default search action
Hongyi Yao
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Haiyu Song, Hongyi Yao, Peng Shi, Dan Zhang, Li Yu:
Distributed Secure State Estimation of Multi-Sensor Systems Subject to Two-Channel Hybrid Attacks. IEEE Trans. Signal Inf. Process. over Networks 8: 1049-1058 (2022) - [c26]Weichen Xu, Jian Cao, Tianhao Fu, Hongyi Yao, Yuan Wang:
Boosting Dense Long-Tailed Object Detection from Data-Centric View. ACCV (3) 2022: 558-574 - [c25]Hongyi Yao, Pu Li, Jian Cao, Xiangcheng Liu, Chenying Xie, Bingzhang Wang:
RAPQ: Rescuing Accuracy for Power-of-Two Low-bit Post-training Quantization. IJCAI 2022: 1573-1579 - [i12]Hongyi Yao, Pu Li, Jian Cao, Xiangcheng Liu, Chenying Xie, Bingzhang Wang:
RAPQ: Rescuing Accuracy for Power-of-Two Low-bit Post-training Quantization. CoRR abs/2204.12322 (2022) - 2021
- [i11]Xiangcheng Liu, Jian Cao, Hongyi Yao, Wenyu Sun, Yuan Zhang:
AdaPruner: Adaptive Channel Pruning and Effective Weights Inheritance. CoRR abs/2109.06397 (2021)
2010 – 2019
- 2015
- [j6]Xin Lou, Hongyi Yao, Chee-Wei Tan, Jianping Wang:
VANDER: Efficient Cooperative Watchdog Monitoring for Lossy Wireless Network Coding. IEEE Trans. Veh. Technol. 64(2): 702-713 (2015) - [c24]Hongyi Yao, Gyan Ranjan, Alok Tongaonkar, Yong Liao, Zhuoqing Morley Mao:
SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic. MobiCom 2015: 439-451 - [c23]Ashkan Nikravesh, Hongyi Yao, Shichang Xu, David R. Choffnes, Zhuoqing Morley Mao:
Mobilyzer: An Open Platform for Controllable Mobile Network Measurements. MobiSys 2015: 389-404 - [c22]Shichang Xu, Ashkan Nikravesh, Hongyi Yao, David R. Choffnes, Zhuoqing Morley Mao:
Demo: Mobilyzer: Mobile Network Measurement Made Easy. MobiSys 2015: 467 - [c21]Shichang Xu, Ashkan Nikravesh, Hongyi Yao, David R. Choffnes, Zhuoqing Morley Mao:
Poster: Context-Triggered Mobile Network Measurement. MobiSys 2015: 493 - 2014
- [j5]Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Comput. Surv. 47(2): 24:1-24:34 (2014) - [j4]Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael Langberg:
Network Codes Resilient to Jamming and Eavesdropping. IEEE/ACM Trans. Netw. 22(6): 1978-1987 (2014) - [c20]Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan M. Duursma:
Distributed reed-solomon codes for simple multiple access networks. ISIT 2014: 651-655 - [c19]Sanae Rosen, Hongyi Yao, Ashkan Nikravesh, Yunhan Jia, David R. Choffnes, Zhuoqing Morley Mao:
Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf. MobiSys 2014: 353 - 2013
- [c18]Zhao Li, Tracey Ho, Derek Leong, Hongyi Yao:
Distributed storage allocation for heterogeneous systems. Allerton 2013: 320-326 - [c17]Shota Kanno, Sang-Rim Lee, T. Harashima, Toshinobu Kuki, Hisashi Kino, Hajime Mushiake, Hongyi Yao, Tetsu Tanaka:
Multiple optical stimulation to neuron using Si opto-neural probe with multiple optical waveguides and metal-cover for optogenetics. EMBC 2013: 253-256 - [c16]Xiaohang Li, Hongyi Yao, Meng Wang, Soung Chang Liew:
ADMOt: Compressive sensing techniques for channel monitoring in multiple access networks. ICASSP 2013: 4514-4518 - [c15]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless resilient network coding against byzantine adversaries. INFOCOM 2013: 265-269 - [c14]Qing Yang, Xiaoxiao Li, Hongyi Yao, Ji Fang, Kun Tan, Wenjun Hu, Jiansong Zhang, Yongguang Zhang:
BigStation: enabling scalable real-time signal processingin large mu-mimo systems. SIGCOMM 2013: 399-410 - [i10]Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless Resilient Network Coding Against Byzantine Adversaries. CoRR abs/1301.2860 (2013) - [i9]Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan M. Duursma:
Distributed Reed-Solomon Codes for Simple Multiple Access Networks. CoRR abs/1310.5187 (2013) - 2012
- [j3]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Passive Network Tomography for Erroneous Networks: A Network Coding Approach. IEEE Trans. Inf. Theory 58(9): 5922-5940 (2012) - [c13]Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network equivalence in the presence of an eavesdropper. Allerton Conference 2012: 960-967 - [c12]Ömer Faruk Tekin, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
On erasure correction coding for streaming. ITA 2012: 221-226 - [i8]Theodoros K. Dikaliotis, Hongyi Yao, Tracey Ho, Michelle Effros, Jörg Kliewer:
Network Equivalence in the Presence of an Eavesdropper. CoRR abs/1211.4081 (2012) - 2011
- [j2]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-Access Network Information-Flow and Correction Codes. IEEE Trans. Inf. Theory 57(2): 1067-1079 (2011) - [c11]Hongyi Yao, Tracey Ho, Cristina Nita-Rotaru:
Key agreement for wireless networks in the presence of active adversaries. ACSCC 2011: 792-796 - [c10]Ömer Faruk Tekin, Svitlana Vyetrenko, Tracey Ho, Hongyi Yao:
Erasure correction for nested receivers. Allerton 2011: 1454-1461 - [c9]Hongyi Yao, Tracey Ho:
Privacy preserving data aggregating with multiple access channel. Allerton 2011: 1809-1815 - [c8]Hongyi Yao, Tracey Ho:
Error Estimating Codes with Constant Overhead: A Random Walk Approach. ICC 2011: 1-5 - [c7]Peng Zhang, Yixin Jiang, Chuang Lin, Hongyi Yao, Albert Wasef, Xuemin Shen:
Padding for orthogonality: Efficient subspace authentication for network coding. INFOCOM 2011: 1026-1034 - [c6]Hongyi Yao, Tracey Ho, Michelle Effros:
On the equivalence of Shannon capacity and stable capacity in networks with memoryless channels. ISIT 2011: 503-507 - [i7]Theodoros K. Dikaliotis, Hongyi Yao, Amir Salman Avestimehr, Sidharth Jaggi, Tracey Ho:
Low-Complexity Near-Optimal Codes for Gaussian Relay Networks. CoRR abs/1102.5138 (2011) - 2010
- [c5]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Network Coding Tomography for Network Failures. INFOCOM 2010: 91-95 - [c4]Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, Alon Rosen:
RIPPLE Authentication for Network Coding. INFOCOM 2010: 2258-2266 - [c3]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multi-source operator channels: Efficient capacity-achieving codes. ITW 2010: 1-5 - [i6]Hongyi Yao, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho:
Multiple Access Network Information-flow And Correction codes. CoRR abs/1001.2603 (2010) - [i5]Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael Langberg:
Network Codes Resilient to Jamming and Eavesdropping. CoRR abs/1001.3714 (2010) - [i4]Hongyi Yao, Xiaohang Li, Soung Chang Liew:
Achieving the Scaling Law of SNR-Monitoring in Dynamic Wireless Networks. CoRR abs/1008.0053 (2010) - [i3]Theodoros K. Dikaliotis, Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Hongyi Yao, Michelle Effros, Jörg Kliewer, Elona Erez:
Multiple-access Network Information-flow and Correction Codes. CoRR abs/1012.0112 (2010)
2000 – 2009
- 2009
- [j1]Bin Ma, Hongyi Yao:
Seed optimization for i.i.d. similarities is no easier than optimal Golomb ruler design. Inf. Process. Lett. 109(19): 1120-1124 (2009) - [c2]Hongyi Yao, Elad Verbin:
Network coding is highly non-approximable. Allerton 2009: 209-213 - [i2]Hongyi Yao, Sidharth Jaggi, Minghua Chen:
Network coding tomography for network failures. CoRR abs/0908.0711 (2009) - 2008
- [c1]Bin Ma, Hongyi Yao:
Seed Optimization Is No Easier than Optimal Golomb Ruler Design. APBC 2008: 133-144 - 2007
- [i1]Hongyi Yao:
On the Information of the Second Moments Between Random Variables Using Mutually Unbiased Bases. CoRR abs/0712.2579 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint