-01

As smart devices are becoming increasingly common in people’s daily lives, privacy and security concerns make data collection expensive limited, which further hinder the development of data-driven tasks. This paper studies how to better conduct private trading via a novel generator method rather than direct raw data. new facilitates more convenient transactions by generator, protects owners is satisfactory terms compensation query pricing. In detail, we propose RARIEA, market framework for...

10.1016/j.ins.2022.04.030 article EN cc-by-nc-nd Information Sciences 2022-04-19

Maximum distance separable codes are commonly used in large-scale distributed storage systems since they achieve the maximum fault tolerance for some given redundancy. In this paper, we focus on repair problem of MDS codes. By stacking multiple Blaum-Roth code instances which parity-check matrices judiciously designed, construct three families binary array with optimal bandwidth single-node failure. Specifically, first family lower bound where number helper nodes d is n − 1; The second...

10.1109/isit54713.2023.10206994 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2023-06-25

The strong secrecy transmission problem of the arbitrarily varying wiretap channel (AVWC) with input and state constraints is investigated in this paper. First, a stochastic-encoder code lower bound capacity established by applying type argument Csiszár's almost independent coloring lemma. Then, superposition provided. can be larger than ordinary bound. Random upper bounds AVWC are further Based on these results, we consider special case model, namely severely less noisy AVWC, give random...

10.1109/tit.2022.3161808 article EN cc-by IEEE Transactions on Information Theory 2022-03-23

In this paper, we consider a relay-assisted cognitive cellular downlink system dynamically accessing spectrum licensed to primary network, thereby improving the efficiency of usage. A cluster-based architecture is proposed, where relay stations are employed for minimizing interference users in network and achieving fairness cell-edge users. Based on architecture, an optimal solution derived jointly controlling data rate, transmission power, subband allocation optimize weighted sum goodput...

10.1109/icc.2009.5198883 article EN IEEE International Conference on Communications 2009-06-01

Mobile crowdsening (MCS) recently has been regarded as a newly-emerged sensing paradigm, which consists of centralized cloud-based platform, some data demanders and workers. However, since the platform needs to process tons sensory is requested by submitted large number workers, this traditional MCS system may cause heavy latency serious network congestion, thus can not be employed real-time large-scale applications. Therefore, new proposed combining edge computing, where nodes (e.g., base...

10.1109/secon48991.2020.9158412 article EN 2020-06-01

Hyperledger Fabric is one of the most popular permissioned blockchain platforms widely adopted in enterprise solutions. To optimize and fully utilize platform, it desired to conduct a thorough performance analysis Fabric. Although numerous studies have analyzed Fabric, three significant limitations still exist. First, existing evaluation frameworks rely on fixed workload rates, which fail accurately reflect systems real-world application scenarios. Second, impact extending breadth depth...

10.3390/math12213403 article EN cc-by Mathematics 2024-10-31

10.1109/isit57864.2024.10619305 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2024-07-07

Domain generalization (DG) endeavors to develop robust models that possess strong generalizability while preserving excellent discriminability. Nonetheless, pivotal DG techniques tend improve the feature by learning domain-invariant representations, inadvertently overlooking On one hand, simultaneous attainment of and discriminability features presents a complex challenge, often entailing inherent contradictions. This challenge becomes particularly pronounced when manifest reduced owing...

10.48550/arxiv.2309.16483 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Erasure Codes are widely implemented in distributed storage systems to achieve fault tolerance with high efficiency. Reed-Solomon code is commonly deployed data centers due its optimal efficiency, but it requires massive repair bandwidth for node repair. Minimum Storage Regenerating (MSR) and Locally Repairable (LR) proposed reduce bandwidth. However, MSR usually carries a heavy disk I/O burden LR not In this paper, we take I/O, bandwidth, sub-packetization level, degree (number of helper...

10.1109/wcsp58612.2023.10405147 article EN 2023-11-02

The strong secrecy transmission problem of arbitrarily varying wiretap channel (AVWC) with input and state constraints is investigated in this paper. A stochastic code lower bound the capacity established by applying type argument Csiszár's almost independent coloring lemma, which includes result ordinary AVWC as special case. Our codebook generation without i.i.d. assumption soft covering lemma to ensure reliable communication over constraints. It proved that 0good codebooks for can be...

10.1109/isit45174.2021.9517973 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2021-07-12

In recent years, crowdsensing has received extensive attention both in academia and industry. However, most of the prior works are based on centralized framework, where users upload sensor data to a platform alone. this paper, we propose decentralized aggregation algorithm for crowdsensing, which, participants negotiate average their pure distributed manner while enjoying differential privacy guarantee. Taking participants' into consideration, first redesign averaging by artificially adding...

10.1109/globecom42002.2020.9322169 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2020-12-01

In the existing works on asymptotics of throughput covert communications, an adversary is typically assumed to run a single binary hypothesis testing determine presence active transmission, which equivalent distinguish between induced mixture distribution by all codewords and with inactive transmitter. this paper, we show that both first second order are O(1) when can afford running parallel simple against detection each codeword. The constraint in case given as upper-bound δ total variation...

10.1109/milcom58377.2023.10356292 article EN MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) 2023-10-30

Comparing with hard decision decoding algorithms, soft has a lower probability of bit error but higher computational complexity. As maximum-likelihood method, the <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$A^{\ast }$ </tex-math></inline-formula> algorithm is most basic and widely used to minimize probability. However, its average complexity strongly depends on seed codeword heuristic function utilized...

10.1109/access.2018.2866396 article EN cc-by-nc-nd IEEE Access 2018-01-01
Coming Soon ...