Lei Yu

ORCID: 0000-0003-0772-2914
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Limits and Structures in Graph Theory
  • Cooperative Communication and Network Coding
  • Cellular Automata and Applications
  • DNA and Biological Computing
  • Complexity and Algorithms in Graphs
  • Markov Chains and Monte Carlo Methods
  • Advanced Graph Theory Research
  • Sparse and Compressive Sensing Techniques
  • Chaos-based Image/Signal Encryption
  • graph theory and CDMA systems
  • Statistical Mechanics and Entropy
  • Wireless Signal Modulation Classification
  • Graph theory and applications
  • Advanced Image Fusion Techniques
  • Advanced MIMO Systems Optimization
  • Coding theory and cryptography
  • Energy Harvesting in Wireless Networks
  • Mathematical Approximation and Integration
  • Distributed Sensor Networks and Detection Algorithms
  • Mathematical Analysis and Transform Methods
  • Video Coding and Compression Technologies
  • Image and Signal Denoising Methods
  • Graph Labeling and Dimension Problems
  • Advanced Data Compression Techniques

Nankai University
2019-2024

Harbin Engineering University
2013-2024

Chongqing Normal University
2023-2024

Shenyang Aerospace University
2023-2024

Xiamen University of Technology
2023

Beijing Language and Culture University
2023

Harbin Institute of Technology
2023

Huanghuai University
2023

COMSATS University Islamabad
2023

Ministry of Industry and Information Technology
2023

With the wide application of unmanned aerial vehicles (UAVs), performing search and rescue missions autonomously in unknown environment has become an increasingly concerning issue. In this article, we propose adaptive conversion speed Q-Learning algorithm (ACSQL). Performing UAV is divided into two stages: mission stage optimal path stage. first stage, a can find task points as soon possible, efficiency exploration increased by adaptively adjusting UAV. second to get secure short path,...

10.1109/tvt.2023.3297837 article EN IEEE Transactions on Vehicular Technology 2023-07-21

Wireless video broadcast/multicast and mobile communication pose a challenge to the conventional transmission scheme (which consists of separate digital source coding channel coding). The reason is that based on nonscalable design, this unavoidably leads cliff effect as well limits ability support multiple users with diverse conditions. In paper, we propose novel wireless scalable (WSVC) framework. Specifically, present hybrid digital-analog (HDA) joint source-channel (JSCC) integrates...

10.1109/tcsvt.2013.2273675 article EN IEEE Transactions on Circuits and Systems for Video Technology 2013-07-17

10.1016/j.dam.2015.07.001 article EN publisher-specific-oa Discrete Applied Mathematics 2015-07-30

Wireless video broadcast/multicast and mobile communication pose a challenge to the conventional transmission strategy (which applies separate digital source coding channel in point-to-point system) and, therefore, cooperative has been proposed improve received quality of receivers with bad channels robustness fading (mobility). In this paper we propose novel wireless (WCVC) framework. Specifically, present joint source-channel scheme that is based on hybrid digital-analog integrates...

10.1109/tcsvt.2014.2347532 article EN IEEE Transactions on Circuits and Systems for Video Technology 2014-08-13

Functional neuroimaging studies suggest that abnormal brain functional connectivity may be the neural underpinning of addiction to illicit drugs and relapse after successful cessation therapy. Aberrant networks have been demonstrated in addicted patients newly abstinent addicts. However, it is not known whether patterns persist prolonged abstinence. In this cross-sectional study, whole-brain resting-state magnetic resonance images (8 min) were collected from 30 heroin-addicted individuals a...

10.1002/jnr.23608 article EN Journal of Neuroscience Research 2015-08-17

In image compression and transmission, two basic data redundancies can be identified exploited: statistical redundancy perceptual redundancy. Statistical has been studied for a very long time exploited in most coding schemes. However, not yet completely exploited. Furthermore, is difficult to exploit by using digital techniques because power allocation performed at the bit level coding. as one of one-size-fits-all technique, soft transmission suitable its directly applied pixel instead...

10.1109/tmm.2018.2811622 article EN IEEE Transactions on Multimedia 2018-03-09

The conventional channel resolvability problem refers to the determination of minimum rate required for an input process so that output distribution approximates a target in either total variation distance or relative entropy. In contrast previous works, this paper, we use (normalized unnormalized) Rényi divergence (with parameter in[0, 2] U {∞}) measure level approximation. We also provide asymptotic expressions normalized when is larger than equal 1 as well (lower and upper) bounds case...

10.1109/tit.2018.2885318 article EN IEEE Transactions on Information Theory 2018-12-07

We study a generalized version of Wyner's common information problem (also coined the distributed source simulation problem). The original consists in understanding minimum rate input to independent processors generate an approximation joint distribution when distance measure used quantify discrepancy between synthesized and target distributions is normalized relative entropy. Our generalization involves changing unnormalized Rényi divergences order α = 1 + s ∈ [0, 2]. show that needed...

10.1109/tit.2018.2806569 article EN IEEE Transactions on Information Theory 2018-02-15

Recently, two extensions of Wyner's common information-exact and Rényi informations-were introduced respectively by Kumar, Li, El Gamal (KLE), the present authors. The class information problems involves determining minimum rate input to independent processors needed exactly or approximately generate a target joint distribution. For exact problem, generation distribution is required, while for α-Rényi informations, relative entropy divergence with order α were used quantify discrepancy...

10.1109/tit.2020.2970396 article EN IEEE Transactions on Information Theory 2020-01-29

In this paper, we propose a novel wireless video transmission scheme named HDA-Cast, which is hybrid digital-analog (HDA) coding that integrates the advantages of digital and analog coding. Relative to most state-of-the-art methods, it avoids "cliff effect" provided channel quality within expected range, gives better fairness among all receivers for multicast, has strong adaption variation. The evaluation results show our HDA-Cast 3.5-9.6 dB than SoftCast an up-to-date scheme. Owing its...

10.1109/iscas.2013.6572058 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2013-05-01

The random variable simulation problem consists in using a k-dimensional i.i.d. vector X <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sup> with distribution P <sub xmlns:xlink="http://www.w3.org/1999/xlink">X</sub> to simulate an n-dimensional Y xmlns:xlink="http://www.w3.org/1999/xlink">n</sup> so that its is approximately Q xmlns:xlink="http://www.w3.org/1999/xlink">Y</sub> . In contrast previous works, this paper, we consider the...

10.1109/tit.2019.2891363 article EN IEEE Transactions on Information Theory 2019-01-08

In the complex battlefield electromagnetic environment, multiple jamming signals can enter radar receiver simultaneously due to development of jammers and modulation technology. The received compound aggravate difficulty recognition subsequent counter-countermeasure. face strong overlapping unseen signal combinations, performance existing methods usually seriously degrades. this paper, an end-to-end multi-label classification framework combining a complex-valued convolutional neural network...

10.3390/rs15215180 article EN cc-by Remote Sensing 2023-10-30

A coupling of two distributions P <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">X</sub> and xmlns:xlink="http://www.w3.org/1999/xlink">Y</sub> is a joint distribution xmlns:xlink="http://www.w3.org/1999/xlink">XY</sub> with marginal equal to . Given marginals real-valued function f the , what its minimum over all couplings ? We study asymptotics such problems different f's X Y replaced by <sup xmlns:xlink="http://www.w3.org/1999/xlink">n</sup>...

10.1109/tit.2018.2857763 article EN IEEE Transactions on Information Theory 2018-07-20

In literature, different common informations were defined by G\'acs and K\"orner, Wyner, Kumar, Li, Gamal, respectively. this paper, we define two generalized versions of informations, named approximate exact information-correlation functions, exploiting the conditional maximal correlation as a commonness or privacy measure. These encompass notions G\'acs-K\"orner's, Wyner's, Kumar-Li-Gamal's special cases. Furthermore, to give operational characterizations these also study problems private...

10.48550/arxiv.1610.09289 preprint EN other-oa arXiv (Cornell University) 2016-01-01

In this paper, we study the type graph, namely, a bipartite graph induced by joint type. We investigate maximum edge density of subgraphs having number vertices on each side an exponential scale in length <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</i> This can be seen as isoperimetric problem. provide asymptotically sharp bounds for exponent goes to infinity. also biclique rate region which is defined set (...

10.1109/tit.2024.3357859 article EN IEEE Transactions on Information Theory 2024-01-24

In this paper, we derive variational formulas for the asymptotic exponents (i.e., convergence rates) of concentration and isoperimetric functions in product Polish probability space under certain mild assumptions. These are expressed terms relative entropies (which from information theory) optimal transport cost functionals theory). Hence, our results verify an intimate connection among theory, transport, measure or inequalities. regime, corresponding formula is fact a dimension-free bound...

10.1109/tit.2024.3408043 article EN IEEE Transactions on Information Theory 2024-05-31

We consider the exact channel synthesis problem. This problem concerns determination of minimum amount information required to create correlation remotely when there is a certain rate randomness shared by two terminals. generalizes an existing approximate version, in which generated joint distribution be close target under total variation (TV) distance measure (instead being exactly equal distribution). provide single-letter inner and outer bounds on admissible region communication for These...

10.1109/tit.2019.2944625 article EN IEEE Transactions on Information Theory 2019-10-01

The union-closed sets conjecture states that in any nonempty family $\mathcal{F}$ of subsets a finite set, there exists an element contained at least proportion $1/2$ the $\mathcal{F}$. Using information-theoretic method, Gilmer \cite{gilmer2022constant} recently showed $0.01$ such He conjectured his technique can be pushed to constant $\frac{3-\sqrt{5}}{2}$ which was subsequently confirmed by several researchers...

10.3390/e25050767 article EN cc-by Entropy 2023-05-08

We revisit the high-dimensional content identification with lossy recovery problem (Tuncel and Gündüz, 2014) establish an exponential strong converse theorem. As a corollary of theorem, we derive upper bound on joint identification-error excess-distortion exponent for problem. Our main results can be specialized to biometrical (Willems, 2003) (Tuncel, 2009) since these two problems are both special cases leverage information spectrum method introduced by Oohama adapt techniques therein...

10.1109/tit.2018.2842775 article EN IEEE Transactions on Information Theory 2018-06-01

We leverage proof techniques from discrete Fourier analysis and an existing result in coding theory to derive new bounds for the problem of non-interactive simulation binary random variables. Previous literature were derived by applying data processing inequalities concerning maximal correlation or hypercontractivity. show that our are sharp some regimes. Indeed, a specific instance parameters, main resolves open posed E. Mossel 2017. As by-products analyses, various properties average...

10.1109/tit.2021.3054659 article EN IEEE Transactions on Information Theory 2021-01-26

This paper investigates basic trade-offs between energy and delay in wireless communication systems using finite blocklength theory. We first assume that data arrive constant stream of bits, which are put into packets transmitted over a communications link. Our results show depending on exactly how is measured, general depends √d <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-1</sup> or √Vd log d, where d the delay. means decreases quite...

10.1109/tit.2019.2954347 article EN publisher-specific-oa IEEE Transactions on Information Theory 2019-11-19
Coming Soon ...