


default search action
Bin Dai 0003
Person information
- affiliation: Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- affiliation: Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- affiliation (former): Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- affiliation (PhD 2012): Shanghai Jiao Tong University, China
Other persons with the same name
- Bin Dai — disambiguation page
- Bin Dai 0001
— National University of Defense Technology, Unmanned System Institute, Changsha, China
- Bin Dai 0002
— Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China (and 2 more)
- Bin Dai 0004
— Beihang University, School of Electronic and Information Engineering, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Han Deng
, Dengfeng Xia
, Han Cai, Qifa Yan
, Peng Xu
, Bin Dai
:
An Efficient Coding Scheme for the AWGN Relay Network With Receiver-Transmitter Feedback. IEEE Syst. J. 18(3): 1717-1728 (2024) - [j39]Haonan Zhang
, Ke Li
, Kangli Zhao, Peng Xu
, Bin Dai:
An Efficient Joint Source-Channel Coding Scheme for Wireless Hierarchical Federated Learning and its Information-Theoretic Analysis. IEEE Trans. Consumer Electron. 70(4): 7398-7411 (2024) - [j38]Dengfeng Xia
, Guangfen Xie
, Chuanchuan Yang
, Bin Dai
:
Finite Blocklength Approach and Its Security Analysis for the Dirty-Tape Channel With Noiseless/Noisy Feedback. IEEE Trans. Commun. 72(4): 1949-1966 (2024) - [j37]Haoheng Yuan, Yanghe Feng
, Chuanchuan Yang
, Zhuojun Zhuang, Bin Dai
:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. IEEE Trans. Inf. Forensics Secur. 19: 178-193 (2024) - [c42]Chao Qi, Minquan Cheng, Xianhua Niu, Bin Dai:
Coded Caching with File and Demand Privacy. ISIT 2024: 1658-1663 - [c41]Bin Dai, Fan Cheng, Yuhan Yang, Dengfeng Xia
:
A Linear Feedback Coding Scheme for Computation Over Gaussian Multiple-Access Channels. ISIT 2024: 2228-2232 - [c40]Dengfeng Xia
, Han Deng, Peng Xu, Bin Dai:
Sum-Capacity for Symmetric Finite-State Gaussian Multiple Access Channel with Delayed Feedback. ITW 2024: 669-674 - [c39]Han Deng, Dengfeng Xia
, Peng Xu, Bin Dai:
Gaussian Relay Channel with Noiseless Feedback: Revisit. ITW 2024: 675-680 - [c38]Yuhan Yang, Han Deng, Peng Xu, Bin Dai:
Efficient Coding for Computation Over Gaussian Multiple-Access Channel with Noiseless/Noisy Feedback. ITW 2024: 681-686 - [c37]Jia Wang, Guangfen Xie, Dengfeng Xia
, Bin Dai:
Feedback Coding of URLLC in Vehicle-to-Everything (V2X) Communications and Its Secrecy Analysis. WCNC 2024: 1-6 - 2023
- [j36]Haoheng Yuan, Guangfen Xie
, Bin Dai
:
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. Entropy 25(9): 1339 (2023) - [j35]Guangfen Xie, Chuanchuan Yang
, Yanghe Feng
, Gang Liu, Bin Dai
:
Secure Finite Blocklength Coding Schemes for Reconfigurable Intelligent Surface Aided Wireless Channels With Feedback. IEEE Trans. Commun. 71(5): 2931-2946 (2023) - [c36]Han Deng
, Dengfeng Xia
, Yating Lin, Bin Dai:
A Finite Blocklength Approach for AWGN Relay Network with Receiver-Transmitter Feedback. GLOBECOM (Workshops) 2023: 1231-1236 - [c35]Dengfeng Xia
, Han Deng, Guangfen Xie, Chuanchuan Yang, Bin Dai:
A Finite Blocklength Coding Scheme for the AR(1) Gaussian Channel with AWGN Feedback Channel. GLOBECOM (Workshops) 2023: 1255-1260 - [c34]Haoheng Yuan, Han Deng, Guangfen Xie, Chuanchuan Yang, Bin Dai:
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. GLOBECOM 2023: 7097-7102 - [c33]Haonan Zhang, Zhiming Yu, Chuanchuan Yang, Bin Dai:
When Wireless Hierarchical Federated Learning Meets Physical Layer Security: A Finite Blocklength Approach for MIMO Channel. ICC Workshops 2023: 580-585 - [c32]Guangfen Xie, Chuanchuan Yang, Bin Dai:
Finite Blocklength Coding Scheme for RIS-Aided MIMO Channel with Noisy Feedback. ICC Workshops 2023: 1313-1318 - [c31]Haonan Zhang, Chuanchuan Yang, Bin Dai:
A Finite Blocklength Approach for Wireless Hierarchical Federated Learning in the Presence of Physical Layer Security. INFOCOM Workshops 2023: 1-6 - [c30]Huan Yang, Dengfeng Xia
, Bin Dai:
A Finite Blocklength Approach for the Gaussian Relay Channel with Noisy Feedback. WCSP 2023: 275-280 - 2022
- [j34]Joyce Tlhoolebe, Bin Dai
:
Object Selection as a Biometric. Entropy 24(2): 148 (2022) - [j33]Xia Zeng, Chuanchuan Yang, Bin Dai
:
Utility-Privacy Trade-Off in Distributed Machine Learning Systems. Entropy 24(9): 1299 (2022) - [j32]Dengfeng Xia
, Chuanchuan Yang
, Bin Dai
:
Two-Way Full-Duplex Gaussian Channels With or Without Eavesdropper: Revisit. IEEE Trans. Commun. 70(8): 5434-5450 (2022) - [j31]Bin Dai
, Chong Li
, Yingbin Liang
, Zheng Ma
, Shlomo Shamai
:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. IEEE Trans. Inf. Forensics Secur. 17: 1583-1596 (2022) - [c29]Guangfen Xie, Chuanchuan Yang, Bin Dai:
Secure Finite Blocklength Coding Scheme for the RIS-Aided SIMO Channel with Feedback. GLOBECOM (Workshops) 2022: 516-521 - [c28]Dengfeng Xia
, Chuanchuan Yang, Bin Dai:
A Finite Blocklength Coding Scheme for the Dirty-Tape Channel with Noisy Feedback. GLOBECOM 2022: 4268-4273 - [c27]Dengfeng Xia
, Chuanchuan Yang, Bin Dai:
A Practical Coding Scheme for the Two-Way Full-Duplex Dirty Paper Channel. ICC 2022: 4691-4696 - [c26]Dengfeng Xia
, Chuanchuan Yang, Bin Dai:
A Finite Blocklength Coding Scheme for the Two-Way Full-duplex Fading Channel. ICCC Workshops 2022: 1-6 - [c25]Haonan Zhang, Chuanchuan Yang, Bin Dai:
When Wireless Federated Learning Meets Physical Layer Security: The Fundamental Limits. INFOCOM Workshops 2022: 1-6 - [i12]Haonan Zhang, Chuanchuan Yang, Bin Dai:
When Wireless Hierarchical Federated Learning Meets Physical Layer Security: A Finite Blocklength Approach. CoRR abs/2210.11747 (2022) - 2021
- [j30]Haoheng Yuan, Bin Dai
:
A Capacity-Achieving Feedback Scheme of the Gaussian Multiple-Access Channel with Degraded Message Sets. Entropy 23(6): 756 (2021) - [j29]Guangfen Xie, Bin Dai
:
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy 23(8): 929 (2021) - [c24]Haoheng Yuan, Chuanchuan Yang, Bin Dai:
Enhancing Physical Layer Security in Internet of Things via Feedback: Revisit. ComComAP 2021: 126-131 - [c23]Dengfeng Xia
, Chuanchuan Yang, Bin Dai:
The Role of Feedback in Two-Way Full-Duplex Secure Communication: Revisit. GLOBECOM (Workshops) 2021: 1-6 - [c22]Haoheng Yuan, Chuanchuan Yang, Bin Dai:
Enhancing Physical Layer Security in Internet of Things via Feedback: Revisit. GLOBECOM (Workshops) 2021: 1-6 - 2020
- [j28]Bin Dai, Chong Li, Yingbin Liang, H. Vincent Poor
, Shlomo Shamai (Shitz):
Enhancing physical layer security via channel feedback: a survey. EURASIP J. Wirel. Commun. Netw. 2020(1): 58 (2020) - [j27]Zhuojun Zhuang
, Keke Zhang, Zhen Jing, Bin Dai, Jia Huang:
Bounds on relative generalised Hamming weight. IET Commun. 14(11): 1794-1804 (2020) - [j26]Bin Dai
, Zheng Ma
, Yuan Luo
, Xuxun Liu
, Zhuojun Zhuang, Ming Xiao
:
Enhancing Physical Layer Security in Internet of Things via Feedback: A General Framework. IEEE Internet Things J. 7(1): 99-115 (2020) - [j25]Xuxun Liu
, Anfeng Liu
, Tie Qiu, Bin Dai
, Tian Wang
, Lei Yang
:
Restoring Connectivity of Damaged Sensor Networks for Long-Term Survival in Hostile Environments. IEEE Internet Things J. 7(2): 1205-1215 (2020) - [j24]Xuxun Liu
, Tie Qiu
, Bin Dai, Lei Yang
, Anfeng Liu
, Jiangtao Wang
:
Swarm-Intelligence-Based Rendezvous Selection via Edge Computing for Mobile Sensor Networks. IEEE Internet Things J. 7(10): 9471-9480 (2020) - [j23]Bin Dai
, Chong Li
, Yingbin Liang, Zheng Ma
, Shlomo Shamai Shitz
:
Impact of Action-Dependent State and Channel Feedback on Gaussian Wiretap Channels. IEEE Trans. Inf. Theory 66(6): 3435-3455 (2020) - [c21]Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:
On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback. ISITA 2020: 397-401 - [c20]Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:
Feedback Capacity of Gaussian Multiple-Access Wiretap Channel with Degraded Message Sets. ITW 2020: 1-5 - [i11]Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai:
Feedback Capacities of Gaussian Multiple-Access Wiretap Channels. CoRR abs/2007.14555 (2020)
2010 – 2019
- 2019
- [j22]Haonan Zhang, Linman Yu, Chenxu Wei, Bin Dai
:
A New Feedback Scheme for the State-Dependent Wiretap Channel With Noncausal State at the Transmitter. IEEE Access 7: 45594-45604 (2019) - [j21]Haonan Zhang, Linman Yu, Bin Dai
:
Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter. Entropy 21(3): 278 (2019) - [j20]Chenxu Wei, Linman Yu, Bin Dai
:
Some New Results on the GaussianWiretap Feedback Channel. Entropy 21(9): 817 (2019) - [j19]Bin Dai
, Linman Yu, Xuxun Liu
, Zheng Ma
:
Feedback Coding Schemes for the Broadcast Channel With Mutual Secrecy Requirement at the Receivers. IEEE Trans. Commun. 67(9): 6039-6052 (2019) - [j18]Bin Dai
, Yuan Luo
:
An Improved Feedback Coding Scheme for the Wire-Tap Channel. IEEE Trans. Inf. Forensics Secur. 14(1): 262-271 (2019) - [c19]Bin Dai, Haonan Zhang, Zheng Ma:
Capacity Results on the Action-Dependent Dirty Paper Wiretap Channel. ICC Workshops 2019: 1-6 - [c18]Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz:
The Dirty Paper Wiretap Feedback Channel with or without Action on the State. ISIT 2019: 657-661 - [c17]Linman Yu, Zhuojun Zhuang, Zheng Ma, Bin Dai:
Two Lower Bounds on the Secrecy Capacity of the Action-dependent Dirty Paper Wiretap Channel. IWSDA 2019: 1-4 - [c16]Zhuojun Zhuang, Bin Dai, Keke Zhang, Zhen Jing, Jia Huang, Hao Zhu:
On Asymptotic Analysis of Relative Generalized Hamming Weight. IWSDA 2019: 1-4 - 2018
- [j17]Bin Dai, Zheng Ma, Ming Xiao
, Xiaohu Tang, Pingzhi Fan:
Secure Communication Over Finite State Multiple-Access Wiretap Channel With Delayed Feedback. IEEE J. Sel. Areas Commun. 36(4): 723-736 (2018) - [c15]Bin Dai, Linman Yu, Zheng Ma:
Feedback Strategies for the Broadcast Channel with Mutual Secrecy Requirement. GLOBECOM Workshops 2018: 1-6 - [c14]Bin Dai, Linman Yu, Yuan Luo:
New Results on the Wire-tap Channel with Noiseless Feedback. ITW 2018: 1-5 - [i10]Bin Dai, Linman Yu, Zheng Ma:
Feedback Coding Schemes for the Broadcast Channel with Mutual Secrecy Requirement. CoRR abs/1804.03426 (2018) - 2017
- [j16]Xin Li, Bin Dai, Zheng Ma:
How Can We Fully Use Noiseless Feedback to Enhance the Security of the Broadcast Channel with Confidential Messages. Entropy 19(10): 529 (2017) - [j15]Bin Dai
, Zheng Ma:
Multiple access wiretap channel with noiseless feedback. IET Commun. 11(14): 2190-2198 (2017) - [j14]Bin Dai
, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. IEEE Trans. Inf. Forensics Secur. 12(3): 746-760 (2017) - [c13]Bin Dai, Xin Li:
Capacity Results on the Finite State Multiple-Access Wiretap Channel with Delayed State Feedback. GLOBECOM Workshops 2017: 1-7 - [c12]Bin Dai, Zheng Ma:
Capacity results on the finite state Markov wiretap channel with delayed state feedback. ICASSP 2017: 2072-2076 - [c11]Bin Dai:
Capacity results on the multiple-access wiretap channel with noiseless feedback. IWSDA 2017: 39-43 - [c10]Bin Dai, Zheng Ma:
Can channel output feedback enhance the secrecy capacity of the finite state Markov wiretap channel with delayed state feedback? WCSP 2017: 1-6 - [i9]Bin Dai, Zheng Ma:
Multiple Access Wiretap Channel with Noiseless Feedback. CoRR abs/1701.04052 (2017) - [i8]Bin Dai, Zheng Ma, Yuan Luo, Xiaohu Tang:
Finite State Multiple-Access Wiretap Channel with Delayed Feedback. CoRR abs/1704.01238 (2017) - [i7]Chao Qi, Bin Dai, Xiaohu Tang:
Achieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy. CoRR abs/1707.05930 (2017) - [i6]Bin Dai:
An Improved Feedback Coding Scheme for the Wire-tap Channel. CoRR abs/1712.04981 (2017) - 2016
- [j13]Bin Dai, Linman Yu, Zheng Ma:
Relay Broadcast Channel With Confidential Messages. IEEE Trans. Inf. Forensics Secur. 11(2): 410-425 (2016) - [c9]Bin Dai, Linman Yu, Zheng Ma:
Compress-and-forward strategy for the relay broadcast channel with confidential messages. ICC Workshops 2016: 254-259 - [i5]Bin Dai, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel with Delayed Feedback. CoRR abs/1606.06418 (2016) - 2015
- [j12]Bin Dai, Zheng Ma, Linman Yu:
Feeding Back the Output or Sharing the State: Which Is Better for the State-Dependent Wiretap Channel? Entropy 17(12): 7900-7925 (2015) - [j11]Zhuojun Zhuang, Bin Dai, Yuan Luo, A. J. Han Vinck:
Secure error-correcting network codes with side information leakage. IET Commun. 9(8): 1068-1075 (2015) - [j10]Bin Dai, A. J. Han Vinck, Yuan Luo, Zheng Ma:
