Fan Cheng
Fan Cheng
Verified email at - Homepage
Cited by
Cited by
SDTR: Soft decision tree regressor for tabular data
H Luo, F Cheng, H Yu, Y Yi
IEEE Access 9, 55999-56011, 2021
Phoenix: Storage using an autonomous mobile infrastructure
RK Panta, R Jana, F Cheng, YFR Chen, VA Vaishampayan
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1863-1873, 2013
FORTAP: Using Formulae for Numerical-Reasoning-Aware Table Pretraining
Z Cheng, H Dong, F Cheng, R Jia, P Wu, S Han, D Zhang
Proceedings of the 60th Annual Meeting of the Association for Computational …, 2021
Higher Order Derivatives in Costa's Entropy Power Inequality
F Cheng, Y Geng
IEEE Transactions on Information theory 61 (11), 5892-5905, 2015
Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets
F Cheng, RW Yeung
IEEE Transactions on Information Theory 60 (6), 3345–3358, JUNE 2014, 2014
Imperfect secrecy in wiretap channel II
F Cheng, RW Yeung, KW Shum
IEEE Transactions on Information Theory 61 (1), 628-636, 2014
The structure of zero-divisor semigroups with graph K n○ K 2
T Wu, F Cheng
Semigroup Forum 76 (2), 330-340, 2008
Fraud detection in online product review systems via heterogeneous graph transformer
S Tang, L Jin, F Cheng
IEEE Access 9, 167364-167373, 2021
A numerical study on the wiretap network with a simple network topology
F Cheng, VYF Tan
IEEE Transactions on Information Theory 62 (5), 2481-2492, 2016
Generalization of Mrs. Gerber's Lemma
F Cheng
Communications in Information and Systems, 2014
Dimensionality-varying diffusion process
H Zhang, R Feng, Z Yang, L Huang, Y Liu, Y Zhang, Y Shen, D Zhao, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
Density sensitive random walk for local community detection
Y Yi, L Jin, H Yu, H Luo, F Cheng
IEEE Access 9, 27773-27782, 2021
A marginal characterization of entropy functions for conditional mutually independent random variables (with application to wyner's common information)
Q Chen, F Cheng, T Liu, RW Yeung
2015 IEEE International Symposium on Information Theory (ISIT), 974-978, 2015
A2R2: robust unsupervised neural machine translation with adversarial attack and regularization on representations
H Yu, H Luo, Y Yi, F Cheng
IEEE Access 9, 19990-19998, 2021
Performance bounds in secure network coding
F Cheng, RW Yeung
2011 International Symposium on Networking Coding, 1-6, 2011
Eliminating lipschitz singularities in diffusion models
Z Yang, R Feng, H Zhang, Y Shen, K Zhu, L Huang, Y Zhang, Y Liu, ...
arXiv preprint arXiv:2306.11251, 2023
Lipschitz Singularities in Diffusion Models
Z Yang, R Feng, H Zhang, Y Shen, K Zhu, L Huang, Y Zhang, Y Liu, ...
The Twelfth International Conference on Learning Representations, 2023
Convexity of Fisher information with respect to Gaussian perturbation
F Cheng, Y Geng
2014 Iran Workshop on Communication and Information Theory (IWCIT), 1-5, 2014
How to Solve Gaussian Interference Channel
F Cheng
The 2019 Workshop on Probability and Information Theory (WPI 2019), HKU, 2019
Optimality of routing on the wiretap network with simple network topology
F Cheng
2014 IEEE International Symposium on Information Theory, 786-790, 2014
The system can't perform the operation now. Try again later.
Articles 1–20