Huang, Wentao
- Huang, Wentao and Bruck, Jehoshua (2019) Generic Secure Repair for Distributed Storage; 10.48550/arXiv.1706.00500
- Huang, Wentao and Bruck, Jehoshua (2018) Secret Sharing with Optimal Decoding and Repair Bandwidth
- Huang, Wentao and Bruck, Jehoshua (2018) Secure RAID Schemes from EVENODD and STAR Codes
- Huang, Wentao and Ho, Tracey, el al. (2018) Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding; IEEE Transactions on Information Theory; Vol. 64; No. 6; 4496-4512; 10.1109/TIT.2018.2820686
- Shor, Roman and Yadgar, Gala, el al. (2018) How to Best Share a Big Secret; ISBN 978-1-4503-5849-1; Proceedings of the 11th ACM International Systems and Storage Conference; 76-88; 10.1145/3211890.3211896
- Huang, Wentao and Bruck, Jehoshua (2017) Generic Secure Repair for Distributed Storage; 10.48550/arXiv.1706.00500
- Huang, Wentao and Bruck, Jehoshua (2017) Secret sharing with optimal decoding and repair bandwidth; ISBN 978-1-5090-4096-4; 2017 IEEE International Symposium on Information Theory (ISIT); 1813-1817; 10.1109/ISIT.2017.8006842
- Huang, Wentao and Bruck, Jehoshua (2017) Secure RAID schemes from EVENODD and STAR codes; ISBN 978-1-5090-4096-4; 2017 IEEE International Symposium on Information Theory (ISIT); 609-613; 10.1109/ISIT.2017.8006600
- Huang, Wentao and Langberg, Michael, el al. (2016) Communication Efficient Secret Sharing; IEEE Transactions on Information Theory; Vol. 62; No. 12; 7195-7206; 10.1109/TIT.2016.2616144
- Huang, Wentao and Bruck, Jehoshua (2016) Secure RAID Schemes for Distributed Storage; ISBN 978-1-5090-1806-2; 2016 IEEE International Symposium on Information Theory (ISIT); 1401-1405; 10.1109/ISIT.2016.7541529
- Huang, Wentao and Bruck, Jehoshua (2016) Secure RAID Schemes for Distributed Storage; 10.1109/ISIT.2016.7541529
- En Gad, Eyal and Huang, Wentao, el al. (2015) Rewriting Flash Memories by Message Passing; 10.1109/ISIT.2015.7282534
- Huang, Wentao and Langberg, Michael, el al. (2015) Connecting multiple-unicast and network error correction: Reduction and unachievability; ISBN 978-1-4673-7704-1; 2015 IEEE International Symposium on Information Theory; 361-365; 10.1109/ISIT.2015.7282477
- Huang, Wentao and Wang, Ting, el al. (2015) Rateless and pollution-attack-resilient network coding; ISBN 978-1-4673-7704-1; 2015 IEEE International Symposium on Information Theory; 2623-2627; 10.1109/ISIT.2015.7282931
- Huang, Wentao and Langberg, Michael, el al. (2015) Communication Efficient Secret Sharing; 10.1109/TIT.2016.2616144
- En Gad, Eyal and Huang, Wentao, el al. (2015) Rewriting Flash Memories by Message Passing; 10.48550/arXiv.1502.00189
- Huang, Wentao and Ho, Tracey, el al. (2014) Single-source/sink network error correction is as hard as multiple-unicast; ISBN 978-1-4799-8009-3; 2014 52nd Annual Allerton Conference on Communication, Control, and Computing; 423-430; 10.1109/ALLERTON.2014.7028486
- Huang, Wentao and Ho, Tracey, el al. (2014) Reverse Edge Cut-Set Bounds for Secure Network Coding; ISBN 978-1-4799-5186-4; 2014 IEEE International Symposium on Information Theory (ISIT); 106-110; 10.1109/ISIT.2014.6874804
- Wei, Yunkai and Mao, Yuming, el al. (2014) A novel channel aware stage ARQ in wide area Wireless Sensor Networks; ISBN 978-1-4799-2842-2; IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP); 1-5; 10.1109/ISSNIP.2014.6827595
- Huang, Wentao and Ho, Tracey, el al. (2013) On Secure Network Coding with Uniform Wiretap Sets; ISBN 978-1-4799-0821-9; Network Coding (NetCod) 2013; 1-6; 10.1109/NetCod.2013.6570814
- Huang, Wentao and Ho, Tracey, el al. (2013) Rateless Resilient Network Coding Against Byzantine Adversaries; ISBN 978-1-4673-5944-3; Infocom, 2013 Proceedings; 265-269; 10.1109/INFCOM.2013.6566776