Search Results - "Zhu, Jingge"
-
1
Gaussian Multiple Access via Compute-and-Forward
Published in IEEE transactions on information theory (01-05-2017)“…Lattice codes used under the compute-and-forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel (MAC): the receiver…”
Get full text
Journal Article -
2
Communication Versus Computation: Duality for Multiple-Access Channels and Source Coding
Published in IEEE transactions on information theory (01-01-2019)“…Computation codes in network information theory are designed for scenarios where the decoder is not interested in recovering the information sources…”
Get full text
Journal Article -
3
Lattice Codes for Many-to-One Interference Channels With and Without Cognitive Messages
Published in IEEE transactions on information theory (01-03-2015)“…A new achievable rate region is given for the Gaussian cognitive many-to-one interference channel. The proposed novel coding scheme is based on the…”
Get full text
Journal Article -
4
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
Published in IEEE communications letters (01-10-2010)“…We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is…”
Get full text
Journal Article -
5
Typical sumsets of lattice points
Published in 2016 50th Asilomar Conference on Signals, Systems and Computers (01-11-2016)“…From a subset of the n-dimensional integer lattice, we independently pick two points uniformly at random. A sumset is formed by adding these two points…”
Get full text
Conference Proceeding -
6
A four-dimensional no-equilibrium chaotic system with multi-scroll chaotic hidden attractors and its application in image encryption
Published in Physica scripta (01-10-2024)“…In recent years, constructing hidden attractors with multi-scroll has become a key discussion point in the research and application fields of chaos science. In…”
Get full text
Journal Article -
7
Improved Chua’s chaotic system with a novel memristor: generating multi-scroll hidden attractors and applications in image encryption
Published in Physica scripta (01-10-2024)“…In this paper, a new method for generating multi-scroll chaotic attractors by introducing a new memristor model into an improved Chua’s system is presented…”
Get full text
Journal Article -
8
On the Generalization for Transfer Learning: An Information-Theoretic Analysis
Published in IEEE transactions on information theory (01-10-2024)“…Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different…”
Get full text
Journal Article -
9
Semi-Supervised Learning Under General Causal Models
Published in IEEE transaction on neural networks and learning systems (23-05-2024)“…Semi-supervised learning (SSL) aims to train a machine learning (ML) model using both labeled and unlabeled data. While the unlabeled data have been used in…”
Get full text
Journal Article -
10
A Bayesian approach to (online) transfer learning: Theory and algorithms
Published in Artificial intelligence (01-11-2023)“…Transfer learning is a machine learning paradigm where knowledge from one problem is utilized to solve a new but related problem. While conceivable that…”
Get full text
Journal Article -
11
On Minimizing Symbol Error Rate Over Fading Channels With Low-Resolution Quantization
Published in IEEE transactions on communications (01-11-2021)“…We analyze the symbol error probability (SEP) of <inline-formula> <tex-math notation="LaTeX">M </tex-math></inline-formula>-ary pulse amplitude modulation…”
Get full text
Journal Article -
12
On the Capacity-Achieving Input of Channels With Phase Quantization
Published in IEEE transactions on information theory (01-09-2022)“…Several information-theoretic studies on channels with output quantization have identified the capacity-achieving input distributions for different fading…”
Get full text
Journal Article -
13
On the Capacity-Achieving Input of the Gaussian Channel With Polar Quantization
Published in IEEE transactions on communications (01-09-2022)“…The polar receiver architecture is a receiver design that captures the envelope and phase information of the signal rather than its in-phase and quadrature…”
Get full text
Journal Article -
14
Typical sumsets of linear codes
Published in 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (01-09-2016)“…Given two identical linear codes C with rate R over F q of length n, we independently pick one codeword from each codebook uniformly at random. A sumset is…”
Get full text
Conference Proceeding -
15
A sequential approximation framework for coded distributed optimization
Published in 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (01-10-2017)“…Building on the previous work of Lee et al. [2] and Ferdinand et al. [3] on coded computation, we propose a sequential approximation framework for solving…”
Get full text
Conference Proceeding -
16
Design and Analysis of Hardware-Limited Non-Uniform Task-Based Quantizers
Published in IEEE transactions on signal processing (01-01-2023)“…Hardware-limited task-based quantization is a new design paradigm for data acquisition systems equipped with serial scalar analog-to-digital converters using a…”
Get full text
Journal Article -
17
Compute-and-forward using nested linear codes for the Gaussian MAC
Published in 2015 IEEE Information Theory Workshop (ITW) (01-04-2015)“…The classical modulo-lattice construction of Erez et al. has been successfully applied to several coding problems under Gaussian noise, including coding for…”
Get full text
Conference Proceeding -
18
Capacity Bounds for One-Bit MIMO Gaussian Channels with Analog Combining
Published in IEEE transactions on communications (01-11-2022)“…The use of 1-bit analog-to-digital converters (ADCs) is seen as a promising approach to significantly reduce the power consumption and hardware cost of…”
Get full text
Journal Article -
19
Compute-forward multiple access (CFMA) with nested LDPC codes
Published in 2017 IEEE International Symposium on Information Theory (ISIT) (01-06-2017)“…Inspired by the compute-and-forward scheme from Nazer and Gastpar, a novel multiple-access scheme introduced by Zhu and Gastpar makes use of nested lattice…”
Get full text
Conference Proceeding -
20
On lattice codes for Gaussian interference channels
Published in 2015 IEEE International Symposium on Information Theory (ISIT) (01-06-2015)“…The usefulness of lattice codes is investigated for two-user Gaussian interference channels (IC). A coding scheme based on the compute-and-forward technique is…”
Get full text
Conference Proceeding Journal Article