Information and Computing Lab (ICL)

Publications

Journal papers

  1. F. Cheng and V. Y. F. Tan, ‘‘A Numerical Study on the Wiretap Network with a Simple Network Topology,’’ IEEE Trans. Inform. Theory, vol. 62, no. 5, pp. 2481-2492, May 2016. arXiv link

  2. F. Cheng and Y. Geng, ‘‘Higher Order Derivatives in Costa's Entropy Power Inequality,’’ IEEE Trans. Inform. Theory, vol. 61, no. 11, pp. 5892-5905, Nov. 2015. arXiv link

  3. F. Cheng, R. W. Yeung, and K. W. Shum, ‘‘Imperfect Secrecy in Wiretap Channel II,’’ IEEE Trans. Inform. Theory, vol. 61, no. 1, pp. 628-636, Jan. 2015. arXiv link

  4. F. Cheng and R. W. Yeung, ‘‘Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets,’’ IEEE Trans. Inform. Theory, vol. 60, no. 6, pp. 3345-3358, Jun. 2014. arXiv link

  5. F. Cheng, ‘‘Generalization of Mrs. Gerber's Lemma,’’ Communications in Information and Systems, vol. 14, no. 2, pp. 79-86, 2014. Full Text arXiv link

  6. R. K. Panta, R. Jana, F. Cheng, Y.-F. R. Chen, and V. A. Vaishampayan, ‘‘Phoenix: Storage Using an Autonomous Mobile Infrastructure,’’ IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1863-1873, Sept. 2013.

  7. T. Wu and F. Cheng, ‘‘The Structures of Zero-divisor Semi-groups with Graph Kn * K2,’’ Semi-group Forum, vol. 76, Springer (2008), pp. 330-340.

Conference papers

  1. Y. Geng and F. Cheng, ‘‘Duality between finite numbers of discrete multiple access and broadcast channels,’’ 2015 IEEE Information Theory Workshop, Jeju, Korea (ITW 2015).

  2. Q. Chen, F. Cheng, T. Liu and R. W. Yeung, ‘‘A Marginal Characterization of Entropy Functions for Conditional Mutual Independent Random Variables,’’ 2015 IEEE International Symposium on Information Theory, (ISIT 2015).

  3. F. Cheng, ‘‘Optimality of Routing on the Wiretap Network with Simple Network Topology,’’ 2014 IEEE International Symposium on Information Theory, (ISIT 2014).

  4. F. Cheng and Y. Geng, ‘‘Convexity of Fisher Information with Respect to Gaussian Perturbation,’’ 2014 Iran Workshop on Communication and Information Theory, (IWCIT 2014).

  5. F. Cheng, R. W. Yeung and K. W. Shum, ‘‘Imperfect Secrecy in Wiretap Channel II,’’ 2012 IEEE International Symposium on Information Theory, (ISIT 2012).

  6. F. Cheng and R. W. Yeung, ‘‘Performance Bounds in Secure Network Coding,’’ 2011 IEEE International Symposium on Network Coding, (NetCod 2011).

Thesis

‘‘Performance Bounds in Secure Network Coding,’’ Department of Information Engineering, The Chinese University of Hong Kong, 2012.