Xinmei Wang

According to our database1, Xinmei Wang authored at least 103 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Synchronization of Fuzzy Inertial Neural Networks with Time-Varying Delays via Fixed-Time and Preassigned-Time Control.
Neural Process. Lett., December, 2023

2022
Trajectory tracking of multi-legged robot based on model predictive and sliding mode control.
Inf. Sci., 2022

Formation control of multiple mecanum-wheeled mobile robots with physical constraints and uncertainties.
Appl. Intell., 2022

CI-Net: a joint depth estimation and semantic segmentation network using contextual information.
Appl. Intell., 2022

2021
Effect of Laser Parameters on Optical Stealth Transmission System Performance.
Sensors, 2021

Finite-Time Stabilization of Memristive Neural Networks with Time Delays.
Neural Process. Lett., 2021

The Estimation of Image Jacobian Matrix with Time-Delay Compensation.
J. Adv. Comput. Intell. Intell. Informatics, 2021

CI-Net: Contextual Information for Joint Semantic Segmentation and Depth Estimation.
CoRR, 2021

Feasibility, planning and control of ground-wall transition for a suctorial hexapod robot.
Appl. Intell., 2021

2020
Multiobjective Optimization of a Tubular Coreless LPMSM Based on Adaptive Multiobjective Black Hole Algorithm.
IEEE Trans. Ind. Electron., 2020

Stacked autoencoder-based community detection method via an ensemble clustering framework.
Inf. Sci., 2020

Semi-supervised human resource scheduling based on deep presentation in the cloud.
EURASIP J. Wirel. Commun. Netw., 2020

2019
Synthesizing Depth Hand Images with GANs and Style Transfer for Hand Pose Estimation.
Sensors, 2019

Estimation of Object Motion State Based on Adaptive Decorrelation Kalman Filtering.
J. Adv. Comput. Intell. Intell. Informatics, 2019

Unscented Kalman Filtering for Nonlinear Systems with Colored Measurement Noises and One-Step Randomly Delayed Measurements.
J. Adv. Comput. Intell. Intell. Informatics, 2019

High-performance community detection in social networks using a deep transitive autoencoder.
Inf. Sci., 2019

Robust transfer integrated locally kernel embedding for click-through rate prediction.
Inf. Sci., 2019

2018
Multi-label Green's Function Criterion inspired Transfer Annotation System.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Stability and Synchronization Control of Fractional-Order Gene Regulatory Network System with Delay.
J. Adv. Comput. Intell. Intell. Informatics, 2017

A Robust Method for Multimodal Image Registration Based on Vector Field Consensus.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
基于简单再生码的分段编码方案 (Segmentation Coding Scheme Based on Simple Regenerating Codes).
计算机科学, 2016

Objective Image Quality Assessment Based on Saliency Map.
J. Adv. Comput. Intell. Intell. Informatics, 2016

Online Estimation of Image Jacobian Matrix with Time-Delay Compensation.
J. Adv. Comput. Intell. Intell. Informatics, 2016

Stability Analysis and Hopf Bifurcation Control for a Wireless Network Model.
J. Adv. Comput. Intell. Intell. Informatics, 2016

2015
Network coding based on hyper-edge decomposition for wireless network with link failures.
Int. J. Commun. Syst., 2015

Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing.
IEICE Trans. Commun., 2015

2013
Several Explicit Constructions for (3, L) QC-LDPC Codes with Girth at Least Eight.
IEEE Commun. Lett., 2013

Construction of Girth-Eight QC-LDPC Codes from Greatest Common Divisor.
IEEE Commun. Lett., 2013

2012
Enhanced Feedback Iterative Decoding of Sparse Quantum Codes.
IEEE Trans. Inf. Theory, 2012

Design of Quasi-Cyclic Cycle LDPC Codes over GF(<i>q</i>).
IEICE Trans. Commun., 2012

Tight lower bound of consecutive lengths for QC-LDPC codes with girth twelve
CoRR, 2012

New quasi-cyclic LDPC codes with girth at least eight based on Sidon sequences.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

2011
Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices.
IEICE Trans. Commun., 2011

Parallel Concatenated Tree Hadamard Codes.
IEEE Commun. Lett., 2011

A class of quasi-cyclic LDPC codes from B<sub>2</sub>(mod <i>m</i>) sequences.
Sci. China Inf. Sci., 2011

Conflict-Free Transmission Schedule Based on Network Coding in Wireless Networks.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
General Impossible Differential Attack on 7-Round AES.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Nonbinary LDPC codes constructed based on a cyclic MDS code and a low-complexity nonbinary message-passing decoding algorithm.
IEEE Commun. Lett., 2010

Construction of quasi-cyclic LDPC codes based on a two-dimensional MDS code.
IEEE Commun. Lett., 2010

Construction of nonbinary quasi-cyclic LDPC cycle codes based on singer perfect difference set.
IEEE Commun. Lett., 2010

the upper bounds on differntial characteristics in block cipher SMS4.
IACR Cryptol. ePrint Arch., 2010

Girth-12 Quasi-Cyclic LDPC Codes with Consecutive Lengths
CoRR, 2010

Precoding scheme maximizing SINR for MIMO broadcast channels.
Sci. China Inf. Sci., 2010

Two-dimensional generalized Reed-Solomon codes: A unified framework for quasi-cyclic LDPC codes constructed based on finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
A family of asymptotically good quantum codes based on code concatenation.
IEEE Trans. Inf. Theory, 2009

A More Secure MFE Multivariate Public Key Encryption Scheme.
Int. J. Comput. Sci. Appl., 2009

Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
On the Gray Image of Cyclic Codes over Finite Chain Rings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Generalized Combining Method for Design of Quasi-Cyclic LDPC Codes.
IEEE Commun. Lett., 2008

Quantum generalized Reed-Solomon codes: Unified framework for quantum MDS codes.
CoRR, 2008

Transmission Strategies for Parallel Relay Networks Based on Superposition Coding.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

IP Traceback Using Digital Watermark and Honeypot.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A feedback belief propagation algorithm for LDPC convolutional codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Union Bound Analysis of Concatenated Twist Hadamard Codes.
Proceedings of IEEE International Conference on Communications, 2008

Fair Exchange Signature Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A New Low Complexity Iterative Detection for Space-Time Bit-Interleaved Coded Modulation Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Semi-Irregular LDPC Codes Used in MBC.
IEICE Trans. Commun., 2007

Concatenated twist hadamard codes.
IEEE Commun. Lett., 2007

Low-complexity soft-input soft-output demodulation of orthogonal modulation.
IEEE Commun. Lett., 2007

Efficient ID-based Signature Without Trusted PKG.
IACR Cryptol. ePrint Arch., 2007

Network Coding Based Multicast in Internet.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

An Algorithm to Search Minimal Subtree Graphs.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Network Coding Scheme Based on Key Nodes.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Novel Remote User Authentication Scheme Using Bilinear Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Analysis of the Thresholds for Regular Low-Density Erasure Codes.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
An Identity-based Mediated Signature Scheme from Bilinear Pairing.
Int. J. Netw. Secur., 2006

New Traitor Tracing Scheme against Anonymous Attack.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A New ID-Based Broadcast Encryption Scheme.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Methods to Forge ElGamal Signatures and Determine Secret Key.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Fast Decoding Algorithm for Low-Density Parity-Check Codes.
IEICE Trans. Commun., 2005

High Rate Recursive Space-Time Trellis Code Designed for Serially Concatenated Space-Time Codes.
IEICE Trans. Commun., 2005

A simple convergence comparison of Gallager codes under two message-passing schedules.
IEEE Commun. Lett., 2005

Convergence rates comparison of sum-product decoding of RA codes under different message-passing schedules.
IEEE Commun. Lett., 2005

Design of recursive convolutional space-time codes with an arbitrary number of transmit antennas.
IEEE Commun. Lett., 2005

Practical convertible authenticated encryption schemes using self-certified public keys.
Appl. Math. Comput., 2005

Security of a multisignature scheme for specified group of verifiers.
Appl. Math. Comput., 2005

Cryptanalysis of Rijndael S-box and improvement.
Appl. Math. Comput., 2005

Effective design of recursive convolutional space-time codes with an arbitrary number of transmit antennas.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A new high rate serially concatenated space-time code.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing.
Proceedings of the Computational Science and Its Applications, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Cryptanalysis of a Cellular Automata Cryptosystem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Identity-Based Signature and Its Threshold Version.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
New method to determine algebraic expression of Rijndael S-box.
Proceedings of the 3rd International Conference on Information Security, 2004

The Key-bits in Turbo Codes and Their Protections.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Low-complexity concatenated two-state TCM schemes with near-capacity performance.
IEEE Trans. Inf. Theory, 2003

Activity Attack on Rijndael .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Performance of Low-Density Parity-Check Codes with16-QAM in Fading Channels.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Analysis of AES S-box with Walsh Spectrum.
Informatica (Slovenia), 2002

Non-full rank space-time trellis codes for serially concatenated system.
IEEE Commun. Lett., 2002

The General Autocorrelation and Its Application.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
On the minimal interpolation problem and decoding RS codes.
IEEE Trans. Inf. Theory, 2000

An approach to finding the attacks on the cryptographic protocols.
ACM SIGOPS Oper. Syst. Rev., 2000

A Simple and Efficient Approach to Verfying Cryptographic Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000

On the two-dimensional binary (d, k) constrained array.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1998
Some New Bounds for Q-ary Linear Block Codes.
IEEE Trans. Inf. Theory, 1998

1994
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems.
IEEE Trans. Inf. Theory, 1994

On the undetected error probability of nonlinear binary constant weight codes.
IEEE Trans. Commun., 1994

1991
A Joint Authentication and Enryption Scheme Based on Algebraic Coding Theory.
Proceedings of the Applied Algebra, 1991


  Loading...