David Xiao
According to our database1,
David Xiao
authored at least 30 papers
between 2003 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Optimization of Regenerator Placement in Optical Networks Using Deep Tensor Neural Network.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
2019
Machine Learning for Regenerator Placement Based on the Features of the Optical Network.
Proceedings of the 21st International Conference on Transparent Optical Networks, 2019
2016
Random Struct. Algorithms, 2016
2015
IEEE/ACM Trans. Netw., 2015
2014
Proceedings of the First (2014) ACM Conference on Learning @ Scale, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
Sample Complexity Bounds on Differentially Private Learning via Communication Complexity.
Proceedings of The 27th Conference on Learning Theory, 2014
2013
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks.
IACR Cryptol. ePrint Arch., 2013
Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the Information Theoretic Security - 7th International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Lower Bounds on Information Complexity via Zero-Communication Protocols and Applications.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
(Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011
2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the COLT 2010, 2010
Proceedings of the 25th Annual IEEE Conference on Computational Complexity, 2010
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP.
Proceedings of the 25th Annual IEEE Conference on Computational Complexity, 2010
2009
Proceedings of the 24th Annual IEEE Conference on Computational Complexity, 2009
2008
Derandomizing the Ahlswede-Winter matrix-valued Chernoff bound using pessimistic estimators, and applications.
Theory Comput., 2008
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
Proceedings of the Advances in Cryptology, 2008
2006
Derandomizing the AW matrix-valued Chernoff bound using pessimistic estimators and applications.
Electron. Colloquium Comput. Complex., 2006
2005
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, 2005
2003
Estimating and Comparing Entropies Across Written Natural Languages Using PPM Compression.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003