{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:48:18Z","timestamp":1740181698993,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Harvard FAS Dean\u2019s Fund for Promising Scholarship"},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1718698","CCF-1910410"],"award-info":[{"award-number":["CCF-1718698","CCF-1910410"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/jsait.2020.3039964","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T02:32:14Z","timestamp":1606271534000},"page":"695-704","source":"Crossref","is-referenced-by-count":1,"title":["The Limiting Poisson Law of Massive MIMO Detection With Box Relaxation"],"prefix":"10.1109","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5162-0459","authenticated-orcid":false,"given":"Hong","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5174-2595","authenticated-orcid":false,"given":"Yue M.","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1958.8.171"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2490670"},{"journal-title":"0-1 phase transitions in sparse spiked matrix estimation","year":"2019","author":"barbier","key":"ref31"},{"key":"ref30","first-page":"2652","article-title":"The all-or-nothing phenomenon in sparse linear regression","author":"reeves","year":"2019","journal-title":"Proc Conf Learn Theory"},{"key":"ref35","volume":"1","author":"feller","year":"1968","journal-title":"An Introduction to Probability Theory and Its Applications"},{"journal-title":"The distribution of the Lasso Uniform control over sparse balls and adaptive parameter tuning","year":"2018","author":"miolane","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2334558"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.936019"},{"key":"ref12","first-page":"55","article-title":"Box-constrained maximum-likelihood detection in CDMA","author":"tan","year":"2000","journal-title":"Proc Int Zurich Seminar Broadband Commun Access-Transmiss -Netw"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2831622"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-012-9135-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-016-0754-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.061912"},{"journal-title":"The cavity method for analysis of large-scale penalized regression","year":"2015","author":"ramezanali","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804053"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2016018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2399914"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/imaiai\/iau005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638794"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1089242.1089247"},{"key":"ref29","first-page":"948","article-title":"High dimensional regression with binary coefficients. Estimating squared error and a phase transtition","author":"david","year":"2017","journal-title":"Proc Conf Learn Theory"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2598651"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282651"},{"key":"ref7","volume":"2","author":"gr\u00f6tschel","year":"2012","journal-title":"Geometric Algorithms and Combinatorial Optimization"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2178495"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541285"},{"journal-title":"CDMA Principles of Spread Spectrum Communication","year":"1995","author":"viterbi","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2009\/09\/L09003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2094817"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00018732.2016.1211393"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2916359"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"18914","DOI":"10.1073\/pnas.0909892106","article-title":"Message-passing algorithms for compressed sensing","volume":"106","author":"donoho","year":"2009","journal-title":"Proc Nat Acad Sci"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2840720"},{"journal-title":"A Framework to Characterize Performance of LASSO Algorithms","year":"2013","author":"stojnic","key":"ref25"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8700143\/9319601\/9269378-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/9319601\/09269378.pdf?arnumber=9269378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:16:34Z","timestamp":1651065394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":35,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsait.2020.3039964","relation":{},"ISSN":["2641-8770"],"issn-type":[{"type":"electronic","value":"2641-8770"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}