Lina Wang

ORCID: 0000-0002-9053-940X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Photonic Communication Systems
  • Optical Network Technologies
  • Wireless Communication Networks Research
  • Satellite Communication Systems
  • Error Correcting Code Techniques
  • Network Security and Intrusion Detection
  • Coding theory and cryptography
  • IoT and Edge/Fog Computing
  • Bluetooth and Wireless Communication Technologies
  • Cooperative Communication and Network Coding
  • Anomaly Detection Techniques and Applications
  • Photonic and Optical Devices
  • Cognitive Radio Networks and Spectrum Sensing
  • Mobile Agent-Based Network Management
  • Chaos-based Image/Signal Encryption
  • IoT Networks and Protocols
  • Network Traffic and Congestion Control
  • Advanced Bandit Algorithms Research
  • Advanced Wireless Communication Technologies
  • DNA and Biological Computing
  • Advanced Algorithms and Applications
  • Advanced Machining and Optimization Techniques
  • Educational Technology and Pedagogy
  • Advanced Data Storage Technologies
  • Indoor and Outdoor Localization Technologies

University of Science and Technology Beijing
2016-2025

Tiangong University
2024

Institute of Process Engineering
2024

North China University of Science and Technology
2019-2024

China Aerospace Science and Technology Corporation
2016-2024

Shandong University of Science and Technology
2023

Northwestern Polytechnical University
2023

Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai)
2021

Nanchang Institute of Technology
2021

Nanjing University of Information Science and Technology
2021

Highly accurate positioning is a crucial prerequisite of multi Unmanned Aerial Vehicle close-formation flight for target tracking, formation keeping, and collision avoidance. Although the position UAV can be obtained through Global Positioning System (GPS), it difficult to obtain highly data in GPS-denied environment (e.g., GPS jamming area, suburb, urban canyon, or mountain area); this may cause miss tracking collide with another UAV. In particular, control environments faces difficulties...

10.1016/j.cja.2023.07.006 article EN cc-by-nc-nd Chinese Journal of Aeronautics 2023-07-13

Non-orthogonal multiple access (NOMA) has been extensively studied to improve the performance of space-terrestrial satellite networks on account shortage frequency band resources. In this paper, terrestrial network and synergistically provide complete coverage for ground users. A user association scheme channel gain distance between users BSs is proposed identify be associated by BSs, there an upper limit number with each BS. Then calculate condition ratio select served satellite. The all...

10.1109/twc.2020.3030704 article EN IEEE Transactions on Wireless Communications 2020-10-27

The identification and filtration of malicious texts in social media environments represent a significant technical challenge aimed at protecting users from online violence disinformation. This complexity stems the diversity innovativeness texts, which include unique expressions special sentence structures. Particularly, interrogative forms pose alignment challenges with traditional corpora due to existing methods' failure exploit text's deep global semantic representations. issue is...

10.1613/jair.1.16369 article EN cc-by Journal of Artificial Intelligence Research 2025-03-05

We propose a novel feature fusion based multi-task convolutional neural network (ConvNet) for simultaneous bit-rate and modulation format identification (BR-MFI) optical performance monitoring (OPM) in heterogeneous fiber-optic networks. The proposed ConvNet fuses the intermediate layers through operation then trains losses on fused feature. In addition to traditional ConvNet's ability of extraction sharing, our is able capture both global local information phase portraits has good OPM...

10.1109/access.2019.2939043 article EN cc-by IEEE Access 2019-01-01

10.1007/s12613-011-0444-7 article EN International Journal of Minerals Metallurgy and Materials 2011-05-28

This paper attempts to build a web-based English teaching platform that improves students’ efficiency in learning. After reviewing the current theories on platforms, author combined online education technology and Licensure Master’s Program (LAMP) into mixed mode, which inherits advantages of traditional network technologies. In addition, an was designed for instruction exercises courses. The is operated jointly by students, teachers administrators. research shows system, through integration...

10.3991/ijet.v14i16.11150 article EN International Journal of Emerging Technologies in Learning (iJET) 2019-08-29

Intrusion detection is an important defence to protect the security of computer network systems. With integrated technique genetic algorithm and neural network, a method evolutionary networks proposed perform intrusion in this paper. It robust enough, parallel nonlinear dynamic processing system satisfy requirements real-time prediction with high accuracy. new method, structure optimized using algorithm. The obtained model thus used for prealarm

10.1109/icii.2001.983487 article EN 2002-11-13

The semiconductor optical amplifier (SOA) has obvious advantages in all-optical signal processing, because of the simple structure, strong non-linearity, and easy integration. A variety processing functions, such as wavelength conversion, logic gates sampling, can be completed by SOA. So SOA been widespread concerned field processing. Recently, polarization rotation effect is receiving considerable interest, many researchers have launched numerous research work utilizing this effect. In...

10.1007/s13320-016-0353-5 article EN cc-by Photonic Sensors 2016-07-22

The BeiDou navigation satellite system (BDS) developed by China can provide users with high precision, as well all-weather and real-time positioning navigation. It be widely used in many applications. However, new challenges emerge the development of 5G communication Internet Things (IoT) technologies. BDS needs to suitable for large-scaled terminal scenario provides higher precision. In this paper, a differential method based on IoT edge computing is proposed. computational pressure data...

10.3390/s20030889 article EN cc-by Sensors 2020-02-07

Modern block ciphers can be used for designing security schemes to meet the requirements in underwater acoustic sensor networks. The substitution boxes (S-boxes) must have good cryptographic properties resist various attacks. difficulty design of S-boxes is that no obvious distribution. In this paper, we investigate certain subgraph Cayley graph symmetric group get some information about distribution S-boxes. Based on obtained, an algorithm with proposed. analysis shows preferred S-box...

10.1109/access.2019.2906222 article EN cc-by-nc-nd IEEE Access 2019-01-01

ABSTRACT Reduced sedimentation of barium titanate (BaTiO 3 , BT) nanoparticles during solution casting to prepare the BT/poly(vinylidene fluoride) (PVDF) films is systematically investigated by surface modification BT nanoparticles. The hydroxylated hydrogen peroxide (H 2 O ) or aminated γ‐aminopropyl triethoxysilane (γ‐APS). It found that compatibility between fillers and polymer matrix remarkably improved such treatments. As a result, agglomeration in BT/PVDF composite are significantly...

10.1002/app.42662 article EN Journal of Applied Polymer Science 2015-07-31

In mobile real-time database systems, the objects of concurrency control should take saving system resources and supporting disconnection into consideration, besides ensuring consistency, reducing number expired transactions avoiding "priority inversion". paper, a nested transaction model for is discussed. Then divergence lock based on prudent ordered sharing check-out/check-in protocol disconnections are given. DC/POS-PAI-2PL two-phase strategy integrating these methods transactions. The...

10.1109/iccnmc.2003.1243047 article EN 2004-03-01

The limited labeled sample data in the field of advanced security threats detection seriously restricts effective development research work. Learning labels from and unlabeled has received a lot attention various universal labeling methods have been proposed. However, task malicious communication samples targeted at to face two practical challenges: difficulty extracting features advance complexity actual types. To address these problems, we proposed method for based on semi-supervised deep...

10.23919/jcc.2019.11.015 article EN China Communications 2019-11-01

Impulsive noise is commonly present in many applications of actual communication networks, leading to algorithms based on the Gaussian model no longer being applicable. A robust parameter estimator frequency-hopping (FH) signals suitable for various impulsive environments, referred as ℓp-STFT, proposed. The ℓp-STFT replaces ℓ2-norm by using generalized version ℓp-norm where 1 < p 2 derivation short-time Fourier transform (STFT) an objective function. It combines processing with any...

10.3390/electronics8091017 article EN Electronics 2019-09-11

We consider a <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> -armed bandit problem in general graphs where agents are arbitrarily connected and each of them has limited memorizing capabilities communication bandwidth. The goal is to let the eventually learn best arm. Although recent studies show power collaboration among improving efficacy learning, it assumed these that...

10.1109/tnet.2023.3273501 article EN IEEE/ACM Transactions on Networking 2023-05-16

10.1007/s00170-019-03758-3 article EN The International Journal of Advanced Manufacturing Technology 2019-05-19

Hadoop Distributed File System (HDFS) is designed to store big data reliably, and stream these at high bandwidth user applications.However, the default HDFS block placement policy assumes that all nodes in cluster are homogeneous, randomly place blocks without considering any nodes' resource characteristics, which decreases self-adaptability of system.In this paper, we take account heterogeneities, such as utilization disk space, put forward an improved strategy for solving some drawbacks...

10.2174/1874110x01509010792 article EN The Open Cybernetics & Systemics Journal 2015-07-31

With the evolution of research on defense strategies in cyber security, choice an optimal strategy has become a key problem current studies. Focusing balance between individual cost and overall network cost, we present application mean field game large-scale defenders where players seek to construct at their minimum cost. The contributions are threefold: first, propose function based Hilbert space discuss function, each player discrete-time dynamics. Then, Nash equilibrium with infinite is...

10.1177/1550147719831180 article EN cc-by International Journal of Distributed Sensor Networks 2019-02-01

Since several years, satellite communications are playing a remarkable role in telecommunications infrastructures, thus the increasing interest transporting internet traffic over links. Many technologies such as deployment of multicast and real-time audio/video streaming application likely to increase percentage context TCP internet. The Transport Control Protocol assures transport protocol that supports many common applications including e-mail service, ftp, http or telnet. It also provides...

10.1109/icnisc.2016.024 article EN 2016-04-01
Coming Soon ...