Delay and capacity tradeoff analysis for motioncast X Wang, W Huang, S Wang, J Zhang, C Hu IEEE/ACM transactions on networking 19 (5), 1354-1367, 2011 | 216 | 2011 |
Capacity scaling of general cognitive networks W Huang, X Wang IEEE/ACM Transactions on Networking (TON) 20 (5), 1501-1513, 2012 | 103* | 2012 |
Communication efficient secret sharing W Huang, M Langberg, J Kliewer, J Bruck IEEE Transactions on Information Theory 62 (12), 7195-7206, 2016 | 83 | 2016 |
Capacity scaling in mobile wireless ad hoc network with infrastructure support W Huang, X Wang, Q Zhang 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 52 | 2010 |
Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding W Huang, T Ho, M Langberg, J Kliewer IEEE Transactions on Information Theory, 2018 | 28* | 2018 |
Capacity of Wireless Networks With Social Characteristics L Fu, W Huang, X Gan, F Yang, X Wang IEEE Transactions on Wireless Communications 15 (2), 1505-1516, 2016 | 28 | 2016 |
On rumour spreading with skepticism and denial W Huang Tech. Rep, 2011 | 25 | 2011 |
Secret sharing with optimal decoding and repair bandwidth W Huang, J Bruck 2017 IEEE International Symposium on Information Theory (ISIT), 1813-1817, 2017 | 19 | 2017 |
Rewriting flash memories by message passing EE Gad, W Huang, Y Li, J Bruck 2015 IEEE International Symposium on Information Theory (ISIT), 646-650, 2015 | 19* | 2015 |
Secure RAID schemes for distributed storage W Huang, J Bruck 2016 IEEE International Symposium on Information Theory (ISIT), 1401-1405, 2016 | 17 | 2016 |
Multicast capacity in mobile wireless ad hoc network with infrastructure support X Chen, W Huang, X Wang, X Lin 2012 Proceedings IEEE INFOCOM, 271-279, 2012 | 17 | 2012 |
Multicast capacity in MANET with infrastructure support Z Qian, X Tian, X Chen, W Huang, X Wang IEEE Transactions on Parallel and Distributed Systems 25 (7), 1808-1818, 2014 | 16 | 2014 |
How to best share a big secret R Shor, G Yadgar, W Huang, E Yaakobi, J Bruck Proceedings of the 11th ACM International Systems and Storage Conference, 76-88, 2018 | 12 | 2018 |
A low-overhead energy-efficient ARQ protocol for wireless sensor networks Y Wei, Y Mao, S Leng, W Huang China Communications 11 (10), 74-87, 2014 | 11 | 2014 |
Rateless and pollution-attack-resilient network coding W Huang, T Wang, X Hu, J Jang, T Salonidis 2015 IEEE International Symposium on Information Theory (ISIT), 2623-2627, 2015 | 10 | 2015 |
Secure RAID schemes from EVENODD and STAR codes W Huang, J Bruck IEEE International Symposium on Information Theory (ISIT), 2017 | 9 | 2017 |
Coding for Security and Reliability in Distributed Systems W Huang California Institute of Technology, 2017 | 8 | 2017 |
Rateless resilient network coding against byzantine adversaries W Huang, T Ho, H Yao, S Jaggi 2013 Proceedings IEEE INFOCOM, 265-269, 2013 | 8 | 2013 |
Generic Secure Repair for Distributed Storage W Huang, J Bruck arXiv preprint arXiv:1706.00500, 2017 | 6 | 2017 |
Connecting multiple-unicast and network error correction: Reduction and unachievability W Huang, M Langberg, J Kliewer 2015 IEEE International Symposium on Information Theory (ISIT), 361-365, 2015 | 6 | 2015 |