18 results on '"Ta-Yuan Liu"'
Search Results
2. Multicasting with untrusted relays: A noncoherent secure network coding approach.
- Author
-
Ta-Yuan Liu, Shih-Chun Lin, and Yao-Win Peter Hong
- Published
- 2015
- Full Text
- View/download PDF
3. Artificial noise design for discriminatory channel estimation in wireless MIMO systems.
- Author
-
Ta-Yuan Liu, Yu-Ching Chen, and Yao-Win Peter Hong
- Published
- 2014
- Full Text
- View/download PDF
4. Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere.
- Author
-
Ta-Yuan Liu, Pritam Mukherjee, Sennur Ulukus, Shih-Chun Lin, and Yao-Win Peter Hong
- Published
- 2014
- Full Text
- View/download PDF
5. How much training is enough for secrecy beamforming with artificial noise.
- Author
-
Ta-Yuan Liu, Shih-Chun Lin, Tsung-Hui Chang, and Yao-Win Peter Hong
- Published
- 2012
- Full Text
- View/download PDF
6. Privacy-Utility Tradeoff with Nonspecific Tasks: Robust Privatization and Minimum Leakage
- Author
-
I-Hsiang Wang and Ta-Yuan Liu
- Subjects
Constraint (information theory) ,Mathematical optimization ,Information privacy ,Optimization problem ,Linear programming ,Robustness (computer science) ,Computer science ,Mutual information ,Information theory ,Weighting - Abstract
Privacy-preserving data release mechanisms aiming to minimize the privacy leakage under utility constraints of nonspecific tasks are studied through the lens of information theory. While the private feature to be protected is typically determined and known by the users who release their data, the specific task where the release data is utilized is usually unknown. To address the lack of information of the specific task, utility constraints laid on a set of multiple possible tasks are considered. The mechanism protects the privacy of a given feature of the to-be-released data while satisfying utility constraints of all possible tasks in the set. First, the single-letter characterization of the privacy-utility tradeoff region is derived. Characterization of the minimum privacy under log-loss utility constraints turns out to be a non-convex optimization problem involving mutual information in the objective function and the constraints. Second, focusing on the case where the raw data consists of multiple independent components, we show that the above optimization problem can be decomposed into multiple parallel privacy funnel (PF) problems [1] with different weightings. We explicitly derive the optimal solution to each PF problem when the private feature is a deterministic function of a data component. The solution is characterized by the leakage-free threshold, and the minimum leakage is zero while the utility constraint is below the threshold. Once the utility requirement is above the threshold, the privacy leakage increases linearly. Finally, we show that the optimal weighting of each privacy funnel problem can be found by solving a linear program (LP). Numerical results are shown to illustrate the robustness of our approach.
- Published
- 2021
7. To avoid or not to avoid CSI leakage in physical layer secret communication systems
- Author
-
Y.-W. Peter Hong, Pin-Hsun Lin, Shih-Chun Lin, Ta-Yuan Liu, and Eduard A. Jorswieck
- Subjects
Signal processing ,Channel code ,Computer Networks and Communications ,Computer science ,business.industry ,Transmitter ,Physical layer ,Data_CODINGANDINFORMATIONTHEORY ,Communications system ,Backward compatibility ,Computer Science Applications ,Electronic engineering ,Electrical and Electronic Engineering ,business ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Channel use ,Leakage (electronics) ,Computer network - Abstract
Physical layer secrecy has attracted much attention in recent years due to its ability to ensure communication secrecy with the use of channel coding and signal processing techniques (and without the explicit use of secret keys) in the physical layer. It serves as a promising technique for highly dynamic or ad hoc systems such as device-to-device and machine-type communication systems. However, the achievable secrecy performance depends highly on the level of CSI at the transmitter, the receiver, and the eavesdropper. In this article, we discuss how different levels of CSI resulting from conventional and unconventional ways of performing training and channel feedback may affect the confidentiality in terms of the information-theoretic (perfect) secrecy rate. The conventional approach refers to the emission of pilot signals from the transmitter and explicit channel feedback from the receiver. This approach is backward compatible with existing systems and allows the receiver to obtain accurate knowledge of the CSI, but may suffer from CSI leakage toward the eavesdropper. Unconventional approaches capitalize on reverse training to prevent CSI leakage and are shown to achieve significant improvements over conventional schemes in certain cases. For example, in a system with four transmit antennas and a single antenna at both the receiver and the eavesdropper, a secrecy rate gain of approximately 0.8 b/channel use at transmit SNR of 16 dB is observed over the full CSI case by providing CSI only to the transmitter (but not the receiver and the eavesdropper).
- Published
- 2015
8. Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere
- Author
-
Y.-W. Peter Hong, Pritam Mukherjee, Sennur Ulukus, Ta-Yuan Liu, and Shih-Chun Lin
- Subjects
Discrete mathematics ,Wiretap channels ,Applied Mathematics ,MIMO ,Transmitter ,Computer Science Applications ,symbols.namesake ,Control theory ,Channel state information ,symbols ,Coherence (signal processing) ,Fading ,Electrical and Electronic Engineering ,Rayleigh scattering ,Mathematics ,Rayleigh fading - Abstract
We consider the block Rayleigh fading multiple-input multiple-output (MIMO) wiretap channel with no prior channel state information (CSI) available at any of the terminals. The channel gains remain constant within a coherence interval of $T$ symbols, and then change to another independent realization in the next coherence interval. The transmitter, the legitimate receiver, and the eavesdropper have $n_{t}$ , $n_{r}$ , and $n_{e} $ antennas, respectively. We determine the exact secure degrees of freedom (s.d.o.f.) of this system when $T\geq 2\min(n_{t},n_{r} )$ . We show that, in this case, the s.d.o.f. is exactly equal to $(\min(n_{t},n_{r})-n_{e})^{+}(T-\min(n_{t},n_{r} ))/T$ . The first term in this expression can be interpreted as the eavesdropper with $n_{e}$ antennas taking away $n_{e} $ antennas from both the transmitter and the legitimate receiver. The second term can be interpreted as a fraction of the s.d.o.f. being lost due to the lack of CSI at the legitimate receiver. In particular, the fraction loss, $\min(n_{t},n_{r} ) /T$ , can be interpreted as the fraction of channel uses dedicated to training the legitimate receiver for it to learn its own CSI. We prove that this s.d.o.f. can be achieved by employing a constant norm channel input, which can be viewed as a generalization of discrete signalling to multiple dimensions.
- Published
- 2015
9. Do people from Taiwan have higher heavy metal levels than those from Western countries?
- Author
-
Wei-Chun Huang, Ta-Yuan Liu, Shoa-Lin Lin, Ming-Ling Wu, and Yao-Min Hung
- Subjects
inorganic chemicals ,Adult ,Male ,Population ,Taiwan ,chemistry.chemical_element ,Ethylenediaminetetraacetic acid ,Urine ,010501 environmental sciences ,01 natural sciences ,Arsenic ,Metal ,Excretion ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Animal science ,Germany ,Metals, Heavy ,Medicine ,Humans ,030212 general & internal medicine ,Occupations ,education ,Edetic Acid ,0105 earth and related environmental sciences ,Aged ,Cadmium ,education.field_of_study ,business.industry ,General Medicine ,Mercury ,Middle Aged ,United States ,Mercury (element) ,chemistry ,Lead ,visual_art ,visual_art.visual_art_medium ,Body Burden ,Original Article ,Female ,business - Abstract
Introduction This study investigated whether heavy metal levels were higher in people from Taiwan as compared to those from Western countries. Methods We measured the level of heavy metals (lead, mercury, arsenic and cadmium) in the blood of 40 apparently healthy adults. Since mercury does not respond to ethylenediaminetetraacetic acid (EDTA) infusion, only urine lead, arsenic and cadmium levels were determined by applying the body burden concept after calcium disodium EDTA infusion. These three heavy metals were extracted from daily urine samples for three consecutive days. Results The mean blood lead, mercury and cadmium levels of the Taiwanese individuals (24.46 ± 9.69 µg/L, 9.64 ± 6.98 µg/L and 0.73 ± 0.27 µg/L, respectively) were greater than those of the Americans. The Taiwanese also had greater blood mercury and cadmium levels than the Germans. The first-day urine lead, arsenic and cadmium levels were 77.9%, 33.1% and 62.4%, respectively, of the total lead, arsenic and cadmium excretion during the three days. This indicates that the first-day urine lead and cadmium excretion represented most (> 60%) of the lead and cadmium excretion in those three days. Conclusion This study demonstrated that the Taiwanese population has higher blood mercury and cadmium levels than Western populations. To study the urine lead and cadmium body burden of patients, detection of first-day, rather than three-day, urine lead and cadmium levels can be done, as the former yields results that are fairly representative, and is more time- and cost-effective.
- Published
- 2017
10. On the Role of Artificial Noise in Training and Data Transmission for Secret Communications
- Author
-
Shih-Chun Lin, Ta-Yuan Liu, and Y.-W. Peter Hong
- Subjects
FOS: Computer and information sciences ,Beamforming ,Coherence time ,Theoretical computer science ,Computer Networks and Communications ,Computer science ,Computer Science - Information Theory ,02 engineering and technology ,Precoding ,Signal-to-noise ratio ,0203 mechanical engineering ,Secrecy ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Coherence (signal processing) ,Safety, Risk, Reliability and Quality ,Computer Science::Information Theory ,Information Theory (cs.IT) ,High Energy Physics::Phenomenology ,020206 networking & telecommunications ,020302 automobile design & engineering ,Channel state information ,Computer Science::Mathematical Software ,Artificial noise ,Coherence (physics) ,Data transmission - Abstract
This work considers the joint design of training and data transmission in physical-layer secret communication systems, and examines the role of artificial noise (AN) in both of these phases. In particular, AN in the training phase is used to prevent the eavesdropper from obtaining accurate channel state information (CSI) whereas AN in the data transmission phase can be used to mask the transmission of the confidential message. By considering AN-assisted training and secrecy beamforming schemes, we first derive bounds on the achievable secrecy rate and obtain a closed-form approximation that is asymptotically tight at high SNR. Then, by maximizing the approximate achievable secrecy rate, the optimal power allocation between signal and AN in both training and data transmission phases is obtained for both conventional and AN-assisted training based schemes. We show that the use of AN is necessary to achieve a high secrecy rate at high SNR, and its use in the training phase can be more efficient than that in the data transmission phase when the coherence time is large. However, at low SNR, the use of AN provides no advantage since CSI is difficult to obtain in this case. Numerical results are presented to verify our theoretical claims., 38 pages, 5 figures, submitted to IEEE Transactions on Information Theory (submitted November 2015)
- Published
- 2015
11. Multicasting with untrusted relays: A noncoherent secure network coding approach
- Author
-
Shih-Chun Lin, Ta-Yuan Liu, and Y.-W. Peter Hong
- Subjects
Multicast ,business.industry ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Eavesdropping ,Data_CODINGANDINFORMATIONTHEORY ,law.invention ,Spread spectrum ,Relay ,law ,Encoding (memory) ,Linear network coding ,Secrecy ,business ,Communication channel ,Computer network - Abstract
We consider the problem of multicasting information from a source to a destination over a multihop network of intermediate relays. However, some of the relays are untrustworthy and may be subject to eavesdropping. The source wishes to enlist their help while keeping the message secret against the eavesdropper. By employing random linear network coding at the relays, the problem is modeled as a noncoherent wiretap channel and is examined in terms of its secrecy capacity. The input distribution is optimized using an efficient projection-based gradient decent algorithm. The untrusted relay recruitment problem is also examined based on the derived secrecy capacity. An interesting scenario is analyzed where each potentially insecure relay may be randomly eavesdropped with a certain probability. Our asymptotic analysis reveals that, with enough untrusted relays, there exists a threshold on the eavesdropping probability below which all untrusted relays should be recruited.
- Published
- 2015
12. The presence of protein-conjugated acrolein and 3-Hydroxypropyl Mercapturic Acid (3-HPMA) in patients with Alzheimer's disease
- Author
-
Han Hsing Tsou, Ta-Yuan Liu, and C.H. Hu
- Subjects
chemistry.chemical_compound ,Biochemistry ,Chemistry ,Acrolein ,In patient ,General Medicine ,Conjugated system ,Mercapturic acid ,Toxicology - Published
- 2016
13. Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
- Author
-
Y.-W. Peter Hong, Sennur Ulukus, Shih-Chun Lin, Ta-Yuan Liu, and Pritam Mukherjee
- Subjects
Discrete mathematics ,3G MIMO ,Coherence time ,business.industry ,Computer science ,MIMO ,Transmitter ,symbols.namesake ,Channel state information ,symbols ,Fading ,Rayleigh scattering ,business ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Rayleigh fading ,Computer network ,Communication channel - Abstract
We consider the block Rayleigh fading multiple-input multiple-output (MIMO) wiretap channel with no prior channel state information (CSI) available at any of the terminals. The channel gains remain constant in a coherence time of T symbols, and then change to another independent realization. The transmitter, the legitimate receiver and the eavesdropper have n t , n r and n e antennas, respectively. We determine the exact secure degrees of freedom (s.d.o.f.) of this system when T ≥ 2 min(n t , n r ). We show that, in this case, the s.d.o.f. is exactly (min(n t , n r ) - n e ) + (T - min(n t , n r ))/T. The first term can be interpreted as the eavesdropper with n e antennas taking away n e antennas from both the transmitter and the legitimate receiver. The second term can be interpreted as a fraction of s.d.o.f. being lost due to the lack of CSI at the legitimate receiver. In particular, the fraction loss, min(n t , n r )/T, can be interpreted as the fraction of channel uses dedicated to training the legitimate receiver for it to learn its own CSI. We prove that this s.d.o.f. can be achieved by employing a constant norm channel input, which can be viewed as a generalization of discrete signalling to multiple dimensions.
- Published
- 2014
14. Betel quid chewing modulates the cigarette containing acrolein uptake in oral cancer patients
- Author
-
Ta-Yuan Liu, C.H. Hu, and Han Hsing Tsou
- Subjects
chemistry.chemical_compound ,chemistry ,business.industry ,Acrolein ,medicine ,Cancer ,General Medicine ,Betel quid chewing ,Pharmacology ,Toxicology ,medicine.disease ,business - Published
- 2016
15. K-band and high-power/efficiency/breakdown GaInAs/InP composite channel HEMTs
- Author
-
J. Pusl, Ta-Yuan Liu, Mehran Matloubian, R. Virk, C. Ngo, and J.B. Shealy
- Subjects
Materials science ,business.industry ,Transconductance ,General Engineering ,General Physics and Astronomy ,High-electron-mobility transistor ,Semiconductor device ,K band ,Breakdown voltage ,Optoelectronics ,Power semiconductor device ,business ,Electrical efficiency ,Power density - Abstract
The authors report the power performance of Ga/sub 0.47/In/sub 0.53/As/InP composite channel InP HEMT's at 18 GHz. Devices with 0.15-/spl mu/m gatelength exhibit a peak transconductance of 720 mS/mm and full channel current of 500 mA/mm while achieving a two-terminal (three-terminal) breakdown voltage of 13.3 V (10.4 V) at 1 mA/mm. Devices with 450-/spl mu/m gatewidth exhibit 0.75-W/mm output power with 53% power-added efficiency (PAE) and 11.9-dB gain. The highest efficiency achieved was 57% at 5.0 V (V/sub ds/) for 600-/spl mu/m-wide devices producing an output power density of 0.5 W/mm. Further, devices with 900-/spl mu/m gatewidth exhibit 0.59-W/mm output power with 53% PAE and 10.5-dB gain.
- Published
- 1997
16. Do people from Taiwan have higher heavy metal levels than those from Western countries?
- Author
-
Ta-Yuan Liu, Yao-Min Hung, Wei-Chun Huang, Ming-Ling Wu, Shoa-Lin Lin, Liu, Ta-Yuan, Hung, Yao-Min, Huang, Wei-Chun, Wu, Ming-Ling, and Lin, Shoa-Lin
- Subjects
HEAVY metals ,ETHYLENEDIAMINETETRAACETIC acid ,ARSENIC ,CADMIUM ,MERCURY ,COMPARATIVE studies ,LEAD ,RESEARCH methodology ,MEDICAL cooperation ,OCCUPATIONS ,RESEARCH ,EVALUATION research ,BODY burden - Abstract
Introduction: This study investigated whether heavy metal levels were higher in people from Taiwan as compared to those from Western countries.Methods: We measured the level of heavy metals (lead, mercury, arsenic and cadmium) in the blood of 40 apparently healthy adults. Since mercury does not respond to ethylenediaminetetraacetic acid (EDTA) infusion, only urine lead, arsenic and cadmium levels were determined by applying the body burden concept after calcium disodium EDTA infusion. These three heavy metals were extracted from daily urine samples for three consecutive days.Results: The mean blood lead, mercury and cadmium levels of the Taiwanese individuals (24.46 ± 9.69 µg/L, 9.64 ± 6.98 µg/L and 0.73 ± 0.27 µg/L, respectively) were greater than those of the Americans. The Taiwanese also had greater blood mercury and cadmium levels than the Germans. The first-day urine lead, arsenic and cadmium levels were 77.9%, 33.1% and 62.4%, respectively, of the total lead, arsenic and cadmium excretion during the three days. This indicates that the first-day urine lead and cadmium excretion represented most (> 60%) of the lead and cadmium excretion in those three days.Conclusion: This study demonstrated that the Taiwanese population has higher blood mercury and cadmium levels than Western populations. To study the urine lead and cadmium body burden of patients, detection of first-day, rather than three-day, urine lead and cadmium levels can be done, as the former yields results that are fairly representative, and is more time- and cost-effective. [ABSTRACT FROM AUTHOR]- Published
- 2017
- Full Text
- View/download PDF
17. Relationship between vitamin D deficiency and cardiovascular disease
- Author
-
Shoa-Lin Lin, Yan-Chiou Ku, Ta-Yuan Liu, Mu-En Liu, and Chang-Sheng Ku
- Subjects
medicine.medical_specialty ,business.industry ,Parathyroid hormone ,Review ,Disease ,medicine.disease ,Placebo ,vitamin D deficiency ,Insulin resistance ,Diabetes mellitus ,Internal medicine ,Epidemiology ,Vitamin D and neurology ,medicine ,Cardiology and Cardiovascular Medicine ,business - Abstract
Epidemiological studies have found that low 25-hydroxyvitamin D levels may be associated with coronary risk factors and adverse cardiovascular outcomes. Additionally, vitamin D deficiency causes an increase in parathyroid hormone, which increases insulin resistance and is associated with diabetes, hypertension, inflammation, and increased cardiovascular risk. In this review, we analyze the association between vitamin D supplementation and the reduction in cardiovascular disease. The role of vitamin D deficiency in cardiovascular morbidity and mortality is still controversial, and larger scale, randomized placebo controlled trials are needed to investigate whether oral vitamin D supplementation can reduce cardiovascular risk. Given the low cost, safety, and demonstrated benefit of higher 25-hydroxyvitamin D levels, vitamin D supplementation should become a public health priority for combating common and costly chronic cardiovascular diseases.
- Published
- 2013
18. Study of Ohmic contact resistance to Ga[sub (1−X)]In[sub (X)]As/InP composite channel InP high electron mobility transistors for X=35% to X=81%
- Author
-
Ta-Yuan Liu, C. Ngo, M. Matloubian, and J. B. Shealy
- Subjects
Electron mobility ,Materials science ,business.industry ,digestive, oral, and skin physiology ,Contact resistance ,Transistor ,General Engineering ,Induced high electron mobility transistor ,chemistry.chemical_element ,respiratory system ,Gallium arsenide ,law.invention ,chemistry.chemical_compound ,chemistry ,law ,Optoelectronics ,business ,Ohmic contact ,Sheet resistance ,Indium - Abstract
This article reports the performance of alloyed Ohmic contacts to Ga(1−X)In(X)As/InP composite channel InP high electron mobility transistors for various indium compositions, from X=35% to X=81%. Both strained and pseudomorphic structures were utilized to observe the impact of the indium concentration on electron mobility, carrier concentration, sheet resistance, and specific contact resistance. The lowest specific contact resistance (Rt
- Published
- 1997
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.