Lin Wang

ORCID: 0000-0002-7691-4672
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • Speech and Audio Processing
  • Cloud Computing and Resource Management
  • Biometric Identification and Security
  • Underwater Vehicles and Communication Systems
  • Context-Aware Activity Recognition Systems
  • IoT and Edge/Fog Computing
  • Gait Recognition and Analysis
  • Remote Sensing and Land Use
  • Software-Defined Networks and 5G
  • Energy Efficient Wireless Sensor Networks
  • User Authentication and Security Systems
  • Bluetooth and Wireless Communication Technologies
  • Advanced Computational Techniques and Applications
  • Image Retrieval and Classification Techniques
  • Antenna Design and Optimization
  • Antenna Design and Analysis
  • IoT-based Smart Home Systems
  • Video Surveillance and Tracking Methods
  • RFID technology advancements
  • Advanced Optical Network Technologies
  • Hand Gesture Recognition Systems
  • Caching and Content Delivery
  • Vehicle License Plate Recognition
  • Wireless Sensor Networks and IoT

Yanshan University
2016-2025

Capital Normal University
2023

Hubei University
2023

Guizhou University
2007-2023

Wuhan University of Technology
2014-2022

Xidian University
2016-2022

Northeastern University
2012-2022

Hangzhou Dianzi University
2021

National University of Defense Technology
2021

University of Shanghai for Science and Technology
2019

We investigate the problem of sensor and source joint localization using time-difference arrivals (TDOAs) an ad-hoc array.A major challenge is that TDOAs contain unknown time offsets between asynchronous sensors.To address this problem, we propose a low-rank approximation method does not need any prior knowledge locations or timing information.At first, construct pseudo arrival (TOA) matrix by introducing two sets parameters (source onset times device capture times) into current TDOA...

10.1109/tsp.2015.2498130 article EN cc-by IEEE Transactions on Signal Processing 2015-11-05

10.1016/j.patrec.2007.04.002 article EN Pattern Recognition Letters 2007-04-12

Virtual machine (VM) scheduling is an important technique for the efficient operation of computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and optimize energy consumption. However, interference between collocated usually ignored, which can result much worse performance degradation applications running due contention shared resources. Based this observation, we aim at designing VM assignment strategies consider...

10.1109/tcc.2015.2449839 article EN IEEE Transactions on Cloud Computing 2015-07-22

Consumer Internet-of-Things platforms, especially in smart home, have received widespread attention. A large number of end-to-end and edge-to-end wireless communication links are subject to significant security privacy risks. Key generation using radio link side-channel information is a burgeoning technology solve this problem. This article designs symmetric key method without environmental constraints, namely, MobiKey. The basic idea taking the human mobility home or swing antenna generate...

10.1109/jiot.2020.2986399 article EN IEEE Internet of Things Journal 2020-04-08

We investigate the self-localization problem of an ad-hoc network randomly distributed and independent devices in open-space environment with low reverberation but heavy noise (e.g. smartphones recording videos outdoor event). Assuming a sufficient number sound sources, we estimate distance between pair from extreme (minimum maximum) time difference arrivals (TDOAs) sources to without knowing offset. The obtained inter-device distances are then exploited derive geometrical configuration...

10.1109/taslp.2015.2442417 article EN cc-by IEEE/ACM Transactions on Audio Speech and Language Processing 2015-06-05

Since the traditional approaches of managing remote sensing image data could no longer deal with massive challenges nowadays, we present a method to divide into blocks based on GeoSOT global discrete grid system and store HBase. Also, distributed processing using parallel programming model MapReduce, is designed blocks. In end, verifies feasibility efficiency proposed in HBase cluster.

10.1109/igarss.2015.7326842 article EN 2015-07-01

The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused great concern in the communication security next-generation IoT systems. This paper proposes a secure authentication scheme for dynamic key generation capability, which can enhance entire network without constraints on device types, protocols. devices exchange IDs random numbers registration, then generate anonymous information. During process, cloud (e.g., server) uses pseudonym information to match...

