Wenwen Tu

According to our database1, Wenwen Tu authored at least 14 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
On Function Computation With Privacy and Secrecy Constraints.
IEEE Trans. Inf. Theory, 2019

Transfer Probability Prediction for Traffic Flow with Bike Sharing Data: A Deep Learning Approach.
Proceedings of the Advances in Computer Vision, 2019

Secret Key and Private Key Capacities Over an Unauthenticated Public Channel.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Keyless Authentication and Authenticated Capacity.
IEEE Trans. Inf. Theory, 2018

On Private Lossy Function Computation.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

2017
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model.
IEEE Trans. Inf. Forensics Secur., 2017

A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data.
CoRR, 2017

Function computation with privacy constraints.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Multiple key generation with restricted public discussion structure.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Keyless authentication over noisy channel.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
On the simulatability condition in key generation over a non-authenticated public channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Key generation with a Byzantine helper.
Proceedings of the IEEE International Conference on Communication, 2015

2014
On secret key generation from finite source observations.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014


  Loading...