default search action
Jianwei Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j8]Pritam Mukherjee, Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT. IEEE Trans. Inf. Theory 63(3): 1898-1922 (2017) - [c13]Heng-Tze Cheng, Zakaria Haque, Lichan Hong, Mustafa Ispir, Clemens Mewald, Illia Polosukhin, Georgios Roumpos, D. Sculley, Jamie Smith, David Soergel, Yuan Tang, Philipp Tucker, Martin Wicke, Cassandra Xia, Jianwei Xie:
TensorFlow Estimators: Managing Simplicity vs. Flexibility in High-Level Machine Learning Frameworks. KDD 2017: 1763-1771 - [i7]Heng-Tze Cheng, Zakaria Haque, Lichan Hong, Mustafa Ispir, Clemens Mewald, Illia Polosukhin, Georgios Roumpos, D. Sculley, Jamie Smith, David Soergel, Yuan Tang, Philipp Tucker, Martin Wicke, Cassandra Xia, Jianwei Xie:
TensorFlow Estimators: Managing Simplicity vs. Flexibility in High-Level Machine Learning Frameworks. CoRR abs/1708.02637 (2017) - 2016
- [j7]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure. IEEE Trans. Inf. Theory 62(4): 2044-2069 (2016) - 2015
- [j6]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment. Proc. IEEE 103(10): 1857-1873 (2015) - [j5]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of K-User Gaussian Interference Channels: A Unified View. IEEE Trans. Inf. Theory 61(5): 2647-2661 (2015) - [i6]Pritam Mukherjee, Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of One-hop Wireless Networks with No Eavesdropper CSIT. CoRR abs/1506.06114 (2015) - [i5]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of Multi-user Networks: One-Time-Pads in the Air via Alignment. CoRR abs/1507.02266 (2015) - 2014
- [b1]Jianwei Xie:
Secure Degrees of Freedom of Wireless Networks. University of Maryland, College Park, MD, USA, 2014 - [j4]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of One-Hop Wireless Networks. IEEE Trans. Inf. Theory 60(6): 3359-3378 (2014) - [c12]Jianwei Xie, Sennur Ulukus:
Inseparability of the multiple access wiretap channel. ISIT 2014: 391-395 - [c11]Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints. ITW 2014: 361-365 - [i4]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure. CoRR abs/1404.7478 (2014) - 2013
- [j3]Jianwei Xie, Sennur Ulukus:
Sum Secure Degrees of Freedom of Two-Unicast Layered Wireless Networks. IEEE J. Sel. Areas Commun. 31(9): 1931-1943 (2013) - [j2]Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, Aylin Yener:
Cooperative Security at the Physical Layer: A Summary of Recent Advances. IEEE Signal Process. Mag. 30(5): 16-28 (2013) - [c10]Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom region of the Gaussian multiple access wiretap channel. ACSSC 2013: 293-297 - [c9]Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming. CISS 2013: 1-5 - [c8]Jianwei Xie, Sennur Ulukus:
Unified secure DoF analysis of K-user Gaussian interference channels. ISIT 2013: 1107-1111 - [c7]Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom of the Gaussian multiple access wiretap channel. ISIT 2013: 1337-1341 - [i3]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming. CoRR abs/1302.6570 (2013) - [i2]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of K-User Gaussian Interference Channels: A Unified View. CoRR abs/1305.7214 (2013) - 2012
- [c6]Jianwei Xie, Sennur Ulukus:
Secure degrees of freedom of the Gaussian wiretap channel with helpers. Allerton Conference 2012: 193-200 - [c5]Jianwei Xie, Sennur Ulukus:
On the sum secure degrees of freedom of two-unicast layered wireless networks. ISIT 2012: 51-55 - [i1]Jianwei Xie, Sennur Ulukus:
Secure Degrees of Freedom of One-hop Wireless Networks. CoRR abs/1209.5370 (2012) - 2011
- [j1]Jiefang Sun, Aitao Guo, Zhaoyang Zhang, Lei Guo, Jianwei Xie:
A Conjugated Aptamer-Gold Nanoparticle Fluorescent Probe for Highly Sensitive Detection of rHuEPO-α. Sensors 11(11): 10490-10501 (2011) - [c4]Jianwei Xie, Sennur Ulukus:
Secrecy games on the one-sided interference channel. ISIT 2011: 1245-1249 - 2010
- [c3]Jianwei Xie, Sennur Ulukus:
Real interference alignment for the K-user Gaussian interference compound wiretap channel. Allerton 2010: 1252-1257
2000 – 2009
- 2008
- [c2]Jianwei Xie, Pingyi Fan:
Capacity and Delay of the Wireless Network with Special Relay Nodes. NPC Workshops 2008: 369-374 - 2007
- [c1]Jianwei Xie, Pingyi Fan, Khaled Ben Letaief:
Congestion and Access Control Policies of Multi-Priority Instant Services for IP-Based CDMA Radio Access Networks. WCNC 2007: 3838-3843
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-15 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint