default search action
Jiangyuan Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Jiangyuan Li, Thanh Van Nguyen, Chinmay Hegde, Raymond K. W. Wong:
Implicit Regularization for Group Sparsity. ICLR 2023 - [c19]Ruiyan Liu, Tengchao Ma, Yiting Huang, Qingzhao An, Lin Yan, Jiangyuan Li:
Cost-Sensitive Cold Start Latency Optimization Mechanism in Function-as-a-Service. NaNA 2023: 453-458 - [i12]Jiangyuan Li, Thanh Van Nguyen, Chinmay Hegde, Raymond K. W. Wong:
Implicit Regularization for Group Sparsity. CoRR abs/2301.12540 (2023) - 2022
- [c18]Jiangyuan Li, Mohammadreza Armandpour:
Deep Spatio-Temporal Wind Power Forecasting. ICASSP 2022: 4138-4142 - 2021
- [c17]Jiangyuan Li, Thanh Van Nguyen, Chinmay Hegde, Ka Wai Wong:
Implicit Sparse Regularization: The Impact of Depth and Early Stopping. NeurIPS 2021: 28298-28309 - [i11]Jiangyuan Li, Thanh Van Nguyen, Chinmay Hegde, Raymond K. W. Wong:
Implicit Sparse Regularization: The Impact of Depth and Early Stopping. CoRR abs/2108.05574 (2021) - [i10]Jiangyuan Li, Mohammadreza Armandpour:
Deep Spatio-Temporal Wind Power Forecasting. CoRR abs/2109.14530 (2021) - 2020
- [j12]Jiangyuan Li, Bo Liu, Jinqiang Yang, Zhentao Zou:
Hedge fund's dynamic leverage decisions under time-inconsistent preferences. Eur. J. Oper. Res. 284(2): 779-791 (2020)
2010 – 2019
- 2013
- [j11]Yupeng Liu, Jiangyuan Li, Athina P. Petropulu:
Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security. IEEE Trans. Inf. Forensics Secur. 8(4): 682-694 (2013) - [j10]Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Uncoordinated Cooperative Jamming for Secret Communications. IEEE Trans. Inf. Forensics Secur. 8(7): 1081-1090 (2013) - [j9]Gan Zheng, Ioannis Krikidis, Jiangyuan Li, Athina P. Petropulu, Björn E. Ottersten:
Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. IEEE Trans. Signal Process. 61(20): 4962-4974 (2013) - [c16]Jing Xu, Jiangyuan Li, Yizhai Zhang:
Statistical CSI based zero-forcing beamforming for cooperative two-cell downlink transmission. Allerton 2013: 307-314 - [c15]Jing Xu, Shihua Zhu, Jiangyuan Li, Yizhai Zhang:
Signal space diversity based cooperative inter-cell downlink transmission for cell boundary users. CISS 2013: 1-6 - [c14]Jiangyuan Li, Athina P. Petropulu:
A lowcomplexity algorithm for collaborative-relay beamforming. ICASSP 2013: 5002-5005 - [c13]Jiangyuan Li, Athina P. Petropulu:
Optimality of beamforming and closed form secrecy capacity of MIMO wiretap channels with two transmit antennas. WPMC 2013: 1-5 - [i9]Gan Zheng, Ioannis Krikidis, Jiangyuan Li, Athina P. Petropulu, Björn E. Ottersten:
Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. CoRR abs/1308.0094 (2013) - 2012
- [j8]Jiangyuan Li, Athina P. Petropulu:
Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty. IEEE Trans. Signal Process. 60(7): 3892-3895 (2012) - [c12]Jiangyuan Li, Shuangyu Luo, Athina P. Petropulu:
Outage secrecy rate in wireless relay channels using cooperative jamming. GLOBECOM 2012: 2438-2443 - [c11]Gan Zheng, Jiangyuan Li, Kai-Kit Wong, Athina P. Petropulu, Björn E. Ottersten:
Using simple relays to improve physical-layer security. ICCC 2012: 329-333 - [c10]Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Physical layer security with uncoordinated helpers implementing cooperative jamming. SAM 2012: 97-100 - [c9]Yafei Ye, Liyuan Liu, Jiangyuan Li, Dongmei Li, Zhihua Wang:
A 120dB SNDR audio sigma-delta modulator with an asynchronous SAR quantizer. ISCAS 2012: 2357-2360 - [c8]Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Outage constrained secrecy rate maximization using cooperative jamming. SSP 2012: 389-392 - [c7]Jiangyuan Li, Athina P. Petropulu:
Optimality of beamforming for secrecy capacity of MIMO wiretap channels. WIFS 2012: 276-281 - [i8]Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming. CoRR abs/1202.6596 (2012) - [i7]Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu:
Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming. CoRR abs/1202.6597 (2012) - 2011
- [j7]Jiangyuan Li, Athina P. Petropulu:
Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading. IEEE Trans. Inf. Forensics Secur. 6(3-1): 861-867 (2011) - [j6]Jiangyuan Li, Athina P. Petropulu, H. Vincent Poor:
Cooperative Transmission for Relay Networks Based on Second-Order Statistics of Channel State Information. IEEE Trans. Signal Process. 59(3): 1280-1291 (2011) - [j5]Jiangyuan Li, Athina P. Petropulu, Steven Weber:
On Cooperative Relaying Schemes for Wireless Physical Layer Security. IEEE Trans. Signal Process. 59(10): 4985-4997 (2011) - [j4]Jiangyuan Li, Athina P. Petropulu:
On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels. IEEE Trans. Wirel. Commun. 10(4): 1176-1187 (2011) - [c6]Jiangyuan Li, Athina P. Petropulu:
Explicit solution of worst-case secrecy rate for MISO wiretap channels with spherical uncertainty. ACSCC 2011: 198-201 - [c5]Jiangyuan Li, Athina P. Petropulu:
On Transmit Beamforming for Physical-Layer Multicasting. GLOBECOM 2011: 1-5 - [c4]Jiangyuan Li, Athina P. Petropulu:
On beamforming solution for secrecy capacity of MIMO wiretap channels. GLOBECOM Workshops 2011: 889-892 - [i6]Jiangyuan Li, Athina P. Petropulu:
Closed Form Secrecy Capacity of MIMO Wiretap Channels with Two Transmit Antennas. CoRR abs/1107.5541 (2011) - [i5]Jiangyuan Li, Athina P. Petropulu:
Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels with Spherical Uncertainty. CoRR abs/1108.0100 (2011) - 2010
- [c3]Jiangyuan Li, Athina P. Petropulu:
Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels with Non-Trivial Covariance. GLOBECOM 2010: 1-5 - [c2]Jiangyuan Li, Athina P. Petropulu:
Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels. ICASSP 2010: 3362-3365 - [i4]Jiangyuan Li, Athina P. Petropulu, Steven Weber:
Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security. CoRR abs/1001.1389 (2010) - [i3]Jiangyuan Li, Athina P. Petropulu:
On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels. CoRR abs/1003.2372 (2010) - [i2]Jiangyuan Li, Athina P. Petropulu, H. Vincent Poor:
On Cooperative Beamforming Based on Second-Order Statistics of Channel State Information. CoRR abs/1005.5412 (2010)
2000 – 2009
- 2009
- [j3]Jiangyuan Li, Q. T. Zhang, Shenghui Song:
Optimization of transmit-beam number and power allocation for generic correlated MIMO rayleigh channels. IEEE Trans. Commun. 57(8): 2255-2259 (2009) - [i1]Jiangyuan Li, Athina P. Petropulu:
Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels. CoRR abs/0909.2622 (2009) - 2008
- [j2]Jiangyuan Li, Q. T. Zhang:
Transmitter Optimization for Correlated MISO Fading Channels with Generic Mean and Covariance Feedback. IEEE Trans. Wirel. Commun. 7(9): 3312-3317 (2008) - [c1]Jiangyuan Li, Q. T. Zhang:
Optimal Transmit-Beam Number and Power Allocation for Correlated MIMO Rayleigh Fading Channels. ICC 2008: 4240-4244 - 2007
- [j1]Jiangyuan Li, Gang Wei, Fangjiong Chen:
On Minimum-BER Linear Multiuser Detection for DS-CDMA Channels. IEEE Trans. Signal Process. 55(3): 1093-1103 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 19:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint