Dr. Fan Cheng
Information and Computing Lab (We have one phd position opening)
Professor of Special Appointment (Eastern Scholar)
John Hopcroft Center
and Department of Computer Science and Engineering
Shanghai Jiao Tong University
Email: chengfan [at]
theory, Security, and Machine Learning.
Cheng and V. Y. F. Tan, ''A Numerical Study on the Wiretap Network
with a Simple Network Topology,'' IEEE
Trans. Inform. Theory, vol. 62, no. 5, pp. 2481-2492, May
- F. Cheng and Y. Geng, "Higher Order Derivatives in
Costa’s Entropy Power Inequality,'' IEEE Trans. Inform. Theory,
vol. 61, no. 11, pp. 5892-5905,
Nov. 2015. [arXiv link]
- F. Cheng, R. W.
Yeung, and K. W. Shum, "Imperfect Secrecy in Wiretap Channel II,"
IEEE Trans. Inform. Theory, vol. 61, no. 1, pp. 628-636, Jan.
2015. [arXiv link]
- F. Cheng and R. W. Yeung,
"Performance Bounds on a Wiretap Network
with Arbitrary Wiretap Sets," IEEE Trans. Inform. Theory, vol. 60,
no. 6, pp. 3345-3358, Jun.
- F. Cheng, "Generalization of Mrs.
Gerber's Lemma," Communications in Information and Systems,
no. 2, pp. 79–86, 2014. [Full Text]
- R. K. Panta, R. Jana, F.
Cheng, Y.-F. R. Chen, and V. A. Vaishampayan, "Phoenix: Storage
Using an Autonomous Mobile
Infrastructure," IEEE Transactions on Parallel
and Distributed Systems,
vol. 24, no. 9, pp. 1863-1873, Sept.
- T. Wu and F.
Cheng, "The Structures of Zero-divisor Semi-groups with Graph
Kn◦K2," Semi-group Forum, vol. 76, Springer (2008), pp.
- J. Zhong, S. Du, L. Zhou, H. Zhu, F. Cheng and C. Chen,
``Security Modeling and Analysis on Intra Vehicular Network,'' VTC2017-Fall in Toronto, Canada.
Geng and F. Cheng, ''Duality between finite numbers of discrete
multiple access and broadcast channels,'' 2015 IEEE Information
Theory Workshop, Jeju, Korea (ITW
Chen, F. Cheng, T. Liu and R. W. Yeung, ''A Marginal
Characterization of Entropy Functions for Conditional Mutual
Independent Random Variables,'' 2015 IEEE International Symposium
on Information Theory, (ISIT 2015).
- F. Cheng,
"Optimality of Routing on the Wiretap Network with Simple Network
Topology,'' 2014 IEEE International Symposium on Information
Theory, (ISIT 2014).
- F. Cheng and Y. Geng, "Convexity of Fisher
Information with Respect to Gaussian Perturbation,'' 2014
Iran Workshop on Communication and Information Theory, (IWCIT
Cheng, R. W. Yeung and K. W. Shum, "Imperfect Secrecy in Wiretap
Channel II," 2012
IEEE International Symposium on Information Theory, (ISIT
Cheng and R. W. Yeung, "Performance Bounds in Secure Network
IEEE International Symposium on Network Coding, (NetCod
''Performance Bounds in Secure Network
Coding,'' Department of Information Engineering, The Chinese
University of Hong Kong, 2012.