Haibin Zhang

Orcid: 0000-0001-5865-3408

According to our database1, Haibin Zhang authored at least 206 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Alternating minimization differential privacy protection algorithm for the novel dual-mode learning tasks model.
Expert Syst. Appl., 2025

2024
Fluid Antenna System Liberating Multiuser MIMO for ISAC via Deep Reinforcement Learning.
IEEE Trans. Wirel. Commun., September, 2024

Learning-Induced Channel Extrapolation for Fluid Antenna Systems Using Asymmetric Graph Masked Autoencoder.
IEEE Wirel. Commun. Lett., June, 2024

Virtual FAS by Learning-Based Imaginary Antennas.
IEEE Wirel. Commun. Lett., June, 2024

Convergence analysis of generalized ADMM with majorization for linearly constrained composite convex optimization.
Optim. Lett., June, 2024

Simultaneous Authentication of Multiple Users Using a Single mmWave Radar.
IEEE Internet Things J., May, 2024

Adaptive Digital Twin Placement and Transfer in Wireless Computing Power Network.
IEEE Internet Things J., March, 2024

Network shortcut in data plane of service mesh with eBPF.
J. Netw. Comput. Appl., February, 2024

BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication.
IEEE Trans. Inf. Forensics Secur., 2024

Neural implicit surface reconstruction of freehand 3D ultrasound volume with geometric constraints.
Medical Image Anal., 2024

Partial label learning via identifying outlier features.
Knowl. Based Syst., 2024

Pando: Extremely Scalable BFT Based on Committee Sampling.
IACR Cryptol. ePrint Arch., 2024

Deep spatiotemporal fusion network for vision-based robotic inspection of structures.
Eng. Appl. Artif. Intell., 2024

MStableChain: Towards Multi-Native Stablecoins in EVM-Compatible Blockchain for Stable Fee and Mass Adoption.
CoRR, 2024

Comprehensive Analysis of Access Control Models in Edge Computing: Challenges, Solutions, and Future Directions.
CoRR, 2024

Training-free image style alignment for self-adapting domain shift on handheld ultrasound devices.
CoRR, 2024

Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Model-Driven Channel Extrapolation for Massive Fluid Antenna.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Channel State Information Extrapolation in Fluid Antenna Systems Based on Masked Language Model.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Dashing and Star: Byzantine Fault Tolerance with Weak Certificates.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Enhancing Permissioned Blockchains with Controlled Data Authorization.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
A bi-criteria algorithm for online non-monotone maximization problems: DR-submodular+concave.
Theor. Comput. Sci., November, 2023

Energy-Efficient Distributed Learning and Sharding Blockchain for Sustainable Metaverse.
IEEE Wirel. Commun., October, 2023

An Accelerated Regularized Chebyshev-Halley Method for Unconstrained Optimization.
Asia Pac. J. Oper. Res., August, 2023

Distributed and Secure Federated Learning for Wireless Computing Power Networks.
IEEE Trans. Veh. Technol., July, 2023

Efficient dual ADMMs for sparse compressive sensing MRI reconstruction.
Math. Methods Oper. Res., April, 2023

An efficient semismooth Newton method for adaptive sparse signal recovery problems.
Optim. Methods Softw., March, 2023

Lightweight Digital Twin and Federated Learning With Distributed Incentive in Air-Ground 6G Networks.
IEEE Trans. Netw. Sci. Eng., 2023

PD Characteristics and Parameter Extraction for EPR Cable Terminal in EMUs With Spike Defect at Low Temperature.
IEEE Trans. Instrum. Meas., 2023

FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023

Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE.
IACR Cryptol. ePrint Arch., 2023

Practical Signature-Free Asynchronous Common Subset in Constant Time.
IACR Cryptol. ePrint Arch., 2023

Automatic Diagnosis of Carotid Atherosclerosis Using a Portable Freehand 3D Ultrasound Imaging System.
CoRR, 2023

An inertial Douglas-Rachford splitting algorithm for nonconvex and nonsmooth problems.
Concurr. Comput. Pract. Exp., 2023

A surrogate assisted evolutionary multitasking optimization algorithm.
Appl. Soft Comput., 2023

WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Proceedings of the 32nd USENIX Security Symposium, 2023

Energy-Efficient Digital Twin Placement in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2023

SigMixer: Lightweight Automatic Modulation Classification via Multi -Layer Perceptrons Neural Network.
Proceedings of the IEEE Global Communications Conference, 2023

Design and Implementation of the Front End for the Transformer State Intelligent Sensing System Based on Ant Design Vue.
Proceedings of the 6th International Conference on Electronics and Electrical Engineering Technology, 2023

FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
BFT in Blockchains: From Protocols to Use Cases.
ACM Comput. Surv., January, 2022

Achieving Covertness and Security in Broadcast Channels With Finite Blocklength.
IEEE Trans. Wirel. Commun., 2022

Dynamic Digital Twin and Federated Learning With Incentives for Air-Ground Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System.
IEEE Trans. Inf. Forensics Secur., 2022

A Study of the Higgs Mass with the Effective Potential and Higgs Decays in the U(1)XSSM.
Symmetry, 2022

ISVSF: Intelligent Vulnerability Detection Against Java via Sentence-Level Pattern Exploring.
IEEE Syst. J., 2022

How to achieve adaptive security for asynchronous BFT?
J. Parallel Distributed Comput., 2022

Dynamic Access Control and Trust Management for Blockchain-Empowered IoT.
IEEE Internet Things J., 2022

Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency.
IACR Cryptol. ePrint Arch., 2022

Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022

BG: A Modular Treatment of BFT Consensus.
IACR Cryptol. ePrint Arch., 2022

Marlin: Two-Phase BFT with Linearity.
IACR Cryptol. ePrint Arch., 2022

WaterBear: Information-Theoretic Asynchronous BFT Made Practical.
IACR Cryptol. ePrint Arch., 2022

Byzantine Fault Tolerance from Weak Certificates.
IACR Cryptol. ePrint Arch., 2022

Foundations of Dynamic BFT.
IACR Cryptol. ePrint Arch., 2022

Byzantine Reliable Broadcast with O(nL+kn+n<sup>2</sup> log n) Communication.
IACR Cryptol. ePrint Arch., 2022

PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement.
IACR Cryptol. ePrint Arch., 2022

Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions.
IACR Cryptol. ePrint Arch., 2022

Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation.
IACR Cryptol. ePrint Arch., 2022

Asynchronous Verifiable Information Dispersal with Near-Optimal Communication.
IACR Cryptol. ePrint Arch., 2022

CE-Fed: Communication efficient multi-party computation enabled federated learning.
Array, 2022

Energy-Efficient Federated Learning for Wireless Computing Power Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Privacy-Preserving Digital Twin for Vehicular Edge Computing Networks.
Proceedings of the IEEE Smartworld, 2022

DT-FLDS: DT-enabled Federated Learning Data Sharing Model<sup>*</sup>.
Proceedings of the IEEE Smartworld, 2022

Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

ADMM-Induced Low-Complexity Precoder Design Algorithm for Rate-Splitting Multiple Access.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

An Interoperable Framework for Heterogeneous IoT infrastructure to Unlock Data Value.
Proceedings of the Internet of Things, 2022

Online Non-monotone DR-Submodular Maximization: 1/4 Approximation Ratio and Sublinear Regret.
Proceedings of the Computing and Combinatorics - 28th International Conference, 2022

Byzantine Fault Tolerance in the Age of Blockchains and Cloud Computing.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

Pre-hospital Triage Improvement for Ambulances via 5G Video and Vital Data Communication.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
Mobility Management for Blockchain-Based Ultra-Dense Edge Computing: A Deep Reinforcement Learning Approach.
IEEE Trans. Wirel. Commun., 2021

Blockchain-Based Trust Management for Internet of Vehicles.
IEEE Trans. Emerg. Top. Comput., 2021

High-Threshold AVSS with Optimal Communication Complexity.
IACR Cryptol. ePrint Arch., 2021

Succinct Erasure Coding Proof Systems.
IACR Cryptol. ePrint Arch., 2021

MiB: Asynchronous BFT with More Replicas.
CoRR, 2021

Global error bounds for the extended vertical LCP of B-type matrices.
Comput. Appl. Math., 2021