10.1109/access.2020.2996264 article EN cc-by IEEE Access 2020-01-01

High-speed railways in the Beijing–Tianjin–Hebei (BTH) Plain are gradually becoming more widespread, covering a greater area. The operational safety of high-speed is influenced by continuous development land subsidence. It necessary to predict subsidence along railways; thus, this work critical importance railway operation. In study, we processed Sentinel-1A data using Persistent Scatterer Interferometric Synthetic Aperture Radar (PS-InSAR) technique acquire typical BTH Then, combined...

10.3390/rs15184606 article EN cc-by Remote Sensing 2023-09-19

Operations of electricity power systems have recently become more intricate due to development microgrids, execution open access competition, and use network-controlled devices, etc. Computer networks therefore turn into an integral component modern power-grid operations. This paper proposes a new utility computer network security management authentication for actions / commands requests in smart-grid covers multiple domains architecture designed smart grids. presents the strategy procedure...

10.1109/pes.2008.4596900 article EN 2008-07-01

The proliferation of new online Internet services has substantially increased the energy consumption in wired networks, which become a critical issue for service providers. In this paper, we target network-wide energy-saving problem by leveraging speed scaling as strategy. We propose distributed routing scheme-HDEER-to improve network efficiency manner without significantly compromising traffic delay. HDEER is two-stage scheme where simple multipath finding algorithm firstly performed to...

10.1109/jsac.2016.2545498 article EN IEEE Journal on Selected Areas in Communications 2016-03-23

Hyperspectral images usually consist of hundreds spectral bands, which can be used to precisely characterize different land cover types. However, the high dimensionality also has some disadvantages, such as Hughes effect and a storage demand. Band selection is an effective method address these issues. most band algorithms are conducted with high-dimensional images, will bring computation complexity may deteriorate performance. In this paper, spatial feature extraction reduce improve The...

10.1007/s11554-018-0777-9 article EN cc-by Journal of Real-Time Image Processing 2018-04-27

Electromyogram pattern recognition (EMG-PR) based control is a potential method capable of providing intuitively dexterous functions in upper limb prostheses. Meanwhile, the feature extraction adopted EMG-PR considered as an important factor that influences performance By exploiting limitations existing methods, this study proposed new to effectively characterize EMG signal patterns associated with different movement intent. The 2-dimensional novel time-domain set (NTDFS) was investigated...

10.1109/embc.2018.8513015 article EN 2018-07-01

User identification, especially multiuser plays an important role in Internet of Things (IoT)-enabled smart spaces. The early wearable or vision-based solutions either cause discomfort suffer from privacy leakage, and the radio frequency (RF)-based methods are appreciated recent years. Compared with other RF technologies, millimeter wave (mmWave) has merit high spatial resolution been widely employed wireless sensing. In this article, we present a gait identification system based on...

10.1109/jiot.2023.3312668 article EN IEEE Internet of Things Journal 2023-09-07

Cangzhou is located in the northeast part of North China Plain; here, groundwater main water source for production and living. Due to serious regional land subsidence caused by long-term overexploitation groundwater, monitoring this area significant. In paper, we used Small Baseline Subsets Interferometric Point Target Analysis (SBAS-IPTA) technique process Envisat-ASAR, Radarsat-2, Sentinel-1A data obtained from 2004 2020. Additionally, winter wheat distribution information using Pixel...

10.3390/land12122114 article EN cc-by Land 2023-11-28

In this article, we dedicate a handgrip-free technique, called "AcHand," to continuously detect respiratory rates under acoustic signals sensing via smartphone. Although the particularity of AcHand is follow subtle movements heart during its displacement, acknowledge specific challenges that can make signal vulnerable scenarios such as: 1) stochastic hand activities: fluctuations in movement alter trajectory microphones and cause random changes breathing curve, resulting complex...

10.1109/jsen.2024.3372255 article EN IEEE Sensors Journal 2024-03-12

Emergency navigation with a large number of sensors can serve as safety service in emergencies. Recent studies have focused on protocols to safely guide people exits while helping them avoid hazardous areas. However, those approaches are not applicable all circumstances. Both the dynamics environment and mobility users key challenges for efficiency effectiveness protocols. The concepts navigability reachability used evaluate three typical approaches. A simulation results show that these two...

10.1016/s1007-0214(11)70086-4 article EN Tsinghua Science & Technology 2011-12-01
Coming Soon ...