default search action
Lili Wei
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Meng Zhao, Zhixin Yao, Yan Zhang, Lidan Ma, Wenquan Pang, Shuyin Ma, Yijun Xu, Lili Wei:
Predictive value of machine learning for the progression of gestational diabetes mellitus to type 2 diabetes: a systematic review and meta-analysis. BMC Medical Informatics Decis. Mak. 25(1): 18 (2025) - [j47]Yazhen Wang, Guojun Liu, Lixia Yang, Junmin Liu, Lili Wei:
An Attention-Based Feature Processing Method for Cross-Domain Hyperspectral Image Classification. IEEE Signal Process. Lett. 32: 196-200 (2025) - 2024
- [j46]Wanshi Chen, Ilker Demirkol, Gunes Karabulut-Kurt, Stefano Ruffini, Lili Wei:
Series Editorial: Mobile Communications and Networks. IEEE Commun. Mag. 62(8): 108-109 (2024) - [j45]Lili Wei, Jinda Wei:
Personalized Health Management Strategies Based on Deep Reinforcement Learning in the Network Environment. Scalable Comput. Pract. Exp. 25(6) (2024) - [j44]Lili Wei, Zhenxue Wang, Congyan Lang, Liqian Liang, Tao Wang, Songhe Feng, Yidong Li:
Linkage-Based Object Re-Identification via Graph Learning. IEEE Trans. Intell. Transp. Syst. 25(10): 13040-13050 (2024) - [j43]Lili Wei, Mou Chen, Shuang Shi:
Dynamic Event-Triggered Consensus Cost-Based Switching Control for UAV Formation With Disturbances. IEEE Trans. Intell. Veh. 9(2): 3531-3543 (2024) - [j42]Jiarong Wu, Lili Wei, Yanyan Jiang, Shing-Chi Cheung, Luyao Ren, Chang Xu:
Programming by Example Made Easy. ACM Trans. Softw. Eng. Methodol. 33(1): 4:1-4:36 (2024) - [j41]Hengcheng Zhu, Lili Wei, Valerio Terragni, Yepang Liu, Shing-Chi Cheung, Jiarong Wu, Qin Sheng, Bing Zhang, Lihong Song:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. ACM Trans. Softw. Eng. Methodol. 33(1): 16:1-16:31 (2024) - [c40]Xinyu Sun, Zhikun Zhao, Lili Wei, Congyan Lang, Mingxuan Cai, Longfei Han, Juan Wang, Bing Li, Yuxuan Guo:
RL-SeqISP: Reinforcement Learning-Based Sequential Optimization for Image Signal Processing. AAAI 2024: 5025-5033 - [c39]Junfeng Chen, Kevin Li, Yifei Chen, Lili Wei, Yepang Liu:
Demystifying Device-Specific Compatibility Issues in Android Apps. ICSME 2024: 525-537 - [c38]Shidi Chen, Lili Wei, Liqian Liang, Congyan Lang:
Joint Homophily and Heterophily Relational Knowledge Distillation for Efficient and Compact 3D Object Detection. ACM Multimedia 2024: 2127-2135 - [c37]Lili Wei, Xiaofen Tang, Jin Dang:
Few-Shot Object Detection via Disentangling Class-Related Factors in Feature Distribution. PRCV (13) 2024: 77-92 - [c36]Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. SP 2024: 2198-2216 - [i19]Junfeng Chen, Kevin Li, Yifei Chen, Lili Wei, Yepang Liu:
Demystifying Device-specific Compatibility Issues in Android Apps. CoRR abs/2408.01810 (2024) - [i18]Kevin Li, Lin Ling, Jinqiu Yang, Lili Wei:
Automatically Detecting Checked-In Secrets in Android Apps: How Far Are We? CoRR abs/2412.10922 (2024) - 2023
- [j40]Ziyi Chen, Yutong Gao, Congyan Lang, Lili Wei, Yidong Li, Hongzhe Liu, Fayao Liu:
Integrating topology beyond descriptions for zero-shot learning. Pattern Recognit. 143: 109738 (2023) - [j39]Yazhen Wang, Guojun Liu, Lili Wei, Lixia Yang, Long Xu:
A method to improve full-resolution remote sensing pansharpening image quality assessment via feature combination. Signal Process. 208: 108975 (2023) - [j38]Zheming Xu, Lili Wei, Congyan Lang, Songhe Feng, Tao Wang, Adrian G. Bors, Hongzhe Liu:
SSR-Net: A Spatial Structural Relation Network for Vehicle Re-identification. ACM Trans. Multim. Comput. Commun. Appl. 19(6): 216:1-216:22 (2023) - [j37]Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu, Shuqing Li, Lu Liu, Michael R. Lyu:
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. IEEE Trans. Software Eng. 49(6): 3630-3646 (2023) - [c35]Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung:
ωTest: WebView-Oriented Testing for Android Applications. ISSTA 2023: 992-1004 - [i17]Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung:
ωTest: WebView-Oriented Testing for Android Applications. CoRR abs/2306.03845 (2023) - [i16]Jiarong Wu, Lili Wei, Yanyan Jiang, Shing-Chi Cheung, Luyao Ren, Chang Xu:
Programming by Example Made Easy. CoRR abs/2307.07965 (2023) - [i15]Hengcheng Zhu, Lili Wei, Valerio Terragni, Yepang Liu, Shing-Chi Cheung, Jiarong Wu, Qin Sheng, Bing Zhang, Lihong Song:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. CoRR abs/2307.14733 (2023) - [i14]Shuqing Li, Lili Wei, Yepang Liu, Cuiyun Gao, Shing-Chi Cheung, Michael R. Lyu:
Towards Modeling Software Quality of Virtual Reality Applications from Users' Perspectives. CoRR abs/2308.06783 (2023) - 2022
- [j36]Lili Wei, Mou Chen:
Distributed DETMs-based internal collision avoidance control for UAV formation with lumped disturbances. Appl. Math. Comput. 433: 127362 (2022) - [j35]Zhenglong Yang, Yixi Luo, Yong Lin, Lili Wei, Hua Zhang:
Convolutional neural network-based optimal R-λ intra rate control in Versatile Video Coding. J. Electronic Imaging 31(6) (2022) - [j34]Ruijie Zhao, Congyan Lang, Zun Li, Liqian Liang, Lili Wei, Songhe Feng, Tao Wang:
Pedestrian attribute recognition based on attribute correlation. Multim. Syst. 28(3): 1069-1081 (2022) - [j33]Lili Wei:
Intelligent analysis of e-government influence factors based on improved machine learning. Neural Comput. Appl. 34(15): 12241-12256 (2022) - [j32]Yichen Zhu, Lili Wei, Congyan Lang, Siyu Li, Songhe Feng, Yidong Li:
Fine-grained facial expression recognition via relational reasoning and hierarchical relation optimization. Pattern Recognit. Lett. 164: 67-73 (2022) - [j31]Lili Wei, Congyan Lang, Liqian Liang, Songhe Feng, Tao Wang, Shidi Chen:
Weakly Supervised Video Object Segmentation via Dual-attention Cross-branch Fusion. ACM Trans. Intell. Syst. Technol. 13(3): 46:1-46:20 (2022) - [i13]Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu, Shuqing Li, Lu Liu, Michael R. Lyu:
Front-Running Attack Benchmark Construction and Vulnerability Detection Technique Evaluation. CoRR abs/2212.12110 (2022) - 2021
- [j30]Lili Wei, Zhenglong Yang, Zhenming Wang, Guozhong Wang:
A CNN-Based Optimal CTU λ Decision for HEVC Intra Rate Control. IEICE Trans. Inf. Syst. 104-D(10): 1766-1769 (2021) - [j29]Lili Wei, Mou Chen, Tao Li:
