Skip to main content

Showing 1–26 of 26 results for author: Lou, Y

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.09752  [pdf, other

    eess.SP math.NA math.OC

    Time-Varying Graph Signal Recovery Using High-Order Smoothness and Adaptive Low-rankness

    Authors: Weihong Guo, Yifei Lou, **g Qin, Ming Yan

    Abstract: Time-varying graph signal recovery has been widely used in many applications, including climate change, environmental hazard monitoring, and epidemic studies. It is crucial to choose appropriate regularizations to describe the characteristics of the underlying signals, such as the smoothness of the signal over the graph domain and the low-rank structure of the spatial-temporal signal modeled in a… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  2. Integrated Sensing and Communication with Massive MIMO: A Unified Tensor Approach for Channel and Target Parameter Estimation

    Authors: Ruoyu Zhang, Lei Cheng, Shuai Wang, Yi Lou, Yulong Gao, Wen Wu, Derrick Wing Kwan Ng

    Abstract: Benefitting from the vast spatial degrees of freedom, the amalgamation of integrated sensing and communication (ISAC) and massive multiple-input multiple-output (MIMO) is expected to simultaneously improve spectral and energy efficiencies as well as the sensing capability. However, a large number of antennas deployed in massive MIMO-ISAC raises critical challenges in acquiring both accurate channe… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Journal ref: IEEE Transactions on Wireless Communications, 2024

  3. Generalized Multi-kernel Maximum Correntropy Kalman Filter for Disturbance Estimation

    Authors: Shilei Li, Dawei Shi, Yunjiang Lou, Wulin Zou, Ling Shi

    Abstract: Disturbance observers have been attracting continuing research efforts and are widely used in many applications. Among them, the Kalman filter-based disturbance observer is an attractive one since it estimates both the state and the disturbance simultaneously, and is optimal for a linear system with Gaussian noises. Unfortunately, The noise in the disturbance channel typically exhibits a heavy-tai… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: in IEEE Transactions on Automatic Control (2023)

  4. arXiv:2307.00439  [pdf, other

    eess.IV cs.CV math.NA

    Weighted Anisotropic-Isotropic Total Variation for Poisson Denoising

    Authors: Kevin Bui, Yifei Lou, Fredrick Park, Jack Xin

    Abstract: Poisson noise commonly occurs in images captured by photon-limited imaging systems such as in astronomy and medicine. As the distribution of Poisson noise depends on the pixel intensity value, noise levels vary from pixels to pixels. Hence, denoising a Poisson-corrupted image while preserving important details can be challenging. In this paper, we propose a Poisson denoising model by incorporating… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

    Comments: accepted to ICIP 2023

  5. SPP-CNN: An Efficient Framework for Network Robustness Prediction

    Authors: Chengpei Wu, Yang Lou, Lin Wang, Junli Li, Xiang Li, Guanrong Chen

    Abstract: This paper addresses the robustness of a network to sustain its connectivity and controllability against malicious attacks. This kind of network robustness is typically measured by the time-consuming attack simulation, which returns a sequence of values that record the remaining connectivity and controllability after a sequence of node- or edge-removal attacks. For improvement, this paper develops… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: 10 pages, 7 figures, 14 pages Supplementary Information

    Journal ref: IEEE Transactions on Circuits and Systems I: Regular Papers. 2023, 70 (10), 4067-4079

  6. arXiv:2304.06558  [pdf, other

    eess.SY

    Multi-kernel Correntropy Regression: Robustness, Optimality, and Application on Magnetometer Calibration

    Authors: Shilei Li, Yunjiang Lou, Dawei Shi, Li**g Li, Ling Shi

    Abstract: This paper investigates the robustness and optimality of the multi-kernel correntropy (MKC) on linear regression. We first derive an upper error bound for a scalar regression problem in the presence of arbitrarily large outliers and reveal that the kernel bandwidth should be neither too small nor too big in the sense of the lowest upper error bound. Meanwhile, we find that the proposed MKC is rela… ▽ More

    Submitted 11 October, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

  7. arXiv:2304.06548  [pdf, other

    eess.SY cs.LG eess.SP

    Multi-kernel Correntropy-based Orientation Estimation of IMUs: Gradient Descent Methods

    Authors: Shilei Li, Li**g Li, Dawei Shi, Yunjiang Lou, Ling Shi

    Abstract: This paper presents two computationally efficient algorithms for the orientation estimation of inertial measurement units (IMUs): the correntropy-based gradient descent (CGD) and the correntropy-based decoupled orientation estimation (CDOE). Traditional methods, such as gradient descent (GD) and decoupled orientation estimation (DOE), rely on the mean squared error (MSE) criterion, making them vul… ▽ More

    Submitted 11 October, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: 16 pages

  8. Structural Robustness of Complex Networks: A Survey of A Posteriori Measures

    Authors: Yang Lou, Lin Wang, Guanrong Chen

    Abstract: Network robustness is critical for various industrial and social networks against malicious attacks, which has various meanings in different research contexts and here it refers to the ability of a network to sustain its functionality when a fraction of the network fail to work due to attacks. The rapid development of complex networks research indicates special interest and great concern about the… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

    Journal ref: IEEE Circuits and Systems Magazine, Volume 23, Issue 1, 2023

  9. arXiv:2210.01448  [pdf, other

    cs.SD cs.AI cs.CV cs.GR eess.AS

    Rhythmic Gesticulator: Rhythm-Aware Co-Speech Gesture Synthesis with Hierarchical Neural Embeddings

    Authors: Tenglong Ao, Qingzhe Gao, Yuke Lou, Baoquan Chen, Libin Liu

    Abstract: Automatic synthesis of realistic co-speech gestures is an increasingly important yet challenging task in artificial embodied agent creation. Previous systems mainly focus on generating gestures in an end-to-end manner, which leads to difficulties in mining the clear rhythm and semantics due to the complex yet subtle harmony between speech and gestures. We present a novel co-speech gesture synthesi… ▽ More

    Submitted 4 May, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: SIGGRAPH Asia 2022 (Journal Track); Project Page: https://pku-mocca.github.io/Rhythmic-Gesticulator-Page/

  10. CNN-based Prediction of Network Robustness With Missing Edges

    Authors: Chengpei Wu, Yang Lou, Ruizi Wu, Wenwen Liu, Junli Li

    Abstract: Connectivity and controllability of a complex network are two important issues that guarantee a networked system to function. Robustness of connectivity and controllability guarantees the system to function properly and stably under various malicious attacks. Evaluating network robustness using attack simulations is time consuming, while the convolutional neural network (CNN)-based prediction appr… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: In Proceedings of the IEEE 2022 International Joint Conference on Neural Networks (IJCNN)

  11. arXiv:2203.10552  [pdf, other

    eess.SY cs.AI cs.LG cs.NI

    A Learning Convolutional Neural Network Approach for Network Robustness Prediction

    Authors: Yang Lou, Ruizi Wu, Junli Li, Lin Wang, Xiang Li, Guanrong Chen

    Abstract: Network robustness is critical for various societal and industrial networks again malicious attacks. In particular, connectivity robustness and controllability robustness reflect how well a networked system can maintain its connectedness and controllability against destructive attacks, which can be quantified by a sequence of values that record the remaining connectivity and controllability of the… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

    Comments: 12 pages, 10 figures. IEEE Trans. Cybern. 2022

    Journal ref: IEEE Transactions on Cybernetics, 2023, 53(7): 4531-4544

  12. arXiv:2203.05125  [pdf, ps, other

    eess.SP math.OC

    A Lifted $\ell_1 $ Framework for Sparse Recovery

    Authors: Yaghoub Rahimi, Sung Ha Kang, Yifei Lou

    Abstract: Motivated by re-weighted $\ell_1$ approaches for sparse recovery, we propose a lifted $\ell_1$ (LL1) regularization which is a generalized form of several popular regularizations in the literature. By exploring such connections, we discover there are two types of lifting functions which can guarantee that the proposed approach is equivalent to the $\ell_0$ minimization. Computationally, we design… ▽ More

    Submitted 12 May, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: 24 pages

    MSC Class: 65K10; 49N45; 65F50; 90C90; 49M20

  13. arXiv:2110.00201  [pdf, ps, other

    eess.SY cs.LG

    Error-free approximation of explicit linear MPC through lattice piecewise affine expression

    Authors: Jun Xu, Yunjiang Lou, Bart De Schutter, Zhenhua Xiong

    Abstract: In this paper, the disjunctive and conjunctive lattice piecewise affine (PWA) approximations of explicit linear model predictive control (MPC) are proposed. The training data are generated uniformly in the domain of interest, consisting of the state samples and corresponding affine control laws, based on which the lattice PWA approximations are constructed. Re-sampling of data is also proposed to… ▽ More

    Submitted 20 July, 2022; v1 submitted 1 October, 2021; originally announced October 2021.

  14. arXiv:2012.11159  [pdf, other

    cs.SD cs.LG eess.AS

    Multi-stream Convolutional Neural Network with Frequency Selection for Robust Speaker Verification

    Authors: Wei Yao, Shen Chen, Jiamin Cui, Yaolin Lou

    Abstract: Speaker verification aims to verify whether an input speech corresponds to the claimed speaker, and conventionally, this kind of system is deployed based on single-stream scenario, wherein the feature extractor operates in full frequency range. In this paper, we hypothesize that machine can learn enough knowledge to do classification task when listening to partial frequency range instead of full f… ▽ More

    Submitted 12 January, 2021; v1 submitted 21 December, 2020; originally announced December 2020.

    Comments: 12 pages, 11 figures, 8 tables

  15. arXiv:2008.04414  [pdf, other

    physics.soc-ph eess.SY

    A Framework of Hierarchical Attacks to Network Controllability

    Authors: Yang Lou, Lin Wang, Guanrong Chen

    Abstract: Network controllability robustness reflects how well a networked dynamical system can maintain its controllability against destructive attacks. This paper investigates the network controllability robustness from the perspective of a malicious attack. A framework of hierarchical attack is proposed, by means of edge- or node-removal attacks. Edges (or nodes) in a target network are classified hierar… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

    Comments: 10 pages,10 figures

    Journal ref: Communications in Nonlinear Science and Numerical Simulation, 98:105780, 2021

  16. arXiv:2008.02868  [pdf, other

    cs.IT eess.SP

    Performance of Underwater Wireless Optical Communications in Presents of Cascaded Mixture Exponential-Generalized Gamma Turbulence

    Authors: Yi Lou, Julian Cheng, Donghu Nie, Gang Qiao

    Abstract: Underwater wireless optical communication is one of the critical technologies for buoy-based high-speed cross-sea surface communication, where the communication nodes are vertically deployed. Due to the vertically inhomogeneous nature of the underwater environment, seawater is usually vertically divided into multiple layers with different parameters that reflect the real environment. In this work,… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: 12 pages, 4 figures

  17. arXiv:2003.08563  [pdf, other

    physics.soc-ph eess.SY math.OC

    Knowledge-Based Prediction of Network Controllability Robustness

    Authors: Yang Lou, Yaodong He, Lin Wang, Kim Fung Tsang, Guanrong Chen

    Abstract: Network controllability robustness reflects how well a networked system can maintain its controllability against destructive attacks. Its measure is quantified by a sequence of values that record the remaining controllability of the network after a sequence of node-removal or edge-removal attacks. Traditionally, the controllability robustness is determined by attack simulations, which is computati… ▽ More

    Submitted 22 April, 2021; v1 submitted 19 March, 2020; originally announced March 2020.

    Comments: 12 pages, 8 figures

    Journal ref: IEEE Trans Neural Netw Learn Syst. 2022, 33(10): 5739-5750

  18. Towards Optimal Robustness of Network Controllability: An Empirical Necessary Condition

    Authors: Yang Lou, Lin Wang, Kim Fung Tsang, Guanrong Chen

    Abstract: To better understand the correlation between network topological features and the robustness of network controllability in a general setting, this paper suggests a practical approach to searching for optimal network topologies with given numbers of nodes and edges. Since theoretical analysis seems impossible at least in the present time, exhaustive search based on optimization techniques is employ… ▽ More

    Submitted 1 September, 2020; v1 submitted 28 December, 2019; originally announced December 2019.

    Comments: [article] 18 pages, 12 figures; [supplementary information] 9 pages, 15 figures

    Journal ref: IEEE Trans. Circuits Syst. I, Reg. Papers. 2020, 67(9): 3163-3174

  19. Predicting Network Controllability Robustness: A Convolutional Neural Network Approach

    Authors: Yang Lou, Yaodong He, Lin Wang, Guanrong Chen

    Abstract: Network controllability measures how well a networked system can be controlled to a target state, and its robustness reflects how well the system can maintain the controllability against malicious attacks by means of node-removals or edge-removals. The measure of network controllability is quantified by the number of external control inputs needed to recover or to retain the controllability after… ▽ More

    Submitted 14 September, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: 11 pages, 7 figures

    Journal ref: IEEE Trans. Cybern. 2022, 52(5): 4052-4063

  20. arXiv:1906.02252  [pdf, other

    stat.AP cs.LG eess.SP stat.ML

    Probabilistic Structure Learning for EEG/MEG Source Imaging with Hierarchical Graph Prior

    Authors: Feng Liu, Li Wang, Yifei Lou, Rencang Li, Patrick Purdon

    Abstract: Brain source imaging is an important method for noninvasively characterizing brain activity using Electroencephalogram (EEG) or Magnetoencephalography (MEG) recordings. Traditional EEG/MEG Source Imaging (ESI) methods usually assume that either source activity at different time points is unrelated, or that similar spatiotemporal patterns exist across an entire study period. The former assumption m… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

  21. arXiv:1808.04140  [pdf, other

    eess.SY

    Network Flows that Solve Least Squares for Linear Equations

    Authors: Yang Liu, Youcheng Lou, Brian D. O. Anderson, Guodong Shi

    Abstract: This paper presents a first-order {distributed continuous-time algorithm} for computing the least-squares solution to a linear equation over networks. Given the uniqueness of the solution, with nonintegrable and diminishing step size, convergence results are provided for fixed graphs. The exact rate of convergence is also established for various types of step size choices falling into that categor… ▽ More

    Submitted 13 August, 2018; originally announced August 2018.

  22. Toward Stronger Robustness of Network Controllability: A Snapback Network Model

    Authors: Yang Lou, Lin Wang, Guanrong Chen

    Abstract: A new complex network model, called q-snapback network, is introduced. Basic topological characteristics of the network, such as degree distribution, average path length, clustering coefficient and Pearson correlation coefficient, are evaluated. The typical 4-motifs of the network are simulated. The robustness of both state and structural controllabilities of the network against targeted and rando… ▽ More

    Submitted 6 April, 2018; v1 submitted 18 January, 2018; originally announced January 2018.

    Comments: 13 pages, 11 figures

    Journal ref: Y. Lou, L. Wang, & G. Chen, IEEE Trans. Circuits Syst. I, Reg. Papers. 2018, 65(9): 2983-2991

  23. arXiv:1510.05773  [pdf, ps, other

    eess.SY

    Distributed Surrounding Design of Target Region with Complex Adjacency Matrices

    Authors: Youcheng Lou, Yiguang Hong

    Abstract: This is a complete version of the 6-page IEEE TAC technical note [1]. In this paper, we consider the distributed surrounding of a convex target set by a group of agents with switching communication graphs. We propose a distributed controller to surround a given set with the same distance and desired projection angles specified by a complex-value adjacency matrix. Under mild connectivity assumption… ▽ More

    Submitted 20 October, 2015; originally announced October 2015.

  24. arXiv:1503.04904  [pdf, ps, other

    eess.SY math.OC

    Distributed Continuous-time Approximate Projection Protocols for Shortest Distance Optimization Problems

    Authors: Youcheng Lou, Yiguang Hong, Shouyang Wang

    Abstract: In this paper, we investigate the distributed shortest distance optimization problem for a multi-agent network to cooperatively minimize the sum of the quadratic distances from some convex sets, where each set is only associated with one agent. To deal with the optimization problem with projection uncertainties, we propose a distributed continuous-time dynamical protocol based on a new concept of… ▽ More

    Submitted 3 February, 2016; v1 submitted 16 March, 2015; originally announced March 2015.

  25. arXiv:1312.7050  [pdf, ps, other

    eess.SY cs.GT math.OC

    Nash Equilibrium Computation in Subnetwork Zero-Sum Games with Switching Communications

    Authors: Youcheng Lou, Yiguang Hong, Lihua Xie, Guodong Shi, Karl Henrik Johansson

    Abstract: In this paper, we investigate a distributed Nash equilibrium computation problem for a time-varying multi-agent network consisting of two subnetworks, where the two subnetworks share the same objective function. We first propose a subgradient-based distributed algorithm with heterogeneous stepsizes to compute a Nash equilibrium of a zero-sum game. We then prove that the proposed algorithm can achi… ▽ More

    Submitted 26 November, 2015; v1 submitted 25 December, 2013; originally announced December 2013.

  26. arXiv:1205.5927  [pdf, ps, other

    eess.SY math.OC

    An Approximate Projected Consensus Algorithm for Computing Intersection of Convex Sets

    Authors: Youcheng Lou, Guodong Shi, Karl Henrik Johansson, Yiguang Hong

    Abstract: In this paper, we propose an approximate projected consensus algorithm for a network to cooperatively compute the intersection of convex sets. Instead of assuming the exact convex projection proposed in the literature, we allow each node to compute an approximate projection and communicate it to its neighbors. The communication graph is directed and time-varying. Nodes update their states by weigh… ▽ More

    Submitted 26 May, 2012; originally announced May 2012.