Huishuai Zhang
Office: CST 3-118
Email: hzhan23@syr.edu
Short Biography
I am a fifth year Ph.D student in EECS at Syracuse University, working with my advisor Dr. Yingbin Liang. Before this, I received the M.Eng from
the Graduate School of Chinese Academy of Sciences in 2012. From 2005 to 2009, I studied in the Dept. of Electronic Engineering and Information Science at University of Science and Technology of China (USTC).
Research Interests
Right now I am interested in developing performance guarantee for non-convex algorithms in solving machine learning problems such as phase retrieval, matrix completion, deep networks.
Before, I have done works on robust PCA and information theoretical security. For robust PCA, I focused on how the local coherence affect the sensitivity of the low-rank matrix in resisting errors and built connections to the graph clustering problem.
For information theoretical security, I focused on the problems of source-type key generation in multiple terminals.
News
- Aug.12 2016. One paper is accepted by NIPS 2016.
- Apr.24 2016. One paper is accepted by ICML 2016.
Publications
Preprints:
H. Zhang, Y. Liang "Reshaped Wirtinger Flow and Incremental Algorithms for Solving Quadratic Systems of Equations,"[paper][code]
H. Zhang, Y. Chi, Y. Liang "Provable Non-convex Phase Retrieval with Outliers: Median Truncated Wirtinger Flow,"[paper]
Conference Proceedings:
H. Zhang, Y. Liang "Reshaped Wirtinger Flow for Solving Quadratic Systems of Equations," accepted by NIPS 2016
H. Zhang, Y. Chi, Y. Liang "Provable Non-convex Phase Retrieval with Outliers: Median Truncated Wirtinger Flow,"[paper][code] ICML 2016
H. Zhang, Y. Zhou, Y. Liang "Analysis of Robust PCA with Local Incoherence,"[paper][supplemental] Neural Information Processing Systems (NIPS), Montreal, Canada, December 2015.
H. Zhang, Y. Liang, L. Lai. "Secret Key Capacity: Talk or Keep Silent,"
IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, June 2015.
H. Zhang, Y. Liang, L. Lai, S. Shamai (Shitz). "Two-Key Generation for a Cellular Model with a Helper,"
IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, June 2015.
H. Zhang, Y. Liang, L. Lai. "Helper-Assisted Asymmetric Two Key Generation,"
Asilomar Conference on Signals, Systems, and Computers, invited paper, Pacific Grove, CA, Nov. 2014.
H. Zhang, Y. Liang, L. Lai. "Key Capacity Region for a Cellular Source Model,"
IEEE Information Theory Workshop, invited paper, Hobart, Tasmania, Australia, Nov. 2014.
H. Zhang, L. Lai, Y. Liang, H. Wang. "Secret Key-Private Key Generation over Three Terminals: Capacity Region,"
IEEE International Symposium on Information Theory (ISIT), Honululu, HI, June 2014.
Journal Papers:
H. Zhang, Y. Zhou, Y. Liang
"Low-rank Matrix Recovery from Local Coherence Perspective," submitted to
IEEE Transactions
on Information Theory,
H. Zhang, Y. Liang, L. Lai, S. Shamai (Shitz)
"Multi-Key Generation over a Celluar Model with a Helper," revised, submitted to
IEEE Transactions
on Information Theory,
H. Zhang, L. Lai, Y. Liang, H. Wang
"The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation,"
IEEE Transactions
on Information Theory, 60(10):6389-6398, October 2014.
Book Chapters:
H. Zhang, Y. Liang, L. Lai and S. Shamai (Shitz). " Multiple secret key generation: Information theoretic models and key capacity regions." for Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, Cambridge, UK.