{"id":"https://openalex.org/W1972103862","doi":"https://doi.org/10.1109/tit.2014.2315821","title":"Performance Bounds on a Wiretap Network With Arbitrary Wiretap Sets","display_name":"Performance Bounds on a Wiretap Network With Arbitrary Wiretap Sets","publication_year":2014,"publication_date":"2014-04-04","ids":{"openalex":"https://openalex.org/W1972103862","doi":"https://doi.org/10.1109/tit.2014.2315821","mag":"1972103862"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2014.2315821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2315821","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030803449","display_name":"Fan Cheng","orcid":"https://orcid.org/0000-0002-4307-6334"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Cheng","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Key Laboratory of Network Coding Key Technology and Application and Shenzhen Research Institute, The Chinese University of Hong Kong, Shenzhen, China","Institute of Network Coding and the Department of Information Engineering, The Chinese University of Hong Kong, N.T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Coding Key Technology and Application and Shenzhen Research Institute, The Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"Institute of Network Coding and the Department of Information Engineering, The Chinese University of Hong Kong, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030803449"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":3.9569,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.93871096,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"60","issue":"6","first_page":"3345","last_page":"3358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.770087480545044},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7402133941650391},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5262859463691711},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.5142528414726257},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4742369055747986},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.4719903767108917},{"id":"https://openalex.org/keywords/point-to-point","display_name":"Point-to-point","score":0.4716838002204895},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4533039331436157},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.43736982345581055},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4330657422542572},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.42047619819641113},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3633307218551636},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30298370122909546},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1009102463722229}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.770087480545044},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7402133941650391},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5262859463691711},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.5142528414726257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4742369055747986},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.4719903767108917},{"id":"https://openalex.org/C174440990","wikidata":"https://www.wikidata.org/wiki/Q681349","display_name":"Point-to-point","level":2,"score":0.4716838002204895},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4533039331436157},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.43736982345581055},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4330657422542572},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42047619819641113},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3633307218551636},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30298370122909546},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1009102463722229},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tit.2014.2315821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2315821","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.752.3941","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.752.3941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://arxiv.org/pdf/1212.0101.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W18139138","https://openalex.org/W68293075","https://openalex.org/W1762430620","https://openalex.org/W1939999869","https://openalex.org/W1969116803","https://openalex.org/W1971450408","https://openalex.org/W1973427399","https://openalex.org/W1978347773","https://openalex.org/W1979760651","https://openalex.org/W2006947308","https://openalex.org/W2014808714","https://openalex.org/W2027214873","https://openalex.org/W2101526130","https://openalex.org/W2105831729","https://openalex.org/W2109394932","https://openalex.org/W2133936282","https://openalex.org/W2136237463","https://openalex.org/W2141420453","https://openalex.org/W2151964399","https://openalex.org/W2158622349","https://openalex.org/W2165440928","https://openalex.org/W2171100910","https://openalex.org/W2563871604","https://openalex.org/W2914714618","https://openalex.org/W2970097841","https://openalex.org/W3019365222","https://openalex.org/W4230830692","https://openalex.org/W4233121052","https://openalex.org/W4300079393","https://openalex.org/W6600739974","https://openalex.org/W6602698672","https://openalex.org/W6640552614","https://openalex.org/W6657109630","https://openalex.org/W6698135423"],"related_works":["https://openalex.org/W2212571888","https://openalex.org/W2139379087","https://openalex.org/W2411336269","https://openalex.org/W2020805386","https://openalex.org/W3014803371","https://openalex.org/W2124128583","https://openalex.org/W2489403550","https://openalex.org/W2079655802","https://openalex.org/W2073059552","https://openalex.org/W2096444692"],"abstract_inverted_index":{"Consider":[0],"a":[1,6,34,61,99,104,125,144,188],"communication":[2,229],"network":[3,55,62],"represented":[4],"by":[5],"directed":[7],"graph":[8],"G":[9],"=":[10],"(V,":[11],"\u03b5),":[12],"where":[13],"V":[14],"is":[15,22,38,74,156,202,218,231],"the":[16,23,29,32,51,67,70,80,84,116,118,165,177,205,223,227],"set":[17,24,95],"of":[18,25,96,103,107,138,141,143,170,173,195,222],"nodes":[19],"and":[20,40,77,175,186],"8":[21],"point-to-point":[26,228],"channels":[27],"in":[28,82,193,213],"network.":[30],"On":[31],"network,":[33],"secure":[35,54],"message":[36,68,119],"M":[37],"transmitted,":[39],"there":[41],"may":[42],"exist":[43],"wiretappers":[44],"who":[45],"want":[46],"to":[47,59,114,121],"obtain":[48,176],"information":[49],"about":[50],"message.":[52],"In":[53,112,160],"coding,":[56],"we":[57,163],"aim":[58],"find":[60],"code,":[63],"which":[64,83],"can":[65,86,210],"protect":[66,115],"against":[69],"wiretapper":[71,85],"whose":[72],"power":[73],"constrained.":[75],"Cai":[76],"Yeung":[78],"studied":[79],"model":[81],"access":[87],"any":[88],"one":[89,94],"but":[90],"not":[91],"more":[92,158],"than":[93],"channels,":[97],"called":[98],"wiretap":[100,110],"set,":[101],"out":[102],"collection":[105],"A":[106,136,168],"all":[108,139],"possible":[109],"sets.":[111],"order":[113],"message,":[117],"needs":[120],"be":[122,211],"mixed":[123],"with":[124],"random":[126],"key":[127],"K.":[128],"They":[129],"proved":[130],"tight":[131],"fundamental":[132],"performance":[133],"bounds":[134,155],"when":[135,167,216],"consists":[137,169],"subsets":[140,172],"\u03b5":[142,174],"fixed":[145],"size":[146],"r.":[147],"However,":[148],"beyond":[149],"this":[150,161],"special":[151],"case,":[152],"obtaining":[153],"such":[154],"much":[157],"difficult.":[159],"paper,":[162],"investigate":[164],"problem":[166],"arbitrary":[171],"following":[178],"results:":[179],"1)":[180],"an":[181],"upper":[182,198],"bound":[183,190,199,207,225],"on":[184,191,200,208],"H(M)":[185,201],"2)":[187],"lower":[189,206,224],"H(K)":[192,209],"terms":[194],"H(M).":[196],"The":[197,220],"explicit,":[203],"while":[204],"computed":[212],"polynomial":[214],"time":[215],"|A|":[217],"fixed.":[219],"tightness":[221],"for":[226],"system":[230],"also":[232],"proved.":[233]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