Disturbance-observer-based formation-containment control for UAVs via distributed adaptive event -triggered mechanisms. J. Frankl. Inst. 358(10): 5305-5333 (2021) - [c34]Huaxun Huang, Ming Wen, Lili Wei, Yepang Liu, Shing-Chi Cheung:
Characterizing and Detecting Configuration Compatibility Issues in Android Apps. ASE 2021: 517-528 - [c33]Lu Liu, Lili Wei, Wuqi Zhang, Ming Wen, Yepang Liu, Shing-Chi Cheung:
Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts. ASE 2021: 630-641 - [c32]Julian Harty, Haonan Zhang, Lili Wei, Luca Pascarella, Maurício Aniche, Weiyi Shang:
Logging Practices with Mobile Analytics: An Empirical Study on Firebase. MOBILESoft@ICSE 2021: 56-60 - [c31]Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, Shing-Chi Cheung:
ÐArcher: detecting on-chain-off-chain synchronization bugs in decentralized applications. ESEC/SIGSOFT FSE 2021: 553-565 - [c30]Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. USENIX Security Symposium 2021: 751-768 - [c29]Baolin Yin, Xinmin Li, Xiaoqiang Zhang, Lili Wei:
Trajectory Optimization for Age of Information Minimization in UAV Communication Systems. VTC Fall 2021: 1-6 - [i12]Julian Harty, Haonan Zhang, Lili Wei, Luca Pascarella, Maurício Aniche, Weiyi Shang:
Logging Practices with Mobile Analytics: An Empirical Study on Firebase. CoRR abs/2104.02513 (2021) - [i11]Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, Shing-Chi Cheung:
ÐArcher: Detecting On-Chain-Off-Chain Synchronization Bugs in Decentralized Applications. CoRR abs/2106.09440 (2021) - [i10]Lu Liu, Lili Wei, Wuqi Zhang, Ming Wen, Yepang Liu, Shing-Chi Cheung:
Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts. CoRR abs/2108.10799 (2021) - [i9]Huaxun Huang, Ming Wen, Lili Wei, Yepang Liu, Shing-Chi Cheung:
Characterizing and Detecting Configuration Compatibility Issues in Android Apps. CoRR abs/2109.00300 (2021) - 2020
- [j28]Yunjun Yu, Xiaoming Li, Lili Wei:
Fault Tolerant Control of Five-Level Inverter Based on Redundancy Space Vector Optimization and Topology Reconfigruation. IEEE Access 8: 194342-194350 (2020) - [j27]Lili Wei:
Law of the iterated logarithm for estimators of parameters in partially linear errors-in-variables models. Comput. Math. Methods 2(3) (2020) - [j26]Lili Wei, Yepang Liu, Shing-Chi Cheung, Huaxun Huang, Xuan Lu, Xuanzhe Liu:
Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps. IEEE Trans. Software Eng. 46(11): 1176-1199 (2020) - [c28]Zheming Xu, Lili Wei, Congyan Lang, Songhe Feng, Tao Wang, Adrian G. Bors:
HSS-GCN: A Hierarchical Spatial Structural Graph Convolutional Network for Vehicle Re-identification. ICPR Workshops (5) 2020: 356-364 - [c27]Hengcheng Zhu, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung, Qin Sheng, Cui Zhou:
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests. ASE 2020: 436-447 - [d1]Hengcheng Zhu, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung, Qin Sheng, Cui Zhou:
MockSniffer. Zenodo, 2020 - [i8]Yang Yu, Wen Chen, Lili Wei:
Design of Convergence-Optimized Non-binary LDPC Codes over Binary Erasure Channel. CoRR abs/2003.01340 (2020) - [i7]Lili Wei, Wen Chen:
Compute-and-Forward Network Coding Design over Multi-Source Multi-Relay Channels. CoRR abs/2003.02695 (2020) - [i6]Lili Wei, Wen Chen:
Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing. CoRR abs/2003.03250 (2020) - [i5]Lili Wei, Wen Chen:
Integer-Forcing Linear Receiver Design with Slowest Descent Method. CoRR abs/2003.03251 (2020) - [i4]Lili Wei, Wen Chen:
Optimal Upward Scaling of Minimum-TSC Binary Signature Sets. CoRR abs/2003.03252 (2020) - [i3]Kun Xie, Wen Chen, Lili Wei:
Increasing Security Degree of Freedom in Multi-user and Multi-eve Systems. CoRR abs/2003.10675 (2020) - [i2]Yuejun Wei, Yuhang Yang, Ming Jiang, Wen Chen, Lili Wei:
Joint Shortening and Puncturing Optimization for Structured LDPC Codes. CoRR abs/2003.11234 (2020)
2010 – 2019
- 2019
- [j25]Zeyu Sun, Lili Wei, Chen Xu, Zhiguo Lv:
An Event-Driven Mechanism Coverage Algorithm Based on Sensing-Cloud-Computing in Sensor Networks. IEEE Access 7: 84668-84679 (2019) - [j24]Zeyu Sun, Lili Wei, Chen Xu, Tian Wang, Yalin Nie, Xiaofei Xing, Jianfeng Lu:
An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs. IEEE Access 7: 144165-144177 (2019) - [j23]Lili Wei:
Study on the application of cloud computing and speech recognition technology in English teaching. Clust. Comput. 22(Supplement): 9241-9249 (2019) - [j22]Yepang Liu, Jue Wang, Lili Wei, Chang Xu, Shing-Chi Cheung, Tianyong Wu, Jun Yan, Jian Zhang:
DroidLeaks: a comprehensive database of resource leaks in Android apps. Empir. Softw. Eng. 24(6): 3435-3483 (2019) - [j21]Zeyu Sun, Chuanfeng Li, Lili Wei, Zhixian Li, Zhiyu Min, Guozeng Zhao:
Intelligent Sensor-Cloud in Fog Computer: A Novel Hierarchical Data Job Scheduling Strategy. Sensors 19(23): 5083 (2019) - [c26]Lili Wei, Yepang Liu, Shing-Chi Cheung:
Pivot: learning API-device correlations to facilitate Android compatibility issue detection. ICSE 2019: 878-888 - 2018
- [j20]Jinliang Liu, Lili Wei, Xiangpeng Xie, Engang Tian, Shumin Fei:
Quantized Stabilization for T-S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks. IEEE Trans. Fuzzy Syst. 26(6): 3820-3834 (2018) - [c25]Cong Li, Chang Xu, Lili Wei, Jue Wang, Jun Ma, Jian Lu:
ELEGANT: Towards Effective Location of Fragmentation-Induced Compatibility Issues for Android Apps. APSEC 2018: 278-287 - [c24]Lili Wei, Qian (Clara) Li, Geng Wu:
Initial Access Techniques for 5G NR: Omni/Beam SYNC and RACH designs. ICNC 2018: 249-253 - [c23]Huaxun Huang, Lili Wei, Yepang Liu, Shing-Chi Cheung:
Understanding and detecting callback compatibility issues for Android applications. ASE 2018: 532-542 - [c22]Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung, Huaxun Huang:
A tale of two cities: how WebView induces bugs to Android applications. ASE 2018: 702-713 - 2017
- [j19]Jinliang Liu, Lili Wei, Engang Tian, Shumin Fei, Jie Cao:
H∞ filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks. J. Frankl. Inst. 354(18): 8490-8512 (2017) - [c21]Weili Kou, Lili Wei, Changxian Liang, Ning Lu, Qiuhua Wang:
An IDL-Based Parallel Model for Scientific Computations on Multi-core Computers. DMBD 2017: 464-471 - [c20]Lili Wei, Yepang Liu, Shing-Chi Cheung:
OASIS: prioritizing static analysis warnings for Android apps based on app user reviews. ESEC/SIGSOFT FSE 2017: 672-682 - [c19]Lili Wei, Qian (Clara) Li, Geng Wu:
Direction of Arrival Estimation with Uniform Planar Array. VTC Fall 2017: 1-5 - [c18]Lili Wei, Qian (Clara) Li, Geng Wu:
Exhaustive, Iterative and Hybrid Initial Access Techniques in mmWave Communications. WCNC 2017: 1-6 - 2016
- [j18]Lili Wei, Rose Qingyang Hu, Yi Qian, Geng Wu:
Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks. IEEE Trans. Veh. Technol. 65(1): 367-380 (2016) - [c17]Lili Wei, Apostolos Papathanassiou, Qian (Clara) Li, Geng Wu:
System-level simulations for multi-hop D2D communications overlay LTE networks. ICNC 2016: 1-5 - [c16]Lili Wei, Apostolos Papathanassiou, Qian (Clara) Li, Geng Wu:
Dynamic scheduling in system-level simulations for multi-hop D2D communications in LTE networks. IWSLS² 2016: 1-6 - [c15]Lili Wei, Yepang Liu, Shing-Chi Cheung:
Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps. ASE 2016: 226-237 - [i1]Yepang Liu, Lili Wei, Chang Xu, Shing-Chi Cheung:
DroidLeaks: Benchmarking Resource Leak Bugs for Android Applications. CoRR abs/1611.08079 (2016) - 2015
- [j17]Lili Wei, Dimitrios A. Pados, Stella N. Batalama, Rose Qingyang Hu, Michael J. Medley:
Optimal multiuser spread-spectrum data hiding in digital images. Secur. Commun. Networks 8(4): 540-549 (2015) - [j16]Qingkuan Dong, Wenxiu Ding, Lili Wei:
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication. Secur. Commun. Networks 8(8): 1474-1484 (2015) - [c14]Lili Wei, Geng Wu, Rose Qingyang Hu:
Sum-capacity optimal spread-spectrum data hiding in video streams. ICC 2015: 7407-7412 - [c13]Lili Wei, Geng Wu, Rose Qingyang Hu:
Multi-pair device-to-device communications with space-time analog network coding. WCNC 2015: 920-925 - 2014
- [j15]Chaolong Jia, Lili Wei, Hanning Wang, Jiulin Yang:
Study of Track Irregularity Time Series Calibration and Variation Pattern at Unit Section. Comput. Intell. Neurosci. 2014: 727948:1-727948:14 (2014) - [j14]Lili Wei, Rose Qingyang Hu, Yi Qian, Geng Wu:
Enable device-to-device communications underlaying cellular networks: challenges and research aspects. IEEE Commun. Mag. 52(6): 90-96 (2014) - [j13]Lili Wei, Rose Qingyang Hu, Yi Qian, Geng Wu:
Key elements to enable millimeter wave communications for 5G wireless systems. IEEE Wirel. Commun. 21(6): 136-143 (2014) - [c12]Lili Wei, Zhaotong Luo, Qiang Qu, Qing He, Jingwei Xu:
A Low-Cost PKC-based RFID Authentication Protocol and its Implementation. CIS 2014: 415-419 - [c11]Lili Wei, Rose Qingyang Hu, Dimitrios A. Pados, Geng Wu:
Optimal multiuser spread-spectrum data embedding in video streams. GLOBECOM 2014: 764-769 - [c10]Yiran Xu, Rose Qingyang Hu, Lili Wei, Geng Wu:
QoE-aware mobile association and resource allocation over wireless heterogeneous networks. GLOBECOM 2014: 4695-4701 - [c9]Lili Wei, Dimitrios A. Pados, Stella N. Batalama, Michael J. Medley, Rose Qingyang Hu:
Advances in multiuser data embedding in digital media: Orthogonal sum-SINR-optimal carriers. ICC 2014: 963-968 - [c8]Lili Wei, Rose Qingyang Hu, Qian (Clara) Li, Geng Wu:
Energy-efficiency of multi-hop device-to-device communications underlaying cellular networks. ICC 2014: 5486-5491 - [c7]Lili Wei, Wen Chen, Rose Qingyang Hu, Geng Wu:
Network coding in multiple access relay channel with multiple antenna relay. ICNC 2014: 656-661 - 2013
- [j12]Kun Xie, Wen Chen, Lili Wei:
Increasing Security Degree of Freedom in Multiuser and Multieve Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 440-449 (2013) - [j11]Lili Wei, Wen Chen:
Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing. IEEE Trans. Wirel. Commun. 12(2): 840-849 (2013) - [j10]Lili Wei, Wen Chen:
Integer-Forcing Linear Receiver Design with Slowest Descent Method. IEEE Trans. Wirel. Commun. 12(6): 2788-2796 (2013) - [c6]Lili Wei, Wen Chen:
Space-time analog network coding for multiple access relay channels. WCNC 2013: 2961-2965 - 2012
- [j9]Lili Wei, Wen Chen:
Optimal Upward Scaling of Minimum-TSC Binary Signature Sets. IEEE Commun. Lett. 16(2): 168-171 (2012) - [j8]Lili Wei, Wen Chen:
Efficient Compute-and-Forward Network Codes Search for Two-Way Relay Channel. IEEE Commun. Lett. 16(8): 1204-1207 (2012) - [j7]Yuejun Wei, Yuhang Yang, Lili Wei, Wen Chen:
Comments on "A New Parity-Check Stopping Criterion for Turbo Decoding". IEEE Commun. Lett. 16(10): 1664-1667 (2012) - [j6]Yuejun Wei, Yuhang Yang, Ming Jiang, Wen Chen, Lili Wei:
Joint Shortening and Puncturing Optimization for Structured LDPC Codes. IEEE Commun. Lett. 16(12): 2060-2063 (2012) - [j5]Lili Wei, Dimitrios A. Pados:
Optimal Orthogonal Carriers and Sum-SINR/Sum-Capacity of the Multiple-Access Vector Channel. IEEE Trans. Commun. 60(5): 1188-1192 (2012) - [j4]Lili Wei, Wen Chen:
Compute-and-Forward Network Coding Design over Multi-Source Multi-Relay Channels. IEEE Trans. Wirel. Commun. 11(9): 3348-3357 (2012) - [j3]Yang Yu, Wen Chen, Lili Wei:
Design of Convergence-Optimized Non-Binary LDPC Codes over Binary Erasure Channel. IEEE Wirel. Commun. Lett. 1(4): 336-339 (2012) - [c5]Lili Wei, Wen Chen:
Integer-forcing linear receiver design over MIMO channels. GLOBECOM 2012: 3560-3565 - [c4]Lili Wei, Wen Chen:
Optimal binary/quaternary adaptive signature design for code-division multiplexing. GLOBECOM 2012: 4211-4216 - [c3]Lili Wei, Wen Chen:
Network coding in wireless cooperative networks with multiple antenna relays. WCSP 2012: 1-6 - [c2]Lili Wei, Wen Chen, Yuejun Wei:
Linear transceiver and receiver design methods for multiuser MIMO channels. WCSP 2012: 1-6
2000 – 2009
- 2008
- [j2]Lili Wei, Stella N. Batalama, Dimitrios A. Pados, Bruce W. Suter:
Adaptive binary signature design for code-division multiplexing. IEEE Trans. Wirel. Commun. 7(7): 2798-2804 (2008) - 2007
- [j1]Lili Wei, Stella N. Batalama, Dimitrios A. Pados, Bruce W. Suter:
Upward Scaling of Minimum-TSC Binary Signature Sets. IEEE Commun. Lett. 11(11): 889-891 (2007) - 2006
- [c1]Lili Wei, Stella N. Batalama, Dimitrios A. Pados, Bruce W. Suter:
SINR-optimized Binary Signatures by Linear Search. GLOBECOM 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint