Zhuojun Zhuang

Orcid: 0000-0001-5632-2787

According to our database1, Zhuojun Zhuang authored at least 16 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit.
IEEE Trans. Inf. Forensics Secur., 2024

2020
Enhancing Physical Layer Security in Internet of Things via Feedback: A General Framework.
IEEE Internet Things J., 2020

Bounds on relative generalised Hamming weight.
IET Commun., 2020

2019
On Asymptotic Analysis of Relative Generalized Hamming Weight.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

Two Lower Bounds on the Secrecy Capacity of the Action-dependent Dirty Paper Wiretap Channel.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

2015
Secure error-correcting network codes with side information leakage.
IET Commun., 2015

2014
Multiple-access wiretap channel with common channel state information at the encoders.
IET Commun., 2014

On the relative profiles of a linear code and a subcode.
Des. Codes Cryptogr., 2014

2013
Capacity Region of a New Bus Communication Model.
Entropy, 2013

Code constructions and existence bounds for relative generalized Hamming weight.
Des. Codes Cryptogr., 2013

2012
Information-Theoretical Security for Several Models of Multiple-Access Channel
CoRR, 2012

Capacity region of non-degraded wiretap channel with noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2008
A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Reasonable Approach for Defining Load Index in Parallel Computing.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Abstract Model for Intrusion Detection on Multi-Core Platform.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008


  Loading...