default search action
Jinyuan Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Jianjun Zhu, Fan Li, Jinyuan Chen:
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0. Comput. Sci. Rev. 54: 100667 (2024) - [j19]Diego Segura Ibarra, Fan Li, Jianjun Zhu, Jinyuan Chen:
Blockchain application to the processes in material design, production, distribution, and disposal: A survey. J. Ind. Inf. Integr. 41: 100638 (2024) - [i22]Jinyuan Chen:
OciorCOOL: Faster Byzantine Agreement and Reliable Broadcast. CoRR abs/2409.06008 (2024) - 2023
- [j18]Weijun Wang, Jinyuan Chen, Zucheng Huang, Hai Yuan, Peng Li, Xuyao Jiang, Xintong Wang, Cheng Zhong, Qunxu Lin:
Improved YOLOv7-Based Algorithm for Detecting Foreign Objects on the Roof of a Subway Vehicle. Sensors 23(23): 9440 (2023) - [c29]Jinyuan Chen, Bela Stantic:
Hybrid Method for Short Text Topic Modeling. ACIIDS (Companion) 2023: 157-168 - [c28]Jianjun Zhu, Fan Li, Jinyuan Chen:
Communication-Efficient and Error-Free Gradecast with Optimal Resilience. ISIT 2023: 108-113 - [i21]Jianjun Zhu, Fan Li, Jinyuan Chen:
A Survey of Blockchain, Artificial Intelligence, and Edge Computing for Web 3.0. CoRR abs/2311.13731 (2023) - 2022
- [j17]Zezong Zhang, Jianeng Tang, Feng Zhang, Hui Ni, Jinyuan Chen, Zhongming Huang:
Color Image Encryption Using 2D Sine-Cosine Coupling Map. IEEE Access 10: 67669-67685 (2022) - [j16]Nishant Shakya, Fan Li, Jinyuan Chen:
On Distributed Computing With Heterogeneous Communication Constraints. IEEE/ACM Trans. Netw. 30(6): 2776-2787 (2022) - [c27]Jinyuan Chen, Bela Stantic, Jinyan Chen:
Age Prediction of Social Media Users: Case Study on Robots in Hospitality. RiTA 2022: 426-437 - 2021
- [j15]Fan Li, Jinyuan Chen:
Adding Common Randomness Can Remove the Secrecy Penalty in GDoF. IEEE Trans. Inf. Theory 67(4): 2308-2333 (2021) - [j14]Jinyuan Chen, Chunhua Geng:
Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel With a Helper. IEEE Trans. Inf. Theory 67(4): 2334-2352 (2021) - [j13]Jinyuan Chen:
Multi-Layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel. IEEE Trans. Inf. Theory 67(6): 3986-4000 (2021) - [c26]Fan Li, Jinyuan Chen:
Communication-Efficient Signature-Free Asynchronous Byzantine Agreement. ISIT 2021: 2864-2869 - [c25]Jinyuan Chen:
Optimal Error-Free Multi-Valued Byzantine Agreement. DISC 2021: 17:1-17:19 - 2020
- [j12]Jinyuan Chen:
Secure Communication Over Interference Channel: To Jam or not to Jam? IEEE Trans. Inf. Theory 66(5): 2819-2841 (2020) - [c24]Jinyuan Chen:
Multi-layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel. ISIT 2020: 1516-1521 - [c23]Fan Li, Jinyuan Chen:
Secure Communications with Limited Common Randomness at Transmitters. ISIT 2020: 1552-1557 - [i20]Jinyuan Chen:
Fundamental Limits of Byzantine Agreement. CoRR abs/2009.10965 (2020)
2010 – 2019
- 2019
- [j11]Jinyuan Chen, Fan Li:
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel. IEEE Trans. Inf. Forensics Secur. 14(12): 3126-3139 (2019) - [j10]Fan Li, Jinyuan Chen, Zhiying Wang:
Wireless MapReduce Distributed Computing. IEEE Trans. Inf. Theory 65(10): 6101-6114 (2019) - [c22]Jinyuan Chen, Chunhua Geng:
Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper. ISIT 2019: 667-671 - [c21]Fan Li, Jinyuan Chen:
How to Break the Limits of Secrecy Constraints in Communication Networks? ISIT 2019: 2743-2747 - [i19]Fan Li, Jinyuan Chen:
Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks. CoRR abs/1907.04599 (2019) - [i18]Jinyuan Chen:
Multi-layer Interference Alignment and GDoF of the K-User Asymmetric Interference Channel. CoRR abs/1910.12997 (2019) - 2018
- [j9]Jinyuan Chen:
On the MISO Channel With Feedback: Can Infinitely Massive Antennas Achieve Infinite Capacity? IEEE Trans. Inf. Theory 64(10): 6894-6916 (2018) - [c20]Nishant Shakya, Fan Li, Jinyuan Chen:
On Distributed Computing with Heterogeneous Communication Constraints. ACSSC 2018: 1795-1799 - [c19]Jinyuan Chen:
Secure Communication over Interference Channel: To Jam or Not to Jam? Allerton 2018: 1120-1127 - [c18]Fan Li, Jinyuan Chen, Zhiying Wang:
Wireless MapReduce Distributed Computing. ISIT 2018: 1286-1290 - [i17]Nishant Shakya, Fan Li, Jinyuan Chen:
Distributed Computing with Heterogeneous Communication Constraints: The Worst-Case Computation Load and Proof by Contradiction. CoRR abs/1802.00413 (2018) - [i16]Fan Li, Jinyuan Chen, Zhiying Wang:
Wireless MapReduce Distributed Computing. CoRR abs/1802.00894 (2018) - [i15]Jinyuan Chen:
Secure Communication over Interference Channel: To Jam or Not to Jam? CoRR abs/1810.13256 (2018) - [i14]Jinyuan Chen, Fan Li:
Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel. CoRR abs/1812.00550 (2018) - [i13]Jinyuan Chen, Chunhua Geng:
Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper. CoRR abs/1812.10457 (2018) - 2017
- [c17]Jinyuan Chen:
On the MISO channel with feedback: Can infinitely massive antennas achieve infinite capacity? ISIT 2017: 1077-1081 - [i12]Jinyuan Chen:
On the MISO Channel with Feedback: Can Infinitely Massive Antennas Achieve Infinite Capacity? CoRR abs/1703.01287 (2017) - [i11]Jinyuan Chen:
On the Optimality of Secure Communication Without Using Cooperative Jamming. CoRR abs/1706.06220 (2017) - 2016
- [j8]Jinyuan Chen, Sheng Yang, Ayfer Özgür, Andrea J. Goldsmith:
Achieving Full DoF in Heterogeneous Parallel Broadcast Channels With Outdated CSIT. IEEE Trans. Inf. Theory 62(7): 4154-4171 (2016) - [c16]Jinyuan Chen:
New results on the secure capacity of symmetric two-user interference channels. Allerton 2016: 524-531 - 2015
- [j7]Shengli Zhang, Soung Chang Liew, Jinyuan Chen:
The Capacity of Known Interference Channel. IEEE J. Sel. Areas Commun. 33(6): 1241-1252 (2015) - [j6]Jinyuan Chen, Petros Elia, Syed Ali Jafar:
On the Two-User MISO Broadcast Channel With Alternating CSIT: A Topological Perspective. IEEE Trans. Inf. Theory 61(8): 4345-4366 (2015) - [c15]Jinyuan Chen, Andrea Goldsmith, Ayfer Özgür, Sheng Yang:
Degrees of freedom of the MIMO interference channel with parallel multicasting. ISIT 2015: 1069-1073 - 2014
- [j5]Jinyuan Chen, Shaohuang Weng, Qingqiong Chen, Ailin Liu, Fengqing Wang, Jing Chen, Qiang Yi, Qicai Liu, Xinhua Lin:
Development of an Electrochemical Sensing Technique for Rapid Genotyping of Hepatitis B Virus. Sensors 14(3): 5611-5621 (2014) - [c14]Jinyuan Chen, Ayfer Özgür, Suhas N. Diggavi:
Feedback through overhearing. Allerton 2014: 358-365 - [c13]Jinyuan Chen, Petros Elia:
An outer bound on the MIMO BC with evolving current CSIT and perfect delayed CSIT. ISCCSP 2014: 169-172 - [c12]Jinyuan Chen, Sheng Yang, Ayfer Özgür, Andrea J. Goldsmith:
Outdated CSIT can achieve full DoF in heterogeneous parallel channels. ISIT 2014: 2564-2568 - [c11]Jinyuan Chen, Petros Elia, Syed Ali Jafar:
On the vector broadcast channel with alternating CSIT: A topological perspective. ISIT 2014: 2579-2583 - [c10]Jinyuan Chen, Petros Elia:
Symmetric two-user MIMO BC with evolving feedback. ITA 2014: 1-5 - [i10]Jinyuan Chen, Petros Elia, Syed Ali Jafar:
On the Vector Broadcast Channel with Alternating CSIT: A Topological Perspective. CoRR abs/1402.5912 (2014) - [i9]Jinyuan Chen, Ayfer Özgür, Suhas N. Diggavi:
Feedback through Overhearing. CoRR abs/1407.7590 (2014) - [i8]Jinyuan Chen, Sheng Yang, Ayfer Özgür, Andrea Goldsmith:
Achieving Full DoF in Heterogeneous Parallel Broadcast Channels with Outdated CSIT. CoRR abs/1409.6808 (2014) - 2013
- [b1]Jinyuan Chen:
Communications over the broadcast channel with limited and delayed feedback : Fundamental limits and novel encoders and decoders. (Communication au sein d'un canal de broadcast avec feedback limité et retardé : limites fondamentales, nouveaux encodeurs et décodeurs). Télécom ParisTech, France, 2013 - [j4]Jinyuan Chen, Petros Elia:
Toward the Performance Versus Feedback Tradeoff for the Two-User MISO Broadcast Channel. IEEE Trans. Inf. Theory 59(12): 8336-8356 (2013) - [c9]Jinyuan Chen, Petros Elia:
Optimal DoF region of the two-user MISO-BC with general alternating CSIT. ACSSC 2013: 1860-1864 - [c8]Jinyuan Chen, Petros Elia:
MISO broadcast channel with delayed and evolving CSIT. ISIT 2013: 992-996 - [c7]Jinyuan Chen, Sheng Yang, Petros Elia:
On the fundamental feedback-vs-performance tradeoff over the MISO-BC with imperfect and delayed CSIT. ISIT 2013: 997-1001 - [c6]Jinyuan Chen, Petros Elia:
MIMO BC with imperfect and delayed channel state information at the transmitter and receivers. SPAWC 2013: 195-199 - [i7]Jinyuan Chen, Sheng Yang, Petros Elia:
On the Fundamental Feedback-vs-Performance Tradeoff over the MISO-BC with Imperfect and Delayed CSIT. CoRR abs/1302.0806 (2013) - [i6]Jinyuan Chen, Petros Elia:
Optimal DoF Region of the Two-User MISO-BC with General Alternating CSIT. CoRR abs/1303.4352 (2013) - [i5]Jinyuan Chen, Petros Elia:
Toward the Performance vs. Feedback Tradeoff for the Two-User MISO Broadcast Channel. CoRR abs/1306.1751 (2013) - [i4]Jinyuan Chen, Petros Elia:
Symmetric Two-User MIMO BC and IC with Evolving Feedback. CoRR abs/1306.3710 (2013) - 2012
- [c5]Jinyuan Chen, Petros Elia:
Can imperfect delayed CSIT be as useful as perfect delayed CSIT? DoF analysis and constructions for the BC. Allerton Conference 2012: 1254-1261 - [c4]Jinyuan Chen, Raymond Knopp, Petros Elia:
Interference alignment for achieving both full DoF and full diversity in the broadcast channel with delayed CSIT. ISIT 2012: 1887-1891 - [i3]Jinyuan Chen, Petros Elia:
Degrees-of-Freedom Region of the MISO Broadcast Channel with General Mixed-CSIT. CoRR abs/1205.3474 (2012) - [i2]Jinyuan Chen, Petros Elia:
Imperfect Delayed CSIT can be as Useful as Perfect Delayed CSIT: DoF Analysis and Constructions for the BC. CoRR abs/1206.5426 (2012) - [i1]Jinyuan Chen, Petros Elia:
MISO Broadcast Channel with Delayed and Evolving CSIT. CoRR abs/1211.1622 (2012) - 2011
- [c3]Jinyuan Chen, Petros Elia, Raymond Knopp:
Relay-aided interference neutralization for the multiuser uplink-downlink asymmetric setting. ISIT 2011: 264-268 - [c2]Jinyuan Chen, Arun Singh, Petros Elia, Raymond Knopp:
Interference neutralization for separated multiuser uplink-downlink with distributed relays. ITA 2011: 524-532 - 2010
- [j3]Conghua Cheng, Jinyuan Chen, Zehui Li:
A New Algorithm for Maximum Likelihood Estimation with Progressive Type-I Interval Censored Data. Commun. Stat. Simul. Comput. 39(4): 750-766 (2010) - [c1]Jinyuan Chen, Jingyang Lu:
Multi-cell and multi-user detection in uplink for MIMO systems. WCNIS 2010: 23-27
2000 – 2009
- 2008
- [j2]Ming Ma, Zehui Li, Jinyuan Chen:
Phase-type distribution of customer relationship with Markovian response and marketing expenditure decision on the customer lifetime value. Eur. J. Oper. Res. 187(1): 313-326 (2008) - [j1]Jinyuan Chen, Zehui Li:
An extended extreme shock maintenance model for a deteriorating system. Reliab. Eng. Syst. Saf. 93(8): 1123-1129 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint