Skip to main content

Showing 1–17 of 17 results for author: Kai, C

.
  1. arXiv:2401.04109  [pdf

    cs.HC

    Recent developments of selective laser processes for wearable devices

    Authors: Youngchan Kim, Eunseung Hwang, Chang Kai, Kaichen Xu, Heng Pan, Sukjoon Hong

    Abstract: Recently, the growing interest in wearable technology for personal healthcare and smart VR/AR applications newly imposed a need for development of facile fabrication method. Regarding the issue, laser has long been proposing original answers to such challenging technological demands with its remote, sterile, rapid, and site-selective processing characteristics for arbitrary materials. In this revi… ▽ More

    Submitted 28 November, 2023; originally announced January 2024.

  2. arXiv:2306.14270  [pdf

    cond-mat.supr-con cond-mat.str-el

    Fluctuation, insulation and superconductivity: the pressure-dependent phase-diagram of Rb$_2$Mo$_6$Se$_6$

    Authors: Yongsheng Zhao, Alexander P. Petrović, Patrick Gougeon, Philippe Gall, Chen Kai, Wenge Yang, Moritz Hoesch

    Abstract: The quasi-one-dimensional (q1D) material Rb$_2$Mo$_6$Se$_6$ has been proposed to display a nontrivial combination of low-dimensional fluctuations and a dynamical charge density wave (CDW) at ambient pressure. This may lead to a progressive metal to insulator cross over at low temperature. To explore the link between the crystal dimensionality and this insulating instability, we have performed hydr… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: 20 pages, 11 figures, including an appendix of 6 pages with 6 figures

  3. arXiv:2305.13584  [pdf, other

    cs.CR cs.AI

    Model Stealing Attack against Multi-Exit Networks

    Authors: Li Pan, Lv Peizhuo, Chen Kai, Cai Yuling, Xiang Fan, Zhang Shengzhi

    Abstract: Compared to traditional neural networks with a single exit, a multi-exit network has multiple exits that allow for early output from intermediate layers of the model, thus bringing significant improvement in computational efficiency while maintaining similar recognition accuracy. When attempting to steal such valuable models using traditional model stealing attacks, we found that conventional meth… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  4. arXiv:2210.13010  [pdf, other

    cs.IT

    Active Reconfigurable Intelligent Surface Aided Surveillance Scheme

    Authors: Xinyue Hu, Yibo Yi, Kun Li, Hongwei Zhang, Caihong Kai

    Abstract: This letter attempts to design a surveillance scheme by adopting an active reconfigurable intelligent surface (RIS). Different from the conventional passive RIS, the active RIS could not only adjust the phase shift but also amplify the amplitude of the reflected signal. With such reflecting, the reflected signal of active RIS could jointly adjust the signal to interference plus noise ratio (SINR)… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  5. arXiv:2208.06977  [pdf, other

    cs.IT

    Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications

    Authors: Xinyue Hu, Yibo Yi, Kun Li, Hongwei Zhang, Caihong Kai

    Abstract: This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device- to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple ea… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  6. arXiv:2110.15157  [pdf, other

    cs.NI

    Optimizing Tail Latency in Commodity Datacenters using Forward Error Correction

    Authors: Zeng Gaoxiong, Chen Li, Yi Bairen, Chen Kai

    Abstract: Long tail latency of short flows (or messages) greatly affects user-facing applications in datacenters. Prior solutions to the problem introduce significant implementation complexities, such as global state monitoring, complex network control, or non-trivial switch modifications. While promising superior performance, they are hard to implement in practice. This paper presents CloudBurst, a simple,… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

    Comments: 13 pages

  7. arXiv:2007.00908  [pdf

    eess.AS cs.SD

    Semi-Supervised NMF-CNN For Sound Event Detection

    Authors: Chan Teck Kai, Chin Cheng Siong, Li Ye

    Abstract: In this paper, a combinative approach using Nonnegative Matrix Factorization (NMF) and Convolutional Neural Network (CNN) is proposed for audio clip Sound Event Detection (SED). The main idea begins with the use of NMF to approximate strong labels for the weakly labeled data. Subsequently, using the approximated strongly labeled data, two different CNNs are trained in a semi-supervised framework w… ▽ More

    Submitted 21 September, 2020; v1 submitted 2 July, 2020; originally announced July 2020.

    Comments: 5 pages, 2 tables

  8. arXiv:1912.01135  [pdf

    physics.med-ph eess.IV

    Multi-energy CT reconstruction using nonlocal total nuclear generalized variation

    Authors: Cheng Kai, Jiang Min, Jianqiao Yu, Sun Yi

    Abstract: Multi-energy CT based on compression sensing theory with sparse-view sampling can effectively reduce radiation dose and maintain the quality of the reconstructed image. However,when the projection data are noisy, the reconstructed image can be still seriously degraded. In order to address this problem, we extend the total nuclear variation (TNV) regularization and propose the nonlocal total nuclea… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

  9. arXiv:1710.06985  [pdf, other

    cs.NI cs.IT

    Artificial-Noise-Aided Secure Channel with a Full-duplex Source

    Authors: Xinyue Hu, Caihong Kai, Shengli Zhang, Zhongyi Guo, Jun Gao

    Abstract: This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidential information. For realizing secure communication between Alan and Bob, a novel two phases communication scheme is proposed: in Phase 1, Alan and Bob send artifi… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

  10. arXiv:1703.03909  [pdf, other

    cs.NI

    To Bond or not to Bond: An Optimal Channel Allocation Algorithm For Flexible Dynamic Channel Bonding in WLANs

    Authors: Caihong Kai, Yuting Liang, Tianyu Huang, Xu Chen

    Abstract: IEEE 802.11 has evolved from 802.11a/b/g/n to 802.11ac to meet rapidly increasing data rate requirements in WLANs. One important technique adopted in 802.11ac is the channel bonding (CB) scheme that combines multiple 20MHz channels for a single transmission in 5GHz band. In order to effectively access channel after a series of contention operations, 802.11ac specifies two different CB operations:… ▽ More

    Submitted 29 March, 2017; v1 submitted 10 March, 2017; originally announced March 2017.

    Comments: 14 pages, 10 figures,added references,corrected typos

  11. arXiv:1404.6931  [pdf

    cs.NI

    To Achieve Maximal Throughputs in CSMA Wireless Networks Through Offered_load Control

    Authors: Caihong Kai, Qi Zhang, Lusheng Wang

    Abstract: This paper studies how to achieve the maximal link throughputs in a CSMA wireless network through offered-load control. First, we propose an analytical model, contention-graph-combination (CGC), to describe the relationship between the offered-load and the output link throughputs of an unsaturated CSMA network. Based on CGC, we then formulate a linear optimization model to improve the aggregate li… ▽ More

    Submitted 28 April, 2014; originally announced April 2014.

  12. arXiv:1302.4656  [pdf, ps

    cs.NI

    Throughput Analysis of CSMA Wireless Networks with Finite Offered-load

    Authors: Caihong Kai, Shengli Zhang

    Abstract: This paper proposes an approximate method, equivalent access intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, we take into account in our analysis the impacts of empty transmit buffers on the inte… ▽ More

    Submitted 19 February, 2013; originally announced February 2013.

    Comments: 6 pages. arXiv admin note: text overlap with arXiv:1007.5255 by other authors

  13. arXiv:1107.1633  [pdf

    cs.NI

    Throughput Computation in CSMA Wireless Networks with Collision Effects

    Authors: Cai Hong Kai, Soung Chang Liew

    Abstract: It is known that link throughputs of CSMA wireless networks can be computed from a time-reversible Markov chain arising from an ideal CSMA network model (ICN). In particular, this model yields general closed-form equations of link throughputs. However, an idealized and important assumption made in ICN is that the backoff countdown process is in "contiuous-time" and carrier sensing is instantaneous… ▽ More

    Submitted 8 July, 2011; originally announced July 2011.

    Comments: 12 single-column pages

  14. arXiv:1009.3415  [pdf

    cs.NI

    Temporal Starvation in CSMA Wireless Networks

    Authors: Cai Hong Kai, Soung Chang Liew

    Abstract: It is well known that links in CSMA wireless networks are prone to starvation. Prior works focused almost exclusively on equilibrium starvation. In this paper, we show that links in CSMA wireless networks are also susceptible to temporal starvation. Specifically, although some links have good equilibrium throughputs and do not suffer from equilibrium starvation, they can still have no throughput f… ▽ More

    Submitted 17 September, 2010; originally announced September 2010.

    Comments: 27 pages

  15. arXiv:1007.5218  [pdf

    cs.NI

    Applications of Belief Propagation in CSMA Wireless Networks

    Authors: Cai Hong Kai, Soung Chang Liew

    Abstract: The belief propagation (BP) algorithm is an efficient way to solve "inference" problems in graphical models, such as Bayesian networks and Markov random fields. The system-state probability distribution of CSMA wireless networks is a Markov random field. An interesting question is how BP can help the analysis and design of CSMA wireless networks. This paper explores three such applications. First,… ▽ More

    Submitted 14 July, 2011; v1 submitted 29 July, 2010; originally announced July 2010.

    Comments: A technical report of The Chinese University of Hong Kong

  16. arXiv:0809.4342  [pdf

    cs.NI

    Towards a More Accurate Carrier Sensing Model for CSMA Wireless Networks

    Authors: Caihong Kai, Soung Chang Liew

    Abstract: This work calls into question a substantial body of past work on CSMA wireless networks. In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships (CS) among links. This is a 0-1 model in which two links can either sense each other completely or not. In real experiments, we observed that this is generally not the case: the CS rela… ▽ More

    Submitted 25 September, 2008; originally announced September 2008.

  17. arXiv:0712.1854  [pdf

    cs.NI cs.PF

    Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks

    Authors: S. C. Liew, C. Kai, J. Leung, B. Wong

    Abstract: This work started out with our accidental discovery of a pattern of throughput distributions among links in IEEE 802.11 networks from experimental results. This pattern gives rise to an easy computation method, which we term back-of-the-envelop (BoE) computation, because for many network configurations, very accurate results can be obtained within minutes, if not seconds, by simple hand computat… ▽ More

    Submitted 11 December, 2007; originally announced December 2007.