default search action
Shan Lu 0003
Person information
- affiliation: Gifu University, Japan
Other persons with the same name
- Shan Lu — disambiguation page
- Shan Lu 0001 — Microsoft Research, Redmond, WA, USA (and 3 more)
- Shan Lu 0002 — University of Machusetts, Amherst, MA, USA
- Shan Lu 0004 — Communications Research Laboratory, Tokyo, Japan
- Shan Lu 0005 — Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
- Shan Lu 0006 — Purdue University, West Lafayette, IN, USA
- Shan Lu 0007 — Northeast Normal University, School of Geographical Science, Changchun, China (and 1 more)
- Shan Lu 0008 — Central University of Finance and Economics, School of Statistics and Mathematics, Beijing, China (and 1 more)
- Shan Lu 0009 — Shenzhen Polytechnic, Institute of Intelligence Science and Engineering, China (and 1 more)
- Shan Lu 0010 — Topcon Medical Systems, Inc., Paramus, NJ, USA (and 1 more)
- Shan Lu 0011 — Beijing University of Posts and Telecommunications, Beijing, China
- Shan Lu 0012 — Northeastern University, Boston, MA, USA
- Shan Lu 0013 — Capital University of Economics and Business, Beijing, China
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Shan Lu, Hiroshi Kamabe:
Enhancing the Maximum Tolerable Number of Active Users for Unsourced Random Access. ISIT 2024: 3195-3200 - 2023
- [c24]Lantian Wei, Shan Lu, Hiroshi Kamabe:
BNNs- and TISTA- Based Signature Code Design for User Identification and Channel Estimation over Multiple-Access Channel with Rayleigh Fading. ITW 2023: 147-152 - 2022
- [j9]Lantian Wei, Shan Lu, Hiroshi Kamabe, Jun Cheng:
User Identification and Channel Estimation by Iterative DNN-Based Decoder on Multiple-Access Fading Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 417-424 (2022) - [c23]Yuma Narita, Shan Lu, Hiroshi Kamabe:
Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. ICACT 2022: 132-136 - [c22]Hiroshi Kamabe, Takumi Marumo, Shan Lu:
Balanced coding with Lehmer code. ISITA 2022: 69-73 - [c21]Shan Lu, Hiroshi Kamabe:
Improved Survival Probability for Coded Compressed Sensing in Unsourced Random Access. ISITA 2022: 169-173 - 2021
- [c20]Yuma Narita, Shan Lu, Hiroshi Kamabe:
Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. ICACT 2021: 132-136 - 2020
- [c19]Lantian Wei, Shan Lu, Hiroshi Kamabe, Jun Cheng:
User Identification and Channel Estimation by DNN-Based Decoder on Multiple-Access Channel. GLOBECOM 2020: 1-6 - [c18]Yuya Naruse, Shan Lu, Hiroshi Kamabe:
Design of ZDF code using uniform shift enumerator. ISITA 2020: 126-130
2010 – 2019
- 2019
- [c17]Hiroshi Kamabe, Shan Lu:
Burst Erasure Correction by 2D LDPC Codes. GLOBECOM 2019: 1-7 - [c16]Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
Multi-User UD k-Ary Codes Recursively Constructed from Short-Length Multiary Codes for Multiple-Access Adder Channel. ISIT 2019: 425-429 - [i5]Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
A construction of UD k-ary multi-user codes from (2m(k-1)+1)-ary codes for MAAC. CoRR abs/1901.06757 (2019) - [i4]A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, Jos H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hashimoto, Øyvind Ytrehus, Shigeaki Kuzuoka, Mikihiko Nishiara, Han Mao Kiah, Jun Muramatsu, Shigeki Miyake:
Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory. CoRR abs/1907.02944 (2019) - 2018
- [j8]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Construction of Parallel Random I/O Codes Using Coset Coding with Hamming Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2125-2134 (2018) - [j7]Shan Lu, Hiroshi Kamabe, Jun Cheng, Akira Yamawaki:
Unrestricted-Rate Parallel Random Input-Output Codes for Multilevel Flash Memory. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2135-2140 (2018) - [c15]Kengo Shibata, Shan Lu, Masakazu Yoshida, Krishna R. Narayanan, Jun Cheng:
Error Floor Estimation of Spatially-Coupled Irregular LDPC Code Ensembles. ISITA 2018: 379-383 - [c14]Kai-Hsin Wang, Wei Hou, Shan Lu, Ping-Yuen Wu, Yeong-Luh Ueng, Jun Cheng:
Improving Polar Codes by Spatial Coupling. ISITA 2018: 432-436 - [c13]Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
Recursive Construction of k-Ary Uniquely Decodable Codes for Multiple-Access Adder Channel. ISITA 2018: 565-569 - [c12]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
An Upper Bound on the Generalized Cayley Distance. ISITA 2018: 600-604 - [c11]Shan Lu, Wei Hou, Jun Cheng, Hiroshi Kamabe:
A New Kind of Nonbinary Uniquely Decodable Codes with Arbitrary Code Length for Multiple-Access Adder Channel. ITW 2018: 1-5 - 2017
- [j6]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Worst-Case Performance of ILIFC with Inversion Cells. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2662-2670 (2017) - [c10]Shan Lu, Hiroshi Kamabe, Jun Cheng, Akira Yamawaki:
Construction of unrestricted-rate parallel random input-output code. ISIT 2017: 629-633 - [c9]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Lower bounds on the number of write operations by index-less indexed flash code with inversion cells. ISIT 2017: 2483-2487 - [c8]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Construction of parallel RIO codes using coset coding with hamming codes. ITW 2017: 239-243 - [c7]Shan Lu, Hiroshi Kamabe, Jun Cheng:
Codes for T-user asymmetric multiple-access channel with independent sources. ITW 2017: 359-363 - [i3]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Lower Bounds on the Number of Writing Operations by ILIFC with Inversion Cells. CoRR abs/1701.08927 (2017) - [i2]Shan Lu, Hiroshi Kamabe, Jun Cheng, Akira Yamawaki:
Construction of Unrestricted Rate Parallel Random Input Output Code. CoRR abs/1702.02716 (2017) - [i1]Akira Yamawaki, Hiroshi Kamabe, Shan Lu:
Construction of Parallel RIO Codes using Coset Coding with Hamming Codes. CoRR abs/1705.05596 (2017) - 2016
- [j5]Wei Hou, Shan Lu, Jun Cheng:
Spatially Coupled Repeater-Combiner-Convolutional Codes. IEEE Commun. Lett. 20(1): 21-24 (2016) - [j4]Wei Hou, Shan Lu, Jun Cheng:
Rate-compatible spatially coupled LDPC code ensembles based on repeat-accumulate extensions. IET Commun. 10(17): 2422-2426 (2016) - [c6]Shan Lu, Wei Hou, Jun Cheng:
Input-output weight distribution of terminated RSC codes with limited codelength. ISITA 2016: 493-497 - 2015
- [j3]Shan Lu, Wei Hou, Jun Cheng:
A Family of (k+1)-Ary Signature Codes for Noisy Multiple-Access Adder Channel. IEEE Trans. Inf. Theory 61(11): 5848-5853 (2015) - 2014
- [c5]Shan Lu, Wei Hou, Jun Cheng:
Coding scheme for T-user noisy multiple-access adder channel. ISITA 2014: 536-540 - [c4]Wei Hou, Shan Lu, Jun Cheng:
Rate-compatible spatially coupled LDPC codes via repeat-accumulation extension. ISTC 2014: 87-91 - 2013
- [j2]Shan Lu, Jun Cheng, Ying Li, Yoichiro Watanabe:
Two-User Turbo Decoding with Simplified Sum Trellis in Two-Way Relay Channel. IEICE Trans. Commun. 96-B(1): 73-80 (2013) - [j1]Shan Lu, Jun Cheng, Yoichiro Watanabe:
Recursive Construction of (k+1)-Ary Error-Correcting Signature Code for Multiple-Access Adder Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2368-2373 (2013) - [c3]Shan Lu, Jun Cheng, Wei Hou, Yoichiro Watanabe:
Generalized construction of signature code for multiple-access adder channel. ISIT 2013: 1655-1659 - 2012
- [c2]Shan Lu, Jun Cheng, Yoichiro Watanabe:
Decoding for non-binary signature code. ISITA 2012: 382-386 - 2010
- [c1]Shan Lu, Ying Li, Jun Cheng:
Low-complexity turbo decoding scheme for two-way relay network. WCSP 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint