教师名录

程帆 特别研究员

主页: [点击这里]

办公室电话:

办公地点:SEIEE 3-513

电子邮件:chengfan@cs.sjtu.edu.cn

实验室: 信息与计算实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务
Information theory, Security, Machine Learning
PhD,  Information Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China, 2008-2012.


Bachelor, Computer Science and Engineering, Shanghai Jiao Tong University, China, 2003-2007.


Journal papers
    1. F. Cheng and V. Y. F. Tan, ’’A Numerical Study on the Wiretap Network with a Simple Network Topology,’’ IEEE Trans. Inform. Theory, vol. 62, no. 5, pp. 2481-2492, May 2016[arXiv link].
    2. F. Cheng and Y. Geng, "Higher Order Derivatives in Costa’s Entropy Power Inequality,’’ IEEE Trans. Inform. Theory, vol. 61, no. 11, pp. 5892-5905, Nov. 2015. [arXiv link]
    3. F. Cheng, R. W. Yeung, and K. W. Shum, "Imperfect Secrecy in Wiretap Channel II," IEEE Trans. Inform. Theory, vol. 61, no. 1, pp. 628-636, Jan. 2015. [arXiv link
    4. F. Cheng and R. W. Yeung, "Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets," IEEE Trans. Inform. Theory, vol. 60, no. 6, pp. 3345-3358, Jun. 2014. [arXiv link]
    5. F. Cheng, "Generalization of Mrs. Gerber’s Lemma," Communications in Information and Systems, vol. 14, no. 2, pp. 79–86, 2014. [Full Text] [arXiv link]. 
    6. R. K. Panta, R. Jana, F. Cheng, Y.-F. R. Chen, and V. A. Vaishampayan, "Phoenix: Storage Using an Autonomous Mobile Infrastructure," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1863-1873, Sept. 2013.
    7. T. Wu and F. Cheng, "The Structures of Zero-divisor Semi-groups with Graph Kn?K2," Semi-group Forum, vol. 76, Springer (2008), pp. 330-340.

  Conference papers
    1. Y. Geng and F. Cheng, ’’Duality between finite numbers of discrete multiple access and broadcast channels,’’ 2015 IEEE Information Theory Workshop, Jeju, Korea (ITW 2015).
    2. Q. Chen, F. Cheng, T. Liu and R. W. Yeung, ’’A Marginal Characterization of Entropy Functions for Conditional Mutual Independent Random Variables,’’ 2015 IEEE International Symposium on Information Theory, (ISIT 2015).
    3. F. Cheng, "Optimality of Routing on the Wiretap Network with Simple Network Topology,’’ 2014 IEEE International Symposium on Information Theory, (ISIT 2014).
    4. F. Cheng and Y. Geng, "Convexity of Fisher Information with Respect to Gaussian Perturbation,’’  2014 Iran Workshop on Communication and Information Theory, (IWCIT 2014).
    5. F. Cheng, R. W. Yeung and K. W. Shum, "Imperfect Secrecy in Wiretap Channel II," 2012 IEEE International Symposium on Information Theory, (ISIT 2012).
    6. F. Cheng and R. W. Yeung, "Performance Bounds in Secure Network Coding," 2011 IEEE International Symposium on Network Coding, (NetCod 2011).


联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013