Lin Yang

ORCID: 0000-0003-4341-7132
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Privacy-Preserving Technologies in Data
  • Robotic Path Planning Algorithms
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Advanced SAR Imaging Techniques
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • Service-Oriented Architecture and Web Services
  • Satellite Communication Systems
  • Cloud Computing and Resource Management
  • Metaheuristic Optimization Algorithms Research
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Technology and Security Systems
  • Radio Frequency Integrated Circuit Design
  • Wireless Communication Networks Research
  • Advancements in PLL and VCO Technologies
  • Modular Robots and Swarm Intelligence
  • Distributed Control Multi-Agent Systems
  • Radar Systems and Signal Processing
  • Advanced Optical Sensing Technologies
  • Autonomous Vehicle Technology and Safety
  • Mobile Agent-Based Network Management

National University of Defense Technology
2011-2025

National Taiwan Normal University
2021-2022

Harbin Institute of Technology
2016

System Equipment (China)
2011-2012

China Electronics Standardization Institute
2012

Jingdezhen Ceramic Institute
2007

This paper presents a survey of identity management from the perspectives development stages and functions variety Identity Management. The definition core concepts have been discussed deeply. Management models including isolated model, centralized federated model are grouped by components varying changing. Based on transformation design principles, paradigms classified into network centric paradigm, service user paradigm. Comparisons these presented. And we give rough classification current...

10.1109/icitis.2010.5689468 article EN IEEE International Conference on Information Theory and Information Security 2010-12-01

10.1109/icassp49660.2025.10890311 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Interference detection is one of the key technologies used in satellite communication systems to cope with complex electromagnetic environments. To accommodate power consumption and resource-constrained application scenarios payloads, this paper proposes an efficient differential amplitude interference algorithm based on non-uniform adaptive segmentation, building upon classical forward consecutive mean excision (FCME) field. The proposed replaces traditional point-based iterative approach a...

10.3390/electronics14091792 article EN Electronics 2025-04-28

Abstract Radio frequency interference (RFI) is becoming more and frequently, which makes it an important issue in SAR imaging. RFI presented synthetic aperture radar either on purpose or inadvertent will distort the useful echoes, thus degrade image quality. To resolve this issue, a long time study was carried out to characteristic of through RFI-affected spaceborne airborne data. Based narrow band nature RFI, paper proposes new process contains both detection suppression. A subband spectral...

10.1016/j.cja.2015.06.018 article EN cc-by-nc-nd Chinese Journal of Aeronautics 2015-06-20

UCONABC is a basic framework of next generation access control policy Usage Control that composed Authorization-oBlige-Condition components, but so far it lacks important delegation characteristic. The paper analyses the behaviors in UCON based on OM-AM engineering principles, presents formalized usage model with features using BNF Extensions, called as UCOND, and further articulates its hybrid architecture Client & Server Delegation Reference Monitors relative key protocol functions. UCOND...

10.1109/npc.2007.103 article EN 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007) 2007-09-01

Nowadays the significance of access control technology in service oriented network is increasingly highlighted. The RBAC model has a variety advantages such as easy management and high efficiency. With expansion scale, must be divided into autonomous multi-domains for convenient management. However, there still lack studies on domain based barrier applying to multi-domain environment, corresponding supporting implementation technologies are also weak. In this paper, we proposed (D-RBAC)...

10.4304/jcp.8.5.1220-1229 article EN Journal of Computers 2013-04-19

This study develops a catering service robot system for self-serviced restaurant. The overall integrates the Dobot arm, linear motion robot, and Temi mobile robot. By ordering drinks via panel on robots, arm will prepare beverage. When meal is ready, FoodTemi automatically fetch deliver to customer.

10.1109/icce-tw52618.2021.9603096 article EN 2021-09-15

Faced with an increasingly complex electromagnetic environment of space, Synthetic Aperture Radar (SAR) is susceptible to the influence Radio Frequency Interference (RFI) signals, thus seriously affecting SAR image interpretation. This even worse for low-frequency-band systems (P-band example) which are disturbed by a lot television broadcasting signals. Based on model and characteristics RFI modified suppression method proposed. combines advantages traditional notch subspace projection in...

10.1109/igarss.2016.7730301 article EN 2016-07-01

This paper proposes a novel method based on median filter for radio frequency interference (RFI) suppression applied to synthetic aperture radar (SAR). The RFI has higher power than the useful echo signal and narrow property in range domain. A threshold called max-mean-ratio (MMR) is proposed detect existence. If exists, then processed with filter. verified linear modulation (LFM) point target simulation. In end, RadarSat-1 data demonstrate performance. (5 pages)

10.1049/cp.2013.0172 article EN 2013-01-01

Abstract Ant colony optimization (ACO) is a simple and efficient bionic intelligent algorithm, which can be applied to various problems. There are many controllable parameters in the ant optimization, so parameter setting has great impact on efficiency of algorithm. In order further improve researchers have proposed improvements. However, current improved method ACO ignored consideration its original settings. analyze effect this article uses solve small-scale TSP problems as an example for...

10.1088/1757-899x/768/7/072095 article EN IOP Conference Series Materials Science and Engineering 2020-03-01

Difficulties in building quantitative and semantic model of user identity data are bottlenecks for the further development Identity Management technology. Currently, definition has much illegibility, people have different starting points goals, formalization work definitions is exiguous. This paper tries to find a way describe quantitatively, so that semantics information can be expressed, based on analysis Basic Model proposed this paper, requirements been determined, new generalized...

10.1145/2046642.2046646 article EN 2011-10-21

Introducing the trust evaluation into access control for service requester in a distributed network environment could be helpful enhancing precision and security of authorization decisions, special to strange requesters. The existing researches divided objective means subjective means. evaluations used dynamically measure user's degree according reputation based on its past actions. But it cannot work when interaction experience with user is absence. Compared other models using probability...

10.1109/mines.2012.52 article EN 2012-11-01

This paper provides an overview of identity management architecture from the viewpoint paradigms and models. The definition has been discussed, are classified by development stage core design principle transmission which include network centric paradigm, service user paradigm; models grouped components varying functions changing to isolated model, centralized federated model. These have no collisions among them for they views different viewpoint.

10.4028/www.scientific.net/amm.40-41.647 article EN Applied Mechanics and Materials 2010-11-01

In open computing environment (e.g. Web 2.0, SOA, Cloud), resources are shared across different organizations. Application needs authenticate many users from domains. this paper, we present AI-IdM(Application Independent Identity Management), a comprehensive Management, which focus on privacy preservation. The solution presents some useful features, such as user-chosen IdP and two-level identifier etc.

10.1109/icitis.2010.5689511 article EN 2010-12-01

For spaceborne synthetic aperture radar (SAR) imaging, the dispersive ionosphere has significant effects on propagation of low frequency (especially P-band) signal. The ionospheric can be a source phase error in signal, which causes degeneration image quality SAR imaging system. background through modeling and simulation are analyzed, qualitative quantitative analysis based spatio-temporal variability is given. A novel correction algorithm (ICA) proposed to deal with With algorithm,...

10.21629/jsee.2016.05.07 article EN Journal of Systems Engineering and Electronics 2016-10-25

To coordinate the traffic lights for adjacent crossings makes profound challenges to intelligent control of traffics in modern cities. In particular, complexity model multi-crossing is difficult solve a time scale acceptable efficient control. This study proposed optimization problem by co-evolving particle swarm optimization, and learn optimal strategy an artificial neural network (ANN). With this well trained ANN, realtime over can be achieved. The systematic simulation results showed us...

10.1109/icnc.2014.6975822 article EN 2014-08-01

In this letter, a combined technique of self-injection locking and in-loop mixing (SIL-MIX) is applied to phase-locked loop (PLL) frequency synthesizer, which significantly reduces the integrated phase noise conventional PLL synthesizer. Simultaneously, model calculation formula based on SIL-MIX method proposed has high degree consistency with measured results. addition, designed programmable shifter provides novel perspective board-level system integration synthesizers. Experimental results...

10.1109/lmwt.2024.3399022 article EN IEEE Microwave and Wireless Technology Letters 2024-05-20

10.14355/gpai.2015.03.002 article EN Global perspectives on artificial intelligence 2015-01-01

Recently, privacy protection attracts more and research efforts especially for social network data. In the literature, most of existing approaches assume that data are independent to each other which is not case in real world applications. this paper, we first attempt investigate issue when correlated. We model correlation as probability a vertex might be related given vertex, i.e., how likely person could friend another person. The highly correlated will selected neighbor perturbed graph....

10.1109/ccbd.2016.048 article EN 2016-11-01

Prufer algorithm is a powerful method for topology vectorization, but the traditional prufer can only encode rootless labeled tree, and no prior work has studied of applying it to graph vectorization. This paper proposes vectorization undirected graphs based on algorithm, including encoding decoding algorithms. A particular case was discovered by preliminary experiments, which will reduce accuracy coding (when node size reaches more than 150, reach about 60%), so connectivity check mechanism...

10.1109/access.2020.3024974 article EN cc-by IEEE Access 2020-01-01

Recently, GPUs are found to be used across a broad range of domains. To support virtual memory, which is required by most applications at present, the address translation process introduced GPU side. However, many demonstrate that an irregular memory access pattern, in accesses poor structured and often data dependent, makes performance worse especially with virtual-to-physical translations. Modern management unit (MMU) employs caching, e.g. page walk buffer (PWB) cache (PWC), scheduling...

10.1109/paap54281.2021.9720477 article EN 2021-12-10
Coming Soon ...