Follow
Ruida Zhou
Ruida Zhou
Verified email at tamu.edu - Homepage
Title
Cited by
Cited by
Year
Capacity-achieving private information retrieval codes from MDS-coded databases with minimum message size
R Zhou, C Tian, H Sun, T Liu
IEEE Transactions on Information Theory 66 (8), 4904-4916, 2020
572020
On the information leakage in private information retrieval systems
T Guo, R Zhou, C Tian
IEEE Transactions on Information Forensics and Security 15, 2999-3012, 2020
342020
Learning policies with zero or bounded constraint violation for constrained mdps
T Liu, R Zhou, D Kalathil, P Kumar, C Tian
Advances in Neural Information Processing Systems 34, 17183-17193, 2021
272021
Generalized global bandit and its application in cellular coverage optimization
C Shen, R Zhou, C Tekin, M van der Schaar
IEEE Journal of Selected Topics in Signal Processing 12 (1), 218-232, 2018
252018
Regional multi-armed bandits
Z Wang, R Zhou, C Shen
International Conference on Artificial Intelligence and Statistics, 510-518, 2018
202018
Individually conditional individual mutual information bound on generalization error
R Zhou, C Tian, T Liu
IEEE Transactions on Information Theory 68 (5), 3304-3316, 2022
172022
Regional multi-armed bandits with partial informativeness
Z Wang, R Zhou, C Shen
IEEE Transactions on Signal Processing 66 (21), 5705-5717, 2018
142018
Cost-aware cascading bandits
R Zhou, C Gan, J Yan, C Shen
arXiv preprint arXiv:1805.08638, 2018
122018
Weakly private information retrieval under the maximal leakage metric
R Zhou, T Guo, C Tian
2020 IEEE International Symposium on Information Theory (ISIT), 1089-1094, 2020
112020
New results on the storage-retrieval tradeoff in private information retrieval systems
T Guo, R Zhou, C Tian
IEEE Journal on Selected Areas in Information Theory 2 (1), 403-414, 2021
92021
Fast global convergence of policy optimization for constrained MDPs
T Liu, R Zhou, D Kalathil, PR Kumar, C Tian
arXiv preprint arXiv:2111.00552, 2021
92021
Cost-aware cascading bandits
C Gan, R Zhou, J Yang, C Shen
IEEE Transactions on Signal Processing 68, 3692-3706, 2020
82020
Cost-aware learning and optimization for opportunistic spectrum access
C Gan, R Zhou, J Yang, C Shen
IEEE Transactions on Cognitive Communications and Networking 5 (1), 15-27, 2018
82018
Neighbor cell list optimization in handover management using cascading bandits algorithm
C Wang, J Yang, H He, R Zhou, S Chen, X Jiang
IEEE Access 8, 134137-134150, 2020
62020
Improved weakly private information retrieval codes
C Qian, R Zhou, C Tian, T Liu
2022 IEEE International Symposium on Information Theory (ISIT), 2827-2832, 2022
42022
Two-level private information retrieval
R Zhou, C Tian, H Sun, JS Plank
IEEE Journal on Selected Areas in Information Theory 3 (2), 337-349, 2022
42022
On Top- Selection From -Wise Partial Rankings via Borda Counting
W Chen, R Zhou, C Tian, C Shen
IEEE Transactions on Signal Processing 70, 2031-2045, 2022
32022
Stochastic chaining and strengthened information-theoretic generalization bounds
R Zhou, C Tian, T Liu
2022 IEEE International Symposium on Information Theory (ISIT), 690-695, 2022
22022
Computational techniques for investigating information theoretic limits of information systems
C Tian, JS Plank, B Hurst, R Zhou
Information 12 (2), 82, 2021
22021
User manual CAI version-1.0: An open-source toolbox for computer-aided investigation on the fundamental limits of information systems
C Tian, JS Plank, B Hurst, R Zhou
arXiv preprint arXiv:1910.08567, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20