Tian Lin

According to our database1, Tian Lin authored at least 28 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Hybrid Beamforming Optimization for DOA Estimation Based on the CRB Analysis.
IEEE Signal Process. Lett., 2021

Channel Estimation for IRS-Assisted Millimeter-Wave MIMO Systems: Sparsity-Inspired Approaches.
CoRR, 2021

Blindspots in Python and Java APIs Result in Vulnerable Code.
CoRR, 2021

Joint Active and Passive Beamforming for Intelligent Reflecting Surface Aided Multiuser MIMO Communications.
CoRR, 2021

Channel Estimation and Hybrid Precoding for Millimeter Wave Communications: A Deep Learning-Based Approach.
IEEE Access, 2021

Channel Estimation for Intelligent Reflecting Surface-Aided Communication Systems with One-bit ADCs.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

2020
Beamforming Design for Large-Scale Antenna Arrays Using Deep Learning.
IEEE Wirel. Commun. Lett., 2020

Partially-Connected Hybrid Beamforming for Spectral Efficiency Maximization via a Weighted MMSE Equivalence.
CoRR, 2020

Automatic Modulation Classification in Time-Varying Channels Based on Deep Learning.
IEEE Access, 2020

Channel Estimation for Intelligent Reflecting Surface-Assisted Millimeter Wave MIMO Systems.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content.
ACM Trans. Comput. Hum. Interact., 2019

Hybrid Beamforming for Millimeter Wave Systems Using the MMSE Criterion.
IEEE Trans. Commun., 2019

Doubly Sparse: Sparse Mixture of Sparse Experts for Efficient Softmax Inference.
CoRR, 2019

Neural Logic Machines.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Hybrid MMSE Beamforming for Multiuser Millimeter-Wave Communication Systems.
IEEE Commun. Lett., 2018

API Blindspots: Why Experienced Developers Write Vulnerable Code.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Tell them apart: distilling technology differences from crowd-scale comparison discussions.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Hybrid Beamforming for Single Carrier MMWAVE MIMO Systems.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

2017
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Robust Influence Maximization.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

2015
Combining Traditional Marketing and Viral Marketing with Amphibious Influence Maximization.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

Stochastic Online Greedy Learning with Semi-bandit Feedbacks.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Real-Time Topic-Aware Influence Maximization Using Preprocessing.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Efficient Topic-aware Influence Maximization Using Preprocessing.
CoRR, 2014

Combinatorial Pure Exploration of Multi-Armed Bandits.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Combinatorial Partial Monitoring Game with Linear Feedback and Its Applications.
Proceedings of the 31th International Conference on Machine Learning, 2014

2011
Data flow modeling, data mining and QSAR in high-throughput discovery of functional nanomaterials.
Comput. Chem. Eng., 2011

2009
The Bidirectional Inference Calculation Model of Multimedia Image Semantics Perception.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...