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback. J. Commun. Networks 17(1): 21-26 (2015) - [j9]Bin Dai, Zheng Ma:
Multiple-Access Relay Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 10(9): 1835-1849 (2015) - [c8]Bin Dai, Zheng Ma, Linman Yu:
Bounds on the secrecy capacity region of the degraded multiple-access relay wiretap channel. ChinaCom 2015: 254-259 - [c7]Bin Dai, Zheng Ma, Linman Yu:
Feeding back the output or sharing state, which is better for the state-dependent degraded wiretap channel with noncausal CSI at the transmitter? IWSDA 2015: 90-94 - 2014
- [j8]Zhuojun Zhuang, Bin Dai, Yuan Luo, A. J. Han Vinck:
On the relative profiles of a linear code and a subcode. Des. Codes Cryptogr. 72(2): 219-247 (2014) - [j7]Bin Dai, Zheng Ma:
Some New Results on the Multiple-AccessWiretap Channel. Entropy 16(8): 4693-4712 (2014) - [j6]Bin Dai, Yongtao Wang, Zhuojun Zhuang:
Multiple-access wiretap channel with common channel state information at the encoders. IET Commun. 8(5): 597-606 (2014) - [c6]Bin Dai, Zheng Ma:
Achievable rate-equivocation regions for relay broadcast channels with confidential messages. ISITA 2014: 393-397 - [c5]Bin Dai, Zheng Ma:
Feedback enhances the security of degraded broadcast channels with confidential messages and causal channel state information. ITW 2014: 411-415 - [i4]Bin Dai:
Multiple-Access Relay Wiretap Channel. CoRR abs/1403.7883 (2014) - 2013
- [j5]Zhuojun Zhuang, Yuan Luo, Bin Dai:
Code constructions and existence bounds for relative generalized Hamming weight. Des. Codes Cryptogr. 69(3): 275-297 (2013) - [j4]Bin Dai, A. J. Han Vinck, Yuan Luo, Xiaohu Tang:
Wiretap Channel with Action-Dependent Channel State Information. Entropy 15(2): 445-473 (2013) - [j3]Bin Dai, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Capacity Region of a New Bus Communication Model. Entropy 15(2): 678-697 (2013) - [j2]Bin Dai
, Adrianus J. Han Vinck, Yuan Luo:
Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback. J. Appl. Math. 2013: 423619:1-423619:17 (2013) - [c4]Bin Dai, Yongtao Wang:
Degraded multiple-access channel with confidential messages. IWSDA 2013: 110-113 - [i3]Bin Dai, Zheng Ma:
Relay Broadcast Channels with Confidential Messages. CoRR abs/1312.6784 (2013) - 2012
- [j1]Bin Dai, Yuan Luo:
Some New Results on the Wiretap Channel with Side Information. Entropy 14(9): 1671-1702 (2012) - [c3]Bin Dai, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Capacity region of non-degraded wiretap channel with noiseless feedback. ISIT 2012: 244-248 - [c2]Bin Dai, Jiehua Hong, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback. ISIT 2012: 438-442 - [i2]Bin Dai:
Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback. CoRR abs/1201.2859 (2012) - [i1]Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo:
Information-Theoretical Security for Several Models of Multiple-Access Channel. CoRR abs/1208.1697 (2012)
2000 – 2009
- 2008
- [c1]Bin Dai, Yuan Luo, A. J. Han Vinck:
Wiretap Channel with Side Information from Part of Encoder. NPC Workshops 2008: 353-357
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-24 00:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint