Faculty

Luo Yuan Professor

MainPage:

Office Telephone: +86-21-3420-5477

Office Address: SEIEE-3-403

Email: luoyuan@cs.sjtu.edu.cn

Lab: Information and Coding Theory Laboratory

  • Research
  • Education
  • Work Experience
  • Teaching Assignment
  • Publications
  • Project Fund
  • Awards
  • Academic Service

Research Interest

His research interests include Information Theory (especially Shannon Channel Capacity and Network Coding), Coding Theory (especially Hamming Distance, Constant Composition and Constant Weight Code, Periodic Sequence) and Computer Security (especially Virtual Machine Security). Until now, he published about 100 papers on IEEE Trans. on Information Theory, IEEE Trans. on Communications, IEEE Trans. on Computers, IEEE Trans. on Information Forensics & Security and Designs, Codes and Cryptography, etc.

In 2006, his cooperative IT paper "On constant composition codes over Zq" was cited and listed by a cutting-edge review on powerline communication in the Triennial Issue: Mathematics and physics (Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences), see "Powerline communication and the 36 officers problem", vol.364, pp. 3199-3214, 2006. In 2008, his cooperative paper "The relative generalized Hamming weight of linear q-ary codes and their subcodes" (published in Designs, Codes and Cryptography, vol.48, no.2, pp.111-123) was listed firstly in a special issue for IEEE Fellow T. Klove.

Education Background

He received the B.S. in (Mathematics) Information Science, M.S. and Ph.D. degrees in Probability and Mathematical Statistics from Nankai University, Tianjin, China, in 1993, 1996, and 1999, respectively.

Work Experience

From July 1999 to April 2001, he held a Postdoctoral position in the Institute of Systems Science, Chinese Academy of Sciences. From May 2001 to April 2003, he had a Postdoctoral position in the Institute for Experimental Mathematics, University of Duisburg-Essen, Germany, where he revisited the institute twice several years later by the support of German Foundation DFG. From March 2011 to August 2011, he visited the Department of Electrical and Computer Engineering, Waterloo University, Canada. Since June 2003, he has been with the Computer Science and Engineering Department, Shanghai Jiao Tong University, Shanghai, China. He held his present position as a Full Professor since 2006.


Teaching Assignment

Current Assignment:

1. Discrete Mathematics, in English, for undergraduate students

2. Information and Coding Theory, in English, for graduate students

Publications:

Books: 

1. Z. Du and Y. Luo, A Concise Course on Scientific Language Matlab (in Chinese), Nankai University Press, 1998.

2. Y. Wang and Y. Luo (editors), Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, December 10-12, 2010, Shanghai, China.

3. Chinese translation of the 19th, 20th and 21st chapters of the book: Information Theory and Network Coding (R. W. Yeung), which was publised by Higher Education Press, China, July 2011.

 

Papers:

IEEE Transactions on Information Theory:

1). Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp. 1007 -1014,  2010.

2). Y. Luo, C. Mitrpant, A. J. Han Vinck, and K. Chen, "Some new characters on the wire-tap channel of type II", IEEE Trans. Inform. Theory, vol.51, no.3, pp.1222-1229, 2005.

3). C. Mitrpant, A. J. Han Vinck and Y. Luo, "An Achievable Region for the Gaussian Wiretap Channel with Side Information", IEEE Trans. Inform. Theory, vol.52, no.5, pp.2181-2190, 2006.

4). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "On constant composition codes over Zq", IEEE Trans. Inform. Theory, vol.49, no.11, pp.3010-3016, 2003.

5). Y. Luo, F. Fu and V. K. Wei, "On the depth distribution of linear codes", IEEE Trans. Inform. Theory, vol.46, no.6, pp.2197-2203, 2000.

6). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On the Svanstrom bound for ternary constant weight codes", IEEE Trans. Inform. Theory, vol.47, no.5, pp.2061-2064, 2001.

7). O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.

8) Yuan Luo, Chaoping Xing and Lin You, Construction of sequences with high nonlinear complexity from function fields, IEEE Transactions on Information Theory, IT-17-0070, Accept for publication.
9) Lingfei Jin, Yuan Luo and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on Information Theory, IT-16-0456, Accept for publication.

 

Others:

In 2017:

[8] Chenchen Zhang, Yuan Luo and Yan Chen, A Low Complexity SCMA Detector Based on Discretization, IEEE Transactions on Wireless Communications, Paper-TW-May-17-0666R1. Minor Revision

[7] Yuan Luo, Chaoping Xing and Lin You, Construction of sequences with high nonlinear complexity from function fields, IEEE Transactions on Information Theory, IT-17-0070, Accept for publication. Impact Factor 2.68

[6] Lingfei Jin, Yuan Luo and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on Information Theory, IT-16-0456, Accept for publication. Impact Factor 2.68

[5] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, VOL. 12, NO. 3, pp.746-759 , 2017. Impact Factor 4.33

[4] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1408-1419, 2017 Impact Factor 3.82

[3] Chenchen Zhang and Yuan Luo, Approximating the Differential Entropy of Gaussian Mixtures, Proceedings of IEEE GLOBECOM 2017, Singapore, Dec. 4-8, 2017.

[2] Qiran Shi, Chenchen Zhang, Yuan Luo, Low-Complexity RMS Delay Spread Estimation for Wireless OFDM Systems, Proceedings of the 17th IEEE International Conference on Communication Technology, October 27-30, 2017, Chengdu, China.

[1] Akram Hussain and Yuan Luo, Generalized Bidirectional limited magnitude error correcting code for Flash memory, Proceedings of the 11th Annual International Conference on Combinatorial Optimization and Applications 2017, Dec 16-18, 2017 Shanghai, China.



In 2016:

[11] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, vol.65, no.10, pp.8658-8668, 2016. Impact Factor 2.24

[10] Dan He, Wangmei Guo and Yuan Luo, "Secrecy Capacity of the Extended Wiretap Channel II with Noise", Entropy, vol.18, no.11, 2016. Impact Factor 1.74

[9] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, accepted, T-IFS-06293-2016. Impact Factor 2.44

[8] 骆源,过敏意,"计算机学科本硕博贯通培养机制探讨", 计算机教育,2016年第51-4页。

[7] Dongxin Liu, Fan Wu, Linghe Kong, Shaojie Tang, Yuan Luo, Guihai Chen, "Training-Free Indoor White Space Exploration", Special Issue on Spectrum Sharing and Aggregation for Future Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.34, no.10, pp.2589-2604, 2016. Impact Factor 3.67

[6] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. , no. , pp. , doi:10.1109/TMC.2016.2597839. Aug. 2016 Impact Factor 2.45

[5] Chenchen Zhang, Yuan Luo and Guangtao Xue, "A new construction of threshold cryptosystems based on RSA", Information Sciences, vol.363, pp.140-153, 2016. Impact Factor 3.36

[4] Dan He, Yuan Luo and Ning Cai, "Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel", Proceedings of 2016 IEEE International Symposium on Information Theory, pp.505-509, Barcelona, Spain, July 10-15, 2016.

[3] Yaning Xu, Qiyuan He and Yuan Luo, "Optimal Repair for Distributed Storage Codes in Vehicular Networks", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

[2] Qiyuan He, Yaning Xu and Yuan Luo, " I/O Optimized Recovery Algorithm in Vehicular Network Using PM-RBT Codes ", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

[1] Songfan Xie and Yuan Luo, "A Seamless Dual-Link Handover Scheme with Optimized Threshold for C/U Plane Network in High-Speed Rail", The 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

 

 

In 2015:

[9] Min Zeng, Yuan Luo and Guang Gong, "Sequences with Good Correlation Property Based on Depth and Interleaving Techniques", Designs, Codes and Cryptography, vol.77, no.1, pp.255-275, 2015.

[8] Chuliang Weng, Jianfeng Zhan and Yuan Luo, "TSAC: Enforcing Isolation of Virtual Machines in Clouds", IEEE Transactions on Computers, vol. 64, no. 5, pp.1470-1482, 2015.

[7] C. Zhang, X. Chen and Y. Luo, "Threshold Optimization for ISI-free Region Detection in High-Mobility Fading Channels," Proceedings of the Fourth International Workshop on High Mobility Wireless Communications (HMWC’2015),  Xi’an, China, Oct. 21-23, 2015.

[6] Zhenyi Liao and Yuan Luo, A Stack-based Lightweight Approach to Detect Kernel-level Rookits, Proceedings of the 2015 International Conference on Progress in Informatics and Computing, Nanjing, Dec 18-20, 2015.

[5] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, DOI 10.1109/TVT.2015.2508485, 2015.

[4] B. Dai, A. J. Han Vinck, Y. Luo and Z. Ma, “Capacity-equivocation region of a special case of wiretap channel with noiseless feedback”, Journal of Communications and Networks, vol. 17, no. 1, pp. 21-26, 2015. 

[3] X. Liu and Y. Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, vol. 74, no. 3, pp. 533-557, 2015.

[2] X. Dong, J. YuY. ZhuY. ChenY. Luo and M. Li, “SECO: Secure and Scalable Data Collaboration Services in Cloud Computing,” Computers & Security, vol. 50, no. C, pp.91-105, May 2015.

[1] Z. Zhuang, B. Dai, Y. Luo and A. J. Han Vinck, "Secure Error-Correcting Network Codes with Side Information Leakage," IET Communications, vol. 9, no. 8, pp.1068-1075, 2015.

 

In 2014:

[14] X. Chen, C. Zhang and Y. Luo, "Low-Complexity ISI-free Region Detection for OFDM Systems in High-Mobility Fading Channels," Proceedings of the Third International Workshop on High Mobility Wireless Communications (HMWC’2014), pp. 155-159, Beijing, China, November 1-3, 2014. One of the best student paper awards.

[13] M. Zeng, Y. Luo and A. J. Han Vinck, "A Construction of Long Period Sequences Based on Lightweight Generation and High Probability," IEEE Transactions on Communications, vol. 62, no. 11, pp. 4012-4023, 2014.

[12] J. Zhang, X. Dong, J. Yu, Y. Luo, M. Li and B. Wu, "Differentially Private Multidimensional Data Publication", China Communications, vol. 11, no. 13, pp.79-85, 2014.

[11] S. Huang and Y. Luo, "Achieve Distributed, Scalable and Effective Access Control in Cloud Storage Services," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.

[10] Y. Mao, X. Chen and Y. Luo, "HVSM: An In-Out-VM Security Monitoring Architecture in IaaS Cloud," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.

[9] X. Liu and Y. Luo, "The weight distributions of some cyclic codes with three or four nonzeros over F3", Designs, Codes and Cryptography, vol. 73, no. 3, pp. 747-768, 2014.

[8] X. Liu, M. Harrison and Y. Luo, "A note on the five valued conjectures of Johansen, Helleseth, Kholosha and zeta functions", IEEE Communications Letters, pp.1483-1486, vol. 18, no. 9, 2014.

[7] O. Geil, S. Martin, R. Matsumotoy, D. Ruano and Y. Luo, "Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes", Proceedings of 2014 IEEE Information Theory Workshop, pp. 137-141, Hobart, Tasmania, Australia, Nov. 2-5, 2014.

[6] O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.

[5] X. Liu and Y. Luo, "The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3", Journal of Applied Mathematics, Volume 2014, Article ID 686138, DOI: 10.1155/2014/686138.

[4] Zhuojun Zhuang, Bin Dai, Yuan Luo and A. J. Han Vinck, "On the relative profiles of a linear code and a subcode", Designs, Codes and Cryptography, vol.72, no. 2, pp. 219-247, 2014.

[3] Xiaogang Liu, Yuan Luo and Kenneth W. Shum, "On the Optimum Cyclic Subcode Chains of RM(2, m)* for Increasing Message Length", IEEE Transactions on Communications, pp. 2145-2155, vol.62, no.7, 2014.

[2] Min Zeng, Yuan Luo and Guang Gong, "New Binary Sequences With Good Correlation Based on High-Order Difference and Interleaving Techniques", Proceedings of IEEE International Symposium on Information Theory, pp. 1663-1666, Honolulu, HI, USA, June 2014.

[1] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,  "Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing", Computers & Security, Vol.42, Pages 151–164, May 2014.

 

In 2013:

 

[15] Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li, "Hybrid CPU Management for Adapting to the Diversity of Virtual Machines", IEEE Transactions on Computers, vol.62, no.7, pp.1332-1344, 2013.

[14] Zhuojun Zhuang, Yuan Luo and Bin Dai, "Code constructions and existence bounds for relative generalized Hamming weight", Designs, Codes and Cryptography, vol. 69, no. 3, pp.275-297, 2013.

[13] MAO Yaqiang, WANG Yao, LUO Yuan, "A Design of Dynamic Integrity Measurement Framework towards the Cloud", http://www.paper.edu.cn, Feb. 2013. (in Chinese)

[12] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "Achieving Secure and Efficient Data Collaboration in Cloud Computing", Proceedings of 2013 IEEE/ACM 21st International Symposium on Quality of Service  (IWQoS), Pages 195-200, Montreal, Canada, June 2013.

[11] Xujian Chen, Chunshu Li and Yuan Luo, "A Seamless Dual-Link Handover Scheme Suitable for High-Speed Rail", Proceedings of the 2013 International Workshop on High Mobility Wireless Communications (HMWC2013), Pages 91-95, Shanghai, China, Nov. 2013.

[10] Fengfeng Ning, Chuliang Weng, and Yuan Luo, "Virtualization I/O Optimization Based on Shared Memory", Proceedings of the IEEE International Conference on Big Data 2013 (IEEE BigData 2013), Pages 70-77, Santa Clara, USA, Oct. 6-9, 2013.

[9] Xiaogang Liu and Yuan Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, DOI: 10.1007/s10623-013-9877-5, accepted for publication in August 2013. 

[8] Bin Dai, A. J. Han Vinck and Yuan Luo, "Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback", Journal of Applied Mathematics, Volume 2013, Article ID 423619.

[7] Bin Dai, A. J. Han Vinck, Yuan Luo and Xiaohu Tang, "Wiretap Channel with Action-Dependent Channel State Information", Entropy, vol.15, no.2, pp.445-473, 2013.

[6] Bin Dai, A. J. Han Vinck, Yuan Luo and Zhuojun Zhuang, "Capacity Region of a New Bus Communication Model." Entropy, vol.15, no. 2: pp.678-697, 2013.

[5] Min Zeng and Yuan Luo, "Depth, ultimate period, and distribution of sequences of period p^r-1", Invited Paper in the Proceedings of the 8th International Conference on Communications and Networking in China, Guilin, China, Pages 891-896, August 2013. 

[4] Min Zeng, Yuan Luo, and Guang Gong, "A Constuction of Sequence With Low Correlation Based on High-order Difference", one of the best papers of 中国通信学会第一届信息通信博士论坛, Beijing, China, Apr. 2013.

[3] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "P2E: Privacy-preserving and Effective Cloud Data Sharing Service", Proceedings of IEEE Globecom 2013,  Atlanta  USA, Dec. 09-13 2013.

[2] Peng Gao and Yuan Luo, " Unsupervised Strategies for Shilling Attack Detection in Recommender System ", Communications Technology, vol.46, no.04, pp. 5-12, 2013. ( in Chinese.)

[1] Xufu Luo and Yuan Luo, "Research on Virtual Machine System Security Protocols Based on TPM", Jisuanji Yu Xiandaihua, no. 7, pp. 30-33, 2013. ( in Chinese.)

 

In 2012:

 

[8] Bin Dai and Yuan Luo, "Some New Results on the Wiretap Channel with Side Information", Entropy, vol.14, no.9, pp.1671-1702, 2012.

[7] Guangtao Xue, Yuan Luo, Jiadi Yu, Minglu Li, "A Novel Vehicular Location Prediction based on Mobility Patterns for Routing in Urban VANET", EURASIP Journal on Wireless Communications and Networking, 2012:222, 2012.

[6] M. Zeng, Y. Luo and G. Gong, "Rotating-table game and construction of periodic sequences with lightweight calculation", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 1221-1225, Cambridge, USA, July 1 to July 6, 2012.

[5] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 438-442, Cambridge, USA, July 1 to July 6, 2012.

[4] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Capacity Region of Non-degraded Wiretap Channel with Noiseless feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, Pages 244-248, Cambridge, USA, July 1 to July 6, 2012.

[3] Dan He and Yuan Luo, "A Kind of Non-DMC Erasure Wiretap Channel", Proceedings of 2012 14th International Conference on Communication Technology, Pages 1082-1087, Chengdu, China, Nov. 9th-11th, 2012. One of the best papers of the conference.

[2] Zhuojun ZHUANG, Yuan LUO, Bin DAI, "Upper Bounds on Relative Length/Dimension Profile", Proceedings of the 17th National Youth Communication Conference of China, Pages 33-39, Qing Dao, China, July 2012. ( in Chinese.)

[1] Yao Wang and Yuan Luo, "An In-Out-VM MeasurementArchitecture against Dynamic Attacks in Clouds", Proceedings of 2012 14th International Conference on Communication Technology, Pages 761-767, Chengdu, China, Nov. 9th-11th, 2012.

 

In 2011:

 

[1] Q. Liu, G. Wang, C. Weng, Y. Luo, and M. Li, “A Mandatory Access Control Framework in Virtual Machine System with Respect to Multilevel Security II: Implementation,” China Communications, vol. 8, no. 2, pp. 86–94, 2011.

[2] Zihui Liu, Xin-Wen Wub, Yuan Luo, Wende Chen. “New code equivalence based on relative generalized Hamming weights,” Information Sciences, vol. 181, pp. 4308-4317, 2011.

[3] Lei Yu, Chuliang Weng, Minglu Li, Yuan Luo. "SNPdisk: an Efficient Para-virtualization Snapshot Mechanism for Virtual Disks in Private Clouds," IEEE Network, vol. 25, no. 4, pp.  20-26, 2011.

[4] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, Some new bounds on relative generalized Hamming weight, in: 13th International Conference on Communication Technology, Jinan, China, pp. 971-974, Sep. 2011.

[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, On the RDLP and IRDLP of a linear code and a linear subcode, 13th International Conference on Communication Technology, Jinan, China, pp. 975-978, Sep. 2011.

[6] J. Yan, Z. Zhuang, Y. Luo, "On the optimum distance profiles of some quasi cyclic codes," 13th International Conference on Communication Technology, Jinan, China, pp. 979-983, Sep. 2011.

[7] Min Zeng and Yuan Luo, "On the Second Depth Distribution of Vectors Over Fq", Journal of Computational Information Systems, vol. 7, no. 5, 1738-1743, 2011.

 

In 2010:

 

[1] Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp.1007-1014, 2010.

[2] Q. Liu, G. Wang, C. Weng, Y. Luo and M. Li, "A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory", China Communications, vol.7, no.4, pp.137-143, 2010. One of the best papers of 2010 Annual Conference of China Institute of Communications.

[3] X. He, Y. Luo, "Mutual Information Based Similarity Measure for Collaborative Filtering", Proceedings of 2010 IEEE International Conference on Procgress in Informatics and Computing, Shanghai, China, pp. 1117-1121, Dec. 10-12, 2010.

[4] B. Dai, Y. Luo, A.J.Han.Vinck, "Cpacity region of  broadcast channels With private message and causal side information”, Proceedings of the 3rd International Congress on Image and Signal Processing, Yantai, China, pp. 3770-3773, Oct. 16-18, 2010.

[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, “Secure error-correcting network codes with side information from source,”  Proceedings of the 2010 International Conference on Communications and Intelligence Information Security, Guangxi, China, pp.55-59, Oct. 2010. 

[6] Q. Liu, C. Weng, M. Li, and Y. Luo "An In-VM Measuring Framework for Virtual Machines in Cloud", IEEE Security & Privacy,  Vol. 8, no. 6, pp. 56-62, 2010.

[7] M. Houllier and Y. Luo, "Information Distances over Clusters", Proceedings of the 7th International Symposium on Neural Networks, Shanghai, China, June 6-9, 2010. Lecture Notes in Computer Science, Part I, vol. 6063, p.355-364, 2010.

[8] ZHANG Qiang, LUO Yuan, WENG Chuliang and  LI Minglu, "A Trust-Based Detecting Mechanism in Secure Recommender Systems", Microcomputer Information, vol. 26, no. 3, pages 68-70, 2010. (in Chinese)

[9] LIU Qian, LUO Yuan, WENG Chuliang and LI Minglu, "Security protocols based on trusted platform module for virtual machine system", Information Security and Technology, vol. 6, pp. 49-55, 2010. (in Chinese)

 

Before 2009:

 

1). Z. Liu, W. Chen and Y. Luo, "The relative generalized Hamming weight of linear q-ary codes and their subcodes", Designs, codes and cryptography, vol.48, no.2, pp.111-123, 2008.

2). P. Wang, Y. Luo and A. J. Han Vinck, "Quotient Subcode Set and the Coordinated Wiretap Channel II", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.e91, no.12, pp.3731-3737, 2008. 

3). Y. Luo, W. Chen and A. J. Han Vinck, "The determination of the chain good weight hierarchies with high dimension", SIAM Journal on Discrete Mathematics, vol.17, no.2, pp.196-209, 2004.

4). Y. Luo, W. Chen and F. Fu, "A new kind of geometric structures determining the chain good weight hierarchies", Discrete Mathematics, vol.260c, pp.101-117, 2003.

5). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On equidistant constant weight codes", Discrete Applied Mathematics, vol.128, pp.157-164, 2003.

6). H. Zhu, Y. Luo, C. Weng, M. Li, "A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach", pp.134-138, 2009 Fourth ChinaGrid Annual Conference, 2009.

7). Q. Zhang, Y. Luo, C. Weng, M. Li, "A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems", 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, Shanghai China July 2009.

8). Y. Luo, A. J. Han Vinck, "On a Classification of Cyclic Subcode Chains", Proceedings of the 2009 Fourth International ICST Conference on Communications and Networking in China, August 2009, Xi an, China.

9). J. Yu, Y. Luo and M. Li, "Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices", IEEE China Grid 2008.

10). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Resource Scheduling Strategy for Intrusion Detection on Multi-Core Platform", Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China.

11). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Reasonable Approach for Defining Load Index in Parallel Computing", The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008).

12). Z. Zhuang, Y. Luo, M. Li and C. Weng, "An Abstract Model for Intrusion Detection on Multi-Core Platform", IEEE China Grid 2008.

13). A. J. Han Vinck and Y. Luo, "Optimum Distance Profiles of Linear Block Codes", 2008 IEEE International Symposium on Information Theory, Canada.
14). B. Dai and Y. Luo, "Wiretap Channel with Side Information from Part of Encoder", the First International Workshop on High Performance Network (HPN2008), Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China. 

15). P. Wang, Y. Luo and A. J. Han Vinck, " Quotient Subcode Set and Inverse Relative Dimension/ Length Profile", IEEE IWSDA 2007, p128-133.

16). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "Bounds and constructions for q-ary constant composition code". 2002 IEEE International Symposium on Information Theory, June 30-July 5, Lausanne, Switzerland.

17). Y. Luo, F. Fu, C. Mitrpant and A. J. Han Vinck,“A Generalization of MDS Codes”, 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.

18). Y. Luo, W. Chen and F. Fu, "On the weight hierarchies satisfying the chain condition", AAECC 2001 , November 26-30, Melbourne, Australia.

19). C. Mitrpant, Y. Luo and A. J. Han Vinck, "On the wire-tap channel of type II with side information," 2003 IEEE International Symposium on Information Theory, June 29-July 4, Yokohama, Japan.

20). C. Mitrpant, Y. Luo and A. J. Han Vinck, "Achieving the Perfect Secrecy for the Gaussian Wiretap Channel with Side Information", 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.

21). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On the Svanstr?m bound for ternary constant weight codes", 2001 IEEE International Symposium on Information Theory, June 24-29, Washington, D.C., USA. 

22). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On equidistant constant weight codes", WCC 2001, January 8-12, Paris, France. 

23). Y. Luo, F. Fu and K. Chen, "Relative Dimension/Length Profile and Its Conjugate", FIFTH SHANGHAI CONFERENCE ON COMBINATORICS, May 14-18, Shanghai, 2005.

24). B. Dai, Y. Luo, "A variation of the coding scheme in the wiretap channel of type II", ECTI2006, pp.191-194, May 10-13, Thailand.

25). Y. Luo, "Three versions of depths of vectors over GF(2) and linear complexity", IEEE the 5th Asia-Europe Workshop on Concepts in Information Theory, 2006, Korea.

26). Y. Luo and Z. Zhang, "Neural network models for design of block cipher system", Systems Science and Mathematical Sciences, vol.11, no.2, pp.161-167, 1998. 

27). M. Zeng and Y. Luo, "On the third depth distribution and the period of sequence (E-1)m(S) over F2, Journal on Communications", vol. 29, no. 4,pp.51-56, 2008. (in Chinese)

28). Y. Luo, F. Fu and Z. Du, "A bound on the discrete entropy, Journal on Communications", vol.18, no.10, pp.66-69, 1997. (in Chinese)

29). F. Fu and Y. Luo, Depth distribution on linear block code, Chinese Science Bulletin, vol.43, no.19, pp.2046-2049, 1998. (in Chinese)

30). M. Zeng and Y. Luo, On the two kinds of depth distribution over F2, Journal of Shanghai Jiao Tong University, vol.42, no.12, pp.2060-2064, 2008. (in Chinese)

31). Y. Luo and Z. Zhuang, Classic channels related network coding, ZTE Communications, vol.15, no.1, pp.15-19, 2009. (in Chinese)

19. China Program of International S&T Cooperation 2016YFE0100300, 2016-2018

18. The course, Information and Coding Theory, was selected by Shanghai Municipal Education Commission in 2015 as the demonstration course of English Teaching for foreign students in Shanghai.

17. HIRPO: Huawei Innovation Research Program YB2015090062 2015.11-2016.11Code Multiple Access with Extensive Transceiver Property


16. National Natural Science Foundation of China under Grant 61571293: Relative Generalized Hamming Weight on Distributed Storage Recovery and Security, 2016.01-2019.12

15. 分布式存储中数据恢复与数据安全的最优编码, 总参预研.

14. The undergraduate student Zhehui Zhang of our group are funded by the Chun-Tsung Program in 2014-2016 on the researches of interference alignment of distributed storage system.

13. Innovation Program of Shanghai Municipal Education Commission under Grant 14ZZ017: Hamming weight, generalized Hamming weight and the trellis structures of LDPC codes, 2014.1-2016.12.

12. National Natural Science Foundation of China under Grant 61271222: The effects of channel state information and feedback on the channel capacity and secrecy capacity of some broadcast channels, 2013.1-2016.12.

11. National Natural Science Foundation of China under Grant 60972033: The optimum distance profile of linear block code, 2010.1-2012.12.

10. National Natural Science Foundation of China under Grant 60402022: The relative dimension/length profile, relative generalized Hamming weight and its applications, 2005.1-2007.12

9. Research Fund for the Doctoral Program of Higher Education of China (No. 20100073110016), 2011.1-2013.12.

8. Participate in National Basic Research Program of China under Grant 2007CB310900 on Virtual Machine

7. Participate in National Basic Research Program of China under Grant 2012CB316100 on Broadband Mobile Communications at High Speeds

6. Participate in National Basic Research Program of China under Grant 2013CB338004 on Theory of Side Channel Attack and Related Defense Method on Cryptographic System.
5. German Research Foundation DFG 2005,7-2005,9: Advanced researches on relative generalized Hamming weight

4. German Research Foundation DFG 2007.8-2007.10: On wiretap channel with side information

3. Huawei Foundation YJCB2009025WL: Researches on short code with high performance in communication systems

2. Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry 2005.1-2006.12: Basic researches on the wiretap channel of type II

1. Foundation of The State Key Laboratory of Integrated Services Networks 2010.7-2012.6: On the capacity region of the wiretap channel with side information

[1]  Min Zeng, Yuan Luo, and Guang Gong, "A Constuction of Sequence With Low Correlation Based on High-order Difference", one of the best papers of 中国通信学会第一届信息通信博士论坛, Beijing, China, Apr. 2013.

[2] Q. Liu, G. Wang, C. Weng, Y. Luo and M. Li, "A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory", China Communications, vol.7, no.4, pp.137-143, 2010. One of the best papers of 2010 Annual Conference of China Institute of Communications.

[3] Dan He and Yuan Luo, "A Kind of Non-DMC Erasure Wiretap Channel", Proceedings of 2012 14th International Conference on Communication Technology, Pages 1082-1087, Chengdu, China, Nov. 9th-11th, 2012. One of the best papers of the conference.

[4] X. Chen, C. Zhang and Y. Luo, "Low-Complexity ISI-free Region Detection for OFDM Systems in High-Mobility Fading Channels," Proceedings of the Third International Workshop on High Mobility Wireless Communications (HMWC’2014), pp. 155-159, Beijing, China, November 1-3, 2014. One of the best student paper awards.

Conference Chair:

1. The 5th Asia-Europe Workshop on Concepts in Information Theory, Jeju, South Korea, October 25-27, 2006. A Tribute to TE SUN HAN

 

Technical Program Committee Chairs:

1. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, Beijing, China. June 25-27,2010.

2. 2010 International Conference on Progress in Informatics and Computing, Shanghai, China. Dec 10-12, 2010.

3. 2011 International Conference on Network Computing and Information Security (NCIS 11)

4. 2013 IET International Conference on Information and Communications Technologies, Beijing, China, 27-29 April, 2013.

 

Organization Chair:

The Second International Workshop on High Mobility Wireless Communications (HMWC 2013), Shanghai, China, November 1-3, 2013.

Publication Chair: 2011 International Conference on Neural Information Processing

 

TUTORIAL CO-CHAIR:

IEEE WiMob 2011

Contact webmaster@cs.sjtu.edu.cn

Copyright @ 2013 SJTU Computer Science & Engineering All Rights Reserved