Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huishuai Zhang is active.

Publication


Featured researches published by Huishuai Zhang.


IEEE Transactions on Information Theory | 2014

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation

Huishuai Zhang; Lifeng Lai; Yingbin Liang; Hua Wang

The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated. In this problem, each terminal observes a component of correlated sources. All three terminals are required to generate the common SK to be concealed from an eavesdropper that has access to the public discussion, while two designated terminals are required to generate an extra PK to be concealed from both the eavesdropper and the remaining terminal. An outer bound on the SK-PK capacity region was established by Ye and Narayan, and was shown to be achievable for a special case. In this paper, the SK-PK capacity region is established in general by developing schemes to achieve the outer bound for the remaining two cases. The main technique lies in the novel design of a random binning-joint decoding scheme that achieves the existing outer bound.


international symposium on information theory | 2015

Secret key capacity: Talk or keep silent?

Huishuai Zhang; Yingbin Liang; Lifeng Lai

The problem of when all terminals must talk to achieve the secrecy capacity in the multiterminal source model is investigated. Two conditions under which respectively a given terminal does not need to and must talk to achieve the secrecy capacity are characterized. The cases when all terminals must talk to achieve secrecy capacity are shown to be many more than those conjectured in [1] for systems with four or more terminals. There is a gap between the above two conditions, in which whether a given terminal need to talk is not clear. A conjecture is further made in order to narrow down the gap.


international symposium on information theory | 2014

Secret key-private key generation over three terminals: Capacity region

Huishuai Zhang; Lifeng Lai; Yingbin Liang; Hua Wang

The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources. All three terminals are required to generate a common secret key concealed from an eavesdropper that has access to public discussion, while two designated terminals are required to generate an extra private key concealed from both the eavesdropper and the remaining terminal. An outer bound on the SK-PK capacity region was established in [1], and was shown to be achievable for one case. In this paper, achievable schemes are designed to achieve the outer bound for the remaining two cases, and hence the SK-PK capacity region is established in general. The main technique lies in the novel design of a random binning-joint decoding scheme that achieves the existing outer bound.


information theory workshop | 2014

Key capacity region for a cellular source model

Huishuai Zhang; Yingbin Liang; Lifeng Lai

A cellular source model for key generation is proposed and studied, in which a central terminal χ<sub>0</sub> wishes to generate K<sub>1</sub> with terminal χ<sub>1</sub> and K<sub>2</sub> with terminal χ<sub>2</sub>, respectively, via public discussion. Each terminal observes a component of a correlated source sequence. The K<sub>1</sub> is required to be concealed from an eavesdropper that has access to the public discussion, while the key K<sub>2</sub> needs to be concealed from both the eavesdropper and terminal χ<sub>1</sub>. The key capacity region is established by showing that the cut-set upper bound is achievable.


international conference on sampling theory and applications | 2017

Non-convex low-rank matrix recovery from corrupted random linear measurements

Yuanxin Li; Yuejie Chi; Huishuai Zhang; Yingbin Liang

Recent work has demonstrated the effectiveness of gradient descent for recovering low-rank matrices from random linear measurements in a globally convergent manner. However, their performance is highly sensitive in the presence of outliers that may take arbitrary values, which is common in practice. In this paper, we propose a truncated gradient descent algorithm to improve the robustness against outliers, where the truncation is performed to rule out the contributions from samples that deviate significantly from the sample median. A restricted isometry property regarding the sample median is introduced to provide a theoretical footing of the proposed algorithm for the Gaussian orthogonal ensemble. Extensive numerical experiments are provided to validate the superior performance of the proposed algorithm.


allerton conference on communication, control, and computing | 2016

Geometrical properties and accelerated gradient solvers of non-convex phase retrieval

Yi Zhou; Huishuai Zhang; Yingbin Liang

We consider recovering a signal x ∈ ℝn from the magnitudes of Gaussian measurements by minimizing a second order yet non-smooth loss function. By exploiting existing concentration results of the loss function, we show that the non-convex loss function satisfies several quadratic geometrical properties. Based on these geometrical properties, we characterize the linear convergence of the sequence of function graph generated by the gradient flow on minimizing the loss function. Furthermore, we propose an accelerated version of the gradient flow, and establish an in-exact linear convergence of the generated sequence of function graph by exploiting the quadratic geometries of the loss function. Then, we verify the numerical advantages of the proposed algorithms over other state-of-art algorithms.


asilomar conference on signals, systems and computers | 2014

Helper-assisted asymmetric two key generation

Huishuai Zhang; Yingbin Liang; Lifeng Lai

The problem of simultaneously generating an asymmetric key pair with assistance of a helper is studied. In this setting, each of four terminals, i.e., a base station X<sub>0</sub>, two cellular nodes X<sub>1</sub> and X<sub>2</sub>, and a helper X<sub>3</sub>, observes a component of correlated sources. The cellular nodes X<sub>1</sub> and X<sub>2</sub> wish to generate secret keys K<sub>1</sub> and K<sub>2</sub> with the base station X<sub>0</sub>, respectively, under the help of terminal X<sub>3</sub>. Both keys should be concealed from an eavesdropper that has access to the public discussion, while K<sub>2</sub> is also required to be concealed from terminal X<sub>1</sub>. An outer bound on the key capacity region is derived. It is shown to be achievable under certain condition, and hence the key capacity region is characterized under such condition.


allerton conference on communication, control, and computing | 2016

On Compressive orthonormal Sensing

Yi Zhou; Huishuai Zhang; Yingbin Liang

The Compressive Sensing (CS) approach for recovering sparse signal with orthonormal measurements has been studied under various notions of coherence. However, existing notions of coherence either do not exploit the structure of the underlying signal, or are too complicated to provide an explicit sampling scheme for all orthonormal basis sets. Consequently, there is lack of understanding of key factors that guide the sampling of CS with orthonormal measurements and achieve as low sample complexity as possible. In this paper, we introduce a new notion of π-coherence that exploits both the sparsity structure of the signal and the local coherence. Based on π-coherence, we propose a sampling scheme that is adapted to the underlying true signal and is applicable for CS under all orthonormal basis. Our scheme outperforms (up to a constant factor) existing sampling schemes for orthonormal measurements, and achieves a near-optimal sample complexity (up to certain logarithm factors) for several popular choices of orthonormal basis. Furthermore, we characterize the necessary conditions on the sampling schemes for CS with orthonormal measurements. We then propose a practical multi-phase implementation of our sampling scheme, and verify its advantage over existing sampling schemes via application to magnetic resonance imaging (MRI) in medical science.


international symposium on information theory | 2015

Two-key generation for a cellular model with a helper

Huishuai Zhang; Yingbin Liang; Lifeng Lai; Shlomo Shamai

The problem of simultaneously generating two keys for a cellular model is investigated, in which each of four terminals, X<sub>0</sub>, X<sub>1</sub>, X<sub>2</sub>, and X<sub>3</sub> observes one component of correlated sources. The terminal X0 wishes to generate secret keys K<sub>1</sub> and K<sub>2</sub> respectively, with terminals X<sub>1</sub> and X<sub>2</sub> under the help of terminal X<sub>3</sub>. They are allowed to communicate over a public channel. Both K<sub>1</sub> and K<sub>2</sub> are required to be concealed from an eavesdropper that has access to the public discussion. The key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds, which greatly simplifies the proof.


international conference on machine learning | 2016

Provable non-convex phase retrieval with outliers: median truncated wirtinger flow

Huishuai Zhang; Yuejie Chi; Yingbin Liang

Collaboration


Dive into the Huishuai Zhang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lifeng Lai

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shlomo Shamai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shlomo Shamai Shitz

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rafael F. Schaefer

Technical University of Berlin

View shared research outputs
Researchain Logo
Decentralizing Knowledge