Convergence analysis of alternating direction method of multipliers for a family of nonconvex problems

M Hong, ZQ Luo, M Razaviyayn - SIAM Journal on Optimization, 2016 - SIAM
The alternating direction method of multipliers (ADMM) is widely used to solve large-scale
linearly constrained optimization problems, convex or nonconvex, in many engineering …

A unified algorithmic framework for block-structured optimization involving big data: With applications in machine learning and signal processing

M Hong, M Razaviyayn, ZQ Luo… - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
This article presents a powerful algorithmic framework for big data optimization, called the
block successive upper-bound minimization (BSUM). The BSUM includes as special cases …

Joint communication, computation, caching, and control in big data multi-access edge computing

A Ndikumana, NH Tran, TM Ho, Z Han… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The concept of Multi-access Edge Computing (MEC) has been recently introduced to
supplement cloud computing by deploying MEC servers to the network edge so as to reduce …

[BOOK][B] Modern nonconvex nondifferentiable optimization

Y Cui, JS Pang - 2021 - SIAM
Mathematical optimization has always been at the heart of engineering, statistics, and
economics. In these applied domains, optimization concepts and methods have often been …

Multi-UAV interference coordination via joint trajectory and power control

C Shen, TH Chang, J Gong, Y Zeng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, unmanned aerial vehicles (UAVs) have found growing applications in wireless
communications and sensor networks. One of the key challenges for UAV-based wireless …

MIMO radar waveform design with PAPR and similarity constraints

Z Cheng, Z He, B Liao, M Fang - IEEE Transactions on Signal …, 2017 - ieeexplore.ieee.org
The paper investigates the joint design of transmit waveform and receive filter for multiple-
input multiple-output radar in the presence of signal-dependent interference, subject to a …

Survey of security protocols and vulnerabilities in unmanned aerial vehicles

A Shafique, A Mehmood, M Elhadef - IEEE Access, 2021 - ieeexplore.ieee.org
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have
increased in civil and military applications including rescue operations, disaster recovery …

Successive localization and beamforming in 5G mmWave MIMO communication systems

B Zhou, A Liu, V Lau - IEEE Transactions on Signal Processing, 2019 - ieeexplore.ieee.org
Beamforming is an attractive technique to improve the system performance for multi-input
multi-output (MIMO) communications. Previous works mainly focus on improving the data …

Computing B-stationary points of nonsmooth DC programs

JS Pang, M Razaviyayn… - … of Operations Research, 2017 - pubsonline.informs.org
Motivated by a class of applied problems arising from physical layer based security in a
digital communication system, in particular, by a secrecy sum-rate maximization problem …

Iteration complexity analysis of block coordinate descent methods

M Hong, X Wang, M Razaviyayn, ZQ Luo - Mathematical Programming, 2017 - Springer
In this paper, we provide a unified iteration complexity analysis for a family of general block
coordinate descent methods, covering popular methods such as the block coordinate …