default search action
Yong Qi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j97]Chang Lu, Yong Qi, Shibo Hao, Bo Yu:
How and when domestic and international collaboration networks influence innovation performance of SMEs: evidence from China. Bus. Process. Manag. J. 30(2): 435-462 (2024) - [j96]Xing Li, Guiyang Zhang, Fangyuan Zheng, Yong Qi, Chang Lu:
Can high-speed railway promote enterprise ambidextrous innovation: a quasi-natural experiment in China. Bus. Process. Manag. J. 30(5): 1667-1695 (2024) - [j95]Huafeng Wang, Tianyu Hu, Yanan Zhang, Haodu Zhang, Yong Qi, Longzhen Wang, Jianhua Ma, Minghua Du:
Unveiling camouflaged and partially occluded colorectal polyps: Introducing CPSNet for accurate colon polyp segmentation. Comput. Biol. Medicine 171: 108186 (2024) - [j94]Haitao Xu, Saiyu Qi, Junzhe Wei, Chenyang Li, Yong Qi, Wei Wei, Yanan Qiao:
POMF: A Privacy-preserved On-chain Matching Framework. Future Gener. Comput. Syst. 150: 424-435 (2024) - [j93]Jingxian Cheng, Saiyu Qi, Bochao An, Yong Qi, Jianfeng Wang, Yanan Qiao:
Lightweight verifiable blockchain top-k queries. Future Gener. Comput. Syst. 156: 105-115 (2024) - [j92]He Yan, Yan Liu, Yanmeng Li, Qiaolin Ye, Dong-Jun Yu, Yong Qi:
Robust GEPSVM classifier: An efficient iterative optimization framework. Inf. Sci. 657: 119986 (2024) - [j91]Yong Qi, Qian Chen, Mengyuan Yang, Yilei Sun:
Ambidextrous knowledge accumulation, dynamic capability and manufacturing digital transformation in China. J. Knowl. Manag. 28(8): 2275-2305 (2024) - [j90]Xianhui Zong, Yong Qi, He Yan, Qiaolin Ye:
An Intelligent Deep Learning Framework for Traffic Flow Imputation and Short-term Prediction Based on Dynamic Features. Knowl. Based Syst. 300: 112178 (2024) - [j89]Xing Li, Yong Qi, Guiyang Zhang:
Intellectual property protection, religious culture and dynamic capabilities of enterprises: evidence from Chinese listed companies. Technol. Anal. Strateg. Manag. 36(6): 1263-1277 (2024) - [j88]Chang Lu, Yong Qi, Shibo Hao:
Enhancing innovation performance of SMEs through open innovation and absorptive capacity: the moderating effect of business model. Technol. Anal. Strateg. Manag. 36(10): 2907-2923 (2024) - [j87]Jian Hu, Peng Zhu, Juanjuan Li, Yong Qi, Youbing Xia, Fei-Yue Wang:
A Secure Medical Information Storage and Sharing Method Based on Multiblockchain Architecture. IEEE Trans. Comput. Soc. Syst. 11(5): 6392-6406 (2024) - [j86]Haitao Xu, Saiyu Qi, Yong Qi, Wei Wei, Naixue Xiong:
Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing. ACM Trans. Embed. Comput. Syst. 23(1): 7:1-7:31 (2024) - [j85]Hanbo Zhang, Yong Qi, Guiyang Zhang, Dong Wang:
Talent Flow in China's Intelligent Connected Vehicle Industry: Evidence From Online Resume Mining. IEEE Trans. Engineering Management 71: 3510-3529 (2024) - [j84]Saiyu Qi, Yue Li, Wei Wei, Qian Li, Qiao Ke, Yong Qi:
Truth: A Blockchain-Aided Secure Reputation System With Genuine Feedbacks. IEEE Trans. Engineering Management 71: 12433-12447 (2024) - [j83]Saiyu Qi, Wei Wei, Jianfeng Wang, Shifeng Sun, Leszek Rutkowski, Tingwen Huang, Janusz Kacprzyk, Yong Qi:
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage. IEEE Trans. Mob. Comput. 23(4): 2566-2582 (2024) - [j82]Yue Yang, Yong Qi, Saiyu Qi:
Relation-consistency graph convolutional network for image super-resolution. Vis. Comput. 40(2): 619-635 (2024) - [c125]Tianyu Hu, Yong Qi, Huafeng Wang, Yanqing Wang, Longzhen Wang, Minghua Du, Xinyu Xiong:
BCFNET: Boundary-Guided Semantic Cross Fusion for Polyp Segmentation. ISBI 2024: 1-4 - [i15]Yong Qi, Fanghan Zhao:
Saliency-Aware Automatic Buddhas Statue Recognition. CoRR abs/2402.16980 (2024) - [i14]Qiuhao Wang, Xu Yang, Saiyu Qi, Yong Qi:
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search. CoRR abs/2403.19531 (2024) - [i13]Yong Qi, Gabriel Kyebambo, Siyuan Xie, Wei Shen, Shenghui Wang, Bitao Xie, Bin He, Zhipeng Wang, Shuo Jiang:
Safety Control of Service Robots with LLMs and Embodied Knowledge Graphs. CoRR abs/2405.17846 (2024) - [i12]Qi Guo, Minghao Yao, Zhen Tian, Saiyu Qi, Yong Qi, Yun Lin, Jin Song Dong:
Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations. CoRR abs/2407.02073 (2024) - 2023
- [j81]He Yan, Li Cheng, Qiaolin Ye, Dong-Jun Yu, Yong Qi:
Robust generalized canonical correlation analysis. Appl. Intell. 53(18): 21140-21155 (2023) - [j80]Xu Yang, Jiahe Yu, Saiyu Qi, Qiuhao Wang, Jianfeng Wang, Yanan Qiao, Yong Qi:
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain. Comput. Networks 237: 110108 (2023) - [j79]Qi Guo, Yong Qi, Saiyu Qi, Di Wu, Qian Li:
FedMCSA: Personalized federated learning via model components self-attention. Neurocomputing 560: 126831 (2023) - [j78]Saiyu Qi, Xu Yang, Jiahe Yu, Yong Qi:
Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin. IEEE J. Sel. Areas Commun. 41(11): 3517-3532 (2023) - [j77]Di Wu, Saiyu Qi, Yong Qi, Qian Li, Bowen Cai, Qi Guo, Jingxian Cheng:
Understanding and defending against White-box membership inference attack in deep learning. Knowl. Based Syst. 259: 110014 (2023) - [j76]Youshui Lu, Jingning Zhang, Yong Qi, Saiyu Qi, Yue Li, Hongyu Song, Yuhao Liu:
Safety Warning! Decentralised and Automated Incentives for Disqualified Drivers Auditing in Ride-Hailing Services. IEEE Trans. Mob. Comput. 22(3): 1748-1762 (2023) - [c124]Feng Xu, Chang Shi, Kaili Gao, Yong Qi:
Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior. IMMS 2023: 84-95 - [c123]Xu Yang, Ao Wang, Qiuhao Wang, Saiyu Qi, Yong Qi:
A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain. TrustCom 2023: 1300-1305 - [c122]Jingxian Cheng, Saiyu Qi, Yong Qi, Jianfeng Wang, Qin Jiang, Di Wu:
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases. TrustCom 2023: 1306-1311 - [i11]Xuan Xiao, Jiahang Liu, Zhipeng Wang, Yanmin Zhou, Yong Qi, Qian Cheng, Bin He, Shuo Jiang:
Robot Learning in the Era of Foundation Models: A Survey. CoRR abs/2311.14379 (2023) - 2022
- [j75]Jian Hu, Peng Zhu, Yong Qi, Qingyun Zhu, Xiaotong Li:
A patent registration and trading system based on blockchain. Expert Syst. Appl. 201: 117094 (2022) - [j74]He Yan, Liyong Fu, Yong Qi, Dong-Jun Yu, Qiaolin Ye:
Robust ensemble method for short-term traffic flow prediction. Future Gener. Comput. Syst. 133: 395-410 (2022) - [j73]Fan Yang, Yanan Qiao, Yong Qi, Junge Bo, Xiao Wang:
BMP: A blockchain assisted meme prediction method through exploring contextual factors from social networks. Inf. Sci. 603: 262-288 (2022) - [j72]Qian Li, Qingyuan Hu, Saiyu Qi, Yong Qi, Di Wu, Yun Lin, Jin Song Dong:
Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label. Knowl. Based Syst. 241: 107936 (2022) - [j71]He Yan, Liyong Fu, Yong Qi, Li Cheng, Qiaolin Ye, Dong-Jun Yu:
Learning a robust classifier for short-term traffic state prediction. Knowl. Based Syst. 242: 108368 (2022) - [j70]He Yan, Liyong Fu, Tian'an Zhang, Jun Hu, Qiaolin Ye, Yong Qi, Dong-Jun Yu:
Robust distance metric optimization driven GEPSVM classifier for pattern classification. Pattern Recognit. 129: 108779 (2022) - [j69]Yong Qi, Hefeifei Jiang, Shaoxuan Li, Junyu Cao:
ConvLSTM Coupled Economics Indicators Quantitative Trading Decision Model. Symmetry 14(9): 1896 (2022) - [j68]Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 2122-2137 (2022) - [j67]Qin Jiang, Ee-Chien Chang, Yong Qi, Saiyu Qi, Pengfei Wu, Jianfeng Wang:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. IEEE Trans. Inf. Forensics Secur. 17: 1053-1068 (2022) - [j66]Youshui Lu, Jingning Zhang, Yong Qi, Saiyu Qi, Yuanqing Zheng, Yuhao Liu, Hongyu Song, Wei Wei:
Accelerating at the Edge: A Storage-Elastic Blockchain for Latency-Sensitive Vehicular Edge Computing. IEEE Trans. Intell. Transp. Syst. 23(8): 11862-11876 (2022) - [j65]He Yan, Yong Qi, Qiaolin Ye, Dong-Jun Yu:
Robust Least Squares Twin Support Vector Regression With Adaptive FOA and PSO for Short-Term Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst. 23(9): 14542-14556 (2022) - [j64]Youshui Lu, Yong Qi, Saiyu Qi, Yue Li, Hongyu Song, Yuhao Liu:
Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services. IEEE Trans. Mob. Comput. 21(2): 663-680 (2022) - [j63]Saiyu Qi, Wei Wei, Jingxian Cheng, Yuanqing Zheng, Zhou Su, Jingning Zhang, Yong Qi:
Secure and Efficient Item Traceability for Cloud-Aided IIoT. ACM Trans. Sens. Networks 18(4): 54:1-54:24 (2022) - [c121]Qi Guo, Di Wu, Yong Qi, Saiyu Qi, Qian Li:
FLMJR: Improving Robustness of Federated Learning via Model Stability. ESORICS (3) 2022: 405-424 - [c120]YuLin Xu, Wei Liu, Yong Qi, YiHan Hu, Weibin Zhang:
A Common Traffic Object Recognition Method Based on Roadside LiDAR. ICITE 2022: 436-441 - [c119]Wenjia Zhao, Kangjie Lu, Qiushi Wu, Yong Qi:
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators. NDSS 2022 - [i10]Qi Guo, Yong Qi, Saiyu Qi, Di Wu, Qian Li:
FedMCSA: Personalized Federated Learning via Model Components Self-Attention. CoRR abs/2208.10731 (2022) - [i9]Qi Guo, Yong Qi, Saiyu Qi, Di Wu:
Dual Class-Aware Contrastive Federated Semi-Supervised Learning. CoRR abs/2211.08914 (2022) - 2021
- [j62]Yong Qi, Huawei Lin, Yanping Li, Jiashu Chen:
Parameter-Free Attention in fMRI Decoding. IEEE Access 9: 48704-48712 (2021) - [j61]Jingxian Gan, Yong Qi:
Selection of the Optimal Number of Topics for LDA Topic Model - Taking Patent Policy Analysis as an Example. Entropy 23(10): 1301 (2021) - [j60]Guangbin Zhou, Lifeng He, Yong Qi, Meimei Yang, Xiao Zhao, Yuyan Chao:
An improved algorithm using weighted guided coefficient and union self-adaptive image enhancement for single image haze removal. IET Image Process. 15(11): 2680-2692 (2021) - [j59]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Xinxing Liu, Pengfei Gao:
