Institution
Huawei
Company•Shenzhen, China•
About: Huawei is a company organization based out in Shenzhen, China. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 41417 authors who have published 44698 publications receiving 343496 citations. The organization is also known as: Huawei Technologies & Huawei Technologies Co., Ltd..
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, a two-capacitor transformer winding capacitance model is proposed to simplify the common-mode (CM) noise analysis in isolated dc-dc power converters.
Abstract: For isolated dc–dc power converters, the interwinding parasitic capacitance of the transformer is usually one of the main paths for common-mode (CM) noise. In order to simplify the CM noise analysis, this paper proposes a two-capacitor transformer winding capacitance model. The model is derived based on general conditions so it can be applied to different isolated converter topologies. A measurement technique is also proposed to obtain the lumped capacitance for the model. The CM noise models of several isolated converter topologies are analyzed with the proposed two-capacitor transformer winding capacitance model to achieve simplicity. Finally, the proposed transformer winding capacitance model and measurement technique are verified by simulations and experiments.
77 citations
•
19 Apr 2017TL;DR: In this paper, a network slice selection method is applied to a contract signing scene of one terminal equipment and multiple network slices and aims to select a slice for terminal equipment carried out by network equipment.
Abstract: The invention relates to a network slice selection method, is applied to a contract signing scene of one terminal equipment and multiple network slices and aims to select a network slice for terminal equipment carried out by network equipment. The method comprises steps that the first information is generated by the terminal equipment, and the first information comprises one or any combination of the following information including the first network slice information, the first business information and the access information of the terminal equipment; a first message including the first information is sent by the terminal equipment to the network equipment, and the first message is used for requesting to select a network slice for the terminal equipment; the network slice is selected by the network equipment for the terminal equipment according to the first information; a second message is sent by the network equipment to the terminal equipment, and the second message is used for indicating the network equipment to select a network slice for the terminal equipment.
77 citations
••
27 Jun 2020TL;DR: This work proposes a scalable approach for searching individual discriminatory instances of DNN that only employs lightweight procedures like gradient computation and clustering, which makes it significantly more scalable than existing methods.
Abstract: Although deep neural networks (DNNs) have demonstrated astonishing performance in many applications, there are still concerns on their dependability. One desirable property of DNN for applications with societal impact is fairness (i.e., non-discrimination). In this work, we propose a scalable approach for searching individual discriminatory instances of DNN. Compared with state-of-the-art methods, our approach only employs lightweight procedures like gradient computation and clustering, which makes it significantly more scalable than existing methods. Experimental results show that our approach explores the search space more effectively (9 times) and generates much more individual discriminatory instances (25 times) using much less time (half to 1/7).
76 citations
••
25 Jun 2014TL;DR: This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services based on ARM's TrustZone technology and shows that TrustUI provides strong protection of users interaction.
Abstract: Mobile devices are frequently used as terminals to interact with many security-critical services such as mobile payment and online banking. However, the large client software stack and the continuous proliferation of malware expose such interaction under various threats, including passive attacks like phishing and active ones like direct code manipulation. This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services based on ARM's TrustZone technology. TrustUI is built with a combination of key techniques including cooperative randomization of the trusted path and secure delegation of network interaction. With such techniques, TrustUI not only requires no trust of the commodity software stack, but also takes a step further by excluding drivers for user-interacting devices like touch screen from its trusted computing base (TCB). Hence, TrustUI has a much smaller TCB, requires no access to device driver code, and may easily adapt to many devices. A prototype of TrustUI has been implemented on a Samsung Exynos 4412 board and evaluation shows that TrustUI provides strong protection of users interaction.
76 citations
•
02 Jul 2013TL;DR: In this paper, a mixed polar code generation method and a generation device for mixed polar codes is presented. But the method does not take the reliability of the N bits and the weight of corresponding lines of the first matrix into consideration.
Abstract: The embodiment of the invention provides a generation method and a generation device for a mixed Polar code. The method includes: acquiring an N*N first matrix and a sequence which includes N bits, wherein N is the code length of the mixed Polar code and is a positive integer and N lines of the first matrix are corresponding to the N bits of the sequence and N is an integer; determining the reliability of the N bits and determining the weight of the N lines of the first matrix; according to the reliability of the N bits and the weight of the N lines of the first matrix, selecting K bits in the N bits as information bits or selecting K lines of the first matrix to form a K*N second matrix used coding and coding an information bit sequence according to the positions of the information bits or according to the second matrix so as to generate the mixed Polar code; and K is the length of the to-be-coded information bit sequence and is not larger than N. The generation method and generation device for the mixed polar code not only take the reliability into consideration, but also take the weight of corresponding lines of the first matrix into consideration so that the performance of the Polar code can be improved.
76 citations
Authors
Showing all 41483 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yu Huang | 136 | 1492 | 89209 |
Xiaoou Tang | 132 | 553 | 94555 |
Xiaogang Wang | 128 | 452 | 73740 |
Shaobin Wang | 126 | 872 | 52463 |
Qiang Yang | 112 | 1117 | 71540 |
Wei Lu | 111 | 1973 | 61911 |
Xuemin Shen | 106 | 1221 | 44959 |
Li Chen | 105 | 1732 | 55996 |
Lajos Hanzo | 101 | 2040 | 54380 |
Luca Benini | 101 | 1453 | 47862 |
Lei Liu | 98 | 2041 | 51163 |
Tao Wang | 97 | 2720 | 55280 |
Mohamed-Slim Alouini | 96 | 1788 | 62290 |
Qi Tian | 96 | 1030 | 41010 |
Merouane Debbah | 96 | 652 | 41140 |