default search action
Keqin Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Keqin Liu, Richard Weber, Chengzhong Zhang:
Low-complexity algorithm for restless bandits with imperfect observations. Math. Methods Oper. Res. 100(2): 467-508 (2024) - 2023
- [j17]Zhen Yang, Teng Zhang, Keqin Liu, Bingjie Dang, Liying Xu, Yuchao Yang, Ru Huang:
Neuromorphic Artificial Vision Systems Based on Reconfigurable Ion-Modulated Memtransistors. Adv. Intell. Syst. 5(8) (2023) - [c22]Yun-Hsuan Chen, Keqin Liu, Xin Gu, Zheng Zhang, Congguo Yin, Mohamad Sawan:
fNIRS Monitoring During Mechanical Thrombectomy for Outcomes Prediction. ICBEA 2023: 36-40 - [c21]Yefan Zhou, Tianyu Pang, Keqin Liu, Charles H. Martin, Michael W. Mahoney, Yaoqing Yang:
Temperature Balancing, Layer-wise Weight Analysis, and Neural Network Training. NeurIPS 2023 - [i15]Keqin Liu, Chengzhong Zhang:
PCL-Indexability and Whittle Index for Restless Bandits with General Observation Models. CoRR abs/2307.03034 (2023) - [i14]Yefan Zhou, Tianyu Pang, Keqin Liu, Charles H. Martin, Michael W. Mahoney, Yaoqing Yang:
Temperature Balancing, Layer-wise Weight Analysis, and Neural Network Training. CoRR abs/2312.00359 (2023) - 2021
- [i13]Keqin Liu, Ting Wu:
Whittle Index for A Class of Restless Bandits with Imperfect Observations. CoRR abs/2108.03812 (2021) - [i12]Ting Wu, Keqin Liu, Emily Fainman, Ying Wang:
A Data Analysis Study on Human Liver Blood Circulation. CoRR abs/2110.07163 (2021) - 2020
- [i11]Keqin Liu:
Graded Automatic Differentiation. CoRR abs/2003.04484 (2020)
2010 – 2019
- 2018
- [c20]Hesham M. Elmaghraby, Keqin Liu, Zhi Ding:
Femtocell Scheduling as a Restless Multiarmed Bandit Problem Using Partial Channel State Observation. ICC 2018: 1-6 - 2017
- [j16]Keqin Liu, Dominik Beck, Julie A. I. Thoms, Liang Liu, Weiling Zhao, John E. Pimanda, Xiaobo Zhou:
Annotating function to differentially expressed LincRNAs in myelodysplastic syndrome using a network-based method. Bioinform. 33(17): 2622-2630 (2017) - [j15]Keqin Liu, Li He, Zhichao Liu, Junmei Xu, Yuan Liu, Qifan Kuang, Zhining Wen, Menglong Li:
Mutation status coupled with RNA-sequencing data can efficiently identify important non-significantly mutated genes serving as diagnostic biomarkers of endometrial cancer. BMC Bioinform. 18(14): 39-49 (2017) - [j14]Fanfan Xie, Mingxiong He, Li He, Keqin Liu, Menglong Li, Guoquan Hu, Zhining Wen:
Bipartite network analysis reveals metabolic gene expression profiles that are highly associated with the clinical outcomes of acute myeloid leukemia. Comput. Biol. Chem. 67: 150-157 (2017) - 2016
- [j13]Jian Zhang, Hengyong Yu, Xiaohua Qian, Keqin Liu, Hua Tan, Tielin Yang, Maode Wang, King Chuen Li, Michael D. Chan, Waldemar Debinski, Anna Paulsson, Ge Wang, Xiaobo Zhou:
Pseudo progression identification of glioblastoma with dictionary learning. Comput. Biol. Medicine 73: 94-101 (2016) - 2015
- [j12]Xing-Ming Zhao, Keqin Liu, Guanghui Zhu, Feng He, Béatrice Duval, Jean-Michel Richer, De-Shuang Huang, Changjun Jiang, Jin-Kao Hao, Luonan Chen:
Identifying cancer-related microRNAs based on gene expression data. Bioinform. 31(8): 1226-1234 (2015) - 2013
- [j11]Xiujun Zhang, Keqin Liu, Zhi-Ping Liu, Béatrice Duval, Jean-Michel Richer, Xing-Ming Zhao, Jin-Kao Hao, Luonan Chen:
NARROMI: a noise and redundancy reduction technique improves accuracy of gene regulatory network inference. Bioinform. 29(1): 106-113 (2013) - [j10]Sattar Vakili, Keqin Liu, Qing Zhao:
Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems. IEEE J. Sel. Top. Signal Process. 7(5): 759-767 (2013) - [j9]Haoyang Liu, Keqin Liu, Qing Zhao:
Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics. IEEE Trans. Inf. Theory 59(3): 1902-1916 (2013) - [c19]Keqin Liu, Qing Zhao, Ananthram Swami:
Dynamic probing for intrusion detection under resource constraints. ICC 2013: 1980-1984 - [c18]Yaoqing Yang, Keqin Liu, Pingyi Fan:
Distributed flow scheduling in an unknown environment. WiOpt 2013: 593-600 - 2012
- [j8]Keqin Liu, Zhi-Ping Liu, Jin-Kao Hao, Luonan Chen, Xing-Ming Zhao:
Identifying dysregulated pathways in cancers from pathway interaction networks. BMC Bioinform. 13: 126 (2012) - [j7]Pouya Tehrani, Keqin Liu, Qing Zhao:
Opportunistic spectrum access in unslotted primary systems. J. Frankl. Inst. 349(3): 985-1010 (2012) - [j6]Keqin Liu, Qing Zhao:
Cooperative Game in Dynamic Spectrum Access with Unknown Model and Imperfect Sensing. IEEE Trans. Wirel. Commun. 11(4): 1596-1604 (2012) - [c17]Keqin Liu, Qing Zhao:
Dynamic intrusion detection in resource-constrained cyber networks. ISIT 2012: 970-974 - [c16]Keqin Liu, Qing Zhao:
Online learning for stochastic linear optimization problems. ITA 2012: 363-367 - [c15]Keqin Liu, Qing Zhao:
Adaptive shortest-path routing under unknown and stochastically varying link states. WiOpt 2012: 232-237 - [i10]Keqin Liu, Qing Zhao:
Adaptive Shortest-Path Routing under Unknown and Stochastically Varying Link States. CoRR abs/1201.4906 (2012) - [i9]Yaoqing Yang, Keqin Liu, Qing Zhao:
Distributed Flow Scheduling in Unknown Environment. CoRR abs/1210.1708 (2012) - 2011
- [c14]Keqin Liu, Qing Zhao:
Multi-armed bandit problems with heavy-tailed reward distributions. Allerton 2011: 485-492 - [c13]Keqin Liu, Richard Weber, Qing Zhao:
Indexability and whittle index for restless bandit problems involving reset processes. CDC/ECC 2011: 7690-7696 - [c12]Haoyang Liu, Keqin Liu, Qing Zhao:
Logarithmic weak regret of non-Bayesian restless multi-armed bandit. ICASSP 2011: 1968-1971 - [c11]Fabio E. Lapiccirella, Keqin Liu, Zhi Ding:
Multi-Channel Opportunistic Access Based on Primary ARQ Messages Overhearing. ICC 2011: 1-5 - [c10]Haoyang Liu, Keqin Liu, Qing Zhao:
Learning and sharing in a changing world: Non-Bayesian restless bandit with multiple players. ITA 2011: 240-246 - [i8]Haoyang Liu, Keqin Liu, Qing Zhao:
Decentralized Restless Bandit with Multiple Players and Unknown Dynamics. CoRR abs/1102.2975 (2011) - [i7]Keqin Liu, Qing Zhao:
Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems. CoRR abs/1106.6104 (2011) - [i6]Keqin Liu, Qing Zhao:
Dynamic Intrusion Detection in Resource-Constrained Cyber Networks. CoRR abs/1112.0101 (2011) - [i5]Keqin Liu, Qing Zhao:
Extended UCB Policy for Multi-Armed Bandit with Light-Tailed Reward Distributions. CoRR abs/1112.1768 (2011) - 2010
- [j5]Keqin Liu, Qing Zhao:
Indexability of Restless Bandit Problems and Optimality of Whittle Index for Dynamic Multichannel Access. IEEE Trans. Inf. Theory 56(11): 5547-5567 (2010) - [j4]Keqin Liu, Qing Zhao, Bhaskar Krishnamachari:
Dynamic multichannel access with imperfect channel state detection. IEEE Trans. Signal Process. 58(5): 2795-2808 (2010) - [j3]Keqin Liu, Qing Zhao:
Distributed learning in multi-armed bandit with multiple players. IEEE Trans. Signal Process. 58(11): 5667-5681 (2010) - [c9]Keqin Liu, Qing Zhao, Bhaskar Krishnamachari:
Decentralized multi-armed bandit with imperfect observations. Allerton 2010: 1669-1674 - [c8]Keqin Liu, Qing Zhao:
Distributed learning in cognitive radio networks: Multi-armed bandit with distributed multiple players. ICASSP 2010: 3010-3013 - [c7]Keqin Liu, Qing Zhao:
Decentralized multi-armed bandit with multiple distributed players. ITA 2010: 568-577 - [i4]Haoyang Liu, Keqin Liu, Qing Zhao:
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit. CoRR abs/1011.4969 (2010)
2000 – 2009
- 2009
- [j2]Xiangyang Xiao, Keqin Liu, Qing Zhao:
Opportunistic Spectrum Access in Self-Similar Primary Traffic. EURASIP J. Adv. Signal Process. 2009 (2009) - [c6]Keqin Liu, Qing Zhao:
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access. CDC 2009: 3592-3597 - [i3]Keqin Liu, Qing Zhao:
Decentralized Multi-Armed Bandit with Multiple Distributed Players. CoRR abs/0910.2065 (2009) - 2008
- [j1]Qing Zhao, Bhaskar Krishnamachari, Keqin Liu:
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. IEEE Trans. Wirel. Commun. 7(12-2): 5431-5440 (2008) - [c5]Keqin Liu, Qing Zhao:
Channel probing for opportunistic access with multi-channel sensing. ACSCC 2008: 93-97 - [c4]Keqin Liu, Qing Zhao:
Link throughput of multi-channel opportunistic access with limited sensing. ICASSP 2008: 2997-3000 - [i2]Keqin Liu, Qing Zhao:
A Restless Bandit Formulation of Multi-channel Opportunistic Access: Indexablity and Index Policy. CoRR abs/0810.4658 (2008) - 2007
- [c3]Qing Zhao, Bhaskar Krishnamachari, Keqin Liu:
Low-Complexity Approaches to Spectrum Opportunity Tracking. CrownCom 2007: 27-35 - [i1]Qing Zhao, Bhaskar Krishnamachari, Keqin Liu:
On Myopic Sensing for Multi-Channel Opportunistic Access. CoRR abs/0712.0035 (2007) - 2006
- [c2]Linhai Qi, Suxia Ma, Keqin Liu:
Research on Predictive Dialing System Based on Distributed Call Center. SERA 2006: 194-201 - 2005
- [c1]Liyuan Zhao, Keqin Liu, Jun Zheng:
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows. CIS (2) 2005: 711-718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint