<h1>Huang, Wentao</h1>
<h2>Combined from <a href="https://authors.library.caltech.edu">CaltechAUTHORS</a></h2>
<ul>
<li>Shor, Roman and Yadgar, Gala, el al. (2018) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016">How to Best Share a Big Secret</a>; ISBN 978-1-4503-5849-1; Proceedings of the 11th ACM International Systems and Storage Conference; 76-88; <a href="https://doi.org/10.1145/3211890.3211896">10.1145/3211890.3211896</a></li>
<li>Huang, Wentao and Ho, Tracey, el al. (2018) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670">Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding</a>; IEEE Transactions on Information Theory; Vol. 64; No. 6; 4496-4512; <a href="https://doi.org/10.1109/TIT.2018.2820686">10.1109/TIT.2018.2820686</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170713-092535943">Generic Secure Repair for Distributed Storage</a>; <a href="https://doi.org/10.48550/arXiv.1706.00500">10.48550/arXiv.1706.00500</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20191004-142514161">Generic Secure Repair for Distributed Storage</a>; <a href="https://doi.org/10.48550/arXiv.1706.00500">10.48550/arXiv.1706.00500</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334">Secret sharing with optimal decoding and repair bandwidth</a>; ISBN 978-1-5090-4096-4; 2017 IEEE International Symposium on Information Theory (ISIT); 1813-1817; <a href="https://doi.org/10.1109/ISIT.2017.8006842">10.1109/ISIT.2017.8006842</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720">Secure RAID schemes from EVENODD and STAR codes</a>; ISBN 978-1-5090-4096-4; 2017 IEEE International Symposium on Information Theory (ISIT); 609-613; <a href="https://doi.org/10.1109/ISIT.2017.8006600">10.1109/ISIT.2017.8006600</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180709-102239656">Secret Sharing with Optimal Decoding and Repair Bandwidth</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2017) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20180709-101600551">Secure RAID Schemes from EVENODD and STAR Codes</a></li>
<li>Huang, Wentao and Langberg, Michael, el al. (2016) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20161011-150403696">Communication Efficient Secret Sharing</a>; IEEE Transactions on Information Theory; Vol. 62; No. 12; 7195-7206; <a href="https://doi.org/10.1109/TIT.2016.2616144">10.1109/TIT.2016.2616144</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2016) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889">Secure RAID Schemes for Distributed Storage</a>; ISBN 978-1-5090-1806-2; 2016 IEEE International Symposium on Information Theory (ISIT); 1401-1405; <a href="https://doi.org/10.1109/ISIT.2016.7541529">10.1109/ISIT.2016.7541529</a></li>
<li>Huang, Wentao and Bruck, Jehoshua (2016) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20160125-120110556">Secure RAID Schemes for Distributed Storage</a>; <a href="https://doi.org/10.1109/ISIT.2016.7541529">10.1109/ISIT.2016.7541529</a></li>
<li>Huang, Wentao and Langberg, Michael, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107">Connecting multiple-unicast and network error correction: Reduction and unachievability</a>; ISBN 978-1-4673-7704-1; 2015 IEEE International Symposium on Information Theory; 361-365; <a href="https://doi.org/10.1109/ISIT.2015.7282477">10.1109/ISIT.2015.7282477</a></li>
<li>En Gad, Eyal and Huang, Wentao, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290">Rewriting Flash Memories by Message Passing</a>; <a href="https://doi.org/10.1109/ISIT.2015.7282534">10.1109/ISIT.2015.7282534</a></li>
<li>Huang, Wentao and Wang, Ting, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269">Rateless and pollution-attack-resilient network coding</a>; ISBN 978-1-4673-7704-1; 2015 IEEE International Symposium on Information Theory; 2623-2627; <a href="https://doi.org/10.1109/ISIT.2015.7282931">10.1109/ISIT.2015.7282931</a></li>
<li>Huang, Wentao and Langberg, Michael, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150529-105023455">Communication Efficient Secret Sharing</a>; <a href="https://doi.org/10.1109/TIT.2016.2616144">10.1109/TIT.2016.2616144</a></li>
<li>En Gad, Eyal and Huang, Wentao, el al. (2015) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150209-161244506">Rewriting Flash Memories by Message Passing</a>; <a href="https://doi.org/10.48550/arXiv.1502.00189">10.48550/arXiv.1502.00189</a></li>
<li>Huang, Wentao and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898">Single-source/sink network error correction is as hard as multiple-unicast</a>; ISBN 978-1-4799-8009-3; 2014 52nd Annual Allerton Conference on Communication, Control, and Computing; 423-430; <a href="https://doi.org/10.1109/ALLERTON.2014.7028486">10.1109/ALLERTON.2014.7028486</a></li>
<li>Huang, Wentao and Ho, Tracey, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781">Reverse Edge Cut-Set Bounds for Secure Network Coding</a>; ISBN 978-1-4799-5186-4; 2014 IEEE International Symposium on Information Theory (ISIT); 106-110; <a href="https://doi.org/10.1109/ISIT.2014.6874804">10.1109/ISIT.2014.6874804</a></li>
<li>Wei, Yunkai and Mao, Yuming, el al. (2014) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191">A novel channel aware stage ARQ in wide area Wireless Sensor Networks</a>; ISBN 978-1-4799-2842-2; IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP); 1-5; <a href="https://doi.org/10.1109/ISSNIP.2014.6827595">10.1109/ISSNIP.2014.6827595</a></li>
<li>Huang, Wentao and Ho, Tracey, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708">On Secure Network Coding with Uniform Wiretap Sets</a>; ISBN 978-1-4799-0821-9; Network Coding (NetCod) 2013; 1-6; <a href="https://doi.org/10.1109/NetCod.2013.6570814">10.1109/NetCod.2013.6570814</a></li>
<li>Huang, Wentao and Ho, Tracey, el al. (2013) <a href="https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091">Rateless Resilient Network Coding Against Byzantine Adversaries</a>; ISBN 978-1-4673-5944-3; Infocom, 2013 Proceedings; 265-269; <a href="https://doi.org/10.1109/INFCOM.2013.6566776">10.1109/INFCOM.2013.6566776</a></li>
</ul>