Wentao Huang

ORCID: 0000-0003-0963-3624
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Full-Duplex Wireless Communications
  • Wireless Communication Security Techniques
  • Advanced Data Storage Technologies
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Quantum Computing Algorithms and Architecture
  • Error Correcting Code Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Graph theory and applications
  • Distributed systems and fault tolerance
  • IPv6, Mobility, Handover, Networks, Security
  • Security in Wireless Sensor Networks
  • Radar Systems and Signal Processing
  • Cellular Automata and Applications
  • Target Tracking and Data Fusion in Sensor Networks
  • Optical Systems and Laser Technology
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Advanced Wireless Communication Technologies

Beijing University of Posts and Telecommunications
2021-2022

Snap (United States)
2018

California Institute of Technology
2012-2017

Chinese People's Liberation Army
2009

A secret sharing scheme is a method to store information securely and reliably. Particularly, in threshold scheme, encoded into n shares, such that any set of at least t <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> shares suffice decode the secret, most xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> <; reveal no about secret. Assuming each party holds share user wishes by receiving from parties; question we study how minimize...

10.1109/tit.2016.2616144 article EN IEEE Transactions on Information Theory 2016-10-10

This paper studies secure unicast communication over a network with uniform wiretap sets and shows that, when nodes can independently generate randomness, determining the secrecy capacity is at least as difficult k-unicast coding problem. In particular, we show that general problem be reduced to of finding corresponding single link capacities any one link. We propose low-complexity linear optimization-based achievable strategy involving global random keys generated anywhere in network, an...

10.1109/netcod.2013.6570814 article EN 2013-06-01

This paper studies the communication efficiency of threshold secret sharing schemes. We construct a family Shamir's schemes with asymptotically optimal decoding bandwidth for arbitrary parameters. also both and repair The construction leads to regenerating codes allowing centralized multiple node failures small sub-packetization.

10.1109/isit.2017.8006842 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2017-06-01

We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient node failures and resistant eavesdropping. generalize the concept of systematic encoding RAID show have significant advantages efficiencies encoding, decoding random access. For practical high rate regime, we construct three XOR-based with optimal complexities, from EVENODD codes B codes, which are array widely used architecture. These optimally tolerate two eavesdropping...

10.1109/isit.2016.7541529 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2016-07-01

This paper constructs WOM codes that combine rewriting and error correction for mitigating the reliability endurance problems in flash memory.We consider a model is of practical interest to applications where only second write uses codes. Our code construction based on binary erasure quantization with LDGM codes, message passing has potential share efficient hardware implementations LDPC practice. We show coding scheme achieves capacity model. Extensive simulations performance our compares...

10.1109/isit.2015.7282534 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2015-06-01

When sensitive data is stored in the cloud, only way to ensure its secrecy by encrypting it before uploaded. The emerging multi-cloud model, which redundantly two or more independent clouds, provides an opportunity protect with secret-sharing schemes. Both data-protection approaches are considered computationally expensive, but recent advances reduce their costs considerably: (1) Hardware acceleration methods promise eliminate computational complexity of encryption, leave clients challenge...

10.1145/3211890.3211896 article EN 2018-06-04

We study secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient node failures and resistant eavesdropping. describe technique shorten the EVENODD scheme [6], which can optimally tolerate 2 eavesdropping nodes. The shortening allows us obtain of arbitrary lengths, important for practical application. also construct new RAID from STAR code. 3 nodes with optimal encoding/decoding random access complexity.

10.1109/isit.2017.8006600 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2017-06-01

This paper reduces multiple-unicast network coding to single-unicast secure and error correction. Specifically, we present reductions that map an arbitrary instance a unicast in which at most one link is eavesdropped, or correction erroneous, such rate tuple achievable the if only corresponding instance, instance. Conversely, show eavesdropped can be reduced back In addition, capacity of general not (exactly) achievable.

10.1109/tit.2018.2820686 article EN publisher-specific-oa IEEE Transactions on Information Theory 2018-03-29

This paper studies rateless network error correction codes for reliable multicast in the presence of adversarial errors. We present coding schemes two models, where source sends more redundancy over time, until decoding succeeds. The first model assumes there is a secret channel between and destination that adversaries cannot overhear. rate negligible compared to main network. In second share random secrets independent input information. amount information required sent. Both are capacity...

10.1109/infcom.2013.6566776 article EN 2013-04-01

Wireless sensor network (WSN) is a typical kind of low-power and lossy network, in where ARQ (Automatic Repeat reQuest) schemes are often used to improve packets reliability. However, the related may incur significant load consume more energy. This paper proposes novel energy efficient protocol called ARQ+, which uses nearest-first scheme NAK aggregation reduce amount transmission hops packets. Consequently, consumption significantly decreased. Theoretical analyses ARQ+ on consumption,...

10.1109/cc.2014.6969796 article EN China Communications 2014-10-01

A secret sharing scheme is a method to store information securely and reliably. Particularly, in threshold scheme, encoded into $n$ shares, such that any set of at least $t_1$ shares suffice decode the secret, most $t_2 < t_1$ reveal no about secret. Assuming each party holds share user wishes by receiving from parties; question we study how minimize amount communication between parties. We show necessary communication, termed "decoding bandwidth", decreases as number parties participate...

10.48550/arxiv.1505.07515 preprint EN other-oa arXiv (Cornell University) 2015-01-01

We consider the problem of characterizing network capacity in presence adversarial errors on links,focusing particular effect low-capacity feedback links cross cuts.

10.48550/arxiv.1312.3823 preprint EN cc-by-nc-sa arXiv (Cornell University) 2013-01-01

Consider the problem of reliable multicast over a network in presence adversarial errors. In contrast to traditional error correction codes designed for given capacity and number errors, we study an arguably more realistic setting that prior knowledge on adversary parameters is not available. For this propose efficient throughput-optimal schemes, provided source terminals share randomness secret form adversary. We discuss application cryptographic pseudorandom generators efficiently produce...

10.1109/isit.2015.7282931 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2015-06-01

We show that solving a multiple-unicast network coding problem can be reduced to single-unicast error correction problem, where an adversary may jam at most single edge in the network. Specifically, we present efficient reduction maps instance while preserving feasibility. The holds for both zero probability of model and vanishing model. Previous reductions are restricted zero-error case. As application reduction, constructive example showing capacity not achievable, result separate interest.

10.1109/isit.2015.7282477 preprint EN 2022 IEEE International Symposium on Information Theory (ISIT) 2015-06-01

This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to nodes, so any $n-r$ nodes can decode but colluding $z$ cannot infer information about message. In event node failures shares held by failed are lost, system needs be repaired reconstructing and reassigning lost (or replacement) nodes. achieved trivially trustworthy third-party receives available recompute reassign shares. The interesting question, studied in...

10.48550/arxiv.1706.00500 preprint EN other-oa arXiv (Cornell University) 2017-01-01

We consider the problem of secure communication over a network in presence wiretappers. give new cut-set bound on secrecy capacity which takes into account contribution both forward and backward edges crossing cut, connectivity between their endpoints rest network. show is tight class networks, demonstrates that it not possible to find tighter by considering only connectivity.

10.1109/isit.2014.6874804 preprint EN 2014-06-01

We study the problem of communicating over a single-source single-terminal network in presence an adversary that may jam single link network. If any one edges can be jammed, capacity such networks is well understood and follows directly from connection between minimum cut maximum flow networks. In this work we consider which some cannot show determining communication at least as hard solving multiple-unicast coding for error-free case. The latter long standing open problem.

10.1109/allerton.2014.7028486 article EN 2014-09-01

In this paper, we present a novel approach to identify Tor hidden service access activity with key sequences under Obfs4 scenario. By calculating the cell signals occurred during process, get start index and window size of TCP package sequence traffic. order verify effectiveness method, perform comprehensive analysis nine scenarios different transmission model. We find through experimental results that there is window, which has great contribution identifying Only use as input, can achieve...

10.1145/3491396.3506532 article EN 2021-12-28

This paper shows determining the secrecy capacity of a unicast network with uniform wiretap sets is at least as difficult k-unicast problem. In particular, we show that general problem can be reduced to finding corresponding single link capacities and one arbitrary link.

10.48550/arxiv.1208.4390 preprint EN other-oa arXiv (Cornell University) 2012-01-01

We study the problem of communicating over a single-source single-terminal network in presence an adversary that may jam single link network. If any one edges can be jammed, capacity such networks is well understood and follows directly from connection between minimum cut maximum flow single- terminal networks. In this work we consider which some cannot show determining communication at least as hard solving multiple-unicast coding for error-free case. The latter long standing open problem.

10.48550/arxiv.1410.1905 preprint EN other-oa arXiv (Cornell University) 2014-01-01

We show that solving a multiple-unicast network coding problem can be reduced to single-unicast error correction problem, where an adversary may jam at most single edge in the network. Specifically, we present efficient reduction maps instance while preserving feasibility. The holds for both zero probability of model and vanishing model. Previous reductions are restricted zero-error case. As application reduction, constructive example showing capacity not achievable, result separate interest.

10.48550/arxiv.1504.04930 preprint EN other-oa arXiv (Cornell University) 2015-01-01

This paper considers rateless network error correction codes for reliable multicast in the presence of adversarial errors. Most existing are designed a given capacity and maximum number errors known priori to encoder decoder. However, certain practical settings it may be necessary operate without such knowledge. We present coding schemes two models, where source sends more redundancy over time, until decoding succeeds. The first model assumes there is secret channel between destination that...

10.48550/arxiv.1301.2860 preprint EN other-oa arXiv (Cornell University) 2013-01-01
Coming Soon ...