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding. Knowl. Based Syst. 218: 106802 (2021) - [j58]Yue Yang, Yong Qi:
Hierarchical accumulation network with grid attention for image super-resolution. Knowl. Based Syst. 233: 107520 (2021) - [j57]Yue Yang, Yong Qi:
Image super-resolution via channel attention and spatial graph convolutional network. Pattern Recognit. 112: 107798 (2021) - [j56]Qian Li, Yong Qi, Qingyuan Hu, Saiyu Qi, Yun Lin, Jin Song Dong:
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation. IEEE Trans. Inf. Forensics Secur. 16: 2447-2460 (2021) - [c118]Qin Jiang, Yanjun An, Yong Qi, Hai Fang:
Oblivious Data Structure for Secure Multiple-Set Membership Testing. WISA 2021: 299-310 - [c117]Yue Yang, Yong Qi:
Spatial Graph Convolutional Network for Image Super-Resolution. ICME 2021: 1-6 - [i8]Yong Qi, Yanping Li, Huawei Lin, Jiashu Chen, Huaiguang Lei:
Research on Gender-related Fingerprint Features. CoRR abs/2108.08233 (2021) - 2020
- [j55]Jingwei Li, Yong Qi, Guanghua Wang, Jinwei Lin:
Planning Optimal Rejuvenation Policy for Aging Software Systems via a Two-Layer Model. IEEE Access 8: 136725-136735 (2020) - [j54]Jingwei Li, Yong Qi, Wei Wei, Jinwei Lin, Marcin Wozniak, Robertas Damasevicius:
dCCPI-predictor: A state-aware approach for effectively predicting cross-core performance interference. Future Gener. Comput. Syst. 105: 184-195 (2020) - [j53]Qin Jiang, Yong Qi, Saiyu Qi, Wenjia Zhao, Youshui Lu:
Pbsx: A practical private boolean search using Intel SGX. Inf. Sci. 521: 174-194 (2020) - [j52]Yaochen Li, Ying Liu, Rui Sun, Rui Guo, Li Zhu, Yong Qi:
Multi-view point cloud registration with adaptive convergence threshold and its application in 3D model retrieval. Multim. Tools Appl. 79(21-22): 14793-14810 (2020) - [c116]Heyu Wang, Qin Jiang, Hui He, Yong Qi, Xu Yang:
Variable-Length Indistinguishable Binary Tree for Keyword Searching Over Encrypted Data. WISA 2020: 567-578 - [c115]Jingning Zhang, Youshui Lu, Yuhao Liu, Xu Yang, Yong Qi, Xinpei Dong, Haoming Wang:
Serving at the Edge: A Redactable Blockchain with Fixed Storage. WISA 2020: 654-667 - [c114]Wenjia Zhao, Kangjie Lu, Yong Qi, Saiyu Qi:
MPTEE: bringing flexible and efficient memory protection to Intel SGX. EuroSys 2020: 18:1-18:15 - [c113]Jingxian Cheng, Saiyu Qi, Wenqing Wang, Yuchen Yang, Yong Qi:
Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services. ACM Great Lakes Symposium on VLSI 2020: 381-386 - [c112]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Jie Ma, Jian Zhang:
Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer. IJCAI 2020: 2340-2346 - [c111]Jingqi Zhang, Zhongbin Sun, Yong Qi:
AutoIDL: Automated Imbalanced Data Learning via Collaborative Filtering. KSEM (2) 2020: 96-104 - [i7]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Jie Ma, Jian Zhang:
Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer. CoRR abs/2006.15284 (2020)
2010 – 2019
- 2019
- [j51]Lin Cai, Yong Qi, Wei Wei, Jingwei Li:
Improving Resource Usages of Containers Through Auto-Tuning Container Resource Parameters. IEEE Access 7: 108530-108541 (2019) - [j50]Jianyun Ni, Zihao Li, Yong Qi, Hainan Wang, Kim Wan Shua:
A gas source localization algorithm based on NLS initial optimization of particle filtering. Evol. Intell. 12(3): 357-365 (2019) - [j49]Lin Cai, Yong Qi, Wei Wei, Jinsong Wu, Jingwei Li:
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform. Future Gener. Comput. Syst. 93: 570-582 (2019) - [j48]Jinpei Yan, Yong Qi, Qifan Rao, Hui He, Saiyu Qi:
LSTM-Based with Deterministic Negative Sampling for API Suggestion. Int. J. Softw. Eng. Knowl. Eng. 29(7): 1029-1051 (2019) - [j47]Xiaoguang Wang, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 44-57 (2019) - [j46]Pengfei Chen, Yong Qi, Di Hou:
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment. IEEE Trans. Serv. Comput. 12(2): 214-230 (2019) - [c110]Hanrui Zhang, Qianmu Li, Yong Qi, Jun Hou, Yaozong Liu:
The Research Reviewed of Edge Network Active Safety Defense Technology. BigDataService 2019: 242-246 - [c109]Haozhe Liu, Wentian Zhang, Feng Liu, Yong Qi:
3D Fingerprint Gender Classification Using Deep Learning. CCBR 2019: 37-45 - 2018
- [j45]Feng Xu, Yong Qi, Xiaotong Li:
What affects the user stickiness of the mainstream media websites in China? Electron. Commer. Res. Appl. 29: 124-132 (2018) - [j44]Jinpei Yan, Yong Qi, Qifan Rao:
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. Secur. Commun. Networks 2018: 5249190:1-5249190:18 (2018) - [j43]Jinpei Yan, Yong Qi, Qifan Rao:
Detecting Malware with an Ensemble Method Based on Deep Neural Network. Secur. Commun. Networks 2018: 7247095:1-7247095:16 (2018) - [j42]Chun-Qiu Xia, Ke Han, Yong Qi, Yang Zhang, Dong-Jun Yu:
A Self-Training Subspace Clustering Algorithm under Low-Rank Representation for Cancer Classification on Gene Expression Data. IEEE ACM Trans. Comput. Biol. Bioinform. 15(4): 1315-1324 (2018) - [j41]Pengfei Chen, Yong Qi, Xinyi Li, Di Hou, Michael Rung-Tsong Lyu:
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy. IEEE Trans. Dependable Secur. Comput. 15(4): 675-693 (2018) - [c108]Debo Cai, Di Hou, Yong Qi, Jinpei Yan, Yu Lu:
A Distributed Rule Engine for Streaming Big Data. WISA 2018: 123-130 - [c107]Wenjia Zhao, Yong Qi, Di Hou, Peijian Wang, Xin Gao, Zirong Du, Yudong Zhang, Yongfang Zong:
EventDB: A Large-Scale Semi-structured Scientific Data Management System. BigSDM 2018: 105-115 - [c106]Zirong Du, Di Hou, Yong Qi:
An Operator Library System for HEP Events Processing Based on Hbase Coprocessor. BigSDM 2018: 116-124 - [c105]Xin Gao, Yong Qi, Di Hou:
Multi-dimensional Index over a Key-Value Store for Semi-structured Data. BigSDM 2018: 165-175 - [c104]Jinpei Yan, Yong Qi, Qifan Rao, Hui He:
Learning API Suggestion via Single LSTM Network with Deterministic Negative Sampling. SEKE 2018: 137-136 - [c103]Jingwei Li, Yong Qi, Lin Cai:
A Hybrid Approach for Predicting Aging-Related Failures of Software Systems. SOSE 2018: 96-105 - [c102]Jinpei Yan, Yong Qi, Qifan Rao, Saiyu Qi:
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones. TrustCom/BigDataSE 2018: 1170-1179 - [i6]Yaochen Li, Ying Liu, Rui Sun, Rui Guo, Li Zhu, Yong Qi:
Multi-view Point Cloud Registration with Adaptive Convergence Threshold and its Application on 3D Model Retrieval. CoRR abs/1811.10026 (2018) - 2017
- [j40]Xinyi Li, Yong Qi, Pengfei Chen, Yang Fan:
A cost-effective strategy for Cloud system maintenance. Comput. Electr. Eng. 58: 176-189 (2017) - [j39]Hui Dou, Yong Qi:
An online electricity cost budgeting algorithm for maximizing green energy usage across data centers. Frontiers Comput. Sci. 11(4): 661-674 (2017) - [j38]Yong Qi, Shiwei Guo, Qianmu Li:
电网融合泛在网信息平台设计及安全威胁分析 (Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid). 计算机科学 44(3): 150-152 (2017) - [j37]Yong Qi, Xuan Mo, Qianmu Li:
一种面向融合泛在网的协同防护体系设计 (Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network). 计算机科学 44(5): 100-104 (2017) - [j36]Xiao Wang, Yong Qi, Qianmu Li:
基于时变加权马尔科夫链的网络异常检测模型 (Network Anomaly Detection Model Based on Time-varying Weighted Markov Chain). 计算机科学 44(9): 136-141 (2017) - [j35]Jianbao Ren, Yong Qi, Yue-hua Dai, Xuan Yu, Yi Shi:
Nosv: A lightweight nested-virtualization VMM for hosting high performance computing on cloud. J. Syst. Softw. 124: 137-152 (2017) - [j34]Pengfei Chen, Yong Qi, Di Hou:
InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems. IEEE Trans. Emerg. Top. Comput. 5(4): 450-465 (2017) - [j33]Hui Dou, Yong Qi, Wei Wei, Houbing Song:
Carbon-Aware Electricity Cost Minimization for Sustainable Data Centers. IEEE Trans. Sustain. Comput. 2(2): 211-223 (2017) - [c101]Zhiqi Hou, Di Hou, Yong Qi:
A High Energy Physical Metadata Directory Structure Based on RAMCloud. WISA 2017: 301-304 - [c100]Yunpeng Liu, Di Hou, Junpeng Bao, Yong Qi:
Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network. WISA 2017: 305-310 - [c99]Xiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang:
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack. COMPSAC (1) 2017: 628-636 - [c98]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. ICDCS 2017: 414-424 - [c97]Xiaoguang Wang, Yong Qi:
Secure the commodity applications against address exposure attacks. ISCC 2017: 450-456 - [c96]Xuehuai Shi, Qianmu Li, Yong Qi, Tiantian Huang, Jianmei Li:
An accident prediction approach based on XGBoost. ISKE 2017: 1-7 - [c95]Ming Wu, Qianmu Li, Jing Zhang, Shicheng Cui, Deqiang Li, Yong Qi:
A robust inference algorithm for crowd sourced categorization. ISKE 2017: 1-6 - [c94]Qinzheng Zhuo, Qianmu Li, Han Yan, Yong Qi:
Long short-term memory neural network for network traffic prediction. ISKE 2017: 1-6 - [c93]Wenchao Wang, Xu Zhang, Yong Qi, Wei Cheng:
An algorithm of pose estimation based on conic correspondences. ROBIO 2017: 314-319 - [c92]Lin Cai, Yong Qi, Jingwei Li:
A Recommendation-Based Parameter Tuning Approach for Hadoop. SC² 2017: 223-230 - [i5]Saiyu Qi, Yichen Li, Yuanqing Zheng, Yong Qi:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. IACR Cryptol. ePrint Arch. 2017: 90 (2017) - 2016
- [j32]Qianmu Li, Tao Li, Bin Xia, Ming Ni, Xiaoqian Liu, Qifeng Zhou, Yong Qi:
FIRST: Face Identity Recognition in SmarT Bank. Int. J. Semantic Comput. 10(4): 569- (2016) - [j31]Rui Xia, Feng Xu, Jianfei Yu, Yong Qi, Erik Cambria:
Polarity shift detection, elimination and ensemble: A three-stage model for document-level sentiment analysis. Inf. Process. Manag. 52(1): 36-45 (2016) - [j30]Xinyi Li, Yong Qi, Pengfei Chen, Xiaohui Zhang:
A Heuristic Time Sharing Policy for Backup Resources in Cloud System. KSII Trans. Internet Inf. Syst. 10(7): 3026-3049 (2016) - [j29]Yong Qi, Jun Chen, Qianmu Li:
基于冗余消除和属性数值化的XACML策略优化方法 (XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization). 计算机科学 43(2): 163-168 (2016) - [j28]Yong Qi, Xuan Mo, Qianmu Li:
一种基于攻防图的网络安全防御策略生成方法 (Improved Network Security Defense Strategy Generation Method Based on Attack-Defense Graph). 计算机科学 43(10): 130-134 (2016) - [j27]Xiao Wang, Qianmu Li, Yong Qi:
一种基于马尔科夫模型的网络安全风险实时分析方法 (Real Time Analysis Method of Network Security Risk Based on Markov Model). 计算机科学 43(Z11): 338-341 (2016) - [j26]Dou Hui, Yong Qi, Wei Wei, Houbing Song:
A two-time-scale load balancing framework for minimizing electricity bills of Internet Data Centers. Pers. Ubiquitous Comput. 20(5): 681-693 (2016) - [c91]Xinyi Li, Yong Qi, Pengfei Chen, Xiaohui Zhang:
Optimizing Backup Resources in the Cloud. CLOUD 2016: 790-797 - [c90]Chi Zhang, Hui He, Xiaoguang Wang, Yichen Li, Xin Gao, Yong Qi:
Enhancing Data Secrecy with Segmentation Based Isolation. IEEE WISA 2016: 203-208 - [c89]Yong Qi, Ya Zhou, Chang Zhou, Xinran Hu, Xiaoming Hu:
3D feature array involved registration algorithm for multi-pose hand vein authentication. ICB 2016: 1-7 - [c88]Yong Qi, Ya Zhou, Chang Zhou, Xinran Hu, Xiaoming Hu:
Vein point cloud registration algorithm for multi-pose hand vein authentication. ISBA 2016: 1-6 - 2015
- [j25]Xibei Yang, Yong Qi, Dong-Jun Yu, Hualong Yu, Jingyu Yang:
α-Dominance relation and rough sets in interval-valued information systems. Inf. Sci. 294: 334-347 (2015) - [j24]Hengrong Ju, Xibei Yang, Yong Qi, Jingyu Yang:
量化粗糙集的单调性属性约简方法 (Approach to Monotonicity Attribute Reduction in Quantitative Rough Set). 计算机科学 42(8): 36-39 (2015) - [j23]Jinpei Yan, Hui He, Wenhuan An, Xiaohui Zhang, Jianbao Ren, Yong Qi:
国内第三方Android应用市场安全性的检测 (Detecting Security of Applications in Chinese Third-party Android Market). 计算机科学 42(12): 143-147 (2015) - [j22]Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi:
PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency. IEEE Trans. Computers 64(5): 1389-1401 (2015) - [j21]Rui Xia, Feng Xu, Chengqing Zong, Qianmu Li, Yong Qi, Tao Li:
Dual Sentiment Analysis: Considering Two Sides of One Review. IEEE Trans. Knowl. Data Eng. 27(8): 2120-2133 (2015) - [j20]Lei Yang, Yong Qi, Jinsong Han, Cheng Wang, Yunhao Liu:
Shelving Interference and Joint Identification in Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 26(11): 3149-3159 (2015) - [c87]Hui Dou, Yong Qi, Pengfei Chen:
A Novel Approach to Improving Resource Utilization for IaaS. IEEE WISA 2015: 89-94 - [c86]Dou Hui, Yong Qi, Wei Wei, Houbing Song:
Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing. IIKI 2015: 210-214 - [c85]Hui Dou, Yong Qi:
Greening Data Centers within Cost Budget. SmartCity 2015: 568-574 - [c84]Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, Yajin Zhou:
SecPod: a Framework for Virtualization-based Security Systems. USENIX ATC 2015: 347-360 - [c83]Jianbao Ren, Yong Qi, Yue-hua Dai, Xiaoguang Wang, Yi Shi:
AppSec: A Safe Execution Environment for Security Sensitive Applications. VEE 2015: 187-199 - [i4]Pengfei Chen, Yong Qi, Di Hou:
CHAOS: Accurate and Realtime Detection of Aging-Oriented Failure Using Entropy. CoRR abs/1502.00781 (2015) - [i3]Pengfei Chen, Yong Qi, Peipei Wang, Li Su, Xinyi Li:
Making Availability as a Service in the Clouds. CoRR abs/1503.04422 (2015) - 2014
- [j19]Xiaoguang Wang, Yong Qi, Yue-hua Dai, Yi Shi, Jianbao Ren, Xuan Yu:
TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud. J. Comput. 9(10): 2303-2314 (2014) - [j18]Xianghe Wei, Hong Zhang, Xuan Mo, Yong Qi, Zhen Liu, Qianmu Li:
A Comprehensive Trust Model Based on Reputation and Fuzzy Theory. J. Comput. 9(11): 2666-2676 (2014) - [j17]Zhen Ni, Qianmu Li, Tao Li, Yong Qi:
A WSN Nodes Access Mechanism and Directed Diffusion in Emergency Circumstances. J. Digit. Inf. Manag. 12(4): 235-245 (2014) - [j16]Peijian Wang, Yong Qi, Xue Liu:
Power-aware optimization for heterogeneous multi-tier clusters. J. Parallel Distributed Comput. 74(1): 2005-2015 (2014) - [j15]Xibei Yang, Yong Qi, Hualong Yu, Xiaoning Song, Jingyu Yang:
Updating multigranulation rough approximations with increasing of granular structures. Knowl. Based Syst. 64: 59-69 (2014) - [j14]Pengfei Zheng, Yong Qi, Yangfan Zhou, Pengfei Chen, Jianfeng Zhan, Michael R. Lyu:
An Automatic Framework for Detecting and Characterizing Performance Degradation of Software Systems. IEEE Trans. Reliab. 63(4): 927-943 (2014) - [c82]Pengfei Zheng, Yangfan Zhou, Michael R. Lyu, Yong Qi:
Granger Causality-Aware Prediction and Diagnosis of Software Degradation. IEEE SCC 2014: 528-535 - [c81]Xinyi Li, Hui He, Pengfei Chen, Xiaohui Zhang, Li Su, Yong Qi:
Multiplexing of Backup VMs Based on Greedy Policy. IEEE WISA 2014: 197-202 - [c80]Pengfei Chen, Yong Qi, Pengfei Zheng, Di Hou:
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems. INFOCOM 2014: 1887-1895 - [c79]Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li:
Frogeye: Perception of the slightest tag motion. INFOCOM 2014: 2670-2678 - [c78]Xibei Yang, Yong Qi, Hualong Yu, Jingyu Yang:
Want More? Pay More! RSCTC 2014: 144-151 - [c77]Jingjing Song, Xibei Yang, Yong Qi, Hualong Yu, Xiaoning Song, Jing-Yu Yang:
Characterizing Hierarchies on Covering-Based Multigranulation Spaces. RSKT 2014: 467-478 - [c76]Xingbin Ma, Xibei Yang, Yong Qi, Xiaoning Song, Jing-Yu Yang:
Multicost Decision-Theoretic Rough Sets Based on Maximal Consistent Blocks. RSKT 2014: 824-833 - [c75]Pengfei Chen, Yong Qi, Di Hou, Huachong Sun:
InvarNet-X: A Comprehensive Invariant Based Approach for Performance Diagnosis in Big Data Platform. BPOE@ASPLOS/VLDB 2014: 124-140 - [i2]Pengfei Chen, Yong Qi, Di Hou, Jiankang Liu:
Bio-inspired Mechanism and Model Exploration of Software Aging. CoRR abs/1409.1879 (2014) - 2013
- [j13]Yue-hua Dai, Yi Shi, Yong Qi, Jianbao Ren, Peijian Wang:
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. Frontiers Comput. Sci. 7(1): 34-43 (2013) - [j12]Dong-Jun Yu, Jun Hu, Yan Huang, Hong-Bin Shen, Yong Qi, Zhenmin Tang, Jing-Yu Yang:
TargetATPsite: A template-free method for ATP-binding sites prediction with residue evolution image sparse representation and classifier ensemble. J. Comput. Chem. 34(11): 974-985 (2013) - [c74]Hui Dou, Yong Qi, Peijian Wang:
Hybrid Power Control and Electricity Cost Management for Distributed Internet Data Centers in Cloud Computing. IEEE WISA 2013: 394-399 - [c73]Pengfei Chen, Yong Qi, Xinyi Li, Li Su:
An ensemble MIC-based approach for performance diagnosis in big data platform. IEEE BigData 2013: 78-85 - [c72]Xiaoguang Wang, Yong Qi, Yue-hua Dai, Jianbao Ren:
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing. COMPSAC Workshops 2013: 115-120 - [c71]Lin Cai, Zhen Jia, Yong Qi, Lei Wang:
CloudRank-V: A Desktop Cloud Benchmark with Complex Workloads. HPCC/EUC 2013: 415-421 - [c70]Peijian Wang, Yong Qi, Dou Hui, Lei Rao, Xue Liu:
Present or Future: Optimal Pricing for Spot Instances. ICDCS 2013: 410-419 - [c69]Shan Chang, Hui Song, Li Lu, Qingsong Yao, Yong Qi:
Random Graph Based Benchmarking Methodology for RFID Security Protocols. ICEBE 2013: 184-191 - [c68]Pengfei Chen, Yong Qi, Pengfei Zheng, Jianfeng Zhan, Yihan Wu:
Multi-scale Entropy: One Metric of Software Aging. SOSE 2013: 162-169 - [c67]Yue-hua Dai, Yong Qi, Jianbao Ren, Yi Shi, Xiaoguang Wang, Xuan Yu:
A lightweight VMM on many core for high performance computing. VEE 2013: 111-120 - [i1]Wanling Gao, Yuqing Zhu, Zhen Jia, Chunjie Luo, Lei Wang, Zhiguo Li, Jianfeng Zhan, Yong Qi, Yongqiang He, Shimin Gong, Xiaona Li, Shujie Zhang, Bizhu Qiu:
BigDataBench: a Big Data Benchmark Suite from Web Search Engines. CoRR abs/1307.0320 (2013) - 2012
- [j11]Shan Chang, Yong Qi, Hongzi Zhu, Jizhong Zhao, Xuemin Shen:
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks. IEEE Trans. Parallel Distributed Syst. 23(6): 1103-1114 (2012) - [j10]Peijian Wang, Lei Rao, Xue Liu, Yong Qi:
D-Pro: Dynamic Data Center Operations With Demand-Responsive Electricity Prices in Smart Grid. IEEE Trans. Smart Grid 3(4): 1743-1754 (2012) - [c66]Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi:
Isolate secure executing environment for a safe cloud. ICCC 2012: 79-84 - [c65]Qianmu Li, Qiugan Shi, Jun Hou, Yong Qi, Hong Zhang:
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks. ICICA (LNCS) 2012: 88-97 - [c64]Dongjun Yu, Jun Hu, Xiaoning Song, Yong Qi, Zhenmin Tang:
Supervised Kernel Self-Organizing Map. IScIDE 2012: 246-253 - [c63]Pengfei Zheng, Qingguo Xu, Yong Qi:
An Advanced Methodology for Measuring and Characterizing Software Aging. ISSRE Workshops 2012: 253-258 - 2011
- [j9]Min Xi, Yong Qi, Kui Wu, Jizhong Zhao, Mo Li:
Using Potential to Guide Mobile Nodes in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 229-251 (2011) - [j8]Yuan-sheng Luo, Yong Qi, Di Hou, Lin-feng Shen, Ying Chen, Xiao Zhong:
A novel heuristic algorithm for QoS-aware end-to-end service composition. Comput. Commun. 34(9): 1137-1144 (2011) - [j7]Junbin Zhang, Yong Qi, Di Hou, Ming Li:
A Reference Programming Model for Building Context-Aware Application. IEICE Trans. Inf. Syst. 94-D(1): 114-126 (2011) - [j6]Yanan Qiao, Yong Qi, Di Hou:
Tensor Field Model for higher-order information retrieval. J. Syst. Softw. 84(12): 2303-2313 (2011) - [j5]Wei Wei, Yong Qi:
Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks. Sensors 11(5): 4794-4807 (2011) - [j4]Ming Lei, Barend J. van Wyk, Yong Qi:
Online Estimation of the Approximate Posterior Cramer-Rao Lower Bound for Discrete-Time Nonlinear Filtering. IEEE Trans. Aerosp. Electron. Syst. 47(1): 37-57 (2011) - [c62]Peijian Wang, Lei Rao, Xue Liu, Yong Qi:
Dynamic Power Management of Distributed Internet Data Centers in Smart Grid Environment. GLOBECOM 2011: 1-5 - [c61]Qingsong Yao, Jinsong Han, Yong Qi, Lei Yang, Yunhao Liu:
Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols. ICPP 2011: 713-721 - [c60]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Tao Gu, Yunhao Liu:
Season: Shelving interference and joint identification in large-scale RFID systems. INFOCOM 2011: 3092-3100 - [c59]Hui He, Jizhong Zhao, Yong Qi, Shuo Lian, Wei Xi:
Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems. MSN 2011: 152-159 - [c58]Jianbao Ren, Yong Qi, Yue-hua Dai, Xuan Yu:
Inter-domain Communication Mechanism Design and Implementation for High Performance. PAAP 2011: 272-276 - [c57]Shan Chang, Yong Qi, Hongzi Zhu, Mianxiong Dong, Kaoru Ota:
Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. WASA 2011: 190-201 - 2010
- [c56]Dong-Hong Xu, Zheng Li, Yong Qi, Shujuan Jiang, Di Hou:
Dynamic Projection from Choreography to Orchestration Based on Role Correlation. CNSR 2010: 229-235 - [c55]Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu:
Identification-free batch authentication for RFID tags. ICNP 2010: 154-163 - [c54]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo Li, Qingsong Yao, Ying Chen, Xiao Zhong:
Utilizing RF Interference to Enable Private Estimation in RFID Systems. ICPADS 2010: 83-90 - [c53]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Yunhao Liu, Ying Chen, Xiao Zhong:
Revisting Tag Collision Problem in RFID Systems. ICPP 2010: 178-187 - [c52]Peijian Wang, Yong Qi, Xue Liu, Ying Chen, Xiao Zhong:
Power Management in Heterogeneous Multi-tier Web Clusters. ICPP 2010: 385-394 - [c51]Lin-feng Shen, Yong Qi:
A Novel End-User Oriented Service Composition Model Based on Quotient Space Theory. ICSS 2010: 180-184 - [c50]Jungpen Bao, Yong Qi, Di Hou, Hui He:
A Text Copy Detection System Based on Complex Event Processing Architecture. ServiceWave Workshops 2010: 203-207 - [c49]Fan Zhao, Guizhong Liu, Yong Qi:
An adaptive mode-driven spatiotemporal motion vector prediction for wavelet video coding. VCIP 2010: 77442G - [c48]Qingsong Yao, Yong Qi, Ying Chen, Xiao Zhong:
A Desynchronization Tolerant RFID Private Authentication Protocol. WASA 2010: 120-124
2000 – 2009
- 2009
- [j3]Xiang-Yang Li, Ashraf Nusairat, Yanwei Wu, Yong Qi, Jizhong Zhao, Xiaowen Chu, Yunhao Liu:
Joint Throughput Optimization for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 8(7): 895-909 (2009) - [j2]Xiang-Yang Li, Yu Wang, Haiming Chen, Xiaowen Chu, Yanwei Wu, Yong Qi:
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links. IEEE Trans. Parallel Distributed Syst. 20(10): 1408-1421 (2009) - [c47]Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. COMPSAC (1) 2009: 240-245 - [c46]Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:
A Mixed Software Rejuvenation Policy for Multiple Degradations Software System. HPCC 2009: 376-383 - [c45]Wei Xi, Jizhong Zhao, Xue Liu, Xiang-Yang Li, Yong Qi:
EUL: An Efficient and Universal Localization Method for Wireless Sensor Network. ICDCS 2009: 433-440 - [c44]Hui He, Fan Wei, Yong Qi:
A Multi-step Task Allocation Algorithm of Mobile Agent Based on Mobile Ad Hoc Network. ICEBE 2009: 247-251 - [c43]Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu, Mo Li:
Run to Potential: Sweep Coverage in Wireless Sensor Networks. ICPP 2009: 50-57 - [c42]Xiang-Yang Li, XiaoHua Xu, ShiGuang Wang, Shaojie Tang, Guojun Dai, Jizhong Zhao, Yong Qi:
Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model. MASS 2009: 353-362 - [c41]Qingsong Yao, Yong Qi, Jizhong Zhao, Jinsong Han:
An Enhanced Synchronization Approach for RFID Private Authentication. MASS 2009: 959-964 - [c40]Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li, Yunhao Liu:
Randomizing RFID Private Authentication. PerCom 2009: 1-10 - [c39]Junbin Zhang, Yong Qi, Di Hou, Ming Li:
A Table-Driven Programming Paradigm for Context-Aware Application Development. SAINT 2009: 121-124 - [c38]Lei Miao, Yong Qi, Di Hou, Chang-li Wu, Yue-hua Dai:
Energy Saving Task Scheduling for Heterogeneous CMP System Based on Multi-objective Fuzzy Genetic Algorithm. SMC 2009: 3923-3927 - 2008
- [c37]Dong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen:
A novel formal framework for secure dynamic services composition. CIT 2008: 694-699 - [c36]Dong-Hong Xu, Yong Qi, Di Hou, Ying Chen:
SpiG4WSC: A Calculus for Secure Services Composition. IEEE SCC (2) 2008: 511-513 - [c35]Wei Wei, Yong Qi, Xin He, Wei Wang, Ruidong Li, Hui He:
Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology. APSCC 2008: 644-649 - [c34]Dong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen:
An Improved Calculus for Secure Dynamic Services Composition. COMPSAC 2008: 686-691 - [c33]Yong Qi, Qingsheng Zhang, Hui He, Yujie Niu:
Designing Simulated Context-Aware Telephone in Pervasive Spaces. COMPSAC 2008: 1260-1265 - [c32]Yong Qi, Long Xiao, Qianmu Li:
Information Security Risk Assessment Method Based on CORAS Frame. CSSE (3) 2008: 571-574 - [c31]Yuan-sheng Luo, Yong Qi, Lin-feng Shen, Di Hou, Chanyachatchawan Sapa, Ying Chen:
An Improved Heuristic for QoS-Aware Service Composition Framework. HPCC 2008: 360-367 - [c30]Qingsong Yao, Shan Chang, Yong Qi, Ming Li:
New Programming Model for Pervasive Computing. ICEBE 2008: 325-332 - [c29]Shan Chang, Qingxi Li, Yong Qi, Jizhong Zhao, Yuan He, Xue Liu:
Safety assurance for archeologists using sensor network. SenSys 2008: 359-360 - [c28]Lei Miao, Yong Qi, Di Hou, Yue-hua Dai, Yi Shi:
A multi-objective hybrid genetic algorithm for energy saving task scheduling in CMP system. SMC 2008: 197-201 - [c27]Wei Wei, Yong Qi, Wei Wang, Ruidong Li, Yi Shi, Yu Gu, Andrew Chen:
Variant rate based cross layer time frame scheduling in wireless sensor networks. WTS 2008: 62-68 - 2007
- [c26]Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao:
A Conflict Resolution Method in Context-Aware Computing. ACIS-ICIS 2007: 135-140 - [c25]Jizhong Zhao, Min Xi, Yong Qi:
Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. ACIS-ICIS 2007: 844-849 - [c24]Wei Wei, Yong Qi, Saiyu Qi, Di Hou, Wei Wang, Min Xi, Qingsong Yao:
Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment. APSCC 2007: 75-80 - [c23]Jichuan Wang, Shaoying Liu, Yong Qi, Di Hou:
Developing an Insulin Pump System Using the SOFL Method. APSEC 2007: 334-341 - [c22]Qingsheng Zhang, Yong Qi, Di Hou, Jizhong Zhao, Huawei Han:
Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments. FSKD (3) 2007: 156-160 - [c21]Hai Ning Meng, Yong Qi, Di Hou, Ying Chen:
Forecasting Software Aging of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm. ICAC 2007: 10 - [c20]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu:
A Study on Context-aware Privacy Protection for Personal Information. ICCCN 2007: 1351-1358 - [c19]Dong-Hong Xu, Yong Qi, Di Hou, Ying Chen, Liang Liu:
A Formal Model for Security-Aware dynamic Web Services Composition. ICCSA Workshops 2007: 139-143 - [c18]Hai Ning Meng, Yong Qi, Di Hou, Lu Xia Pei, Ying Chen:
Application Server Aging Prediction Model Based on Wavelet Network with Adaptive Particle Swarm Optimization Algorithm. ICIC (2) 2007: 14-25 - [c17]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Jihong Zhang:
Context-Aware Learning Privacy Disclosure Policy from Interaction History. ICNC (5) 2007: 3-7 - [c16]Lei Miao, Yong Qi, Di Hou, Yue-hua Dai:
Energy-Aware Scheduling Tasks on Chip Multiprocessor. ICNC (4) 2007: 319-323 - [c15]Hai Ning Meng, Yong Qi, Di Hou, Yao Zhang, Liang Liu:
Software Aging Forecasting Model of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm. ICNC (3) 2007: 353-357 - [c14]Xi Min, Jizhong Zhao, Yong Qi, Hui He, Li Ming, Wei Wei:
Isotope Programming Model: a Kind of Program Model for Context-Aware Application. MUE 2007: 597-602 - [c13]Lei Miao, Yong Qi, Di Hou, Chang-li Wu, Yue-hua Dai:
Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems. IEEE NAS 2007: 249-250 - [c12]Yanan Qiao, Yong Qi, Hui He:
The Research on Term Field Based Term Co-Occurrence Model. SKG 2007: 471-474 - [c11]Yong Qi, Saiyu Qi, Pu Zhu, Lin-feng Shen:
Context-Aware Semantic Web Service Discovery. SKG 2007: 499-502 - [c10]Yong Qi, Peijie Hao, Yu Hou, Yanan Qiao:
The Research and Design of the Semantic Search Engine Based on Ontology. SKG 2007: 610-611 - [c9]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Yujie Niu:
Research on context-aware architecture for personal information privacy protection. SMC 2007: 3912-3916 - [c8]Min Xi, Jizhong Zhao, Yong Qi, Hui He, Liang Liu:
An Offset Algorithm for Conflict Resolution in Context-Aware Computing. UIC 2007: 878-887 - 2006
- [j1]Kun Zhang, Yong Qi, Hong Zhang:
Dynamic multicast routing algorithm for delay and delay variation-bounded Steiner tree problem. Knowl. Based Syst. 19(7): 554-564 (2006) - [c7]Yi Shi, Xinyu Yang, Ning Li, Yong Qi:
Deterministic Packet Marking with Link Signatures for IP Traceback. Inscrypt 2006: 144-152 - [c6]Dongjun Yu, Yong Qi, Yong-Hong Xu, Jing-Yu Yang:
Kernel-SOM Based Visualization of Financial Time Series Forecasting. ICICIC (2) 2006: 470-473 - [c5]Hai Ning Meng, Yong Qi, Di Hou, Ying Chen, Jizhong Zhao:
Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm. ICTAI 2006: 659-666 - [c4]Hai Ning Meng, Yong Qi, Di Hou, Liang Liu, Hui He:
Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm. ISPA 2006: 573-583 - 2005
- [c3]Qian-Mu Li, Yong Qi, Man-Wu Xu, Feng-Yu Liu:
A New Method of Network Data Link Troubleshooting. ISPA 2005: 890-900 - [c2]Jizhong Zhao, Yong Qi, Zhaofeng Ma:
Secure Multimedia Streaming with Trusted Digital Rights Management. LCN 2005: 817-821 - 2000
- [c1]Yong Qi, Li Ma, Jizhong Zhao, Junyi Shen:
OTMS-A CORBA-Compliant Object Transaction Management System. TOOLS (36) 2000: 126-133
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint