Xinmei Wang

According to our database1, Xinmei Wang authored at least 85 papers between 1991 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Estimation of Object Motion State Based on Adaptive Decorrelation Kalman Filtering.
JACIII, 2019

Unscented Kalman Filtering for Nonlinear Systems with Colored Measurement Noises and One-Step Randomly Delayed Measurements.
JACIII, 2019

High-performance community detection in social networks using a deep transitive autoencoder.
Inf. Sci., 2019

Robust transfer integrated locally kernel embedding for click-through rate prediction.
Inf. Sci., 2019

2018
Multi-label Green's Function Criterion inspired Transfer Annotation System.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Stability and Synchronization Control of Fractional-Order Gene Regulatory Network System with Delay.
JACIII, 2017

A Robust Method for Multimodal Image Registration Based on Vector Field Consensus.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Objective Image Quality Assessment Based on Saliency Map.
JACIII, 2016

Online Estimation of Image Jacobian Matrix with Time-Delay Compensation.
JACIII, 2016

Stability Analysis and Hopf Bifurcation Control for a Wireless Network Model.
JACIII, 2016

2015
Network coding based on hyper-edge decomposition for wireless network with link failures.
Int. J. Communication Systems, 2015

Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing.
IEICE Transactions, 2015

2013
Several Explicit Constructions for (3, L) QC-LDPC Codes with Girth at Least Eight.
IEEE Communications Letters, 2013

Construction of Girth-Eight QC-LDPC Codes from Greatest Common Divisor.
IEEE Communications Letters, 2013

2012
Enhanced Feedback Iterative Decoding of Sparse Quantum Codes.
IEEE Trans. Information Theory, 2012

Design of Quasi-Cyclic Cycle LDPC Codes over GF(q).
IEICE Transactions, 2012

New quasi-cyclic LDPC codes with girth at least eight based on Sidon sequences.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

2011
Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices.
IEICE Transactions, 2011

Parallel Concatenated Tree Hadamard Codes.
IEEE Communications Letters, 2011

A class of quasi-cyclic LDPC codes from B2(mod m) sequences.
SCIENCE CHINA Information Sciences, 2011

Conflict-Free Transmission Schedule Based on Network Coding in Wireless Networks.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
General Impossible Differential Attack on 7-Round AES.
IEICE Transactions, 2010

Nonbinary LDPC codes constructed based on a cyclic MDS code and a low-complexity nonbinary message-passing decoding algorithm.
IEEE Communications Letters, 2010

Construction of quasi-cyclic LDPC codes based on a two-dimensional MDS code.
IEEE Communications Letters, 2010

Construction of nonbinary quasi-cyclic LDPC cycle codes based on singer perfect difference set.
IEEE Communications Letters, 2010

the upper bounds on differntial characteristics in block cipher SMS4.
IACR Cryptology ePrint Archive, 2010

Precoding scheme maximizing SINR for MIMO broadcast channels.
SCIENCE CHINA Information Sciences, 2010

Two-dimensional generalized Reed-Solomon codes: A unified framework for quasi-cyclic LDPC codes constructed based on finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
A family of asymptotically good quantum codes based on code concatenation.
IEEE Trans. Information Theory, 2009

A More Secure MFE Multivariate Public Key Encryption Scheme.
IJCSA, 2009

Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
On the Gray Image of Cyclic Codes over Finite Chain Rings.
IEICE Transactions, 2008

Generalized Combining Method for Design of Quasi-Cyclic LDPC Codes.
IEEE Communications Letters, 2008

Transmission Strategies for Parallel Relay Networks Based on Superposition Coding.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

IP Traceback Using Digital Watermark and Honeypot.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A feedback belief propagation algorithm for LDPC convolutional codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Union Bound Analysis of Concatenated Twist Hadamard Codes.
Proceedings of IEEE International Conference on Communications, 2008

Fair Exchange Signature Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A New Low Complexity Iterative Detection for Space-Time Bit-Interleaved Coded Modulation Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Semi-Irregular LDPC Codes Used in MBC.
IEICE Transactions, 2007

Concatenated twist hadamard codes.
IEEE Communications Letters, 2007

Low-complexity soft-input soft-output demodulation of orthogonal modulation.
IEEE Communications Letters, 2007

Efficient ID-based Signature Without Trusted PKG.
IACR Cryptology ePrint Archive, 2007

Network Coding Based Multicast in Internet.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

An Algorithm to Search Minimal Subtree Graphs.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Network Coding Scheme Based on Key Nodes.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Novel Remote User Authentication Scheme Using Bilinear Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Analysis of the Thresholds for Regular Low-Density Erasure Codes.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
An Identity-based Mediated Signature Scheme from Bilinear Pairing.
I. J. Network Security, 2006

New Traitor Tracing Scheme against Anonymous Attack.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A New ID-Based Broadcast Encryption Scheme.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Methods to Forge ElGamal Signatures and Determine Secret Key.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Fast Decoding Algorithm for Low-Density Parity-Check Codes.
IEICE Transactions, 2005

High Rate Recursive Space-Time Trellis Code Designed for Serially Concatenated Space-Time Codes.
IEICE Transactions, 2005

A simple convergence comparison of Gallager codes under two message-passing schedules.
IEEE Communications Letters, 2005

Convergence rates comparison of sum-product decoding of RA codes under different message-passing schedules.
IEEE Communications Letters, 2005

Design of recursive convolutional space-time codes with an arbitrary number of transmit antennas.
IEEE Communications Letters, 2005

Practical convertible authenticated encryption schemes using self-certified public keys.
Applied Mathematics and Computation, 2005

Security of a multisignature scheme for specified group of verifiers.
Applied Mathematics and Computation, 2005

Cryptanalysis of Rijndael S-box and improvement.
Applied Mathematics and Computation, 2005

Effective design of recursive convolutional space-time codes with an arbitrary number of transmit antennas.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A new high rate serially concatenated space-time code.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing.
Proceedings of the Computational Science and Its Applications, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Cryptanalysis of a Cellular Automata Cryptosystem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Identity-Based Signature and Its Threshold Version.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
The Key-bits in Turbo Codes and Their Protections.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Low-complexity concatenated two-state TCM schemes with near-capacity performance.
IEEE Trans. Information Theory, 2003

Activity Attack on Rijndael .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Performance of Low-Density Parity-Check Codes with16-QAM in Fading Channels.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Analysis of AES S-box with Walsh Spectrum.
Informatica (Slovenia), 2002

Non-full rank space-time trellis codes for serially concatenated system.
IEEE Communications Letters, 2002

The General Autocorrelation and Its Application.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
On the minimal interpolation problem and decoding RS codes.
IEEE Trans. Information Theory, 2000

An approach to finding the attacks on the cryptographic protocols.
Operating Systems Review, 2000

A Simple and Efficient Approach to Verfying Cryptographic Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000

On the two-dimensional binary (d, k) constrained array.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1998
Some New Bounds for Q-ary Linear Block Codes.
IEEE Trans. Information Theory, 1998

1994
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems.
IEEE Trans. Information Theory, 1994

On the undetected error probability of nonlinear binary constant weight codes.
IEEE Trans. Communications, 1994

1991
A Joint Authentication and Enryption Scheme Based on Algebraic Coding Theory.
Proceedings of the Applied Algebra, 1991


  Loading...