Jingge Zhu

ORCID: 0000-0003-0661-601X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Sparse and Compressive Sensing Techniques
  • Machine Learning and Algorithms
  • Advanced Wireless Communication Technologies
  • Advanced Wireless Communication Techniques
  • Energy Harvesting in Wireless Networks
  • Error Correcting Code Techniques
  • Domain Adaptation and Few-Shot Learning
  • Machine Learning and ELM
  • DNA and Biological Computing
  • Stochastic Gradient Optimization Techniques
  • Control Systems and Identification
  • Advanced Control Systems Optimization
  • Wireless Body Area Networks
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Energy Efficient Wireless Sensor Networks
  • Molecular Communication and Nanonetworks
  • Neural Networks and Applications
  • Complexity and Algorithms in Graphs
  • Advanced Wireless Network Optimization
  • Analog and Mixed-Signal Circuit Design
  • Optical Network Technologies

The University of Melbourne
2018-2025

University of California, Berkeley
2016-2018

Berkeley College
2017

École Polytechnique Fédérale de Lausanne
2013-2016

Shanghai Jiao Tong University
2010

The distance to uncontrollability for a linear control system is the (in 2-norm) nearest uncontrollable system. We present an algorithm based on methods of Gu and Burke-Lewis-Overton that estimates any prescribed accuracy. new method requires O(n4 ) operations average, which improvement over previous have complexity O(n6 ), where n order Numerical experiments indicate reliable in practice.

10.1137/05063060x article EN SIAM Journal on Matrix Analysis and Applications 2006-01-01

We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner.Artificial noise is introduced along with useful information.We derive power control and artificial parameter for kinds of optimal points, max-min point single user point.It shown that there exists critical value Pc constraint, below which an on rate region, above time-sharing between points achieves larger pairs.It also can help enlarge particular point.

10.1109/lcomm.2010.081910.101121 article EN IEEE Communications Letters 2010-09-07

10.1109/tit.2025.3560447 article EN IEEE Transactions on Information Theory 2025-01-01

Lattice codes used under the compute-and-forward paradigm suggest an alternative strategy for standard Gaussian multiple-access channel (MAC): receiver successively decodes integer linear combinations of messages until it can invert and recover all messages. In this paper, a technique called compute-forward multiple access (CFMA) is proposed analyzed. For two-user MAC, shown that without time-sharing, entire capacity region be attained using CFMA with single-user decoder as soon...

10.1109/tit.2016.2605121 article EN IEEE Transactions on Information Theory 2016-09-01

Hardware-limited task-based quantization is a new design paradigm for data acquisition systems equipped with serial scalar analog-to-digital converters using small number of bits. By taking into account the underlying system task, quantizers can efficiently recover desired parameters from low-bit quantized observation. Current and analysis frameworks hardware-limited are only applicable to inputs bounded support uniform non-subtractive dithering. Here, we propose framework based on...

10.1109/tsp.2023.3269911 article EN IEEE Transactions on Signal Processing 2023-01-01

Transfer learning is a machine paradigm where knowledge from one problem utilized to solve new but related problem. While conceivable that task could help task, if not executed properly, transfer algorithms can impair the performance instead of improving it – commonly known as negative transfer. In this paper, we use parametric statistical model study Bayesian perspective. Specifically, three variants problems, instantaneous, online, and time-variant learning. We define an appropriate...

10.1016/j.artint.2023.103991 article EN cc-by-nc Artificial Intelligence 2023-08-11

10.1109/tit.2025.3542673 article EN IEEE Transactions on Information Theory 2025-01-01

We present a modified compute-and-forward scheme which utilizes Channel State Information at the Transmitters (CSIT) in natural way. The allows different users to have coding rates, and use CSIT achieve larger rate region. This idea is applicable all systems technique can be arbitrarily better than regular some settings.

10.48550/arxiv.1401.3189 preprint EN other-oa arXiv (Cornell University) 2014-01-01

Semi-supervised learning (SSL) aims to train a machine (ML) model using both labeled and unlabeled data. While the data have been used in various ways improve prediction accuracy, reason why could help is not fully understood. One interesting promising direction understand SSL from causal perspective. In light of independent mechanisms (ICM) principle, can be helpful when label causes features but vice versa. However, relations between labels complex real world applications. this article, we...

10.1109/tnnls.2024.3392750 article EN IEEE Transactions on Neural Networks and Learning Systems 2024-01-01

Building on the previous work of Lee et al. [2] and Ferdinand [3] coded computation, we propose a sequential approximation framework for solving optimization problems in distributed manner. In computation system, latency caused by individual processors ("stragglers") usually causes significant delay overall process. The proposed method is powered scheme, which designed specifically systems with stragglers. This scheme has desirable property that user guaranteed to receive useful...

10.1109/allerton.2017.8262879 article EN 2017-10-01

We present a modified compute-and-forward scheme which utilizes Channel State Information at the Transmitters (CSIT) in natural way. The allows different users to have coding rates, and use CSIT achieve larger rate region. This idea is applicable all systems technique can be arbitrarily better than regular some settings.

10.3929/ethz-a-010095320 article EN arXiv (Cornell University) 2014-01-14

Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different distributions (denoted as μ μ', respectively). In this work, we give an informationtheoretic analysis on the generalization error excess risk of transfer algorithms, following a line work initiated by Russo Zhou. Our results suggest, perhaps expected, that Kullback-Leibler (KL) divergence D(μ||μ') plays important role characterizing settings...

10.1109/isit44484.2020.9173989 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2020-06-01

We present a practical strategy that aims to attain rate points on the dominant face of multiple access channel capacity using standard low complexity decoder. This technique is built upon recent theoretical developments Zhu and Gastpar compute-forward which achieves sequential illustrate this with off-the-shelf LDPC codes. In first stage decoding, receiver recovers linear combination transmitted codewords sum-product algorithm (SPA). second stage, by recovered sum-of-codewords as side...

10.1109/tcomm.2018.2874240 article EN IEEE Transactions on Communications 2018-10-08

Transfer learning is a machine paradigm where the knowledge from one task utilized to resolve problem in related task. On hand, it conceivable that could be useful for solving problem. other also recognized if not executed properly, transfer algorithms fact impair performance instead of improving - commonly known as negative transfer. In this paper, we study online problems source samples are given an off-line way while target arrive sequentially. We define expected regret problem, and...

10.1109/isit45174.2021.9517974 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2021-07-12

Inspired by the compute-and-forward scheme from Nazer and Gastpar, a novel multiple-access introduced Zhu Gastpar makes use of nested lattice codes sequential decoding linear combinations codewords to recover individual messages. This strategy, coined compute-forward multiple access (CFMA), provably achieves points on dominant face capacity region while circumventing need time sharing or rate splitting. For two-user channel (MAC), we propose practical procedure design suitable off-the-shelf...

10.1109/isit.2017.8007067 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2017-06-01

Real-time data-driven optimization and control problems over networks may require sensitive information of participating users to calculate solutions decision variables, such as in traffic or energy systems. Adversaries with access coordination signals potentially decode on individual put user privacy at risk. We develop local differential privacy, which is a strong notion that guarantees regardless any auxiliary an adversary have, for larger family convex distributed problems. The mechanism...

10.48550/arxiv.1806.06035 preprint EN other-oa arXiv (Cornell University) 2018-01-01

We analyze the symbol error probability (SEP) of $M$-ary pulse amplitude modulation ($M$-PAM) receivers equipped with optimal low-resolution quantizers. first show that optimum detector can be reduced to a simple decision rule. Using this simplification, an exact SEP expression for quantized $M$-PAM is obtained when Nakagami-$m$ fading channel considered. The derived enables optimization quantizer and/or constellation under minimum criterion. Our analysis quantization equidistant receiver...

10.1109/tcomm.2021.3102131 article EN IEEE Transactions on Communications 2021-08-03

Due to mutual interference between users, power allocation problems in wireless networks are often non-convex and computationally challenging. Graph neural (GNNs) have recently emerged as a promising approach tackling these an that exploits the underlying topology of networks. In this paper, we propose novel graph representation method for include full-duplex (FD) nodes. We then design corresponding FD Neural Network (F-GNN) with aim allocating transmit powers maximise network throughput....

10.1109/iccworkshops57953.2023.10283511 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2023-05-28

Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different distributions (denoted as $\mu$ $\mu'$, respectively). In this work, we give an information-theoretic analysis on the generalization error excess risk of transfer algorithms, following a line work initiated by Russo Zhou. Our results suggest, perhaps expected, that Kullback-Leibler (KL) divergence $D(mu||mu')$ plays important role characterizing...

10.48550/arxiv.2005.08697 preprint EN other-oa arXiv (Cornell University) 2020-01-01

The usefulness of lattice codes is investigated for two-user Gaussian interference channels (IC). A coding scheme based on the compute-and-forward technique shown to achieve capacity region IC under strong interference. proposed uses single-user decoders whereas conventional multi-user simultaneous decoding. same applicable Z-interference channel. lattice-based also devised state-dependent with state sequence non-causally known transmitters. establishes new achievable rate regions, which can...

10.1109/isit.2015.7282819 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2015-06-01
Coming Soon ...