research
          
      
      ∙
      09/23/2020
    Fundamental Limits of Byzantine Agreement
Byzantine agreement (BA) is a distributed consensus problem where n proc...
          
            research
          
      
      ∙
      10/28/2019
    Multi-layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel
In wireless networks, link strengths are often affected by some topologi...
          
            research
          
      
      ∙
      07/10/2019
    Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks
In communication networks secrecy constraints usually incur an extra lim...
          
            research
          
      
      ∙
      12/26/2018
    Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper
We study a symmetric Gaussian wiretap channel with a helper, where a con...
          
            research
          
      
      ∙
      12/03/2018
    Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel
In many communication channels, secrecy constraints usually incur a pena...
          
            research
          
      
      ∙
      10/30/2018
    Secure Communication over Interference Channel: To Jam or Not to Jam?
We consider a secure communication over a two-user Gaussian interference...
          
            research
          
      
      ∙
      02/03/2018
    Wireless MapReduce Distributed Computing
Motivated by mobile edge computing and wireless data centers, we study a...
          
            research
          
      
      ∙
      02/01/2018
     
             
  
  
     
                             share
 share