Follow
Wentao Huang
Title
Cited by
Cited by
Year
Delay and capacity tradeoff analysis for motioncast
X Wang, W Huang, S Wang, J Zhang, C Hu
IEEE/ACM transactions on networking 19 (5), 1354-1367, 2011
2172011
Capacity scaling of general cognitive networks
W Huang, X Wang
IEEE/ACM Transactions on Networking (TON) 20 (5), 1501-1513, 2012
104*2012
Communication efficient secret sharing
W Huang, M Langberg, J Kliewer, J Bruck
IEEE Transactions on Information Theory 62 (12), 7195-7206, 2016
792016
Capacity scaling in mobile wireless ad hoc network with infrastructure support
W Huang, X Wang, Q Zhang
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
522010
Capacity of Wireless Networks With Social Characteristics
L Fu, W Huang, X Gan, F Yang, X Wang
IEEE Transactions on Wireless Communications 15 (2), 1505-1516, 2016
272016
Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding
W Huang, T Ho, M Langberg, J Kliewer
IEEE Transactions on Information Theory, 2018
26*2018
On rumour spreading with skepticism and denial
W Huang
Tech. Rep, 2011
252011
Rewriting flash memories by message passing
EE Gad, W Huang, Y Li, J Bruck
2015 IEEE International Symposium on Information Theory (ISIT), 646-650, 2015
23*2015
Secret sharing with optimal decoding and repair bandwidth
W Huang, J Bruck
2017 IEEE International Symposium on Information Theory (ISIT), 1813-1817, 2017
182017
Multicast capacity in MANET with infrastructure support
Z Qian, X Tian, X Chen, W Huang, X Wang
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1808-1818, 2014
172014
Multicast capacity in mobile wireless ad hoc network with infrastructure support
X Chen, W Huang, X Wang, X Lin
2012 Proceedings IEEE INFOCOM, 271-279, 2012
172012
Secure RAID schemes for distributed storage
W Huang, J Bruck
2016 IEEE International Symposium on Information Theory (ISIT), 1401-1405, 2016
162016
How to best share a big secret
R Shor, G Yadgar, W Huang, E Yaakobi, J Bruck
Proceedings of the 11th ACM International Systems and Storage Conference, 76-88, 2018
112018
A low-overhead energy-efficient ARQ protocol for wireless sensor networks
Y Wei, Y Mao, S Leng, W Huang
China Communications 11 (10), 74-87, 2014
112014
Rateless and pollution-attack-resilient network coding
W Huang, T Wang, X Hu, J Jang, T Salonidis
2015 IEEE International Symposium on Information Theory (ISIT), 2623-2627, 2015
102015
Secure RAID schemes from EVENODD and STAR codes
W Huang, J Bruck
IEEE International Symposium on Information Theory (ISIT), 2017
92017
Rateless resilient network coding against byzantine adversaries
W Huang, T Ho, H Yao, S Jaggi
2013 Proceedings IEEE INFOCOM, 265-269, 2013
92013
Coding for Security and Reliability in Distributed Systems
W Huang
California Institute of Technology, 2017
82017
Generic Secure Repair for Distributed Storage
W Huang, J Bruck
arXiv preprint arXiv:1706.00500, 2017
62017
Connecting multiple-unicast and network error correction: Reduction and unachievability
W Huang, M Langberg, J Kliewer
2015 IEEE International Symposium on Information Theory (ISIT), 361-365, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20