Shuangqing Wei

Orcid: 0000-0001-5913-1441

According to our database1, Shuangqing Wei authored at least 111 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Learning from Hierarchical Structure of Knowledge Graph for Recommendation.
ACM Trans. Inf. Syst., January, 2024

The Economics of Privacy and Utility: Investment Strategies.
IEEE Trans. Inf. Forensics Secur., 2024

Optimal Obfuscation to Protect Client Privacy in Federated Learning.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2023
Disentangling Geographical Effect for Point-of-Interest Recommendation.
IEEE Trans. Knowl. Data Eng., August, 2023

Hierarchical and Stable Multiagent Reinforcement Learning for Cooperative Navigation Control.
IEEE Trans. Neural Networks Learn. Syst., 2023

The First and Second Order Asymptotics of Covert Communication over AWGN Channels.
CoRR, 2023

Modeling Multi-Grained User Preference in Location Visitation.
Proceedings of the 31st ACM International Conference on Advances in Geographic Information Systems, 2023

2022
Learning to Advise and Learning from Advice in Cooperative Multi-Agent Reinforcement Learning.
CoRR, 2022

Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks.
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022

Learning to Advise and Learning from Advice in Cooperative Multiagent Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
A Semi-Centralized Dynamic Key Management Framework for In-Vehicle Networks.
IEEE Trans. Veh. Technol., 2021

Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint.
IEEE Trans. Inf. Forensics Secur., 2021

Information-Bottleneck-Based Behavior Representation Learning for Multi-agent Reinforcement learning.
CoRR, 2021

2020
Coupling the reduced-order model and the generative model for an importance sampling estimator.
J. Comput. Phys., 2020

VAE-KRnet and its applications to variational Bayes.
CoRR, 2020

Efficient, Effective and Well Justified Estimation of Active Nodes within a Cluster.
CoRR, 2020

A Semi-centralized Security Framework for In-Vehicle Networks.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Latent Factor Analysis of Gaussian Distributions under Graphical Constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Stabilizing Multi-Agent Deep Reinforcement Learning by Implicitly Estimating Other Agents' Behaviors.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Learning-based Adaptive Quantization for Communication-efficient Distributed Optimization with ADMM.
Proceedings of the 54th Asilomar Conference on Signals, Systems, and Computers, 2020

2019
On the Secret Key Capacity of Sibling Hidden Markov Models.
IEEE Trans. Inf. Forensics Secur., 2019

One-shot achievability and converse bounds of Gaussian random coding in AWGN channels under covert constraints.
CoRR, 2019

Algebraic Properties of Wyner Common Information Solution under Graphical Constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2019

One-shot achievability and converse bounds of Gaussian random coding in AWGN channels under covert constraint.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

Information Bottleneck Problem Revisited.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs Under Privacy Constraints.
IEEE Trans. Inf. Forensics Secur., 2018

Chernoff information between Gaussian trees.
Inf. Sci., 2018

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks.
Proceedings of the 25th International Conference on Telecommunications, 2018

Partition of Random Items: Tradeoff between Binning Utility and Meta Information Leakage.
Proceedings of the 25th International Conference on Telecommunications, 2018

Estimation of RFID Tag Population Size by Gaussian Estimator.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Topological and Algebraic Properties of Chernoff Information between Gaussian Graphs.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Traffic-Aware Joint Allocation of Uplink Control and Communication Channels in Multicast Systems.
IEEE Trans. Veh. Technol., 2017

Brief Announcement: Asynchronous, Distributed, Optical Mutual Exclusion.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

Successive synthesis of latent Gaussian trees.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Asymptotic converse bound for secret key capacity in hidden Markov model.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Algebraic properties of solutions to common information of Gaussian vectors under sparse graphical constraints.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Secret Common Randomness From Routing Metadata in Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.
IEEE Trans. Inf. Forensics Secur., 2016

A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage.
Inf. Sci., 2016

Layered Synthesis of Latent Gaussian Trees.
CoRR, 2016

Chernoff information of bottleneck Gaussian trees.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Sequential Detection of Disjoint Subgraphs over Boolean MAC Channels: A Probabilistic Approach.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Asymptotic Error Free Partitioning Over Noisy Boolean Multiaccess Channels.
IEEE Trans. Inf. Theory, 2015

Partition Information and its Transmission Over Boolean Multi-Access Channels.
IEEE Trans. Inf. Theory, 2015

Statistical Characterization of Decryption Errors in Block-Ciphered Systems.
IEEE Trans. Commun., 2015

Analysis of degrees of freedom under mixture Gaussian model in cognitive radio systems.
Phys. Commun., 2015

Optimal admission and preemption control in finite-source loss systems.
Oper. Res. Lett., 2015

KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs.
CoRR, 2015

Classifying Unrooted Gaussian Trees under Privacy Constraints.
CoRR, 2015

Evaluation of security robustness against information leakage in Gaussian polytree graphical models.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Modeling of coupled collision and congestion in finite source wireless access systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Detection of graph structures via communications over a multiaccess Boolean channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Efficient Link Cuts in Online Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Effects of downsampling on statistics of discrete-time semi-Markov processes.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

Optimal call admission and preemption control for public safety communications.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

2014
Achievable partition information rate over noisy multi-access Boolean channel.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Transmission of partitioning information over non-adaptive multi-access Boolean channel.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

2013
Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts.
IEEE Trans. Inf. Forensics Secur., 2013

ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels.
IEEE Trans. Inf. Forensics Secur., 2013

Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach.
J. Commun., 2013

Cross-layer detection of stealthy jammers in multihop cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Exponential secrecy against unbounded adversary using joint encryption and privacy amplification.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

An end-to-end exponentially secure secrecy scheme against an unbounded adversary.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

Degrees-of-freedom and interference tradeoff for a mix-Gaussian cognitive radio channel.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

2012
Feedback-Based Collaborative Secrecy Encoding Over Binary Symmetric Channels.
IEEE Trans. Inf. Theory, 2012

Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme.
IEEE Trans. Inf. Theory, 2012

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise.
IEEE Trans. Inf. Forensics Secur., 2012

CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study.
IEEE Trans. Commun., 2012

ARQ-based key scheduling algorithm over correlated erasure channels.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Linear cryptanalysis against block ciphered system under noisy ciphertexts.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Design and analysis of an ARQ based symmetric key generation algorithm.
Proceedings of the MILCOM 2011, 2011

Sensing and Transmission in Probabilistically Interference-Limited Cognitive Radio Systems.
Proceedings of the Global Communications Conference, 2011

Creation of degraded wiretap channel through deliberate noise in block ciphered systems.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Statistical analysis of error patterns in block ciphered crypto-system.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Approximation algorithms for minimum energy transmission scheduling in rate and duty-cycle constrained wireless networks.
IEEE/ACM Trans. Netw., 2010

Convergence of the complex envelope of bandlimited OFDM signals.
IEEE Trans. Inf. Theory, 2010

A Multi-Interference-Channel Matrix Pair Beamformer for CDMA Systems
CoRR, 2010

Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Online Algorithms for Maximizing Quality of Link Transmissions over a Jammed Wireless Channel.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Jamming games in fast-fading wireless channels.
Int. J. Auton. Adapt. Commun. Syst., 2008

Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
CoRR, 2008

Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II: Parallel Slow Fading Channels
CoRR, 2008

Energy Efficient Estimation of Gaussian Sources over Inhomogeneous Gaussian MAC Channels.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Secrecy rates of binary wiretapper channels using feedback schemes.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks.
IEEE Trans. Inf. Theory, 2007

Adaptive Signaling Based on Statistical Characterizations of Outdated Feedback in Wireless Communications.
Proc. IEEE, 2007

Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Spreading Sequence-Based Non-coherent Sensor Fusion and its Resulting Large Deviation Exponents.
Proceedings of the IEEE International Conference on Acoustics, 2007

Energy Efficient Relaying and Coalition-Forming in Relay Networks.
Proceedings of the IEEE International Conference on Acoustics, 2007

Sigma-Delta ADC Based Distributed Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Fully Polynomial Approximation Algorithm for Collaborative Relaying in Sensor Networks Under Finite Rate Constraints.
Proceedings of the Distributed Computing in Sensor Systems, 2007

Algorithms for Relaying via Channel Quantization in Finite Rate Feedback Limited Sensor Networks.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

Minimax and Maxmin Solutions to Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Rapid Hybrid Acquisition of Ultra-Wideband Signals.
J. VLSI Signal Process., 2006

Asynchronous cooperative diversity.
IEEE Trans. Wirel. Commun., 2006

Using Misbehavior to Analyze Strategic versus Aggregate Energy Minimization in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2006

Strategic Versus Collaborative Power Control in Relay Fading Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

PAPR Performance of IDFT-Based Uncoded OFDM Signals with Null Subcarriers and Transmit Filtering.
Proceedings of IEEE International Conference on Communications, 2006

Approximation Algorithms for Power-Aware Scheduling of Wireless Sensor Networks with Rate and Duty-Cycle Constraints.
Proceedings of the Distributed Computing in Sensor Systems, 2006

Scheduling with Rate and Duty-Cycle Constraints for Wireless Networks over an Interference Channel.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
On the asymptotic capacity of MIMO systems with antenna arrays of fixed length.
IEEE Trans. Wirel. Commun., 2005

Analysis of Relationship between Strategic and Aggregate Energy Minimization in Delay-Constrained Wireless Networks
CoRR, 2005

2003
On the minimax robustness of the uniform transmission power strategy in MIMO systems.
IEEE Commun. Lett., 2003

On the asymptotic capacity of MIMO systems with fixed length linear antenna arrays.
Proceedings of IEEE International Conference on Communications, 2003

2002
Error statistics for average power measurements in wireless communication systems.
IEEE Trans. Commun., 2002

A modern extreme value theory approach to calculating the distribution of the peak-to-average power ratio in OFDM systems.
Proceedings of the IEEE International Conference on Communications, 2002


  Loading...