A Novel Adaptive Differential Privacy Algorithm for Empirical Risk Minimization.
Asia Pac. J. Oper. Res., 2021

An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Machine Learning-based Slice Management in 5G Networks for Emergency Scenarios.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2020
Gait Learning Based Authentication for Intelligent Things.
IEEE Trans. Veh. Technol., 2020

Reducing Offloading Latency for Digital Twin Edge Networks in 6G.
IEEE Trans. Veh. Technol., 2020

A Modified Nonlinear Conjugate Gradient Algorithm for Large-Scale Nonsmooth Convex Optimization.
J. Optim. Theory Appl., 2020

A hybrid Bregman alternating direction method of multipliers for the linearly constrained difference-of-convex problems.
J. Glob. Optim., 2020

Sparse multiple instance learning with non-convex penalty.
Neurocomputing, 2020

Blockchains for Government: Use Cases and Challenges.
Digit. Gov. Res. Pract., 2020

The Analysis of Alternating Minimization Method for Double Sparsity Constrained Optimization Problem.
Asia Pac. J. Oper. Res., 2020

Elderly Health Promotion using Multiple Ball-robots based on Evolutionary Robot.
Proceedings of the 15th IEEE International Conference of System of Systems Engineering, 2020

Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Physical Layer Security for Edge Caching in 6G Networks.
Proceedings of the IEEE Global Communications Conference, 2020

EPIC: Efficient Asynchronous BFT with Adaptive Security.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
The Prediction and Error Correction of Physiological Sign During Exercise Using Bayesian Combined Predictor and Naive Bayesian Classifier.
IEEE Syst. J., 2019

Research on Subdivision System of Sin-Cos Encoder Based on Zero Phase Bandpass Filter.
Sensors, 2019

LTE Delay Assessment for Real-Time Management of Future Smart Grids.
Mob. Networks Appl., 2019

Energy-Aware Computation Offloading and Transmit Power Allocation in Ultradense IoT Networks.
IEEE Internet Things J., 2019

An iterative scheme for testing the positive definiteness of multivariate homogeneous forms.
Int. J. Comput. Math., 2019

On the Origins and Variations of Blockchain Technologies.
IEEE Secur. Priv., 2019

Clear5G: 5G Empowers the Factories of the Future.
ERCIM News, 2019

Optimisation of NB-IoT deployment for smart energy distribution networks.
EURASIP J. Wirel. Commun. Netw., 2019

Mobility Management for Ultra-Dense Edge Computing: A Reinforcement Learning Approach.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Outlier Detection of Internet of Vehicles.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Method on Human Activity Recognition Based on Convolutional Neural Network.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

2018
Double Auction-Based Resource Allocation for Mobile Edge Computing in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Threshold Tuning-Based Wearable Sensor Fault Detection for Reliable Medical Monitoring Using Bayesian Network Model.
IEEE Syst. J., 2018

Validation of Finite Element Model by Smart Aggregate-Based Stress Monitoring.
Sensors, 2018

Proximal gradient method with automatic selection of the parameter by automatic differentiation.
Optim. Methods Softw., 2018

Optimality analysis on partial l<sub>1</sub> -minimization recovery.
J. Glob. Optim., 2018

Fault Detection and Repairing for Intelligent Connected Vehicles Based on Dynamic Bayesian Network Model.
IEEE Internet Things J., 2018

Connecting Intelligent Things in Smart Hospitals Using NB-IoT.
IEEE Internet Things J., 2018

PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion.
IACR Cryptol. ePrint Arch., 2018

On the Universally Composable Security of OpenStack.
IACR Cryptol. ePrint Arch., 2018

A Bayesian network model for data losses and faults in medical body sensor networks.
Comput. Networks, 2018

Improving EDCA for Efficient Channel Access in Vehicular Communications.
IEEE Commun. Mag., 2018

Content Attention Model for Aspect Based Sentiment Analysis.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

STAMP: Short-Term Attention/Memory Priority Model for Session-based Recommendation.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

The Prediction of Heart Rate During Running Using Bayesian Combined Predictor.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

DQ-EDCA: Dynamic Queue Management Based EDCA Mechanism for Vehicle Communication.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

An Experimental Study Towards the In-Vehicle Network of Intelligent and Connected Vehicles.
Proceedings of the IEEE Global Communications Conference, 2018

Energy-Efficient Task Offloading and Transmit Power Allocation for Ultra-Dense Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2018

Assessment of the Suitability of NB-IoT Technology for ORM in Smart Grids.
Proceedings of the 2018 European Conference on Networks and Communications, 2018

BEAT: Asynchronous BFT Made Practical.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions.
IEEE Wirel. Commun., 2017

Secure Real-Time Monitoring and Management of Smart Distribution Grid Using Shared Cellular Networks.
IEEE Wirel. Commun., 2017

Doppler Correction Using Short-Time MUSIC and Angle Interpolation Resampling for Wayside Acoustic Defective Bearing Diagnosis.
IEEE Trans. Instrum. Meas., 2017

Fault diagnosis of body sensor networks using hidden Markov model.
Peer-to-Peer Netw. Appl., 2017

A nonmonotone inexact Newton method for unconstrained optimization.
Optim. Lett., 2017

Data leakage between C/S communication: A case study on Android music app.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Weakly Supervised Text Attention Network for Generating Text Proposals in Scene Images.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Collaborative Computation Offloading for Mobile-Edge Computing over Fiber-Wireless Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Real Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2017

Secure Causal Atomic Broadcast, Revisited.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Distance Based Method for Outlier Detection of Body Sensor Networks.
EAI Endorsed Trans. Wirel. Spectr., 2016

Practical State Machine Replication with Confidentiality.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Norton Zone: Symantec's Secure Cloud Storage System.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

LTE Delay Assessment for Real-Time Management of Future Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

Multi-hop multi-AP multi-channel cooperation for high efficiency WLAN.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Byzantine reliable broadcast in sparse networks.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

A Data Reconstruction Model Addressing Loss and Faults in Medical Body Sensor Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
ReputationPro: The Efficient Approaches to Contextual Transaction Trust Computation in E-Commerce Environments.
ACM Trans. Web, 2015

Stochastic Resonance in an Underdamped System with Pinning Potential for Weak Signal Detection.
Sensors, 2015

Online Doppler Effect Elimination Based on Unequal Time Interval Sampling for Wayside Acoustic Bearing Fault Detecting System.
Sensors, 2015

A Data-Collection and Fault Diagnosis System of Train Bearing Based on the C# and Multi-Wireless-Terminal.
J. Softw., 2015

K-State automaton burst detection model based on KOS: Emerging trends in cancer field.
J. Inf. Sci., 2015

On the proximal Landweber Newton method for a class of nonsmooth convex problems.
Comput. Optim. Appl., 2015

A Linearized Alternating Direction Method of Multipliers with Substitution Procedure.
Asia Pac. J. Oper. Res., 2015

Bit Security of the CDH Problems over Finite Fields.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Fault Detection for Medical Body Sensor Networks Under Bayesian Network Model.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Space Reduction for Contextual Transaction Trust Computation in E-Commerce and E-Service Environments.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
The approaches to contextual transaction trust computation in e-Commerce environments.
Secur. Commun. Networks, 2014

On proximal gradient method for the convex problems regularized with the group reproducing kernel norm.
J. Glob. Optim., 2014

A proximal classifier with positive and negative local regions.
Neurocomputing, 2014

Bits Security of the CDH Problems over Finite Fields.
IACR Cryptol. ePrint Arch., 2014

Assessment of the energy efficiency enhancement of future mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

ByzID: Byzantine Fault Tolerance from Intrusion Detection.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Fault Diagnosing ECG in Body Sensor Networks Based on Hidden Markov Model.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Social Context-Aware Trust Prediction in Social Networks.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

P2S: a fault-tolerant publish/subscribe infrastructure.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2013
A SA-Based Wireless Seismic Stress Monitoring System for Concrete Structures.
Int. J. Distributed Sens. Networks, 2013

Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.
IACR Cryptol. ePrint Arch., 2013

Energy saving: Scaling network energy efficiency faster than traffic growth.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

System-Level Assessment of Non-Orthogonal Spectrum Sharing via Transmit Beamforming.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Unique Ring Signatures: A Practical Construction.
Proceedings of the Financial Cryptography and Data Security, 2013

A Novel Model for Contextual Transaction Trust Computation with Fixed Storage Space in E-Commerce and E-Service Environments.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
An interior point trust region method for nonnegative matrix factorization.
Neurocomputing, 2012

A Framework for Unique Ring Signatures.
IACR Cryptol. ePrint Arch., 2012

Unique Group Signatures.
IACR Cryptol. ePrint Arch., 2012

Efficient Contextual Transaction Trust Computation in E-commerce Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

Resource allocation and management in multi-operator cellular networks with shared physical resources.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

The Security of Ciphertext Stealing.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Length-Doubling Ciphers and Tweakable Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Model Checking Multirate Hybrid Systems with Restricted Convex Polyhedron.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Towards ground truthing observations in gray-box anomaly detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Transaction Similarity-Based Contextual Trust Evaluation in E-Commerce and E-Service Environments.
Proceedings of the IEEE International Conference on Web Services, 2011

Analytical assessment of the performance impact of spectrum sharing in cellular networks considering different time scales.
Proceedings of the 19th European Signal Processing Conference, 2011

Online Ciphers from Tweakable Blockciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Combining sFlow and Tracker traffic analysis: A novel estimation approach for network-wide BitTorrent distribution.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
On the Halley class of methods for unconstrainedoptimization problems.
Optim. Methods Softw., 2010

A new method to control chaos in an economic system.
Appl. Math. Comput., 2010

Model Checking Rectangular Hybrid Systems with Timed Computation Tree Logic.
Proceedings of the 4th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2010

MIMO-OFDM performance in relation to wideband channel properties.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

2009
Symbolic Algorithmic Analysis of Rectangular Hybrid Systems.
J. Comput. Sci. Technol., 2009

Adjoint code generator.
Sci. China Ser. F Inf. Sci., 2009

A Security Enhancement Scheme for Image Perceptual Hashing.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Original Halley Method and its Improvement with Automatic Differentiation.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Layered Approx-Regular LDPC: Code Construction and Encoder/Decoder Design.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

Capacity Based Fast Receive Antenna Subset Selection in MIMO System.
IEICE Trans. Commun., 2008

General Framework of Chain Store Information System base on Supply Chain Management Theory.
Comput. Inf. Sci., 2008

Symbolic Algorithm Analysis of Rectangular Hybrid Systems.
Proceedings of the Theory and Applications of Models of Computation, 2008

A Multi-Channel Combination Method of Image Perceptual Hashing.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Computing the High Order Derivatives with Automatic Differentiation and Its Application in Chebyshev's Method.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
On MM-Type Channel Estimation for MIMO OFDM Systems.
IEEE Trans. Wirel. Commun., 2007

An improved inexact Newton method.
J. Glob. Optim., 2007

Performance Analysis of IEEE 802.11e EDCA.
IEICE Trans. Commun., 2007

Frequency Offset Estimator for OFDM Using a Special Preamble.
IEICE Trans. Commun., 2007

Newly-Built Iterative Receiver and Hardware Implementation for V-BLAST.
IEICE Trans. Commun., 2007

Stimulating cooperation in route discovery of ad hoc networks.
Proceedings of the Q2SWinet'07, 2007

An Efficient Version on a New Improved Method of Tangent Hyperbolas.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

2006
Performance of group ordered successive interference cancellation for multiuser detection in GSTBC SFH/MC DS-CDMA system.
Wirel. Commun. Mob. Comput., 2006

Performance evaluation of LDPC codes in bliss scheme-based storage systems using density evolution.
IEEE Trans. Consumer Electron., 2006

Iterative ICI Mitigation Method for MIMO OFDM Systems.
IEICE Trans. Commun., 2006

2005
A SCTP based OAM system of 3G cellular network.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

2004
Theoretical efficiency of a new inexact method of tangent hyperbolas.
Optim. Methods Softw., 2004


  Loading...