Author image not provided
 H Vincent Poor

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article7.02
Citation Count2,351
Publication count335
Publication years1993-2017
Available for download31
Average downloads per article206.84
Downloads (cumulative)6,412
Downloads (12 Months)232
Downloads (6 Weeks)145
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


348 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 348
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
October 2018 IEEE/ACM Transactions on Networking (TON): Volume 26 Issue 5, October 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 4,   Downloads (Overall): 4

Full text available: PDFPDF
A social learning network SLN emerges when users exchange information on educational topics with structured interactions. The recent proliferation of massively scaled online human learning, such as massive open online courses MOOCs, has presented a plethora of research challenges surrounding SLN. In this paper, we ask: how efficient are these ...

2
September 2018 IEEE Transactions on Information Theory: Volume 64 Issue 9, September 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

It is well known that the mutual information between two random variables can be expressed as the difference of two relative entropies that depend on an auxiliary distribution, a relation sometimes referred to as the golden formula. This paper is concerned with a finite-blocklength extension of this relation. This extension ...

3
August 2018 SEC'18: Proceedings of the 27th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

We demonstrate that an Internet of Things (IoT) botnet of high wattage devices-such as air conditioners and heaters-gives a unique ability to adversaries to launch large-scale coordinated attacks on the power grid. In particular, we reveal a new class of potential attacks on power grids called the Manipulation of demand ...

4
August 2018 IEEE Transactions on Wireless Communications: Volume 17 Issue 8, August 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Caching popular files in the storage of edge networks, namely edge caching, is a promising approach for service providers (SPs) to reduce redundant backhaul transmission to edge nodes (ENs). It is still an open problem to design an efficient incentive mechanism for edge caching in 5G networks with a large ...

5
July 2018 Problems of Information Transmission: Volume 54 Issue 3, July 2018
Publisher: Plenum Press
Bibliometrics:
Citation Count: 0

The common wisdom is that the capacity of parallel channels is usually additive. This was also conjectured by Shannon for the zero-error capacity function, which was later disproved by constructing explicit counterexamples demonstrating the zero-error capacity to be super-additive. Despite these explicit examples for the zero-error capacity, there is surprisingly ...

6
July 2018 IEEE Transactions on Signal Processing: Volume 66 Issue 14, July 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas, while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users’ quality-of-service ...

7
July 2018 IEEE Transactions on Signal Processing: Volume 66 Issue 14, July 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Training design for general multiple-input multiple-output (MIMO) systems is investigated in this paper. Unlike prior designs that are applicable only for centralized MIMO systems with total power constraints, general power constraints are considered here. They cover total power constraints, individual power constraints, and mixed individual and per-user sum-power constraints as ...

8
February 2018 IEEE Wireless Communications: Volume 25 Issue 1, February 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Wireless communication networks are becoming highly virtualized with two-layer hierarchies, in which controllers at the upper layer with tasks to achieve can ask a large number of agents at the lower layer to help realize computation, storage, and transmission functions. Through offloading data processing to the agents, the controllers can ...

9
February 2018 IEEE Wireless Communications: Volume 25 Issue 1, February 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The emergence of big data analytics makes it possible to extract and predict user demand from a significant volume of data that are collected from mobile networks. Accurate prediction of user demand based on big data provides the fundamental information for proactive pushing and caching, which can efficiently obtain capacity ...

10
February 2018 IEEE Transactions on Mobile Computing: Volume 17 Issue 2, February 2018
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

User authentication is the critical first step in detecting identity-based attacks and preventing subsequent malicious attacks. However, the increasingly dynamic mobile environments make it harder to always apply cryptographic-based methods for user authentication due to their infrastructural and key management overhead. Exploiting non-cryptographic based techniques grounded on physical layer properties ...

11 published by ACM
January 2018 CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 131,   Downloads (12 Months): 131,   Downloads (Overall): 131

Full text available: PDFPDF
Differential privacy mechanism design has traditionally been tailored for a scalar-valued query function. Although many mechanisms such as the Laplace and Gaussian mechanisms can be extended to a matrix-valued query function by adding i.i.d. noise to each element of the matrix, this method is often suboptimal as it forfeits an ...
Keywords: MVG mechanism, differential privacy, directional noise, matrix-valued query, matrix-variate Gaussian

12
January 2018 IEEE Transactions on Wireless Communications: Volume 17 Issue 1, January 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Software-defined networking (SDN) provides an agile and programmable way to optimize radio access networks via a control-data plane separation. Nevertheless, reaping the benefits of wireless SDN hinges on making optimal use of the limited wireless fronthaul capacity. In this paper, the problem of fronthaul-aware resource allocation and user scheduling is ...

13
January 2018 IEEE Transactions on Signal Processing: Volume 66 Issue 2, January 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

This paper considers a wireless sensor network for locating a static target or tracking a dynamic target, which is characterized a priori by a Gaussian mixture distribution. An amplify-and-forward relay node acts as a wireless bridge in relaying the sensor's independent observations of the target to a fusion center (FC). ...

14
December 2017 IEEE Transactions on Wireless Communications: Volume 16 Issue 12, December 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

In this paper, the problem of distributed resource allocation is studied for an Internet of Things (IoT) system, composed of a heterogeneous group of nodes compromising both machine-type devices (MTDs) and human-type devices (HTDs). The problem is formulated as a noncooperative game between the heterogeneous IoT devices which seek to ...

15
May 2017 IEEE Transactions on Wireless Communications: Volume 16 Issue 5, May 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

This study investigates relay control for simultaneous wireless information and power transfer in full-duplex relay networks under Nakagami- $m$ fading channels. Unlike previous work, harvest-transmit (HT) and general harvest-transmit-store (HTS) models are respectively considered to maximize average throughput subject to quality of service (QoS) constraints. The end-to-end outage ...

16
May 2017 IEEE Transactions on Information Theory: Volume 63 Issue 5, May 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

In this paper, the problem of developing universal algorithms for noiseless compressed sensing of stochastic processes is studied. First, Rényi’s notion of information dimension (ID) is generalized to continuous-valued discrete-time stationary processes. This provides a measure of complexity for such processes and is connected to the rate of measurement (sampling ...

17
May 2017 IEEE Transactions on Wireless Communications: Volume 16 Issue 5, May 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

This paper considers the efficient design of precoding matrices for sum throughput maximization under throughput quality of service (QoS) constraints and energy harvesting (EH) constraints for energy-constrained devices in a full-duplex (FD) multicell multi-user multiple-input-multiple-output network. Both time splitting (TS) and power splitting are considered to ensure practical EH and ...

18
March 2017 IEEE Journal on Selected Areas in Communications: Volume 35 Issue 3, March 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, and targeted attacks on storage devices. In this paper, prospect theory (PT) is applied to formulate the interaction between the defender of a cloud storage system and an APT attacker who makes subjective decisions ...

19
February 2017 IEEE Transactions on Signal Processing: Volume 65 Issue 3, February 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Tensor canonical polyadic decomposition (CPD), which recovers the latent factor matrices from multidimensional data, is an important tool in signal processing. In many applications, some of the factor matrices are known to have orthogonality structure, and this information can be exploited to improve the accuracy of latent factors recovery. However, ...

20
February 2017 IEEE Transactions on Wireless Communications: Volume 16 Issue 2, February 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

In this paper, new strategies are devised for joint load balancing and interference management in the downlink of a heterogeneous network, where small cells are densely deployed within the coverage area of a traditional macrocell. Unlike existing work, the limited backhaul capacity at each base station (BS) is taken into ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us