Skip to main content

Showing 1–23 of 23 results for author: Yeung, R W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18017  [pdf, other

    cs.IT cs.ET

    Dependence Analysis and Structured Construction for Batched Sparse Code

    Authors: Jiaxin Qing, Xiaohong Cai, Yijun Fan, Mingyang Zhu, Raymond W. Yeung

    Abstract: In coding theory, codes are usually designed with a certain level of randomness to facilitate analysis and accommodate different channel conditions. However, the resulting random code constructed can be suboptimal in practical implementations. Represented by a bipartite graph, the Batched Sparse Code (BATS Code) is a randomly constructed erasure code that utilizes network coding to achieve near-op… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2401.14916  [pdf, ps, other

    cs.IT

    Proving Information Inequalities by Gaussian Elimination

    Authors: Laigang Guo, Raymond W. Yeung, Xiao-Shan Gao

    Abstract: The proof of information inequalities and identities under linear constraints on the information measures is an important problem in information theory. For this purpose, ITIP and other variant algorithms have been developed and implemented, which are all based on solving a linear program (LP). In this paper, we develop a method with symbolic computation. Compared with the known methods, our appro… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02786

  3. arXiv:2305.06533  [pdf, other

    cs.IT

    Reliable Throughput of Generalized Collision Channel without Synchronization

    Authors: Yijun Fan, Yanxiao Liu, Yi Chen, Shenghao Yang, Raymond W. Yeung

    Abstract: We consider a generalized collision channel model for general multi-user communication systems, an extension of Massey and Mathys' collision channel without feedback for multiple access communications. In our model, there are multiple transmitters and receivers sharing the same communication channel. The transmitters are not synchronized and arbitrary time offsets between transmitters and receiver… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  4. arXiv:2207.06757  [pdf, ps, other

    cs.IT

    Secure Network Function Computation for Linear Functions -- Part I: Source Security

    Authors: Xuan Guang, Yang Bai, Raymond W. Yeung

    Abstract: In this paper, we put forward secure network function computation over a directed acyclic network. In such a network, a sink node is required to compute with zero error a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, is not allowed to… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  5. arXiv:2202.02786  [pdf, ps, other

    cs.IT

    Proving Information Inequalities and Identities with Symbolic Computation

    Authors: Laigang Guo, Raymond W. Yeung, Xiao-Shan Gao

    Abstract: Proving linear inequalities and identities of Shannon's information measures, possibly with linear constraints on the information measures, is an important problem in information theory. For this purpose, ITIP and other variant algorithms have been developed and implemented, which are all based on solving a linear program (LP). In particular, an identity $f = 0$ is verified by solving two LPs, one… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  6. arXiv:2105.07609  [pdf, ps, other

    cs.IT cs.NI

    Intrablock Interleaving for Batched Network Coding with Blockwise Adaptive Recoding

    Authors: Hoover H. F. Yin, Ka Hei Ng, Allen Z. Zhong, Raymond W. Yeung, Shenghao Yang, Ian Y. Y. Chan

    Abstract: Batched network coding (BNC) is a low-complexity solution to network transmission in multi-hop packet networks with packet loss. BNC encodes the source data into batches of packets. As a network coding scheme, the intermediate nodes perform recoding on the received packets belonging to the same batch instead of just forwarding them. A recoding scheme that may generate more recoded packets for batc… ▽ More

    Submitted 15 September, 2021; v1 submitted 17 May, 2021; originally announced May 2021.

    Comments: This paper was presented in part at 2021 IEEE International Symposium on Information Theory

  7. arXiv:2103.08081  [pdf, ps, other

    cs.IT

    Linear Network Error Correction Coding: A Revisit

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider linear network error correction (LNEC) coding when errors may occur on edges of a communication network of which the topology is known. In this paper, we first revisit and explore the framework of LNEC coding, and then unify two well-known LNEC coding approaches. Furthermore, by develo** a graph-theoretic approach to the framework of LNEC coding, we obtain a significantly enhanced ch… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

    Comments: 41 pages

  8. arXiv:2006.05839  [pdf, ps, other

    cs.IT

    Weakly Secure Symmetric Multilevel Diversity Coding

    Authors: Tao Guo, Chao Tian, Tie Liu, Raymond W. Yeung

    Abstract: Multilevel diversity coding is a classical coding model where multiple mutually independent information messages are encoded, such that different reliability requirements can be afforded to different messages. It is well known that {\em superposition coding}, namely separately encoding the independent messages, is optimal for symmetric multilevel diversity coding (SMDC) (Yeung-Zhang 1999). In the… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: The paper has been accepted by IEEE Transactions on Information Theory

  9. arXiv:1811.02390  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part II: Flexible Rate and Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: In the two-part paper, we consider the problem of secure network coding when the information rate and the security level can change over time. To efficiently solve this problem, we put forward local-encoding-preserving secure network coding, where a family of secure linear network codes (SLNCs) is called local-encoding-preserving (LEP) if all the SLNCs in this family share a common local encoding… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 38 pages

  10. arXiv:1811.02388  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part I: Fixed Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: Information-theoretic security is considered in the paradigm of network coding in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, also referred to as the security level. Secure network coding is applied to prevent the leakage of the source information to the wiretappers. In this two-part paper, we consider the problem of secure network coding when the in… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 32 pages

  11. arXiv:1805.02989  [pdf, other

    cs.IT

    On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point

    Authors: Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung

    Abstract: The problem of exact-repair regenerating codes against eavesdrop** attack is studied. The eavesdrop** model we consider is that the eavesdropper has the capability to observe the data involved in the repair of a subset of $\ell$ nodes. An $(n,k,d,\ell)$ secure exact-repair regenerating code is an $(n,k,d)$ exact-repair regenerating code that is secure under this eavesdrop** model. It has bee… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: This paper will be presented in part in ISIT 2018

  12. arXiv:1801.02376  [pdf, ps, other

    cs.IT

    The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding

    Authors: Tao Guo, Raymond W. Yeung

    Abstract: It is well known that {\em superposition coding}, namely separately encoding the independent sources, is optimal for symmetric multilevel diversity coding (SMDC) (Yeung-Zhang 1999). However, the characterization of the coding rate region therein involves uncountably many linear inequalities and the constant term (i.e., the lower bound) in each inequality is given in terms of the solution of a line… ▽ More

    Submitted 21 May, 2019; v1 submitted 8 January, 2018; originally announced January 2018.

  13. arXiv:1710.02252  [pdf, ps, other

    cs.IT

    Improved Upper Bound on the Network Function Computing Capacity

    Authors: Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li

    Abstract: The problem of network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a {\em target function}, of which the inputs are generated at multiple source nodes. The edges in the network are assumed to be error-free and have limited capacity. The nodes in the network are assumed to have unbounded comput… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

    Comments: 43 pages

  14. arXiv:1611.09104  [pdf, ps, other

    cs.IT cs.DM math.CO

    Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider a communication network where there exist wiretappers who can access a subset of channels, called a wiretap set, which is chosen from a given collection of wiretap sets. The collection of wiretap sets can be arbitrary. Secure network coding is applied to prevent the source information from being leaked to the wiretappers. In secure network coding, the required alphabet size is an open… ▽ More

    Submitted 28 November, 2016; originally announced November 2016.

    Comments: 35 pages

  15. arXiv:1608.03697  [pdf, other

    cs.DM cs.IT

    On Information-Theoretic Characterizations of Markov Random Fields and Subfields

    Authors: Raymond W. Yeung, Ali Al-Bashabsheh, Chao Chen, Qi Chen, Pierre Moulin

    Abstract: Let $X_i, i \in V$ form a Markov random field (MRF) represented by an undirected graph $G = (V,E)$, and $V'$ be a subset of $V$. We determine the smallest graph that can always represent the subfield $X_i, i \in V'$ as an MRF. Based on this result, we obtain a necessary and sufficient condition for a subfield of a Markov tree to be also a Markov tree. When $G$ is a path so that $X_i, i \in V$ fo… ▽ More

    Submitted 17 January, 2018; v1 submitted 12 August, 2016; originally announced August 2016.

  16. Partition-Symmetrical Entropy Functions

    Authors: Qi Chen, Raymond W. Yeung

    Abstract: Let $\cal{N}=\{1,\cdots,n\}$. The entropy function $\bf h$ of a set of $n$ discrete random variables $\{X_i:i\in\cal N\}$ is a $2^n$-dimensional vector whose entries are ${\bf{h}}({\cal{A}})\triangleq H(X_{\cal{A}}),\cal{A}\subset{\cal N} $, the (joint) entropies of the subsets of the set of $n$ random variables with $H(X_\emptyset)=0$ by convention. The set of all entropy functions for $n$ discre… ▽ More

    Submitted 28 September, 2016; v1 submitted 28 July, 2014; originally announced July 2014.

    Comments: This paper is published in IEEE Transactions on Information Theory

    Journal ref: Issue Date: OCTOBER.2016 Volume: 62 Issue: 10 On page(s): 1-18 Print ISSN: 0018-9448 Online ISSN: 1557-9654

  17. arXiv:1312.4811  [pdf, ps, other

    cs.IT

    Finite-Length Analysis of BATS Codes

    Authors: Shenghao Yang, Tsz-Ching Ng, Raymond W. Yeung

    Abstract: BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propa… ▽ More

    Submitted 12 February, 2016; v1 submitted 17 December, 2013; originally announced December 2013.

    Comments: 47 pages

  18. Cut-Set Bounds for Networks with Zero-Delay Nodes

    Authors: Silas L. Fong, Raymond W. Yeung

    Abstract: In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent (hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot). A node is said to incur no delay if its received symbol obtained in a time slot is ava… ▽ More

    Submitted 11 February, 2015; v1 submitted 6 December, 2013; originally announced December 2013.

    Comments: Submitted to IEEE Transactions on Information Theory in Aug, 2012

    Journal ref: IEEE Transactions on Information Theory, vol. 61, pp. 3837-3850, Jul, 2015

  19. arXiv:1212.0101  [pdf, other

    cs.IT

    Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets

    Authors: Fan Cheng, Raymond W. Yeung

    Abstract: Consider a communication network represented by a directed graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$, where $\mathcal{V}$ is the set of nodes and $\mathcal{E}$ is the set of point-to-point channels in the network. On the network a secure message $M$ is transmitted, and there may exist wiretappers who want to obtain information about the message. In secure network coding, we aim to find a netwo… ▽ More

    Submitted 12 October, 2014; v1 submitted 1 December, 2012; originally announced December 2012.

  20. Batched Sparse Codes

    Authors: Shenghao Yang, Raymond W. Yeung

    Abstract: Network coding can significantly improve the transmission rate of communication networks with packet loss compared with routing. However, using network coding usually incurs high computational and storage costs in the network devices and terminals. For example, some network coding schemes require the computational and/or storage capacities of an intermediate network node to increase linearly with… ▽ More

    Submitted 6 February, 2014; v1 submitted 23 June, 2012; originally announced June 2012.

    Comments: 51 pages, 12 figures, submitted to IEEE Transactions on Information Theory

    Journal ref: Information Theory, IEEE Transactions on , vol.60, no.9, pp.5322-5346, Sept. 2014

  21. arXiv:1202.0859  [pdf, other

    cs.IT cs.CR

    Imperfect Secrecy in Wiretap Channel II

    Authors: Fan Cheng, Raymond W. Yeung, Kenneth W. Shum

    Abstract: In a point-to-point communication system which consists of a sender, a receiver and a set of noiseless channels, the sender wishes to transmit a private message to the receiver through the channels which may be eavesdropped by a wiretapper. The set of wiretap sets is arbitrary. The wiretapper can access any one but not more than one wiretap set. From each wiretap set, the wiretapper can obtain som… ▽ More

    Submitted 12 October, 2014; v1 submitted 3 February, 2012; originally announced February 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  22. On Linear Operator Channels over Finite Fields

    Authors: Shenghao Yang, Siu-Wai Ho, ** Meng, En-hui Yang, Raymond W. Yeung

    Abstract: Motivated by linear network coding, communication channels perform linear operation over finite fields, namely linear operator channels (LOCs), are studied in this paper. For such a channel, its output vector is a linear transform of its input vector, and the transformation matrix is randomly and independently generated. The transformation matrix is assumed to remain constant for every T input ve… ▽ More

    Submitted 14 April, 2010; v1 submitted 11 February, 2010; originally announced February 2010.

    Comments: 53 pages, 3 figures, submitted to IEEE Transaction on Information Theory

  23. Refined Coding Bounds and Code Constructions for Coherent Network Error Correction

    Authors: Shenghao Yang, Raymond W. Yeung, Chi-Kin Ngai

    Abstract: Coherent network error correction is the error-control problem in network coding with the knowledge of the network codes at the source and sink nodes. With respect to a given set of local encoding kernels defining a linear network code, we obtain refined versions of the Hamming bound, the Singleton bound and the Gilbert-Varshamov bound for coherent network error correction. Similar to its classi… ▽ More

    Submitted 22 January, 2010; v1 submitted 12 April, 2009; originally announced April 2009.

    Comments: 32 pages

    Journal ref: IEEE-J-IT 57 (2011) 1409 - 1424