default search action
Wen-Long Chin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Wen-Long Chin, Pin-Wei Chen, Shih-Hsiang Chou, Yu-Hua Yang, Pei-Yin Chen, Tao Jiang:
Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques. IEEE Internet Things J. 11(3): 4389-4397 (2024) - [j38]Wen-Long Chin, Sung-Ching Lai, Shin-Wei Lin, Hsiao-Hwa Chen:
Pipelined Neural Network Assisted Mobility Speed Estimation Over Doubly-Selective Fading Channels. IEEE Wirel. Commun. 31(3): 163-168 (2024) - 2023
- [j37]Shih-Hsiang Lin, Jun-Yi Lee, Chia-Chou Chuang, Narn-Yih Lee, Pei-Yin Chen, Wen-Long Chin:
Hardware Implementation of High-Throughput S-Box in AES for Information Security. IEEE Access 11: 59049-59058 (2023) - [j36]Cheng-Tsung Chang, Pin-Wei Chen, Wen-Long Chin, Shih-Hsiang Chou, Yu-Hua Yang:
Hardware-efficient algorithm and architecture design with memory and complexity reduction for semi-global matching. Integr. 92: 99-105 (2023) - [j35]Wen-Long Chin, Hsin-An Ko, Ning-Wen Chen, Pin-Wei Chen, Tao Jiang:
Securing NFV/SDN IoT Using VNFs Over a Compute-Intensive Hardware Resource in NFVI. IEEE Netw. 37(6): 248-254 (2023) - [j34]Wen-Long Chin, Jia-Han Lin, Wen-Chao Wu, Hsiao-Hwa Chen:
Doppler Frequency Estimation Based on Time Diversity of Random Processes in Doubly-Selective Channels. IEEE Trans. Veh. Technol. 72(2): 2707-2711 (2023) - 2022
- [j33]You-Tun Teng, Wen-Long Chin, Deng-Kai Chang, Pei-Yin Chen, Pin-Wei Chen:
VLSI Architecture of S-Box With High Area Efficiency Based on Composite Field Arithmetic. IEEE Access 10: 2721-2728 (2022) - 2021
- [j32]David Shiung, Ya-Yin Yang, Wen-Long Chin:
Using Communication Channel Equalization to Remove Atmospheric Turbulence in Star Signal Detection. IEEE Access 9: 152903-152912 (2021) - [j31]Wen-Long Chin, Qinyu Zhang, Tao Jiang:
Low-complexity neuron for fixed-point artificial neural networks with ReLU activation function in energy-constrained wireless applications. IET Commun. 15(7): 917-923 (2021) - 2020
- [j30]Wen-Long Chin, David Shiung, Yi Qian, Woongsup Lee, Andres Kwasinski, Yansha Deng:
IEEE Access Special Section Editorial: Green Signal Processing for Wireless Communicationsand Networking. IEEE Access 8: 105169-105172 (2020) - [j29]Wen-Long Chin, Cheng-Che Hsieh, David Shiung, Tao Jiang:
Intelligent Indoor Positioning Based on Artificial Neural Networks. IEEE Netw. 34(6): 164-170 (2020)
2010 – 2019
- 2019
- [j28]Wen-Long Chin, Cheng-Chieh Chang, Cheng-Lung Tseng, Ying-Zhe Huang, Tao Jiang:
Bayesian Real-Time QRS Complex Detector for Healthcare System. IEEE Internet Things J. 6(3): 5540-5549 (2019) - [j27]Wen-Long Chin:
On the Noise Uncertainty for the Energy Detection of OFDM Signals. IEEE Trans. Veh. Technol. 68(8): 7593-7602 (2019) - [j26]Wen-Long Chin, Ming-Ru Lu:
Spectrum Sensing for Cognitive OFDM Over Line-of-Sight Doubly Selective Fading Channels. IEEE Trans. Veh. Technol. 68(8): 8191-8195 (2019) - [c13]David Shiung, Wen-Long Chin:
Designing High-Performance Green Filters Using Downsampling Techniques. ISPACS 2019: 1-2 - 2018
- [j25]Wen-Long Chin:
Nondata-Aided Doppler Frequency Estimation for OFDM Systems Over Doubly Selective Fading Channels. IEEE Trans. Commun. 66(9): 4211-4221 (2018) - [j24]Jia-Yang Lin, Yi-Ting Hsieh, Trong Nghia Le, Wen-Long Chin:
AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems. J. Supercomput. 74(9): 4470-4480 (2018) - [j23]Wen-Long Chin, Chun-Hung Lee, Tao Jiang:
Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications. IEEE Trans. Smart Grid 9(6): 6298-6306 (2018) - [c12]Wen-Long Chin:
Practical Energy Detection for Internet of Things Devices. ICIOT 2018: 164-167 - 2017
- [j22]Wen-Long Chin:
Spectrum Sensor Employing Continuous Pilot Tones in Cognitive Radio Systems. IEEE Access 5: 8444-8450 (2017) - [j21]Wen-Long Chin, Wan Li, Hsiao-Hwa Chen:
Energy Big Data Security Threats in IoT-Based Smart Grid Communications. IEEE Commun. Mag. 55(10): 70-75 (2017) - [j20]Trong Nghia Le, Wen-Long Chin, Hsiao-Hwa Chen:
Standardization and Security for Smart Grid Communications Based on Cognitive Radio Technologies - A Comprehensive Survey. IEEE Commun. Surv. Tutorials 19(1): 423-445 (2017) - [j19]Yao-Ren Lee, Wen-Long William Chin:
Low-complexity time synchronization for energy-constrained wireless sensor networks: Dual-Clock delayed-message approach. Peer-to-Peer Netw. Appl. 10(4): 887-896 (2017) - 2016
- [j18]Wen-Long Chin, Ya-Hsuan Lin, Hsiao-Hwa Chen:
A Framework of Machine-to-Machine Authentication in Smart Grid: A Two-Layer Approach. IEEE Commun. Mag. 54(12): 102-107 (2016) - [j17]Wen-Long Chin, Jiaming Li, Hsiao-Hwa Chen:
Low-Complexity Energy Detection for Spectrum Sensing With Random Arrivals of Primary Users. IEEE Trans. Veh. Technol. 65(2): 947-952 (2016) - [c11]Trong Nghia Le, Wen-Long Chin, Ya-Hsuan Lin:
Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks. ICNC 2016: 1-5 - 2015
- [j16]Trong Nghia Le, Wen-Long Chin, Wei-Che Kao:
Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio Networks. IEEE Commun. Lett. 19(5): 799-802 (2015) - [j15]Wen-Long William Chin, Trong Nghia Le, Chun-Lin Tseng:
Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels. Inf. Sci. 321: 238-249 (2015) - [j14]Zong-Han Yu, Wen-Long Chin:
Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid. IEEE Trans. Smart Grid 6(3): 1219-1226 (2015) - [c10]Wen-Long Chin, Yin-Je Hwang, Ya-Xuan Lin:
Signal detection for spectrum sensing with uncertain arrivals of traffics. FSKD 2015: 2185-2189 - 2014
- [j13]Wen-Long Chin, Trong Nghia Le, Chun-Lin Tseng, Wei-Che Kao, Chun-Shen Tsai, Chun-Wei Kao:
Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks. Int. J. Ad Hoc Ubiquitous Comput. 15(4): 263-274 (2014) - [j12]Wen-Long Chin, Chun-Wei Kao, Hsiao-Hwa Chen, Teh-Lu Liao:
Iterative Synchronization-Assisted Detection of OFDM Signals in Cognitive Radio Systems. IEEE Trans. Veh. Technol. 63(4): 1633-1644 (2014) - [j11]Wen-Long Chin:
Channel-power profile estimation for orthogonal frequency-division multiplexing systems. Wirel. Commun. Mob. Comput. 14(2): 200-209 (2014) - [c9]Wen-Long Chin, Chun-Wei Kao, Trong Nghia Le:
Advanced Spectrum Sensing for OFDM-Based Cognitive Radio Networks Using Cyclic Prefix. VTC Fall 2014: 1-5 - 2012
- [j10]Wen-Long Chin:
Time-Domain Processing of Frequency-Domain Data and Its Application. IEICE Trans. Commun. 95-B(4): 1406-1409 (2012) - [j9]Wen-Long Chin:
Blind Symbol Synchronization for OFDM Systems Using Cyclic Prefix in Time-Variant and Long-Echo Fading Channels. IEEE Trans. Veh. Technol. 61(1): 185-195 (2012) - [c8]Wen-Long Chin, Chun-Lin Tseng, Chun-Shen Tsai, Wei-Che Kao, Chun-Wei Kao:
Channel-Based Detection of Primary User Emulation Attacks in Cognitive Radios. VTC Spring 2012: 1-5 - 2011
- [j8]Wen-Long Chin:
Channel length assisted symbol synchronization for OFDM systems in multipath fading channels. EURASIP J. Wirel. Commun. Netw. 2011: 68 (2011) - [j7]Wen-Long Chin:
Blind Minimum Interference Symbol Synchronization for OFDM Systems in Long ISI Channels. IEICE Trans. Commun. 94-B(4): 1066-1069 (2011) - [j6]Wen-Long Chin:
ML Estimation of Timing and Frequency Offsets Using Distinctive Correlation Characteristics of OFDM Signals Over Dispersive Fading Channels. IEEE Trans. Veh. Technol. 60(2): 444-456 (2011)
2000 – 2009
- 2009
- [j5]Wen-Long Chin, Sau-Gee Chen:
IEEE 1588 clock synchronization using dual slave clocks in a slave. IEEE Commun. Lett. 13(6): 456-458 (2009) - [j4]Wen-Long Chin, Sau-Gee Chen:
A Low-Complexity Minimum-Interference Symbol Time Estimation for OFDM Systems. IEICE Trans. Commun. 92-B(5): 1828-1833 (2009) - [j3]Wen-Long Chin, Sau-Gee Chen:
A Blind Synchronizer for OFDM Systems Based on SINR Maximization in Multipath Fading Channels. IEEE Trans. Veh. Technol. 58(2): 625-635 (2009) - [c7]Wen-Long Chin, Jiun-Lin Tzen:
Clock synchronization for energy-constrained wireless sensor networks. PIMRC 2009: 1371-1375 - [c6]Wen-Long Chin, Sau-Gee Chen:
Symbol Time Synchronization Based on SINR Maximization for OFDM. VTC Spring 2009 - [c5]Wen-Long Chin, Sau-Gee Chen:
On the Analysis of Combined Synchronization Error Effects in OFDM Systems. VTC Spring 2009 - 2008
- [j2]Wen-Long Chin, Sau-Gee Chen:
Joint Effects of Synchronization Errors of OFDM Systems in Doubly-Selective Fading Channels. EURASIP J. Adv. Signal Process. 2008 (2008) - [j1]Wen-Long Chin, Sau-Gee Chen:
Blind SNR Estimation with Coherent Function for OFDM Systems. IEICE Trans. Commun. 91-B(11): 3753-3756 (2008) - [c4]Wen-Long Chin, Sau-Gee Chen:
A Blind Maximum-SINR Synchronization Technique for OFDM Systems. GLOBECOM 2008: 4427-4431 - [c3]Wen-Long Chin, Sau-Gee Chen:
A low-complexity symbol time estimation for OFDM systems. ICASSP 2008: 3053-3056 - [c2]Wen-Long Chin, Sau-Gee Chen:
Theoretical Analysis of Joint Synchronization Error Effects for OFDMA Systems. VTC Spring 2008: 1930-1934 - 2007
- [c1]Wen-Long Chin, Sau-Gee Chen, Chih-Liang Chen:
A Joint Synchronization Algorithm for OFDM Systems. PIMRC 2007: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint