Jilin Wang

According to our database1, Jilin Wang authored at least 18 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach.
Frontiers Comput. Sci., April, 2024

2023
A Graphical Approach to Document Layout Analysis.
Proceedings of the Document Analysis and Recognition - ICDAR 2023, 2023

Compressive Near/Far-Field Channel Estimation for MmWave/THz Systems with Extremely Large Antenna Arrays.
Proceedings of the IEEE Global Communications Conference, 2023

2021
Multiantenna-Assisted Wideband Spectrum Sensing Based on Sub-Nyquist Sampling.
IEEE Wirel. Commun. Lett., 2021

Grant-Free Massive Connectivity in Massive MIMO Systems: Collocated Versus Cell-Free.
IEEE Wirel. Commun. Lett., 2021

Compressive Wideband Spectrum Sensing and Carrier Frequency Estimation with Unknown Mimo Channels.
Proceedings of the IEEE International Conference on Acoustics, 2021

Large Margin Training Improves Language Models for ASR.
Proceedings of the IEEE International Conference on Acoustics, 2021

2019
An improved reversible data hiding scheme based on pixel permutation.
Int. J. Inf. Technol. Manag., 2019

Quadrature Index Modulation With Three-Dimension Constellation.
IEEE Access, 2019

2018
Privacy-Preserving Credit Scoring on Cloud.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2011
Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

2010
A Controllable Anonymous Proxy Signature Scheme with Revocation.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

2005
A Convertible Limited Verifier Signature Scheme.
Proceedings of the Advances in Web-Age Information Management, 2005

2004
An Improved Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
An Efficient Revocation Algorithm in Group Signatures.
Proceedings of the Information Security and Cryptology, 2003

2002
two attacks on xia-you Group Signature.
IACR Cryptol. ePrint Arch., 2002


  Loading...