{"id":620,"date":"2025-12-02T20:45:30","date_gmt":"2025-12-02T12:45:30","guid":{"rendered":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/?page_id=620"},"modified":"2026-03-30T14:43:11","modified_gmt":"2026-03-30T06:43:11","slug":"publications","status":"publish","type":"page","link":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"620\" class=\"elementor elementor-620\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68e6ed4 e-flex e-con-boxed e-con e-parent\" data-id=\"68e6ed4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2760426 elementor-widget elementor-widget-text-editor\" data-id=\"2760426\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6>Book Chapter and Monograph<\/h6><ul><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cMarket Entry,\u201d in the chapter of\u00a0<em>Encyclopedia of Wireless Networks<\/em>, Springer, forthcoming.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and\u00a0R. Zhang, \u201cCost-aware cellular networks powered by smart grid and energy harvesting,\u201d in the chapter of\u00a0<em>Key Technologies for 5G Wireless Systems,<\/em>\u00a0Cambridge University Press, 2017.<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou,\u00a0<span><a href=\"http:\/\/link.springer.com\/book\/10.1007%2F978-1-4614-8890-3\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000\"><em>Cognitive Virtual Network Operator Games<\/em><\/span><\/a><\/span>, Springer Press, 2013.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3617504 e-flex e-con-boxed e-con e-parent\" data-id=\"3617504\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c632ffa elementor-widget elementor-widget-text-editor\" data-id=\"c632ffa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6>Journals<\/h6><ul><li>P. Ning, <strong>L. Duan<\/strong>, and C. Hua, &#8220;Global adaptive control of nonlinear systems with parametric uncertainties and time-delays via time-varying gain feedback approach,&#8221; IEEE Transactions on Automatic Control, forthcoming. \u00a0<\/li><li>S. Li and <strong>L. Duan<\/strong>, &#8220;Incentivizing Social Information Sharing Through Routing Games,&#8221; IEEE\/ACM Transactions on Networking, vol. 34, pp. 2303-2315, 2026. <a href=\"https:\/\/arxiv.org\/abs\/2308.13301\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2308.13301<\/a><\/li><li><p class=\"p1\">L. Wang, Y. Yuan, F. Li, <strong>L. Duan<\/strong>, <span class=\"outlook-search-highlight\" data-markjs=\"true\">\u201cROSS<\/span>:RObust decentralized stochastic learning based on Shapley values,&#8221; IEEE\/ACM Transactions on Networking, vol. 34, pp. 2911-2926, 2026. <a href=\"https:\/\/arxiv.org\/pdf\/2411.00365\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2411.00365<\/a> \u00a0<\/p><\/li><li>G. Yan, K. Liu, C. Liu, and <strong>L. Duan<\/strong>, &#8220;To Optimize Edge-Intelligent Cooperative Perception in Heterogeneous Vehicular Networks,&#8221; IEEE Transactions on Mobile Computing, 2026.\u00a0<\/li><li><p class=\"p1\">H. Li and <strong>L. Duan<\/strong>, &#8220;Theoretical Analysis of Mixture-of-Experts in Mobile Edge Computing,&#8221; IEEE\/ACM Transactions on Networking, vol. 34, pp. 1659-1581, 2026. <a href=\"https:\/\/arxiv.org\/abs\/2412.15690\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2412.15690<\/a><\/p><\/li><li><p class=\"p1\">P. Ning, <strong>L. Duan<\/strong>, and C. Hua, &#8220;Optimal tracking control of uncertain nonlinear systems using simplified reinforcement learning,&#8221; IEEE Transactions on Cybernetics, 2026.\u00a0<\/p><\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cTo Analyze and Regulate Human-in-the-loop Learning for Congestion Games,\u201d IEEE\/ACM Transactions on Networking, vol. 33, no. 3, pp. 1338-1350, Jun. 2025. <a href=\"https:\/\/arxiv.org\/pdf\/2501.03055\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2501.03055<\/a><\/li><li>S. Li and\u00a0<strong>L. Duan<\/strong>, \u201cStaying fresh: efficient algorithms for timely social information distribution,\u201d IEEE Transactions on Network Science and Engineering (TNSE), vol. 12, no. 5, pp. 4275-4286, Oct. 2025. Online technical report:<a href=\"https:\/\/arxiv.org\/pdf\/2308.13260\" target=\"_blank\" rel=\"noopener\">\u00a0https:\/\/arxiv.org\/pdf\/2308.13260\u00a0<\/a><\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cCompetitive multi-armed bandit games for resource sharing,\u201d IEEE Transactions on Mobile Computing, vol. 24, no. 9, pp. 8393-8404, Sept. 2025. <a href=\"https:\/\/arxiv.org\/abs\/2503.20975\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2503.20975\u00a0<\/a><\/li><li>D. Xu,\u00a0<strong>L. Duan<\/strong>, and H. Zhu, \u201cAIGC-enhanced hybrid content caching in wireless networks,\u201d IEEE Transactions on Wireless Communications, vol. 24, no. 8, pp. 6780-6796, \u00a0Aug. 2025. [<a href=\"https:\/\/www.techrxiv.org\/users\/816753\/articles\/1217420-aigc-enhanced-hybrid-content-caching-in-wireless-networks?commit=534497dd918f066ab97fcd064a378f24f1931f93\" target=\"_blank\" rel=\"noopener\">Online tech report<\/a>]<\/li><li>Y. Liu and\u00a0<strong>L. Duan<\/strong>, \u201cMechanism design for blockchain order books against selfish miners,\u201d IEEE Transactions on Network Science and Engineering, vol. 12, no. 3, pp. 2121-2134, Jun. 2025. <a href=\"https:\/\/arxiv.org\/abs\/2501.12576\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2501.12576<\/a><\/li><li>S. Li and\u00a0<strong>L. Duan<\/strong>, \u201cAge of Information Diffusion on Social Networks,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 33, no. 2, pp. 701-712, Apr. 2025. <a href=\"https:\/\/arxiv.org\/pdf\/2308.13303\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2308.13303<\/a><\/li><li>Y. Cao,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cSensing for Secure Communication in ISAC: Protocol Design and Beamforming Optimization,\u201d IEEE Transactions on Wireless Communications (TWC), vol. 24, no. 2, pp. 1207-1220, Feb. 2025. [<a href=\"https:\/\/www.researchgate.net\/publication\/386585362_Sensing_for_Secure_Communication_in_ISAC_Protocol_Design_and_Beamforming_Optimization\" target=\"_blank\" rel=\"noopener\">Download here<\/a>]<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, B. Shou, and J. Huang, \u201cInformation freshness in service queues with strategic customers,\u201d <strong><strong>Production and Operations Management (POM, Business Week&#8217;s 20 Premier Journals<\/strong><\/strong><strong>)<\/strong>, vol. 34, no. 2, 2025. [<a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/10591478241281913?casa_token=7mubnSXbVfEAAAAA:am1VknI0xdeYHgyaRQBNR19FlbNU2m8LXqTNrypRU1sQNHoPDp4gYZKEtd3ua6l51ZyvHPueE4iqYA\" target=\"_blank\" rel=\"noopener\">Download here<\/a>]<\/li><li>Q. Lin,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cLearning from Social Interactions: Personalized Pricing and Buyer Manipulation,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 11871-11888, Dec. 2024. [<a href=\"https:\/\/dl.ifip.org\/db\/conf\/wiopt\/wiopt2022\/1570811642.pdf\" target=\"_blank\" rel=\"noopener\">Download Conference version here<\/a>]<\/li><li>S. Zheng, W. Yuan, X. Wang, and\u00a0<strong>L. Duan<\/strong>, \u201cAdaptive federated learning via new entropy approach,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 11920-11936, Dec. 2024. Online: <a href=\"https:\/\/arxiv.org\/pdf\/2303.14966\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2303.14966<\/a><\/li><li>Q. Lin,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cPersonalized Pricing through Strategic User Profiling in Social Networks,\u201d IEEE\/ACM Transactions on Networking, vol. 32, no. 5, pp. 3977-3992, Oct. 2024. [<a href=\"https:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2021\/08\/WiOpt_2021_Pricing.pdf\" target=\"_blank\" rel=\"noopener\">Download conference version here<\/a>]<\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cHuman-in-the-loop Learning for Dynamic Congestion Games,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 11159-11171, Dec. 2024. Online: <a href=\"https:\/\/arxiv.org\/pdf\/2404.15599\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2404.15599<\/a><\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cTo save mobile crowdsourcing from cheap-talk: A game theoretic learning approach,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 8, pp. 8418-8430, Aug. 2024. [<a href=\"https:\/\/arxiv.org\/abs\/2306.06791\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>F. Li, Y. Chai, H. Yang, P. Hu, and\u00a0<strong>L. Duan<\/strong>, \u201cIncentivizing massive unknown workers for budget-limited crowdsensing: From off-line and on-line perspectives,\u201d IEEE\/ACM Transactions on Networking, vol. 32, no. 3, pp. 2406-2421, Jun. 2024. Online: <a href=\"https:\/\/arxiv.org\/abs\/2309.12113\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2309.12113\u00a0<\/a><\/li><li>W. Wang,\u00a0<strong>L. Duan<\/strong>, X. Liu, and N. Zhao, \u201cLegitimate pilot contamination attack in intelligent multi-access networks,\u201d IEEE Wireless Communications Letters, vol. 13, no. 3, pp. 805-809, Mar. 2024. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2024\/01\/Legitimate_Pilot_Contamination_Attack_in_Intelligent_Multi-Access_Networks.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>X. Wang, S. Zheng, and\u00a0<strong>L. Duan<\/strong>, \u201cDynamic pricing for client recruitment in federated learning,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 32, no. 2, pp. 1273-1286, Apr. 2024. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/09\/FL-Dynamic_Pricing.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>].<\/li><li>X. Xu, J. Zhang, M. Li,\u00a0<strong>L. Duan<\/strong>, and L. Xie, \u201cA family of strategyproof mechanisms for activity scheduling,\u201d Autonomous Agents and Multi-Agent Systems (AGNT), vol. 37, no. 44, Oct. 2023. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/09\/A_Family_of_Strategyproof_Mechanisms_for_Activity_Scheduling.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>J. Li, G. Sun,\u00a0<strong>L. Duan<\/strong>, and Q. Wu, \u201cMulti-objective optimization for UAV swarm-assisted IoT with virtual antenna arrays,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 5, pp. 4890-4907, May 2024. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/07\/UAV-Swarm-Intelligence-TMC.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>] <strong>[An ESI Highly Cited Paper in 2025]<\/strong><\/li><li>S. Hong and\u00a0<strong>L. Duan<\/strong>, \u201cLocation privacy protection game against adversary through multi-user cooperative obfuscation,\u201d IEEE Transactions on Mobile Computing, vol. 23, no. 3, pp. 2066-2077, Mar. 2024. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/02\/MultiCoop_Privacy.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report to Download<\/a>]<\/li><li>X. Xu, B. Li, M. Li, and\u00a0<strong>L. Duan<\/strong>, \u201cTwo-facility location games with minimum distance requirement,\u201d Journal of Artificial Intelligence Research (<strong>JAIR<\/strong>), vol. 70, pp. 716-756, 2021. <a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/02\/aamas2019.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">[Online Technical Report to Download]<\/a><\/li><li>X. Xu, X. Lin, and\u00a0<strong>L. Duan<\/strong>, \u201cDesign and performance analysis of partial computation output schemes for accelerating coded machine learning,\u201d IEEE Transactions on Network Science and Engineering, vol. 10, no. 2, pp. 1119-1130, Apr. 2023. [<a href=\"https:\/\/www.researchgate.net\/publication\/366029025_Design_and_Performance_Analysis_of_Partial_Computation_Output_Schemes_for_Accelerating_Coded_Machine_Learning\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>S. Gao, C. Courcoubetis, and\u00a0<strong>L. Duan<\/strong>, \u201cDistributed Double Auction Mechanisms for Large-Scale Device-to-Device Resource Trading,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 31, no. 3, pp. 1308-1323, Jun. 2023. [<a href=\"https:\/\/arxiv.org\/abs\/2007.09934\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a>]<\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cOnline pricing incentive to sample fresh information,\u201d IEEE Transactions on Network Science and Engineering, vol. 10, no. 1, pp. 514-526, Feb. 2023. [<a href=\"https:\/\/arxiv.org\/abs\/2209.08711\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a>]<\/li><li>Y. Cao,\u00a0<strong>L. Duan<\/strong>, M. Jin, and N. Zhao, \u201cCooperative Double-IRS Aided Proactive Eavesdropping,\u201d IEEE Transactions on Communications, vol. 70, no. 9, pp. 6228-6240, Sept. 2022. [<a href=\"https:\/\/www.researchgate.net\/publication\/362054605_Cooperative_Double-IRS_Aided_Proactive_Eavesdropping\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cDynamic Pricing and Mean Field Analysis for Controlling Age of Information,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 30, no. 6, pp. 2588-2600, Dec. 2022. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/2004.10050.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2004.10050.pdf\u00a0<\/a><\/li><li>S. Li, M. Li,\u00a0<strong>L. Duan<\/strong>, and V. C.S. Lee, \u201cOnline algorithms for the maximum k-interval coverage problem,\u201d Journal of Combinatorial Optimization (JOCO), vol. 44, pp. 3364-3404, 2022. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2022\/08\/JOCO-OnlineCoverage.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>S. Hong,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cProtecting location privacy by multi-query: A dynamic Bayesian game theoretic approach,\u201d IEEE Transactions on Information Forensics &amp; Security (TIFS), vol. 17, pp. 2569-2584, 2022. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2022\/07\/TIFS_PrivacyGame.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]\u00a0<\/li><li>S. Li, M. Li,\u00a0<strong>L. Duan<\/strong>, and V. C.S. Lee, \u201cEfficient algorithms for ride-hitching in UAV travelling,\u201d Theoretical Computer Science, 2022. [<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S030439752200408X?casa_token=uxqhYxLLcrwAAAAA:7_dDWyFGmIc_lATb_90CoxliXCKnTLYVX_-Gsl21Nlg-dmZMZC4FdFrhLNEHsmE6CqXr7CkRvj_7\" target=\"_blank\" rel=\"noopener\">Available online here<\/a>]\u00a0\u00a0<\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cTo Help or Disturb: Introduction of Crowdsourced WiFi to 5G Networks,\u201d IEEE Transactions on Mobile Computing (TMC), vol. 22, no. 9, pp. 5583-5596, Sept. 2023. Available: <a href=\"https:\/\/arxiv.org\/abs\/2206.08261\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2206.08261<\/a><\/li><li>Z. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cChase or Wait: Dynamic UAV Deployment to Learn and Catch Time-Varying User Activities,\u201d IEEE Transactions on Mobile Computing, vol. 22(3), pp. 1369 \u2013 1383, 2023. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2021\/08\/TMC_UAVdeployment.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>].\u00a0<strong>(ESI Highly Cited Paper of 2023)<\/strong><\/li><li>K. Wang, X. Zhang,\u00a0<strong>L. Duan<\/strong>, and J. Tie, \u201cMulti-UAV Cooperative Trajectory for Servicing Dynamic Demands and Charging Battery,\u201d IEEE Transactions on Mobile Computing, vol. 22, no. 3, pp. 1599-1614, Mar. 2023. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1805.08357\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1805.08357<\/a><\/li><li>P. Lai,\u00a0<strong>L. Duan<\/strong>, and X. Lin, \u201cLearning large electrical loads via flexible contracts with commitment,\u201d IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1925-1940, Jun. 2021. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1901.09169.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1901.09169.pdf<\/a><\/li><li>N. Ding, Z. Fang,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201c<span class=\"ITWTqi_23IoOPmK3O6ErT\">Optimal Incentive and Load Design for Distributed Coded Machine Learning<\/span>,\u201d IEEE Journal on Selected Areas in Communications (JSAC), vol. 39, no. 7, pp. 2090-2104, Jul. 2021. [Conference Version here]: <a href=\"https:\/\/arxiv.org\/abs\/2012.08715\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2012.08715<\/a><\/li><li>J. Yan, S. Bi,\u00a0<strong>L. Duan<\/strong>, and Y.-J. A. Zhang, \u201cPricing-driven service caching and task offloading in mobile edge computing,\u201d IEEE Transactions on Wireless Communications, vol. 20, no. 7, pp. 4495-4512, Jul. 2021. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/2011.02154.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2011.02154.pdf<\/a><\/li><li>B. Li, Q. Yang,\u00a0<strong>L. Duan<\/strong>, and Y. Sun, \u201cOperator-as-a-consumer: A novel energy storage sharing approach under demand charge,\u201d IEEE Transactions on Cybernetics, vol. 53, no. pp. 941-953, Feb. 2023. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2021\/06\/OaaC.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>Y. Han, L. Liu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cTowards reliable UAV swarm communication in D2D-enhanced cellular network,\u201d IEEE Transactions on Wireless Communications, vol. 20, no. 3, pp. 1567-1581, Mar. 2021. [Online]. Available here: <a href=\"https:\/\/arxiv.org\/abs\/2002.04897\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2002.04897<\/a><\/li><li>P. Lai, C. Courcoubetis, L. Duan, S. Galelli, \u201cEconomic controls for smart water distribution networks undergoing supply failures,\u201d IEEE Transactions on Network Science and Engineering, vol. 8, no. 1, pp. 555-574, Mar. 2021. <a href=\"https:\/\/www.researchgate.net\/publication\/347443589_Economic_Controls_for_Smart_Water_Distribution_Networks_Undergoing_Supply_Failures\" target=\"_blank\" rel=\"noopener\">[Online Technical Report]<\/a>.<\/li><li>Y. Che, Y. Lai, S. Luo, K. Wu, and\u00a0<strong>L. Duan<\/strong>, \u201cUAV-aided information and energy transmissions for cognitive and sustainable 5G networks,\u201d IEEE Transactions on Wireless Communications, vol. 20, no. 3, pp. 1668-1683, Mar. 2021. [<a href=\"https:\/\/www.researchgate.net\/publication\/344894927_UAV-aided_Information_and_Energy_Transmissions_for_Cognitive_and_Sustainable_5G_Networks\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>Y. Li, C. Courcoubetis,\u00a0<strong>L. Duan<\/strong>, and R. Weber, \u201cOptimal pricing for peer-to-peer sharing with network externalities,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 29, no. 1, pp. 148-161, Feb. 2021. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1805.09616\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1805.09616<\/a><\/li><li>X. Zhang and\u00a0<strong>L. Duan<\/strong>, \u201cEnergy-saving deployment algorithms of UAV swarm for sustainable wireless coverage,\u201d IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 10320-10335, Sept 2020. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1903.11221.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1903.11221.pdf<\/a><\/li><li>H. Zhang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cJamming-assisted Proactive Eavesdropping over Two Suspicious Communication Links,\u201d IEEE Transactions on Wireless Communications, vol. 19, no. 7, pp. 4817-4830, Jul. 2020. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1907.12234.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1907.12234.pdf\u00a0<\/a><\/li><li>Y. Han, S. Zhang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cCooperative Double-IRS Aided Communication: Beamforming Design and Power Scaling,\u201d IEEE Wireless Communications Letters, vol. 9, no. 8, pp. 1206-1210, Aug. 2020. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/2004.01846.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2004.01846.pdf<\/a><\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cEconomic Analysis of Unmanned Aerial Vehicle (UAV) Provided Mobile Services,\u201d IEEE Transactions on Mobile Computing, vol. 20, no. 5, pp. 1804-1816, May 2021. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2020\/02\/eco-UAV.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>].<\/li><li>H. Zhang and\u00a0<strong>L. Duan<\/strong>, \u201cBeyond Secrecy Rate in MISO Wiretap Channels: An Information Jamming Approach,\u201d IEEE Transactions on Communications, vol. 68, no. 5, pp. 3057-3067, May 2020. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2020\/01\/Info-Jamming.pdf\" target=\"_blank\" rel=\"noopener\">Online Available Here<\/a>]\u00a0<\/li><li>X. Xu,\u00a0<strong>L. Duan<\/strong>, and M. Li, \u201cStrategic learning approach for deploying UAV-provided wireless services,\u201d\u00a0<em>IEEE Transactions on Mobile Computing<\/em>, vol. 20, no. 3, pp. 1230-1241, Mar. 2021. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1907.00301\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1907.00301\u00a0<\/a><\/li><li>Y. Chen, X. Gong, R. Ou,\u00a0<strong>L. Duan<\/strong>, and Q. Zhang, \u201cCROWDCACHING: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT,\u201d<em>\u00a0IEEE Internet of Things Journal<\/em>, vol. 7. no. 6, pp. 5599-5612, Jun. 2020. [<a href=\"https:\/\/www.researchgate.net\/publication\/339840581_CROWDCACHING_Incentivizing_D2D-Enabled_Caching_via_Coalitional_Game_for_IoT\" target=\"_blank\" rel=\"noopener\">Online Available Here<\/a>]<\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cRegulating competition in age of information under network externalities,\u201d <em>IEEE Journal on Selected Areas in Communications<\/em>, vol. 38, no. 4, pp. 697-710, Apr. 2020. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1904.01841\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1904.01841<\/a><\/li><li>Y.-P. Hsu, E. Modiano, and\u00a0<strong>L. Duan<\/strong>, \u201cScheduling Algorithms for Minimizing Age of Information in Wireless Broadcast Networks with Random Arrivals,\u201d\u00a0<em>IEEE Transactions on Mobile Computing<\/em>, vol. 19, no. 12, pp. 2903-2915, Dec. 2020. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1712.07419.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1712.07419.pdf\u00a0<\/a>\u00a0<\/li><li>Z. Wang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cAdaptive Deployment for UAV-Aided Communication Networks,\u201d\u00a0<em>IEEE Transactions on Wireless Communications<\/em>, vol. 18, no. 9, pp. 4531-4543, Sept 2019. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1812.03267.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1812.03267.pdf<\/a><\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cEconomic Analysis of Rollover and Shared Data Plans,\u201d IEEE Transactions on Mobile Computing, vol. 19, no. 9, pp. 2088-2010, Sept. 2020. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1904.07970\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1904.07970<\/a><\/li><li>Y. Han,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cJamming-assisted eavesdropping over parallel fading channels,\u201d\u00a0<em>IEEE Transactions on Information Forensics and Security (TIFS)<\/em>, vol. 14, no. 9, pp. 2486-2499, Sept. 2019. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1902.07420\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1902.07420<\/a><\/li><li>L. Wang, Y. L. Che, J. Long,<strong>\u00a0L. Duan<\/strong> and K. Wu, \u201cMultiple Access mmWave Design for UAV-aided 5G Communications,\u201d <em>IEEE Wireless Communications<\/em>, pp. 64-71, Feb. 2019.<\/li><li>F. Wang,\u00a0<strong>L. Duan<\/strong>, and J. Niu, \u201cOptimal Pricing of User-Initiated Data-Plan Sharing in a Roaming Market,\u201d IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 5929-5944, Sept. 2018. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1712.06236\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/arxiv.org\/abs\/1712.06236<\/a><\/li><li>H. Kim, H. Lee,\u00a0<strong>L. Duan<\/strong>, and I. Lee, \u201cSum-rate maximization methods for wireless powered communication networks in interference channel,\u201d IEEE Transactions on Wireless Communications, vol. 17, no. 10, pp. 6464-6474, Oct. 2018.<\/li><li>X. Wang,\u00a0<strong>L. Duan<\/strong>, and J. Zhang, \u201cMobile Social Services with Network Externality: From Separate Pricing to Bundled Pricing,\u201d IEEE Transactions on Network Science and Engineering, vol. 6, no. 3, pp. 379-390, Sept. 2019. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1803.07496\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1803.07496<\/a><\/li><li>X. Zhang and\u00a0<strong>L. Duan<\/strong>, \u201cFast deployment of UAV networks for optimal wireless coverage,\u201d IEEE Transactions on Mobile Computing, vol. 18, no. 3, pp. 588-601, Mar. 2019. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1710.05616\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/arxiv.org\/abs\/1710.05616<\/a><\/li><li>Y.P. Hsu and\u00a0<strong>L. Duan<\/strong>, \u201cTo motivate social grouping in wireless networks,\u201d IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 4880-4893, Aug. 2017. [Online]. Available: <a href=\"http:\/\/arxiv.org\/abs\/1511.01795\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1511.01795<\/a><\/li><li>C. Jiang, L. Gao,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cScalable Mobile Crowdsensing via Peer-to-Peer Data Sharing,\u201d IEEE Transactions on Mobile Computing, vol. 17, no. 4, pp. 898-912, Apr. 2018. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1705.05343\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1705.05343<\/a><\/li><li>Y. Chen,\u00a0<strong>L. Duan<\/strong>, and Q. Zhang, \u201cFinancial analysis of network upgrade,\u201d IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5496-5499, Jun. 2018.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cTransmit optimisation for symbol-level spoofing,\u201d IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 41-55, Aug. 2017. [Online]. Available:<a href=\"https:\/\/arxiv.org\/pdf\/1608.00722.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1608.00722.pdf<\/a><\/li><li>K. Li, W. Ni,\u00a0<strong>L. Duan<\/strong>, M. Abolhasan, and J. Niu, \u201cWireless power transfer and data collection in wireless sensor networks,\u201d IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2686-2697, Mar. 2018. <a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/03\/08105867.pdf\" target=\"_blank\" rel=\"noopener\">[Online Report]<\/a><\/li><li>F. Gu, J. Niu, and\u00a0<strong>L. Duan<\/strong>, \u201cWAIPO: A fusion-based collaborative indoor localisation system on smartphones,\u201d IEEE\/ACM Transactions on Networking, vol. 25, no. 4, pp. 2267-2280, Aug. 2017.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cProactive eavesdropping via Cognitive Jamming in Fading Channels,\u201d IEEE Transactions on Wireless Communications, vol. 16, no. 5, pp. 2790-2806, May 2017. [Online]. Available: <a href=\"http:\/\/arxiv.org\/abs\/1512.02754\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1512.02754<\/a><\/li><li>C. Jiang, L. Gao,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cData-centric mobile crowdsensing,\u201d IEEE Transactions on Mobile Computing, vol. 17, no. 6, pp. 1275-1288, Jun. 2018. [Online]. Available: <a href=\"https:\/\/arxiv.org\/pdf\/1705.06055.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1705.06055.pdf<\/a><\/li><li>J. Xu, L. Duan, and\u00a0<strong>R. Zhang<\/strong>, \u201cSurveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm,\u201d\u00a0<em>IEEE Wireless Communications<\/em>, pp. 152-159, Aug. 2017. [Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1612.07859\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1612.07859\u00a0<\/a><\/li><li><strong>L. Duan<\/strong>, L. Huang, C. Langbort, A. Pozdnukhov, J. Walrand, and L. Zhang, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7911263\/?reload=true\" target=\"_blank\" rel=\"noopener\">Human-in-the-loop mobile networks: A survey of recent advancements<\/a>,\u201d\u00a0<em>IEEE Journal on Selected Areas in Communications<\/em>, vol. 35, no. 4, pp. 813-831, Apr. 2017.<\/li><li>Y. Guo,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cCooperative local caching under heterogeneous file preferences,\u201d IEEE Transactions on Communications, vol. 65, no. 1, pp. 444-457, Jan. 2017. [Online]. Available: <a href=\"http:\/\/arxiv.org\/abs\/1510.04516\">http:\/\/arxiv.org\/abs\/1510.04516<\/a><\/li><li>Y. Li, C. Courcoubetis, and\u00a0<strong>L. Duan<\/strong>, \u201cDynamic routing for social information sharing,\u201d IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 571-585, Mar. 2017.[Online]. Available: <a href=\"https:\/\/arxiv.org\/abs\/1608.03397\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1608.03397<\/a>\u00a0You can also find\u00a0<a href=\"http:\/\/www2.ims.nus.edu.sg\/Programs\/015game\/files\/costas.pdf\" target=\"_blank\" rel=\"noopener\">[Slide Online]<\/a>.<\/li><li>X. Wang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2016\/09\/TWC-PHmarket.pdf\" target=\"_blank\" rel=\"noopener\">User-initiated Data Plan Trading via A Personal Hotspot Market<\/a>,\u201d IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7885-7898, Nov. 2016.<\/li><li>J. Xu, L. Duan, and R. Zhang, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2016\/12\/PhysicalLayerSpoofing.pdf\" target=\"_blank\" rel=\"noopener\">Fundamental rate limits of physical layer spoofing<\/a>,\u201d IEEE Wireless Communications Letters, vol. 6, no. 2, pp. 154-157, Apr. 2017. [Online]. Available: <a href=\"http:\/\/arxiv.org\/abs\/1612.08129\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1612.08129<\/a><\/li><li>Y. Che,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cDynamic base station operation in large-scale green cellular networks,\u201d IEEE Journal on Selected Areas in Communications (JSAC), vol. 34, no. 12, pp. 3127-3141, Dec. 2016. [Online]. Available: <a href=\"http:\/\/arxiv.org\/abs\/1512.07469\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1512.07469\u00a0<\/a><\/li><li>X. Gong,\u00a0<strong>L. Duan<\/strong>, X. Chen, and J. Zhang, \u201cWhen social network effect meets congestion effect in wireless networks: Data usage equilibrium and optimal pricing,\u201d IEEE Journal on Selected Areas in Communications, vol. 35, no. 2, pp. 449-462, Feb. 2017. [Online]. Conference version available: <a href=\"http:\/\/informationnet.asu.edu\/pub\/social-wireless-mobihoc15-TR.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/informationnet.asu.edu\/pub\/social-wireless-mobihoc15-TR.pdf\u00a0<\/a><\/li><li>Z. Wang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201c<a href=\"http:\/\/arxiv.org\/abs\/1509.01353\" target=\"_blank\" rel=\"noopener\">Adaptively directional wireless power transfer for large-scale sensor networks<\/a>,\u201d\u00a0<em>IEEE Journal on Selected Areas in Communications (JSAC)<\/em>, vol. 34, no. 5, \u00a0pp. 1785-1800, May 2016.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cEnergy group-buying with load sharing for green cellular networks,\u201d IEEE Journal on Selected Areas in Communications (JSAC), vol. 34, no. 4, pp. 786-799, Apr. 2016. [Online]. <a href=\"http:\/\/arxiv.org\/abs\/1508.06093\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1508.06093<\/a><\/li><li>C. Jiang,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cOptimal Pricing and Admission Control for Heterogeneous Secondary Users,\u201d IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5218-5230, Aug. 2016. [Online]. <a href=\"http:\/\/arxiv.org\/abs\/1604.01851\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1604.01851<\/a><\/li><li>Y. L. Che,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cSpatial throughput maximization of wireless powered communication networks,\u201d <em>IEEE Journal on Selected Areas in Communications<\/em>, vol. 33, no. 8, pp. 1534-1548, 2015. [Online].\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1409.3107\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1409.3107<\/a>\u00a0<strong>[An ESI Highly Cited Paper during 2015\u20132016.]<\/strong><a href=\"http:\/\/arxiv.org\/abs\/1409.3107\" target=\"_blank\" rel=\"noopener\"><br \/><\/a><\/li><li>S. Cai, Y. Che,\u00a0<strong>L. Duan<\/strong>, J. Wang, S. Zhou, and R. Zhang, \u201cGreen 5G heterogeneous networks through dynamic small-cell operation,\u201d IEEE Journal on Selected Areas in Communications (JSAC), vol. 34, no. 5, pp. 1103-1115, May 2016. [Online]. <a href=\"http:\/\/arxiv.org\/pdf\/1601.01453v1.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/pdf\/1601.01453v1.pdf<\/a>\u00a0<strong>[An ESI Highly Cited Paper.]<\/strong><\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cProactive eavesdropping via jamming for rate maximization over Rayleigh fading channels,\u201d IEEE Wireless Communications Letters (WCL), vol. 5, no. 1, pp. 80-83, Feb. 2016. [Online]. <a href=\"http:\/\/arxiv.org\/pdf\/1510.05140.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/pdf\/1510.05140.pdf<\/a><a href=\"http:\/\/arxiv.org\/pdf\/1510.05140.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><\/a><\/li><li>L. Gao,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cTwo-sided matching based cooperative spectrum sharing,\u201d\u00a0<em>IEEE Transactions on Mobile Computing (TMC)<\/em>, vol. 6(2), pp. 538-551, 2017.\u00a0<strong>[ESI Highly Cited Paper].<\/strong><\/li><li>S. Gong,\u00a0<strong>L. Duan<\/strong>, and N. Gautam, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/10\/EnergyHarvestRelays.pdf\" target=\"_blank\" rel=\"noopener\">Optimal scheduling and beamforming design in relay networks with energy harvesting constraints<\/a>,\u201d\u00a0<em>IEEE Transactions on Wireless Communications (TWC)<\/em>, vol. 15, no. 2, pp. 1226-1238, Feb. 2016.<\/li><li><strong>L. Duan<\/strong>, B. Shou, and J. Huang, \u201c<a href=\"http:\/\/www.poms.org\/2007\/11\/pom_journal_among_business_wee_1.html\" target=\"_blank\" rel=\"noopener\">Capacity allocation and pricing strategies for new wireless services<\/a>,\u201d\u00a0<em>Production<\/em>\u00a0and\u00a0<em>Operations Managemen<\/em>t (<a href=\"http:\/\/www.poms.org\/2007\/11\/pom_journal_among_business_wee_1.html\" target=\"_blank\" rel=\"noopener\"><strong>POM<\/strong><\/a>), vol. 25(5), pp. 866-882, 2016.\u00a0<strong>[POM is among Business Week\u2019s 20 Premier Journals.]<br \/><\/strong><\/li><li>Y. Guo,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cOptimal pricing and load sharing for energy saving with communications cooperation,\u201d IEEE Transactions on Wireless Communications (TWC), vol. 15, no. 2, pp. 951-964, Feb. 2016. [Online]. <a href=\"http:\/\/arxiv.org\/pdf\/1409.8402.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/pdf\/1409.8402.pdf<\/a><a href=\"http:\/\/arxiv.org\/pdf\/1409.8402.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><\/a><\/li><li>Y. Che, J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cMulti-antenna wireless powered communication with co-channel energy and information transfer,\u201d IEEE Communications Letters, vol. 19, no. 12, pp. 2266-2269, Dec. 2015. [Online]. <a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/10\/WPC.pdf\">http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/10\/WPC.pdf<\/a><\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cCost-aware green cellular networks with energy and communication cooperation,\u201d\u00a0<em>IEEE Communications Magazine<\/em>, vol. 13, no. 5, pp. 257-263, 2015. [Online].<a href=\"http:\/\/arxiv.org\/abs\/1411.4139\" target=\"_blank\" rel=\"noopener\"> http:\/\/arxiv.org\/abs\/1411.4139<\/a><strong> [An ESI Highly Cited Paper.]<\/strong><\/li><li>Y. Chen,\u00a0<strong>L. Duan<\/strong>, J. Huang, and Q. Zhang, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7035108\" target=\"_blank\" rel=\"noopener\">Balancing income and user utility in spectrum allocation<\/a>,\u201d\u00a0<em>IEEE Transactions on Mobile Computing<\/em>, vol. 14, no. 12, pp. 2460-2473, Dec. 2015.<\/li><li>W. Wang, L. Chen, K. G. Shin, and\u00a0<strong>L. Duan<\/strong>, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=7027852\" target=\"_blank\" rel=\"noopener\">Thwarting intelligent malicious behaviors in cooperative sensing: A joint spectrum sensing and access framework<\/a>,\u201d IEEE Transaction on Mobile Computing, vol. 14, no. 15, pp. 2392-2405, Dec. 2015.<\/li><li>S. Gong, P. Wang, and\u00a0<strong>L. Duan<\/strong>, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=7041194\" target=\"_blank\" rel=\"noopener\">Distributed power control with robust protection for\u00a0PUs in Cognitive Radio Networks<\/a>,\u201d\u00a0<em>IEEE Transactions on Wireless Communications<\/em>, vol. 14, no. 6, pp. 3247-3258, 2015.<\/li><li>J. He,\u00a0<strong>L. Duan<\/strong>, F. Hou, P. Cheng, J. Chen, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7015623\" target=\"_blank\" rel=\"noopener\">Multi-period scheduling for wireless sensor networks: A distributed consensus approach<\/a>,\u201d\u00a0<em>IEEE Transactions on Signal Processing<\/em>, vol. 63, no. 7, pp. 1651-1663, 2015.<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201cPricing for local and globaly WiFi markets,\u201d IEEE Transactions on Mobile Computing, vol. 14, no. 5, pp. 1056-1070, 2015. [Online].\u00a0Available:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1407.4355\">http:\/\/arxiv.org\/abs\/1407.4355<\/a><\/li><li>Y. Guo, J. Xu,\u00a0<strong>L. Duan<\/strong>, R. Zhang, \u201cJoint energy and spectrum cooperation for cellular communication systems,\u201d IEEE Transactions on Communications (TCOM), vol. 62, no. 10, pp. 3678-3691, 2015. [Online].\u00a0Available:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1312.1756\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1312.1756<\/a><\/li><li><strong>L. Duan<\/strong>, J. Huang, and J. Walrand, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6853396&amp;tag=1\" target=\"_blank\" rel=\"noopener\">Economic analysis of 4G upgrade timing<\/a>,\u201d IEEE Transactions on Mobile Computing (TMC), vol. 14, no. 5, pp. 975-989, 2015.<strong>\u00a0\u00a0<\/strong><\/li><li>Y. L. Che, R. Zhang, Y. Gong, and\u00a0<strong>L. Duan<\/strong>, \u201cOn spatial capacity of wireless ad hoc networks with threshold based scheduling,\u201d IEEE Transactions on Wireless Communications, vol. 13, no. 12, pp. 6915-6927, Dec. 2014. [Online]. Available:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1409.2592\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1409.2592<\/a><\/li><li><strong>L. Duan<\/strong>, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6746211&amp;tag=1\" target=\"_blank\" rel=\"noopener\">Motivating smartphone users\u2019 collaborations in data acquisitions and distributed computing<\/a>,\u201d<em>\u00a0IEEE Transactions on Mobile Computing (TMC)<\/em>,\u00a0vol. 13, no. 10, pp. 2320-2333, Oct. 2014..<\/li><li>Y. Yang, T. Q.S. Quek, and\u00a0<strong>L. Duan<\/strong>, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6819853&amp;tag=1\" target=\"_blank\" rel=\"noopener\">Backhaul-constrained small cell networks: Refunding and QoS provisioning<\/a>,\u201d\u00a0<em>IEEE Transactions on Wireless Communications<\/em>, vol. 13, no. 9, pp. 5148-5161, Sept. 2014.\u00a0<\/li><li><strong>L. Duan<\/strong>, L. Gao, and J. Huang, \u201c<a href=\"http:\/\/jianwei.ie.cuhk.edu.hk\/publication\/CooperativeContractTechReport.pdf\">Cooperative spectrum sharing: a contract-based approach<\/a>,\u201d\u00a0<em>IEEE Transactions on Mobile Computing (TMC)<\/em>, vol. 13, no. 1, pp. 174-187,\u00a0 2014.\u00a0<strong>[An ESI Highly Cited Paper during 2014-2015.]<br \/><\/strong><\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/home.ie.cuhk.edu.hk\/~jwhuang\/publication\/FemtocellTechReport.pdf\">Economics of femtocell service provision<\/a>,\u201d\u00a0<em>IEEE Transactions on Mobile Computing (TMC)<\/em>, vol. 12, no. 11, pp. 2261-2273, Nov. 2013.<\/li><li><strong>L. Duan<\/strong>, A. W. Min, J. Huang, and K. G. Shin, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6311223&amp;tag=1\">Attack prevention for collaborative spectrum sensing in cognitive radio networks<\/a>,\u201d\u00a0<em>IEEE Journal on Selected Areas in Communications (JSAC)<\/em>, vol. 30, no. 9, pp. 1658-1665, Oct. 2012.<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6042865\">Duopoly competition in dynamic spectrum leasing and\u00a0<\/a><a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6042865\">pricing<\/a>,\u201d\u00a0<em>IEEE Transactions on Mobile Computing (TMC)<\/em>, vol. 11, no. 11, pp. 1706-1719, Nov. 2012.\u00a0<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=5765961\" target=\"_blank\" rel=\"noopener\">Investment and pricing with spectrum uncertainty: a cognitive operator\u2019s perspective<\/a>,\u201d\u00a0<em>IEEE Transactions on Mobile Computing\u00a0 (TMC)<\/em>, vol. 10, no. 11, pp. 1590-1604, Nov. 2011.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc2a80c e-flex e-con-boxed e-con e-parent\" data-id=\"cc2a80c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa3a3a0 elementor-widget elementor-widget-text-editor\" data-id=\"fa3a3a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6>Conferences<\/h6><ul><li>P. Dai and <strong>L. Duan<\/strong>, &#8220;Global convergence for multi-agent reinforcement learning in unreliable communication networks,&#8221; to appear in IEEE INFOCOM 2026. [Acceptance rate: 18.9%]<\/li><li>S. Hao, H. Li, and\u00a0<strong>L. Duan<\/strong>, \u201cTo Theoretically Understand Transformer-Based In-Context Learning for Optimizing CSMA,\u201d to appear in ACM MobiHoc 2025. (Acceptance rate: 23%). [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2025\/07\/ICL.pdf\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>Y. Hu and\u00a0<strong>L. Duan<\/strong>, \u201cHuman-in-the-loop Learning Through Decentralized Communication Mechanisms,\u201d to appear in ACM MobiHoc 2025. (Acceptance rate: 23%). [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2025\/07\/HILL.pdf\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>H. Li, S. Lin,\u00a0<strong>L. Duan<\/strong>, Y. Liang, and N. B. Shroff, \u201cTheory of mixture-of-experts in continual learning,\u201d in The Thirteenth International Conference on Learning Representations (ICLR), 2025. (Spotlight presentation with rate: 5.1%).\u00a0<a href=\"https:\/\/arxiv.org\/abs\/2406.16437\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2406.16437<\/a><\/li><li>Y. Hu and\u00a0<strong>L. Duan<\/strong>, \u201cTruthful mechanisms for linear bandit games with private contexts,\u201d full paper to appear in The 24th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2025). (Acceptance rate: 24.5%).\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/2501.03865\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/2501.03865<\/a><\/li><li>S. Hong, X. Lin, and\u00a0<strong>L. Duan<\/strong>, \u201cLightweight federated learning with differential privacy and straggler resilience,\u201d in INFOCOM 2025. (Acceptance rate: 19%). [<a href=\"https:\/\/arxiv.org\/abs\/2412.06120\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cTheory of mixture-of-experts for mobile edge computing,\u201d in INFOCOM 2025. (Acceptance rate: 19%). [<a href=\"https:\/\/www.arxiv.org\/pdf\/2412.15690\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cOnline Learning from Strategic Human Feedback in LLM Fine-Tuning,\u201d to appear in ICASSP 2025. [<a href=\"https:\/\/arxiv.org\/abs\/2412.16834\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cAlgorithm Design for Continual Learning in IoT Networks,\u201d to appear in ICASSP 2025. [<a href=\"https:\/\/arxiv.org\/abs\/2412.16830\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>D. Xu,\u00a0<strong>L. Duan<\/strong>, and H. Zhu, \u201cHybrid content caching empowered by AIGC in wireless networks,\u201d to appear in ICASSP 2025. [<a href=\"https:\/\/doi.org\/10.36227\/techrxiv.172684305.52909683\/v2\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li><p class=\"p1\">J. Zhu, L. Zhao, F. Xiao, and L. Duan, &#8220;Birds in Cages: Edge Inference Allocation for Distributed LLM Deployment,&#8221; in IWQoS 2025.\u00a0<\/p><\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cDistributed learning for congestion games,\u201d IEEE International Symposium on Information Theory (ISIT), 2024.\u00a0[<a href=\"https:\/\/www.researchgate.net\/publication\/380074526_Distributed_Learning_for_Congestion_Games\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>S. Ngoh, A. P. Majumder, and\u00a0<strong>L. Duan<\/strong>, \u201cRobust Clustered Federated Learning Against Malicious Agents,\u201d The\u00a0<em>2024<\/em>\u00a0IEEE 99th Vehicular Technology Conference:\u00a0<em>VTC2024<\/em>\u2013<em>Spring.<\/em>\u00a0[<a href=\"https:\/\/www.researchgate.net\/publication\/380103755_Robust_Clustered_Federated_Learning_Against_Malicious_Agents\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>S. Li and\u00a0<strong>L. Duan<\/strong>, \u201cAge of Information Diffusion on Social Networks: Optimizing Multi-stage Seeding Strategies,\u201d to appear in ACM Mobihoc 2023 Conference. (Acceptance Rate: 22%) [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/07\/Age-of-information-diffusion-mobihoc23.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>H. Li and\u00a0<strong>L. Duan<\/strong>, \u201cWhen congestion games meet mobile crowdsourcing: selective information disclosure,\u201d to appear in The 37th AAAI Conference on Artificial Intelligence. [Online Technical Report, Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/2211.14029\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2211.14029<\/a>\u00a0] [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2023\/02\/AAAI_3044_Slides.pdf\" target=\"_blank\" rel=\"noopener\">Slides available here<\/a>]<\/li><li>Y. Zhang,\u00a0<strong>L. Duan<\/strong>, and N.-M. Cheung, \u201cAccelerating Federated Learning on non-iid data against stragglers,\u201dSECON WS 2022 \u2013 Distributed ML,\u00a0 [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2022\/08\/FL-accelerate.pdf\" target=\"_blank\" rel=\"noopener\">Online Version here<\/a>]<\/li><li>S. Hong and\u00a0<strong>L. Duan<\/strong>, \u201cMulti-user Privacy Cooperation Game by Leveraging Users\u2019 Service Flexibility,\u201d The\u00a0<em>2022<\/em>\u00a0IEEE International Symposium on Information Theory (<em>ISIT<\/em>). [<a href=\"https:\/\/www.researchgate.net\/publication\/360382930_Multi-user_Privacy_Cooperation_Game_by_Leveraging_Users'_Service_Flexibility\" target=\"_blank\" rel=\"noopener\">Online Version here<\/a>]<\/li><li>S. Gao, C. Courcoubetis, and\u00a0<strong>L. Duan<\/strong>, \u201cAverage-Case Analysis of Greedy Matching for D2D Resource Sharing,\u201d in Proceedings of WiOPT Conference 2021. [<a href=\"https:\/\/arxiv.org\/pdf\/2107.12581.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>]<\/li><li>Q. Lin,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cPersonalized pricing through user profiling in social networks,\u201d in Proceedings of WiOPT Conference 2021. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2021\/08\/WiOpt_2021_Pricing.pdf\" target=\"_blank\" rel=\"noopener\">Technical Report here<\/a>]<\/li><li>S. Li, M. Li,\u00a0<strong>L. Duan<\/strong>, and V. C.S. Lee, \u201cOnline Ride-Hitching in UAV Travelling,\u201d in\u00a0<span class=\"_15gqBTUta5ZVWkGNTkvx90\">COCOON<\/span>\u00a0Conference 2021. [Online]. Available:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/2108.09606\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/2108.09606<\/a><\/li><li>N. Ding, Z. Fang,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cIncentive mechanism design for distributed coded machine learning,\u201d in Proceedings of IEEE INFOCOM 2021. (Acceptance rate: 19.9%). [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/2012.08715\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2012.08715<\/a><\/li><li>L. Ruan,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cOptimal\u00a0<em>UAV Hitching<\/em>\u00a0on Ground Vehicles,\u201d to appear in GLBECOM 2021. [<a href=\"https:\/\/www.researchgate.net\/publication\/353945116_Optimal_UAV_Hitching_on_Ground_Vehicles\" target=\"_blank\" rel=\"noopener\">Online Report<\/a>]<\/li><li>S. Li, M. Li,\u00a0<strong>L. Duan<\/strong>, and V. C.S. Lee , \u201cOnline maximum k-intervals coverage problem,\u201d in COCOA 2020 Conference. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/2011.10938\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/2011.10938<\/a><\/li><li>S. Gao, C. Courcoubetis,\u00a0<strong>L. Duan<\/strong>, \u201cDistributed Double Auctions for Large-scale Device-to-Device Resource Trading,\u201d in the Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2020). (Acceptance Rate: 15%).\u00a0[<a href=\"https:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2020\/04\/D2D_trading.pdf\" target=\"_blank\" rel=\"noopener\">Online Technical Report<\/a>].<\/li><li>X. Xu, M. Li, and\u00a0<strong>L. Duan<\/strong>, \u201cStrategyproof Mechanisms for Activity Scheduling,\u201d to appear as full paper in AAMAS Conference 2020. (Acceptance Rate: 23%). [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2020\/01\/ActivityScheduling.pdf\" target=\"_blank\" rel=\"noopener\">Online<\/a>].<\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cDynamic pricing for controlling age of information,\u201d in Proceedings of IEEE International Symposium on Information Theory (ISIT), 2019. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/1904.01185.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1904.01185.pdf<\/a>\u00a0 &amp;\u00a0\u00a0<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/04\/AoI-Pricing_Poster.pdf\" target=\"_blank\" rel=\"noopener\">[Download Poster Here]<\/a><\/li><li>S. Hao and\u00a0<strong>L. Duan<\/strong>, \u201cEconomics of Age of Information Management under Network Externalities,\u201d to appear in the Twentieth International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2019). (Acceptance rate: 23.7%).\u00a0[Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/1904.01841.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/pdf\/1904.01841.pdf\u00a0\u00a0<\/a>and [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/05\/eco-AoI-Talk.pdf\" target=\"_blank\" rel=\"noopener\">Online Slides here<\/a>].<\/li><li><strong>L. Duan<\/strong>, B. Li, M. Minming, and X. Xu (corresponding author), \u201cHeterogeneous two-facility location games with minimum distance requirement,\u201d to appear in AAMAS 2019 Conference (full paper). (Acceptance rate: 24%).\u00a0<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/02\/aamas2019.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">[Online Technical Report]<\/a>.<\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cDynamic pricing and capacity allocation of UAV-provided mobile services,\u201d to appear in\u00a0<em>INFOCOM 2019 Conference<\/em>. (Acceptance rate: 19.7%).\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/1812.02910.pdf\" target=\"_blank\" rel=\"noopener\">[<\/a><a href=\"https:\/\/arxiv.org\/pdf\/1812.02910.pdf\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a>] and [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/05\/eco-UAV-Talk.pdf\" target=\"_blank\" rel=\"noopener\">Online Slides here<\/a>].<\/li><li>Y. Li, C. Courcoubetis, and\u00a0<strong>L. Duan<\/strong>, \u201cRecommending paths: Follow or not follow?\u201d to appear in\u00a0<em>INFOCOM 2019 Conference<\/em>. (Acceptance rate: 19.7%).\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/1812.00574.pdf\" target=\"_blank\" rel=\"noopener\">[<\/a><a href=\"https:\/\/arxiv.org\/pdf\/1812.00574.pdf\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a>] and [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2019\/05\/eco-Learning.pdf\" target=\"_blank\" rel=\"noopener\">Online Slides here<\/a>].<\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cEconomics of UAV-provided Mobile Services,\u201d\u00a0in\u00a0<em>Proc. NetEcon workshop<\/em>, 2018. (Copyright held by authors.) [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/05\/eco-UAV.pdf\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a>]<\/li><li>H. Zhang and\u00a0<strong>L. Duan<\/strong>, \u201cGoing beyond the secrecy rate via information jamming,\u201d in Proc. of IEEE GLOBECOM, 2018. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/12\/GC18.InfoJamming.pdf\" target=\"_blank\" rel=\"noopener\">Online Slide<\/a>]<\/li><li>Z. Wang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cTraffic-aware adaptive deployment for UAV-aided communication networks,\u201d in Proc. of IEEE GLOBECOM, 2018. [<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/12\/GC18.AdapativeUAV.pdf\" target=\"_blank\" rel=\"noopener\">Online Slide<\/a>]<\/li><li>X. Xu,\u00a0<strong>L. Duan<\/strong>, and M. Li, \u201cUAV Placement Games for Optimal Wireless Service Provision,\u201d in IEEE WiOPT, 2018.\u00a0[<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/04\/UAV-Placement-Games.pdf\" target=\"_blank\" rel=\"noopener\">Online Tech Report<\/a><a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2018\/04\/UAV-Placement-Games.pdf\" target=\"_blank\" rel=\"noopener\">]<\/a>.<\/li><li>Y. Li, C. Courcoubetis,\u00a0<strong>L. Duan<\/strong>, and R. Weber, \u201cOptimal pricing for a peer-to-peer sharing platform under network externalities,\u201d in Proc. of The 13th Workshop on the Economics of Networks, Systems and Computation (NetEcon), 2018. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1805.09616\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1805.09616<\/a><\/li><li>X. Wang and\u00a0<strong>L. Duan<\/strong>, \u201cEconomics of UAV-provided mobile services,\u201d in Proc. of\u00a0The 13th Workshop on the Economics of Networks, Systems and Computation (NetEcon), 2018.<\/li><li>X. Zhang and\u00a0<strong>L. Duan<\/strong>, \u201cOptimization of emergency UAV deployment for providing wireless coverage,\u201d IEEE GLOBECOM\u201917. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1710.05616\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1710.05616<\/a><\/li><li>J. Xu, K. Li,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cProactive eavesdropping via jamming over HARQ-based Communications,\u201d in Proc. of IEEE GLOBECOM, 2017.<\/li><li>F. Wang,\u00a0<strong>L. Duan<\/strong>, and J. Niu, \u201cPricing for opportunistic data sharing via personal hotspot,\u201d in Proc. of IEEE GLOBECOM, 2017. [Online]. Available:\u00a0<a href=\"https:\/\/arxiv.org\/abs\/1712.06236\" target=\"_blank\" rel=\"noopener\">https:\/\/arxiv.org\/abs\/1712.06236<\/a><\/li><li>K. Li, W. Ni,\u00a0<strong>L. Duan<\/strong>, M. Abolhasan, and J. Niu, \u201cSWPT: a joint-scheduling model for wireless powered sensor networks,\u201d in Proc. of IEEE GLOBECOM, 2017.<\/li><li>Y.-P. Hsu, E. Modiano, and\u00a0<strong>L. Duan<\/strong>, \u201cAge of Information: Design and Analysis of Optimal Scheduling Algorithms,\u201d to appear in ISIT 2017. [Online]. Technical Report:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1712.07419\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1712.07419<\/a><\/li><\/ul><ul><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cHarnessing Self-Interference in Full-Duplex Relaying: An Analog Filter-and-Forward Approach,\u201d to appear in GLOBECOM 2016.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cTransmit Optimization for Symbol-Level Spoofing with BPSK Signaling,\u201d to appear in GLOBECOM 2016 Workshop.<\/li><li>H. Lee,\u00a0<strong>L. Duan<\/strong>, and Y. Yi, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2016\/02\/Telco-CDN-Federation.pdf\" target=\"_blank\" rel=\"noopener\">On the competition of CDN companies: Impact of new telco-CDNs\u2019 federation<\/a>,\u201d in Proc. of IEEE WiOpt 2016 Conference.<\/li><li>J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cProactive eavesdropping via cognitive jamming in fading channels,\u201d to appear in IEEE ICC 2016 Conference. Online Technical Report:\u00a0<a href=\"http:\/\/arxiv.org\/abs\/1512.02754\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1512.02754<\/a><\/li><li>Y. Guo,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cCooperative local caching and file sharing under heterogeneous file preferences,\u201d to appear in IEEE ICC 2016 Conference. Online Technical Report:\u00a0<a href=\"http:\/\/arxiv.org\/pdf\/1510.04516.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/pdf\/1510.04516.pdf<\/a><\/li><li>Z. Wang,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/10\/DirectionalWirelessPowerTransfer.pdf\" target=\"_blank\" rel=\"noopener\">Adaptively directional wireless power transfer for large sensor networks<\/a>,\u201d in Proc. of GLOBECOM, 2015.<\/li><li>X. Gong,\u00a0<strong>L. Duan<\/strong>, and X. Chen, \u201cWhen network effect meets congestion effect: Leveraging social services for wireless service,\u201d\u00a0<em>ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201915)<\/em>, 2015.\u00a0<strong>[Acceptance rate: 14.8%]<\/strong>. Online.\u00a0<a href=\"http:\/\/informationnet.asu.edu\/pub\/social-wireless-mobihoc15-TR.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/informationnet.asu.edu\/pub\/social-wireless-mobihoc15-TR.pdf<\/a><\/li><li>Y. Chen,\u00a0<strong>L. Duan<\/strong>, and Q. Zhang, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/05\/p1607-chen.pdf\" target=\"_blank\" rel=\"noopener\">Financial analysis of 4G network deployment<\/a>,\u201d in\u00a0<em>Proc. of<\/em>\u00a0<em>The 34th IEEE International Conference on Computer Communications (INFOCOM\u201915).\u00a0<\/em><strong>[Acceptance Rate: 19%]<\/strong>.\u00a0<\/li><li>S. Gong,\u00a0<strong>L. Duan<\/strong>, and P. Wang, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2015\/05\/p612-gong.pdf\" target=\"_blank\" rel=\"noopener\">Robust optimization of cognitive radio networks powered by energy harvesting<\/a>,\u201d\u00a0to appear in\u00a0<em>Proc. of<\/em>\u00a0<em>The 34th IEEE International Conference on Computer Communications (INFOCOM\u201915).\u00a0<\/em><strong>[Acceptance Rate: 19%]<\/strong>.<\/li><li>S. Cai,\u00a0<strong>L. Duan<\/strong>, J. Wang, S. Zhou, and R. Zhang, \u201cIncentive mechanism design for delayed WiFi offloading,\u201d in Proc. of IEEE ICC 2015.<\/li><li>S. Cai,\u00a0<strong>L. Duan<\/strong>, J. Wang, and R. Zhang, \u201cPower-efficient heterogeneous networks through optimal small-cell scheduling,\u201d in Proc. of IEEE GlobalSIP\u201914.<\/li><li>S. Gong, P. Wang, and\u00a0<strong>L. Duan<\/strong>, \u201cA game theoretic approach for robust power control in cognitive radio networks,\u201d to appear in IEEE GLOBECOM\u201914.<\/li><li>C. Jiang,\u00a0<strong>L. Duan<\/strong>, and J. Huang, \u201cJoint dynamic pricing and spectrum allocation for heterogeneous secondary demands,\u201d IEEE WiOpt\u201914.<\/li><li>Y. Guo, J. Xu,\u00a0<strong>L. Duan<\/strong>, and R. Zhang, \u201cOptimal energy and spectrum sharing for cooperative cellular systems,\u201d IEEE International Conference on Communications (ICC), 2014.<\/li><li>W. Wang, L. Chen, K. G. Shin, and\u00a0<strong>L. Duan<\/strong>, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6848059\" target=\"_blank\" rel=\"noopener\">Secure cooperative spectrum sensing and access against intelligent malicious behaviors<\/a>,\u201d in\u00a0<em>Proc. of<\/em>\u00a0<em>The 34th IEEE International Conference on Computer Communications (INFOCOM\u201914)<\/em>, Toronto, Canada, 2014.<strong>\u00a0[Acceptance rate: 19%]<\/strong><\/li><li><strong>L. Duan<\/strong>\u00a0and R. Zhang, \u201cDynamic contract to regulate energy management in microgrids,\u201d in IEEE SmartgridComm, Vancouver, Canada, 2013.<\/li><li>N. U. Hassan, S. Hussain, C. Yuen,\u00a0<strong>L. Duan<\/strong>, \u201cTradeoff between spectrum cost and quality of service in a cognitive radio network<em>,<\/em>\u201d in\u00a0<em>IEEE GLOBECOM<\/em>, Atlanta, US, 2013.<\/li><li>Y. Yang, T. Quek,<strong>\u00a0L. Duan<\/strong>, \u00a0\u201cBackhaul-constrained optimization for hybrid access small cells,\u201d in\u00a0<em>Proc. of IEEE ICASSP<\/em>, Vancouver, Canada, 2013.<\/li><li><strong>L. Duan<\/strong>,\u00a0J. Huang, and J. Walrand, \u201c<a title=\"INFOCOM13-Upgrade\" href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2013\/01\/INFOCOM13-Upgrade.pdf\">Economic analysis of 4G network upgrade<\/a>,\u201d in\u00a0<em>Proc. of<\/em>\u00a0<em>The 32th IEEE International Conference on Computer Communications (INFOCOM\u201913)<\/em>.<strong>\u00a0[Acceptance Rate: 17%].<\/strong>\u00a0This work was presented as an invited talk at\u00a0<em>2012 IEEE Communication Theory Workshop (CTW)<\/em>.<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2013\/01\/INFOCOM13-GlobalWiFi.pdf\">Optimal pricing for local and global WiFi markets<\/a>,\u201d in\u00a0<em>Proc. of<\/em>\u00a0<em>The 32th IEEE International Conference on Computer Communications (INFOCOM\u201913).\u00a0<\/em><strong>[Acceptance Rate: 17%].<\/strong><\/li><li>Y. Chen,\u00a0<strong>L. Duan<\/strong>, J. Huang, and Q. Zhang, \u201c<a title=\"INFOCOM13-Spectrum\" href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2013\/01\/INFOCOM13-Spectrum.pdf\">Balance of revenue and social welfare in FCC\u2019s spectrum allocation<\/a>,\u201d in\u00a0<em>Proc. of<\/em>\u00a0<em>The 32th IEEE International Conference on Computer Communications (INFOCOM\u201913).\u00a0<\/em><strong>[Acceptance Rate: 17%].<\/strong><\/li><li><strong>L. Duan<\/strong>, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6195541\">Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing<\/a>,\u201d in\u00a0<em>Proc. of the 31th IEEE International Conference on Computer Communications (INFOCOM\u201912)<\/em>, Orlando, Florida, US, Mar. 2012.\u00a0<strong>[Acceptance Rate: 17.9%].<\/strong><\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5462146\">Cognitive mobile virtual network operator: investment and pricing with supply uncertainty<\/a>,\u201d in\u00a0<em>Proc. of the 29th IEEE International Conference on Computer Communications (INFOCOM\u201910)<\/em>, San Diego, CA, US, Mar. 2010.\u00a0<strong>[Acceptance Rate: 17.5%].<\/strong><\/li><li><strong>L. Duan<\/strong>, L. Gao, and J. Huang, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5936229\">Contract-based cooperative spectrum sharing<\/a>,\u201d in\u00a0<em>Proc. of the 5th IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN\u201911)<\/em>, Aachen, Germany, May 2011.\u00a0[Acceptance Rate: 26%].<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5457903\">Competition with dynamic spectrum leasing<\/a>,\u201d in\u00a0<em>Proc. of the 4th IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN\u201910)<\/em>, Singapore, Apr. 2010. [Acceptance Rate: 34%].<\/li><li><strong>L. Duan<\/strong>, J. Huang, and B. Shou, \u201c<a href=\"http:\/\/people.sutd.edu.sg\/~lingjie_duan\/wp-content\/uploads\/2013\/01\/ITC2012-Femtocells.pdf\">Femtocell Service Provision with Dual Channel Competition<\/a>,\u201d in\u00a0<em>Proc. of the Workshop on Telecom Economics, Engineering and Policy, The 24th International Teletraffic Congress<\/em>\u00a0<em>(ITC 24)<\/em>,\u00a0<strong>invited paper<\/strong>, Krakow, Poland, Sept. 2012.<\/li><li><strong>L. Duan<\/strong>\u00a0and J. Huang, \u201c<a href=\"http:\/\/staff.ie.cuhk.edu.hk\/~jwhuang\/publication\/FemtocellGamenets2011.pdf\">Economic viability of femtocell service provision<\/a>,\u201d\u00a0<strong>invited paper<\/strong>, in\u00a0<em>Proc. of International Conference on Game Theory for Networks (GameNets)<\/em>, Shanghai, China, Apr. 2011.<\/li><li>K. Sugiyama, T. Kubo,\u00a0<strong>L. Duan<\/strong>, A. Tagami, T. Hasegawa, and J. Huang, \u201cIncentive mechanisms for secure smartphone collaboration,\u201d poster at\u00a0<em>International Conference on Decision and Game Theory (GameSec)<\/em>, 2012.<\/li><li>C. Li,\u00a0<strong>L. Duan<\/strong>, and X. Dong, \u201cRobust power control for CDMA communication systems via H2 optimal theory,\u201d in\u00a0<em>Proc. of The 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)<\/em>, China, Sept. 2008.<\/li><li>Z. Wu, N. Zhao,\u00a0<strong>L. Duan<\/strong>, and T. Quan, \u201cA novel hyper-chaotic spreading code and its application to 2D-CDMA,\u201d in\u00a0<em>Proc. of The 11th International Conference on Communications (ICCS)<\/em>, Singapore, Nov. 2008.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Book Chapter and Monograph X. Wang and\u00a0L. Duan, \u201cMarket Entry,\u201d in the chapter of\u00a0Encyclopedia of Wireless Networks, Springer, forthcoming. J. Xu,\u00a0L. Duan, and\u00a0R. Zhang, \u201cCost-aware cellular networks powered by smart grid and energy harvesting,\u201d in the chapter of\u00a0Key Technologies for 5G Wireless Systems,\u00a0Cambridge University Press, 2017. L. Duan, J. Huang, and B. Shou,\u00a0Cognitive Virtual Network [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-620","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/pages\/620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/comments?post=620"}],"version-history":[{"count":89,"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/pages\/620\/revisions"}],"predecessor-version":[{"id":887,"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/pages\/620\/revisions\/887"}],"wp:attachment":[{"href":"https:\/\/personal.hkust-gz.edu.cn\/lingjieduan\/wp-json\/wp\/v2\/media?parent=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}