Huihui Wu

Orcid: 0000-0002-1097-3792

According to our database1, Huihui Wu authored at least 57 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beamspace Waveform Design and Beam Selection for Lens Antenna Array-Assisted ISAC Systems.
IEEE Wirel. Commun. Lett., June, 2024

Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024

An Expectation-Maximization Relaxed Method for Privacy Funnel.
CoRR, 2024

A Double Maximization Approach for Optimizing the LM Rate of Mismatched Decoding.
CoRR, 2024

On Convergence of Discrete Schemes for Computing the Rate-Distortion Function of Continuous Source.
CoRR, 2024

Efficient and Provably Convergent Computation of Information Bottleneck: A Semi-Relaxed Approach.
CoRR, 2024

Achieving Covertness and Secrecy in Wireless Communications with Active Attackers.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Dynamic Target Sensing for ISAC Systems in Clutter Environment.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Moving Target Sensing for ISAC Systems in Clutter Environment.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

2023
Neural layered min-sum decoders for cyclic codes.
Phys. Commun., December, 2023

Lossy P-LDPC Codes for Compressing General Sources Using Neural Networks.
Entropy, February, 2023

Analysis and Optimization of a General Linking Matrix for JSCC Scheme Based on Double LDPC Codes.
Entropy, February, 2023

Variations on a Theme by Blahut and Arimoto.
CoRR, 2023

Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems.
Ad Hoc Networks, 2023

Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO Systems.
Proceedings of the International Conference on Networking and Network Applications, 2023

Covert Communication in the D2D-Enabled Cellular Network with Multiple Non-Colluding Wardens.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Communication Optimal Transport Approach to the Computation of Rate Distortion Functions.
Proceedings of the IEEE Information Theory Workshop, 2023

Lossy Compression via Sparse Regression Codes: An Approximate Message Passing Approach.
Proceedings of the IEEE Information Theory Workshop, 2023

Information Bottleneck Revisited: Posterior Probability Perspective with Optimal Transport.
Proceedings of the IEEE International Symposium on Information Theory, 2023

GAN-inspired Intelligent Jamming and Anti-jamming Strategy for Semantic Communication Systems.
Proceedings of the IEEE International Conference on Communications, 2023

2022
On the Design of Channel Coding Autoencoders With Arbitrary Rates for ISI Channels.
IEEE Wirel. Commun. Lett., 2022

An Adaptive Rate Allocation Scheme for Time-Varying Graph Signal Quantization.
IEEE Commun. Lett., 2022

Research on Data Fusion Algorithm Based on Deep Learning in Target Tracking.
CoRR, 2022

Semantic Compression with Side Information: A Rate-Distortion Perspective.
CoRR, 2022

Simplified Path Split Strategy for SCL Decoding Algorithm with Lower Latency.
Proceedings of the 2022 Wireless Telecommunications Symposium, 2022

Performance Analysis of an STBC-MIMO LoRa System over Nakagami and Ricean Fading Channels with Imperfect Channel State Information.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Multi-antenna covert communications in random wireless networks with full-duplex relay.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Protecting Semantic Information Using An Efficient Secret Key.
Proceedings of the IEEE International Symposium on Information Theory, 2022

An Optimal Transport Approach to the Computation of the LM Rate.
Proceedings of the IEEE Global Communications Conference, 2022

2021
SDLV: Verification of Steering Angle Safety for Self-Driving Cars.
Formal Aspects Comput., 2021

Covert MIMO Communication in Two-hop Relay Systems.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Exact Evaluation of Total Variation Distance in Covert Communications.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Construction of Quasi-Cyclic Low-Density Parity-Check Codes based on Quadratic Residue Codes.
Proceedings of the 15th International Symposium on Medical Information and Communication Technology, 2021

A Construction Method of Doped Low-Density Parity-Check Codes Based on Quadratic Residue Codes.
Proceedings of the 15th International Symposium on Medical Information and Communication Technology, 2021

Autoencoder-based MIMO Communications with Learnable ADCs.
Proceedings of the 21st International Conference on Communication Technology, 2021

2020
On covert throughput performance of two-way relay covert wireless communications.
Wirel. Networks, 2020

Analysis and Improvement of Error-Floor Performance for JSCC Scheme Based on Double Protograph LDPC Codes.
IEEE Trans. Veh. Technol., 2020

Design of General Entropy-Constrained Successively Refinable Unrestricted Polar Quantizer.
IEEE Trans. Commun., 2020

Distributed Error Correction Coding Scheme for Low Storage Blockchain Systems.
IEEE Internet Things J., 2020

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication.
CoRR, 2020

Performance of Lossy P-LDPC Codes over GF(2).
Proceedings of the 14th International Conference on Signal Processing and Communication Systems, 2020

End-to-end Physical Layer Communication using Bi-directional GRUs for ISI Channels.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Design of Successively Refinable Unrestricted Polar Quantizer.
IEEE Trans. Commun., 2019

Design of Optimal Scalar Quantizer for Sequential Coding of Correlated Sources.
IEEE Trans. Commun., 2019

2018
Design of Optimal Entropy-Constrained Unrestricted Polar Quantizer for Bivariate Circularly Symmetric Sources.
IEEE Trans. Commun., 2018

Design of Optimal Fixed-Rate Unrestricted Polar Quantizer for Bivariate Circularly Symmetric Sources.
IEEE Signal Process. Lett., 2018

2017
On the Design of Symmetric Entropy-Constrained Multiple Description Scalar Quantizer With Linear Joint Decoders.
IEEE Trans. Commun., 2017

Limits of Covert Communication on Two-Hop AWGN Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.
Proceedings of the International Conference on Networking and Network Applications, 2017

Design of optimal entropy-constrained scalar quantizer for sequential coding of correlated sources.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

2016
Novel UEP product code scheme with protograph-based linear permutation and iterative decoding for scalable image transmission.
Proceedings of the 18th IEEE International Workshop on Multimedia Signal Processing, 2016

2015
The sensitivity of joint source-channel coding based on double protograph LDPC codes to source statistics.
Proceedings of the 9th International Symposium on Medical Information and Communication Technology, 2015

2014
Performance of Joint Source-Channel Coding Based on Protograph LDPC Codes over Rayleigh Fading Channels.
IEEE Commun. Lett., 2014

New results on radiography image transmission with unequal error protection using protograph double LDPC codes.
Proceedings of the 8th International Symposium on Medical Information and Communication Technology, 2014

2013
Ultrasound Common Carotid Artery Segmentation Based on Active Shape Model.
Comput. Math. Methods Medicine, 2013

Unequal error protection for radiography image transmission using protograph double LDPC codes.
Proceedings of the 2013 Wireless Telecommunications Symposium, 2013

2012
Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images Transmission.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...