Alert button
Picture for Lili Yang

Lili Yang

Alert button

Concept-free Causal Disentanglement with Variational Graph Auto-Encoder

Add code
Bookmark button
Alert button
Nov 17, 2023
Jingyun Feng, Lin Zhang, Lili Yang

Viaarxiv icon

Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation

Add code
Bookmark button
Alert button
May 16, 2023
Wenwu Gong, Zhejun Huang, Lili Yang

Figure 1 for Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation
Figure 2 for Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation
Figure 3 for Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation
Figure 4 for Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation
Viaarxiv icon

Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation

Add code
Bookmark button
Alert button
Feb 15, 2023
Feng Shu, Lili Yang, Yan Wang, Xuehui Wang, Weiping Shi, Chong Shen, Jiangzhou Wang

Figure 1 for Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation
Figure 2 for Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation
Figure 3 for Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation
Figure 4 for Precoding and Beamforming Design for Intelligent Reconfigurable Surface-Aided Hybrid Secure Spatial Modulation
Viaarxiv icon

Estimation of Covariance Matrix of Interference for Secure Spatial Modulation against a Malicious Full-duplex Attacker

Add code
Bookmark button
Alert button
Oct 21, 2021
Lili Yang, Xinyi Jiang, Feng Shu, Weibin Zhang, Jiangzhou Wang

Figure 1 for Estimation of Covariance Matrix of Interference for Secure Spatial Modulation against a Malicious Full-duplex Attacker
Figure 2 for Estimation of Covariance Matrix of Interference for Secure Spatial Modulation against a Malicious Full-duplex Attacker
Figure 3 for Estimation of Covariance Matrix of Interference for Secure Spatial Modulation against a Malicious Full-duplex Attacker
Figure 4 for Estimation of Covariance Matrix of Interference for Secure Spatial Modulation against a Malicious Full-duplex Attacker
Viaarxiv icon