Skip to main content

Showing 1–23 of 23 results for author: Guang, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.06619  [pdf, ps, other

    cs.IT

    Zero-Error Distributed Function Compression for Binary Arithmetic Sum

    Authors: Xuan Guang, Ruze Zhang

    Abstract: In this paper, we put forward the model of zero-error distributed function compression system of two binary memoryless sources X and Y, where there are two encoders En1 and En2 and one decoder De, connected by two channels (En1, De) and (En2, De) with the capacity constraints C1 and C2, respectively. The encoder En1 can observe X or (X,Y) and the encoder En2 can observe Y or (X,Y) according to the… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: 39 pages

  2. arXiv:2207.06757  [pdf, ps, other

    cs.IT

    Secure Network Function Computation for Linear Functions -- Part I: Source Security

    Authors: Xuan Guang, Yang Bai, Raymond W. Yeung

    Abstract: In this paper, we put forward secure network function computation over a directed acyclic network. In such a network, a sink node is required to compute with zero error a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, is not allowed to… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  3. arXiv:2103.08081  [pdf, ps, other

    cs.IT

    Linear Network Error Correction Coding: A Revisit

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider linear network error correction (LNEC) coding when errors may occur on edges of a communication network of which the topology is known. In this paper, we first revisit and explore the framework of LNEC coding, and then unify two well-known LNEC coding approaches. Furthermore, by develo** a graph-theoretic approach to the framework of LNEC coding, we obtain a significantly enhanced ch… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

    Comments: 41 pages

  4. arXiv:2002.07324  [pdf, other

    cs.IT

    Vector Gaussian Successive Refinement With Degraded Side Information

    Authors: Yinfei Xu, Xuan Guang, Jian Lu, Jun Chen

    Abstract: We investigate the problem of the successive refinement for Wyner-Ziv coding with degraded side information and obtain a complete characterization of the rate region for the quadratic vector Gaussian case. The achievability part is based on the evaluation of the Tian-Diggavi inner bound that involves Gaussian auxiliary random vectors. For the converse part, a matching outer bound is obtained with… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 19 pages, 1 figure

  5. arXiv:1811.02390  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part II: Flexible Rate and Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: In the two-part paper, we consider the problem of secure network coding when the information rate and the security level can change over time. To efficiently solve this problem, we put forward local-encoding-preserving secure network coding, where a family of secure linear network codes (SLNCs) is called local-encoding-preserving (LEP) if all the SLNCs in this family share a common local encoding… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 38 pages

  6. arXiv:1811.02388  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part I: Fixed Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: Information-theoretic security is considered in the paradigm of network coding in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, also referred to as the security level. Secure network coding is applied to prevent the leakage of the source information to the wiretappers. In this two-part paper, we consider the problem of secure network coding when the in… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 32 pages

  7. arXiv:1710.02252  [pdf, ps, other

    cs.IT

    Improved Upper Bound on the Network Function Computing Capacity

    Authors: Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li

    Abstract: The problem of network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a {\em target function}, of which the inputs are generated at multiple source nodes. The edges in the network are assumed to be error-free and have limited capacity. The nodes in the network are assumed to have unbounded comput… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

    Comments: 43 pages

  8. arXiv:1709.00588  [pdf, other

    cs.IT

    Practical Inner Codes for Batched Sparse Codes in Wireless Multihop Networks

    Authors: Zhiheng Zhou, Congduan Li, Shenghao Yang, Xuan Guang

    Abstract: Batched sparse (BATS) code is a promising technology for reliable data transmission in multi-hop wireless networks. As a BATS code consists of an outer code and an inner code that typically is a random linear network code, one main research topic for BATS codes is to design an inner code with good performance in transmission efficiency and complexity. In this paper, this issue is addressed with a… ▽ More

    Submitted 2 September, 2017; originally announced September 2017.

    Comments: 35 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technology

  9. arXiv:1611.09104  [pdf, ps, other

    cs.IT cs.DM math.CO

    Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider a communication network where there exist wiretappers who can access a subset of channels, called a wiretap set, which is chosen from a given collection of wiretap sets. The collection of wiretap sets can be arbitrary. Secure network coding is applied to prevent the source information from being leaked to the wiretappers. In secure network coding, the required alphabet size is an open… ▽ More

    Submitted 28 November, 2016; originally announced November 2016.

    Comments: 35 pages

  10. arXiv:1601.04503   

    cs.IT

    Secure Network Coding over Small Fields

    Authors: Xuan Guang

    Abstract: In the paradigm of network coding, the information-theoretic security problem is encountered in the presence of a wiretapper, who has capability of accessing an unknown channel-subset in communication networks. In order to combat this eavesdrop** attack, secure network coding is introduced to prevent information from being leaked to adversaries. For any construction of secure linear network code… ▽ More

    Submitted 24 November, 2016; v1 submitted 18 January, 2016; originally announced January 2016.

    Comments: The paper is replaced and a coauthor is added

  11. On the Optimality of Secure Network Coding

    Authors: Xuan Guang, Jiyong Lu, Fang-Wei Fu

    Abstract: In network communications, information transmission often encounters wiretap** attacks. Secure network coding is introduced to prevent information from being leaked to adversaries. The investigation of performance bounds on the numbers of source symbols and random symbols are two fundamental research problems. For an important case that each wiretap-set with cardinality not larger than $r$, Cai… ▽ More

    Submitted 6 May, 2015; originally announced May 2015.

    Comments: Accepted for publication in the IEEE Communications Letters. One column,10 pages

  12. arXiv:1501.01084  [pdf, ps, other

    cs.IT

    Comments on Cut-Set Bounds on Network Function Computation

    Authors: Cup** Huang, Zihan Tan, Shenghao Yang, Xuan Guang

    Abstract: A function computation problem in directed acyclic networks has been considered in the literature, where a sink node wants to compute a target function with the inputs generated at multiple source nodes. The network links are error-free but capacity-limited, and the intermediate network nodes perform network coding. The target function is required to be computed with zero error. The computing rate… ▽ More

    Submitted 27 March, 2017; v1 submitted 6 January, 2015; originally announced January 2015.

    Comments: 16 pages

  13. Small Field Size for Secure Network Coding

    Authors: Xuan Guang, Jiyong Lu, Fang-Wei Fu

    Abstract: In network coding, information transmission often encounters wiretap** attacks. Secure network coding is introduced to prevent information from being leaked to adversaries. For secure linear network codes (SLNCs), the required field size is a very important index, because it largely determines the computational and space complexities of a SLNC, and it is also very important for the process of se… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

    Comments: Accepted for publication in the IEEE Communications Letters. One column,10 pages

  14. arXiv:1410.7190  [pdf, ps, other

    cs.CR cs.IT

    Repairable Threshold Secret Sharing Schemes

    Authors: Xuan Guang, Jiyong Lu, Fang-Wei Fu

    Abstract: In this paper, we propose a class of threshold secret sharing schemes with repairing function between shares without the help of the dealer, that we called repairable threshold secret sharing schemes. Specifically, if a share fails, such as broken or lost, it will be repaired just by some other shares. A construction of such repairable threshold secret sharing schemes is designed by applying linea… ▽ More

    Submitted 4 February, 2015; v1 submitted 27 October, 2014; originally announced October 2014.

    Comments: One column and 17 pages, submitted for publication

  15. arXiv:1403.0214  [pdf, ps, other

    cs.IT

    Variable-Rate Linear Network Error Correction MDS Codes

    Authors: Xuan Guang, Fang-Wei Fu, Zhen Zhang

    Abstract: In network communication, the source often transmits messages at several different information rates within a session. How to deal with information transmission and network error correction simultaneously under different rates is introduced in this paper as a variable-rate network error correction problem. Apparently, linear network error correction MDS codes are expected to be used for these diff… ▽ More

    Submitted 2 March, 2014; originally announced March 2014.

    Comments: Single column, 34 pages, submitted for publication. arXiv admin note: text overlap with arXiv:1311.7466, arXiv:1011.1377

  16. arXiv:1402.4310  [pdf, other

    cs.IT

    Distributed Storage over Unidirectional Ring Networks

    Authors: Jiyong Lu, Xuan Guang, Fang-Wei Fu

    Abstract: In this paper, we study distributed storage problems over unidirectional ring networks, whose storage nodes form a directed ring and data is transmitted along the same direction. The original data is distributed to store on these nodes. Each user can connect one and only one storage node to download the total data. A lower bound on the reconstructing bandwidth to recover the original data for each… ▽ More

    Submitted 14 April, 2014; v1 submitted 18 February, 2014; originally announced February 2014.

    Comments: 28 pages, one column, 12 figures, submitted for possible publication. arXiv admin note: substantial text overlap with arXiv:1401.5168

  17. arXiv:1401.5168  [pdf, other

    cs.IT

    Distributed Storage Schemes over Unidirectional Ring Networks

    Authors: Jiyong Lu, Xuan Guang, Fang-Wei Fu

    Abstract: In this paper, we study distributed storage problems over unidirectional ring networks. A lower bound on the reconstructing bandwidth to recover total original data for each user is proposed, and it is achievable for arbitrary parameters. If a distributed storage scheme can achieve this lower bound with equality for each user, we say it an optimal reconstructing distributed storage scheme (ORDSS).… ▽ More

    Submitted 20 January, 2014; originally announced January 2014.

    Comments: two columns, 5 pages, 8 figures, and submitted to the ISIT 2014

  18. arXiv:1311.7466  [pdf, ps, other

    cs.IT

    Linear Network Error Correction Multicast/Broadcast/Dispersion/Generic Codes

    Authors: Xuan Guang, Fang-Wei Fu

    Abstract: In the practical network communications, many internal nodes in the network are required to not only transmit messages but decode source messages. For different applications, four important classes of linear network codes in network coding theory, i.e., linear multicast, linear broadcast, linear dispersion, and generic network codes, have been studied extensively. More generally, when channels of… ▽ More

    Submitted 28 November, 2013; originally announced November 2013.

    Comments: Single column, 38 pages. Submitted for possible publication

  19. arXiv:1302.4147  [pdf, ps, other

    cs.IT

    The Failure Probability of Random Linear Network Coding for Networks

    Authors: Xuan Guang, Fang-Wei Fu

    Abstract: In practice, since many communication networks are huge in scale, or complicated in structure, or even dynamic, the predesigned linear network codes based on the network topology is impossible even if the topological structure is known. Therefore, random linear network coding has been proposed as an acceptable coding technique for the case that the network topology cannot be utilized completely. M… ▽ More

    Submitted 23 February, 2013; v1 submitted 17 February, 2013; originally announced February 2013.

    Comments: 5 pages, submitted to ISIT 2013. And add the interpretation of the notation $CUT_{t,k}^{out}$ to original manuscript (in column 2, page 2) submitted

  20. arXiv:1302.4146  [pdf, ps, other

    cs.IT

    Linear Network Error Correction Multicast/Broadcast/Dispersion Codes

    Authors: Xuan Guang, Fang-Wei Fu

    Abstract: In this paper, for the purposes of information transmission and network error correction simultaneously, three classes of important linear network codes in network coding, linear multicast/broadcast/dispersion codes are generalized to linear network error correction coding, i.e., linear network error correction multicast/broadcast/dispersion codes. We further propose the (weakly, strongly) extende… ▽ More

    Submitted 17 February, 2013; originally announced February 2013.

    Comments: 5 pages, submitted to ISIT 2013

  21. arXiv:1011.1377  [pdf, ps, other

    cs.IT

    Construction of Network Error Correction Codes in Packet Networks

    Authors: Xuan Guang, Fang-Wei Fu, Zhen Zhang

    Abstract: Recently, network error correction coding (NEC) has been studied extensively. Several bounds in classical coding theory have been extended to network error correction coding, especially the Singleton bound. In this paper, following the research line using the extended global encoding kernels proposed in \cite{zhang-correction}, the refined Singleton bound of NEC can be proved more explicitly. More… ▽ More

    Submitted 5 November, 2010; originally announced November 2010.

    Comments: 14 pages, submitted in 4 Nov. 2010

  22. arXiv:1010.1899  [pdf, ps, other

    cs.IT

    The Failure Probability at Sink Node of Random Linear Network Coding

    Authors: Xuan Guang, Fang-Wei Fu

    Abstract: In practice, since many communication networks are huge in scale or complicated in structure even dynamic, the predesigned network codes based on the network topology is impossible even if the topological structure is known. Therefore, random linear network coding was proposed as an acceptable coding technique. In this paper, we further study the performance of random linear network coding by anal… ▽ More

    Submitted 10 October, 2010; originally announced October 2010.

    Comments: 4 pages, 1 figure, to appear in Proceedings of ICITIS 2010

  23. arXiv:1001.2077  [pdf, ps, other

    cs.IT

    On Random Linear Network Coding for Butterfly Network

    Authors: Xuan Guang, Fang-Wei Fu

    Abstract: Random linear network coding is a feasible encoding tool for network coding, specially for the non-coherent network, and its performance is important in theory and application. In this letter, we study the performance of random linear network coding for the well-known butterfly network by analyzing the failure probabilities. We determine the failure probabilities of random linear network coding… ▽ More

    Submitted 18 January, 2010; v1 submitted 13 January, 2010; originally announced January 2010.

    Comments: This paper was submitted to IEEE Communications Letters