default search action
Xiang He 0001
Person information
- affiliation: Pennsylvania State University, University Park, PA, USA
Other persons with the same name
- Xiang He — disambiguation page
- Xiang He 0002 — Harbin Institute of Technology, Harbin, Heilongjiang, China
- Xiang He 0003 — Beihang University, China (and 1 more)
- Xiang He 0004 — Chinese Academy of Sciences (CAS), Institute of Automation, Brain-inspired Cognitive Intelligence Lab, Beijing, China (and 1 more)
- Xiang He 0005 — Institute of Software, Chinese Academy of Sciences (CAS), Beijing, China
- Xiang He 0006 — Oakland University, Rochester, MI, USA
- Xiang He 0007 — Amazon.com, Seattle, WA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j12]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom. IEEE Trans. Commun. 62(1): 246-255 (2014) - [j11]Xiang He, Aylin Yener:
Providing Secrecy With Structured Codes: Two-User Gaussian Channels. IEEE Trans. Inf. Theory 60(4): 2121-2138 (2014) - [j10]Xiang He, Aylin Yener:
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States. IEEE Trans. Inf. Theory 60(11): 6844-6869 (2014) - 2013
- [j9]Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, Aylin Yener:
Cooperative Security at the Physical Layer: A Summary of Recent Advances. IEEE Signal Process. Mag. 30(5): 16-28 (2013) - [j8]Xiang He, Aylin Yener:
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay. IEEE Trans. Inf. Theory 59(1): 177-192 (2013) - [j7]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom. IEEE Trans. Inf. Theory 59(8): 4733-4745 (2013) - [j6]Xiang He, Aylin Yener:
The Role of Feedback in Two-Way Secure Communications. IEEE Trans. Inf. Theory 59(12): 8115-8130 (2013) - [j5]Xiang He, Aylin Yener:
End-to-End Secure Multi-Hop Communication with Untrusted Relays. IEEE Trans. Wirel. Commun. 12(1): 1-11 (2013) - [i14]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom. CoRR abs/1311.2651 (2013) - 2012
- [c23]Xiang He, Aylin Yener:
The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise. Allerton Conference 2012: 204-211 - [c22]Xiang He, Aylin Yener:
The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying. ISIT 2012: 2316-2320 - [i13]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper. CoRR abs/1203.1376 (2012) - 2011
- [j4]Xiang He, Aylin Yener:
The Gaussian Many-to-One Interference Channel With Confidential Messages. IEEE Trans. Inf. Theory 57(5): 2730-2745 (2011) - [c21]Xiang He, Ashish Khisti, Aylin Yener:
MIMO multiple access channel with an arbitrarily varying eavesdropper. Allerton 2011: 1182-1189 - [c20]Xiang He, Ashish Khisti, Aylin Yener:
MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom. GLOBECOM 2011: 1-5 - [c19]Xiang He, Aylin Yener:
Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper. GLOBECOM Workshops 2011: 854-858 - [c18]Xiang He, Aylin Yener:
Secrecy when the eavesdropper controls its channel states. ISIT 2011: 618-622 - 2010
- [j3]Kyounghwan Lee, Aylin Yener, Xiang He:
Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j2]Xiang He, Aylin Yener:
Cooperation with an untrusted relay: a secrecy perspective. IEEE Trans. Inf. Theory 56(8): 3807-3827 (2010) - [c17]Xiang He, Aylin Yener:
Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas. Allerton 2010: 1228-1235 - [c16]Xiang He, Aylin Yener:
Providing Secrecy Irrespective of Eavesdropper's Channel State. GLOBECOM 2010: 1-5 - [c15]Xiang He, Aylin Yener:
A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel. ICC 2010: 1-5 - [c14]Xiang He, Aylin Yener:
The role of channel states in secret key generation. PIMRC 2010: 2681-2686 - [i12]Xiang He, Aylin Yener:
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay. CoRR abs/1004.1423 (2010) - [i11]Xiang He, Aylin Yener:
The Gaussian Many-to-1 Interference Channel with Confidential Messages. CoRR abs/1005.0624 (2010) - [i10]Xiang He, Aylin Yener:
MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States. CoRR abs/1007.4801 (2010)
2000 – 2009
- 2009
- [j1]Xiang He, Aylin Yener:
Two-Hop Secure Communication Using an Untrusted Relay. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [c13]Xiang He, Aylin Yener:
Interference channels with strong secrecy. Allerton 2009: 811-818 - [c12]Xiang He, Aylin Yener:
A new outer bound for the gaussian interference channel with confidential messages. CISS 2009: 318-323 - [c11]Xiang He, Aylin Yener:
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling. GLOBECOM 2009: 1-6 - [c10]Xiang He, Aylin Yener:
The Gaussian many-to-one interference channel with confidential messages. ISIT 2009: 2086-2090 - [c9]Xiang He, Aylin Yener:
Secure communication with a Byzantine relay. ISIT 2009: 2096-2100 - [c8]Xiang He, Aylin Yener:
K-user interference channels: Achievable secrecy rate and degrees of freedom. ITW 2009: 336-340 - [i9]Xiang He, Aylin Yener:
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling. CoRR abs/0905.2638 (2009) - [i8]Xiang He, Aylin Yener:
The Gaussian Many-to-One Interference Channel with Confidential Messages. CoRR abs/0905.2640 (2009) - [i7]Xiang He, Aylin Yener:
K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom. CoRR abs/0905.2643 (2009) - [i6]Xiang He, Aylin Yener:
Providing Secrecy with Lattice Codes. CoRR abs/0905.2645 (2009) - [i5]Xiang He, Aylin Yener:
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels. CoRR abs/0907.5388 (2009) - [i4]Xiang He, Aylin Yener:
Cooperation with an Untrusted Relay: A Secrecy Perspective. CoRR abs/0910.1511 (2009) - [i3]Xiang He, Aylin Yener:
Interference Channels with Strong Secrecy. CoRR abs/0910.2502 (2009) - [i2]Xiang He, Aylin Yener:
Two-hop Secure Communication Using an Untrusted Relay. CoRR abs/0910.2718 (2009) - [i1]Xiang He, Aylin Yener:
The Role of Feedback in Two-way Secure Communications. CoRR abs/0911.4432 (2009) - 2008
- [c7]Xiang He, Aylin Yener:
End-to-end secure multi-hop communication with untrusted relays is possible. ACSCC 2008: 681-685 - [c6]Xiang He, Aylin Yener:
On the role of feedback in two-way secure communication. ACSCC 2008: 1093-1097 - [c5]Xiang He, Aylin Yener:
Providing secrecy with lattice codes. Allerton 2008: 1199-1206 - [c4]Xiang He, Aylin Yener:
On the energy-delay trade-off of a two-way relay network. CISS 2008: 865-870 - [c3]Xiang He, Aylin Yener:
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming. GLOBECOM 2008: 936-940 - [c2]Lauren M. Huie, Xiang He, Aylin Yener:
Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels. ICC 2008: 4381-4385 - [c1]Xiang He, Aylin Yener:
The role of an untrusted relay in secret communication. ISIT 2008: 2212-2216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 22:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint