#### Filter Results:

- Full text PDF available (9)

#### Publication Year

2013

2017

- This year (2)
- Last five years (19)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Shaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi
- 2014 IEEE 15th International Workshop on Signal…
- 2014

An anomaly detection problem is investigated, in which there are totally n sequences, with s anomalous sequences to be detected. Each normal sequence contains m independent and identically distributed (i.i.d.) samples drawn from a distribution p, whereas each anomalous sequence contains m i.i.d. samples drawn from a distribution q that is distinct from p.… (More)

- Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai
- IEEE Transactions on Information Theory
- 2015

A novel information theoretic approach is proposed to solve the secret sharing problem, in which a dealer distributes one or multiple secrets among a set of participants in such a manner that for each secret only qualified sets of users can recover this secret by pooling their shares together while nonqualified sets of users obtain no information about the… (More)

- Shaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi
- ArXiv
- 2014

An anomaly detection problem is investigated, in which there are totally n sequences with s anomalous sequences to be detected. Each normal sequence contains m independent and identically distributed (i.i.d.) samples drawn from a distribution p, whereas each anomalous sequence contains m i.i.d. samples drawn from a distribution q that is distinct from p.… (More)

- Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai
- Proceedings of the IEEE
- 2015

- Yuheng Bu, Shaofeng Zou, Yingbin Liang, Venugopal V. Veeravalli
- 2016 IEEE International Symposium on Information…
- 2016

The problem of estimating the KL divergence between two unknown distributions is studied. The alphabet size k of the distributions can scale to infinity. The estimation is based on m and n independent samples respectively drawn from the two distributions. It is first shown that there does not exist any consistent estimator to guarantee asymptotic small… (More)

- Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai
- 2013 IEEE 14th Workshop on Signal Processing…
- 2013

A K-receiver degraded broadcast channel with layered decoding and secrecy constraints is investigated, in which receivers are ordered by their channel quality. Each receiver is required to decode one more message compared to the receiver with one level worse channel quality, and this message should be kept secure from all receivers with worse channel… (More)

- Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai
- 2015 IEEE International Symposium on Information…
- 2015

A four-receiver degraded broadcast channel with secrecy outside a bounded range is studied, over which a transmitter sends four messages to four receivers. In the model considered, the channel quality gradually degrades from receiver 4 to receiver 1, and receiver k is required to decode the first k messages for k = 1, ..., 4. Furthermore, message 3 is… (More)

- Yuheng Bu, Shaofeng Zou, Yingbin Liang, Venugopal V. Veeravalli
- 2016 IEEE International Conference on Acoustics…
- 2016

The following detection problem is studied, in which there are M sequences of samples out of which one outlier sequence needs to be detected. Each typical sequence contains n independent and identically distributed (i.i.d.) continuous observations from a known distribution π, and the outlier sequence contains n i.i.d. observations from an outlier… (More)

- Shaofeng Zou, Yingbin Liang, H. Vincent Poor
- 2016 IEEE International Conference on Acoustics…
- 2016

Nonparametric detection of existence of an anomalous disk over a lattice network is investigated. If an anomalous disk exists, then all nodes belonging to the disk observe samples generated by a distribution q, whereas all other nodes observe samples generated by a distribution p that is distinct from q. If there does not exist an anomalous disk, then all… (More)

- Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai
- 2015 IEEE Information Theory Workshop (ITW)
- 2015

A three-receiver degraded broadcast channel with secrecy outside of a bounded range is studied, in which the channel quality gradually degrades from receiver 3 to receiver 1. The transmitter has three messages intended for the receivers with receiver 3 decoding all messages, receiver 2 decoding the first two messages, and receiver 1 decoding only the first… (More)