default search action
Junyi Du
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Yuansheng Wu, Junyi Du, Dadong Ni:
Balanced Domain Partitioning for Software Defined Networks. IEEE Access 11: 6467-6476 (2023) - 2021
- [j10]Yuansheng Wu, Guanqun Zhao, Dadong Ni, Junyi Du:
Dynamic handoff policy for RAN slicing by exploiting deep reinforcement learning. EURASIP J. Wirel. Commun. Netw. 2021(1): 61 (2021) - [c15]Xisen Jin, Arka Sadhu, Junyi Du, Xiang Ren:
Gradient-based Editing of Memory Examples for Online Task-free Continual Learning. NeurIPS 2021: 29193-29205 - 2020
- [j9]Shenglong Peng, Liang Zhou, Junyi Du, Xuan He:
A logically centralized slotted ALOHA-based scheme for broadcast services in vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j8]Shenglong Peng, Liang Zhou, Xuan He, Junyi Du:
GPS-aided inter-microcell interference avoidance for request-transmission splitting slotted ALOHA-based scheme in smart cities with connected vehicles. Future Gener. Comput. Syst. 108: 501-511 (2020) - [j7]Junyi Du:
A Partially Coupled LDPC Coded Scheme for the Gaussian Wiretap Channel. IEEE Commun. Lett. 24(1): 7-10 (2020) - [j6]Zhe Zhang, Liang Zhou, Junyi Du, Yue Zhao:
Design of a Labeling Scheme for 32-QAM Delayed Bit-Interleaved Coded Modulation. Sensors 20(12): 3528 (2020) - [c14]Xisen Jin, Junyi Du, Arka Sadhu, Ram Nevatia, Xiang Ren:
Visually Grounded Continual Learning of Compositional Phrases. EMNLP (1) 2020: 2018-2029 - [c13]Xisen Jin, Zhongyu Wei, Junyi Du, Xiangyang Xue, Xiang Ren:
Towards Hierarchical Importance Attribution: Explaining Compositional Semantics for Neural Sequence Models. ICLR 2020 - [c12]Wenxuan Zhou, Hongtao Lin, Bill Yuchen Lin, Ziqi Wang, Junyi Du, Leonardo Neves, Xiang Ren:
NERO: A Neural Rule Grounding Framework for Label-Efficient Relation Extraction. WWW 2020: 2166-2176 - [i7]Frank F. Xu, Lei Ji, Botian Shi, Junyi Du, Graham Neubig, Yonatan Bisk, Nan Duan:
A Benchmark for Structured Procedural Knowledge Extraction from Cooking Videos. CoRR abs/2005.00706 (2020) - [i6]Xisen Jin, Junyi Du, Xiang Ren:
Visually Grounded Continual Learning of Compositional Semantics. CoRR abs/2005.00785 (2020) - [i5]Xisen Jin, Junyi Du, Xiang Ren:
Gradient Based Memory Editing for Task-Free Continual Learning. CoRR abs/2006.15294 (2020)
2010 – 2019
- 2019
- [j5]Shenglong Peng, Liang Zhou, Xuan He, Junyi Du, Yong Liang Guan:
A Request-Transmission Splitting Scheme for V2X Networks: Design and Throughput Analysis. IEEE Access 7: 158317-158325 (2019) - [c11]Junyi Du, He Jiang, Jiaming Shen, Xiang Ren:
Eliciting Knowledge from Experts: Automatic Transcript Parsing for Cognitive Task Analysis. ACL (1) 2019: 4280-4291 - [c10]Yihuan Liao, Lei Yang, Jinhong Yuan, Kechao Huang, Raymond W. K. Leung, Junyi Du:
LDPC Code Design for Delayed Bit-Interleaved Coded Modulation. ITW 2019: 1-5 - [c9]Shenglong Peng, Xuan He, Junyi Du, Yong Liang Guan, Liang Zhou:
A TDMA-like Access Scheme with Splitting Request and Transmission for Vehicular Networks. WCNC 2019: 1-5 - [i4]Shenglong Peng, Xuan He, Junyi Du, Yong Liang Guan, Liang Zhou:
A TDMA-like Access Scheme with Splitting Request and Transmission for Vehicular Networks. CoRR abs/1905.05431 (2019) - [i3]Junyi Du, He Jiang, Jiaming Shen, Xiang Ren:
Eliciting Knowledge from Experts: Automatic Transcript Parsing for Cognitive Task Analysis. CoRR abs/1906.11384 (2019) - [i2]Xisen Jin, Junyi Du, Zhongyu Wei, Xiangyang Xue, Xiang Ren:
Towards Hierarchical Importance Attribution: Explaining Compositional Semantics for Neural Sequence Models. CoRR abs/1911.06194 (2019) - 2018
- [j4]Junyi Du, Liang Zhou, Lei Yang, Shenglong Peng, Jinhong Yuan:
A New LDPC Coded Scheme for Two-User Gaussian Multiple Access Channels. IEEE Commun. Lett. 22(1): 21-24 (2018) - [j3]Xuan He, Liang Zhou, Junyi Du:
A New Multi-Edge Metric-Constrained PEG Algorithm for Designing Binary LDPC Code With Improved Cycle-Structure. IEEE Trans. Commun. 66(1): 14-25 (2018) - [j2]Xuan He, Liang Zhou, Junyi Du:
PEG-Like Design of Binary QC-LDPC Codes Based on Detecting and Avoiding Generating Small Cycles. IEEE Trans. Commun. 66(5): 1845-1858 (2018) - [c8]Junyi Du, Zhenghai Wang, Lei Xiao, Li Wang, Wensheng Qiao:
LDPC coded DBICM Scheme for Two Way Relay Channel with a Pipeline Decoding Structure. ICCS 2018: 226-230 - 2017
- [j1]Junyi Du, Lei Yang, Jinhong Yuan, Liang Zhou, Xuan He:
Bit Mapping Design for LDPC Coded BICM Schemes With Multi-Edge Type EXIT Chart. IEEE Commun. Lett. 21(4): 722-725 (2017) - [c7]Junyi Du, Liang Zhou, Xuan He, Shenglong Peng:
A New LDPC Coded Scheme for Two-User Multiple-Access Channels Aided with Physical-Layer Network Coding. GLOBECOM Workshops 2017: 1-6 - [c6]Junyi Du, Liang Zhou, Zhe Zhang, Lei Yang, Jinhong Yuan:
Regular and Irregular LDPC Code Design for Bandwidth Efficient BICM Schemes. GLOBECOM 2017: 1-6 - [c5]Zhe Zhang, Liang Zhou, Junyi Du, Shenglong Peng:
An algebraic approach to design low rate low density parity check code. WCSP 2017: 1-6 - 2016
- [c4]Junyi Du, Lei Yang, Jinhong Yuan, Liang Zhou, Xuan He:
Bit Mapping Design for LDPC Coded BICM Schemes with Binary Physical-Layer Network Coding. GLOBECOM 2016: 1-6 - [c3]Junyi Du, Jinhong Yuan, Liang Zhou, Xuan He:
A progressive edge growth algorithm for bit mapping design of LDPC coded BICM schemes. ISIT 2016: 2129-2133 - [i1]Xuan He, Liang Zhou, Junyi Du:
The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures. CoRR abs/1605.05123 (2016) - 2015
- [c2]Junyi Du, Liang Zhou, Xuan He:
The Joint Demodulation and Decoding for BICM-ID System with BEC Approximation and Optimized Bit Mapping. GLOBECOM 2015: 1-6 - [c1]Xuan He, Liang Zhou, Junyi Du, Zhiping Shi:
The multi-step PEG and ACE constrained PEG algorithms can design the LDPC codes with better cycle-connectivity. ISIT 2015: 46-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint