scispace - formally typeset
Search or ask a question
Institution

Huawei

CompanyShenzhen, China
About: Huawei is a company organization based out in Shenzhen, China. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 41417 authors who have published 44698 publications receiving 343496 citations. The organization is also known as: Huawei Technologies & Huawei Technologies Co., Ltd..


Papers
More filters
Journal ArticleDOI
Huan Zhang1, Shuo Wang1, Yiming Li1, Qinghai Wang2, Dianbo Fu2 
TL;DR: In this paper, a two-capacitor transformer winding capacitance model is proposed to simplify the common-mode (CM) noise analysis in isolated dc-dc power converters.
Abstract: For isolated dc–dc power converters, the interwinding parasitic capacitance of the transformer is usually one of the main paths for common-mode (CM) noise. In order to simplify the CM noise analysis, this paper proposes a two-capacitor transformer winding capacitance model. The model is derived based on general conditions so it can be applied to different isolated converter topologies. A measurement technique is also proposed to obtain the lumped capacitance for the model. The CM noise models of several isolated converter topologies are analyzed with the proposed two-capacitor transformer winding capacitance model to achieve simplicity. Finally, the proposed transformer winding capacitance model and measurement technique are verified by simulations and experiments.

77 citations

Patent
Lou Chong1, Huang Yada, Zhang Jian
19 Apr 2017
TL;DR: In this paper, a network slice selection method is applied to a contract signing scene of one terminal equipment and multiple network slices and aims to select a slice for terminal equipment carried out by network equipment.
Abstract: The invention relates to a network slice selection method, is applied to a contract signing scene of one terminal equipment and multiple network slices and aims to select a network slice for terminal equipment carried out by network equipment. The method comprises steps that the first information is generated by the terminal equipment, and the first information comprises one or any combination of the following information including the first network slice information, the first business information and the access information of the terminal equipment; a first message including the first information is sent by the terminal equipment to the network equipment, and the first message is used for requesting to select a network slice for the terminal equipment; the network slice is selected by the network equipment for the terminal equipment according to the first information; a second message is sent by the network equipment to the terminal equipment, and the second message is used for indicating the network equipment to select a network slice for the terminal equipment.

77 citations

Proceedings ArticleDOI
27 Jun 2020
TL;DR: This work proposes a scalable approach for searching individual discriminatory instances of DNN that only employs lightweight procedures like gradient computation and clustering, which makes it significantly more scalable than existing methods.
Abstract: Although deep neural networks (DNNs) have demonstrated astonishing performance in many applications, there are still concerns on their dependability. One desirable property of DNN for applications with societal impact is fairness (i.e., non-discrimination). In this work, we propose a scalable approach for searching individual discriminatory instances of DNN. Compared with state-of-the-art methods, our approach only employs lightweight procedures like gradient computation and clustering, which makes it significantly more scalable than existing methods. Experimental results show that our approach explores the search space more effectively (9 times) and generates much more individual discriminatory instances (25 times) using much less time (half to 1/7).

76 citations

Proceedings ArticleDOI
25 Jun 2014
TL;DR: This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services based on ARM's TrustZone technology and shows that TrustUI provides strong protection of users interaction.
Abstract: Mobile devices are frequently used as terminals to interact with many security-critical services such as mobile payment and online banking. However, the large client software stack and the continuous proliferation of malware expose such interaction under various threats, including passive attacks like phishing and active ones like direct code manipulation. This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services based on ARM's TrustZone technology. TrustUI is built with a combination of key techniques including cooperative randomization of the trusted path and secure delegation of network interaction. With such techniques, TrustUI not only requires no trust of the commodity software stack, but also takes a step further by excluding drivers for user-interacting devices like touch screen from its trusted computing base (TCB). Hence, TrustUI has a much smaller TCB, requires no access to device driver code, and may easily adapt to many devices. A prototype of TrustUI has been implemented on a Samsung Exynos 4412 board and evaluation shows that TrustUI provides strong protection of users interaction.

76 citations

Patent
Bin Li1, Hui Shen1
02 Jul 2013
TL;DR: In this paper, a mixed polar code generation method and a generation device for mixed polar codes is presented. But the method does not take the reliability of the N bits and the weight of corresponding lines of the first matrix into consideration.
Abstract: The embodiment of the invention provides a generation method and a generation device for a mixed Polar code. The method includes: acquiring an N*N first matrix and a sequence which includes N bits, wherein N is the code length of the mixed Polar code and is a positive integer and N lines of the first matrix are corresponding to the N bits of the sequence and N is an integer; determining the reliability of the N bits and determining the weight of the N lines of the first matrix; according to the reliability of the N bits and the weight of the N lines of the first matrix, selecting K bits in the N bits as information bits or selecting K lines of the first matrix to form a K*N second matrix used coding and coding an information bit sequence according to the positions of the information bits or according to the second matrix so as to generate the mixed Polar code; and K is the length of the to-be-coded information bit sequence and is not larger than N. The generation method and generation device for the mixed polar code not only take the reliability into consideration, but also take the weight of corresponding lines of the first matrix into consideration so that the performance of the Polar code can be improved.

76 citations


Authors

Showing all 41483 results

NameH-indexPapersCitations
Yu Huang136149289209
Xiaoou Tang13255394555
Xiaogang Wang12845273740
Shaobin Wang12687252463
Qiang Yang112111771540
Wei Lu111197361911
Xuemin Shen106122144959
Li Chen105173255996
Lajos Hanzo101204054380
Luca Benini101145347862
Lei Liu98204151163
Tao Wang97272055280
Mohamed-Slim Alouini96178862290
Qi Tian96103041010
Merouane Debbah9665241140
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Hewlett-Packard
59.8K papers, 1.4M citations

87% related

Microsoft
86.9K papers, 4.1M citations

87% related

Intel
68.8K papers, 1.6M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202319
202266
20212,069
20203,277
20194,570
20184,476