Alert button
Picture for Shuo Shao

Shuo Shao

Alert button

A Nearly Information Theoretically Secure Approach for Semantic Communications over Wiretap Channel

Add code
Bookmark button
Alert button
Jan 25, 2024
Weixuan Chen, Shuo Shao, Qianqian Yang, Zhaoyang Zhang, Ping Zhang

Viaarxiv icon

Deep Learning Based Superposition Coded Modulation for Hierarchical Semantic Communications over Broadcast Channels

Add code
Bookmark button
Alert button
Jan 03, 2024
Yufei Bo, Shuo Shao, Meixia tao

Viaarxiv icon

Joint Coding-Modulation for Digital Semantic Communications via Variational Autoencoder

Add code
Bookmark button
Alert button
Oct 10, 2023
Yufei Bo, Yiheng Duan, Shuo Shao, Meixia Tao

Figure 1 for Joint Coding-Modulation for Digital Semantic Communications via Variational Autoencoder
Figure 2 for Joint Coding-Modulation for Digital Semantic Communications via Variational Autoencoder
Figure 3 for Joint Coding-Modulation for Digital Semantic Communications via Variational Autoencoder
Figure 4 for Joint Coding-Modulation for Digital Semantic Communications via Variational Autoencoder
Viaarxiv icon

FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model

Add code
Bookmark button
Alert button
Nov 14, 2022
Shuo Shao, Wenyuan Yang, Hanlin Gu, Jian Lou, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren

Figure 1 for FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Figure 2 for FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Figure 3 for FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Figure 4 for FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Viaarxiv icon

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring

Add code
Bookmark button
Alert button
Nov 14, 2022
Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Zhihua Xia, Gerald Schaefer, Hui Fang

Figure 1 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 2 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 3 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 4 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Viaarxiv icon

Learning Based Joint Coding-Modulation for Digital Semantic Communication Systems

Add code
Bookmark button
Alert button
Aug 11, 2022
Yufei Bo, Yiheng Duan, Shuo Shao, Meixia Tao

Figure 1 for Learning Based Joint Coding-Modulation for Digital Semantic Communication Systems
Figure 2 for Learning Based Joint Coding-Modulation for Digital Semantic Communication Systems
Figure 3 for Learning Based Joint Coding-Modulation for Digital Semantic Communication Systems
Figure 4 for Learning Based Joint Coding-Modulation for Digital Semantic Communication Systems
Viaarxiv icon

Deep Learning-Enabled Semantic Communication Systems with Task-Unaware Transmitter and Dynamic Data

Add code
Bookmark button
Alert button
Apr 30, 2022
Hongwei Zhang, Shuo Shao, Meixia Tao, Xiaoyan Bi, Khaled B. Letaief

Figure 1 for Deep Learning-Enabled Semantic Communication Systems with Task-Unaware Transmitter and Dynamic Data
Figure 2 for Deep Learning-Enabled Semantic Communication Systems with Task-Unaware Transmitter and Dynamic Data
Figure 3 for Deep Learning-Enabled Semantic Communication Systems with Task-Unaware Transmitter and Dynamic Data
Figure 4 for Deep Learning-Enabled Semantic Communication Systems with Task-Unaware Transmitter and Dynamic Data
Viaarxiv icon

An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation

Add code
Bookmark button
Alert button
Jan 29, 2022
Jiakun Liu, Shuo Shao, Wenyi Zhang, H. Vincent Poor

Figure 1 for An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation
Figure 2 for An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation
Figure 3 for An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation
Figure 4 for An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation
Viaarxiv icon

Cascading Bandit under Differential Privacy

Add code
Bookmark button
Alert button
Jun 04, 2021
Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao

Figure 1 for Cascading Bandit under Differential Privacy
Figure 2 for Cascading Bandit under Differential Privacy
Viaarxiv icon