scispace - formally typeset
C

Chunguang Li

Researcher at Zhejiang University

Publications -  55
Citations -  1257

Chunguang Li is an academic researcher from Zhejiang University. The author has contributed to research in topics: Distributed algorithm & Robustness (computer science). The author has an hindex of 18, co-authored 55 publications receiving 939 citations.

Papers
More filters
Journal ArticleDOI

Distributed Online One-Class Support Vector Machine for Anomaly Detection Over Networks

TL;DR: Compared with other state-of-the-art anomaly detection methods, the proposed distributed algorithms not only show good anomaly detection performance, but also require relatively short running time and low CPU memory consumption.
Journal ArticleDOI

Distributed Sparse Recursive Least-Squares Over Networks

TL;DR: This paper addresses the problem of in-network distributed estimation for sparse vectors, and develops several distributed sparse recursive least-squares (RLS) algorithms based on the maximum likelihood framework, and the expectation-maximization algorithm is used to numerically solve the sparse estimation problem.
Journal ArticleDOI

Diffusion Information Theoretic Learning for Distributed Estimation Over Network

TL;DR: Simulation results show that the diffusion ITL-based distributed estimation method can achieve superior performance comparing to the standard diffusion least mean square (LMS) algorithm when the noise is modeled to be non-Gaussian.
Journal ArticleDOI

One-Bit Quantized Massive MIMO Detection Based on Variational Approximate Message Passing

TL;DR: A novel inference algorithm called variational approximate message passing (VAMP) for one-bit quantized massive MIMO receiver is developed, which attempts to exploit the advantages of both the variational Bayesian inference algorithm and the bilinear generalized approximated message passing algorithm to accomplish joint channel estimation and data detection in a closed form with first-order complexity.
Journal ArticleDOI

Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud

TL;DR: This work designs secure, correct, and efficient protocols for outsourcing the ED and SVD of a matrix to a malicious cloud and employs efficient privacy-preserving transformations to protect both the input and output privacy.