default search action
Qi Xia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Qi Xia, Thomas K. F. Chiu, Xiuhan Li:
A scoping review of BCIs for learning regulation in mainstream educational contexts. Behav. Inf. Technol. 43(10): 2096-2117 (2024) - [j58]Qi Xia, Bangcheng Zhang, Xiyu Zhang, Lei Li, Chen Wu:
Investigation on robotic cells design improvement in the welding process of body in white. Int. J. Intell. Robotics Appl. 8(2): 322-333 (2024) - [j57]Christian Nii Aflah Cobblah, Qi Xia, Jianbin Gao, Hu Xia, Goodlet Akwasi Kusi, Isaac Amankona Obiri:
A Secure and Lightweight NDN-Based Vehicular Network Using Edge Computing and Certificateless Signcryption. IEEE Internet Things J. 11(16): 27043-27057 (2024) - [j56]Guoqing Wang, Qi Xia, Hong Yan, Shicheng Bei, Huakai Zhang, Hao Geng, Yuhan Zhao:
Research on Pipeline Stress Detection Method Based on Double Magnetic Coupling Technology. Sensors 24(19): 6463 (2024) - [j55]Ke Fang, Zejun Wang, Qi Xia, Yingchao Liu, Bao Wang, Zhaowei Cheng, Jian Cheng, Xinyu Jin, Ruiliang Bai, Lanjuan Li:
Normalizing Flow-Based Distribution Estimation of Pharmacokinetic Parameters in Dynamic Contrast-Enhanced Magnetic Resonance Imaging. IEEE Trans. Biomed. Eng. 71(3): 780-791 (2024) - [j54]Qi Xia, Isaac Amankona Obiri, Jianbin Gao, Hu Xia, Xiaosong Zhang, Kwame Omono Asamoah, Sandro Amofa:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. IEEE Trans. Inf. Forensics Secur. 19: 677-692 (2024) - 2023
- [j53]Qi Xia, Thomas K. F. Chiu, Ching Sing Chai, Kui Xie:
The mediating effects of needs satisfaction on the relationships between prior knowledge and self-regulated learning through artificial intelligence chatbot. Br. J. Educ. Technol. 54(4): 967-986 (2023) - [j52]Thomas K. F. Chiu, Qi Xia, Xinyan Zhou, Ching Sing Chai, Miaoting Cheng:
Systematic literature review on opportunities, challenges, and future research recommendations of artificial intelligence in education. Comput. Educ. Artif. Intell. 4: 100118 (2023) - [j51]Qi Xia, Thomas K. F. Chiu, Ching Sing Chai:
The moderating effects of gender and need satisfaction on self-regulated learning through Artificial Intelligence (AI). Educ. Inf. Technol. 28(7): 8691-8713 (2023) - [j50]Yangyang Liu, Qi Xia, Xiong Li, Jianbin Gao, Xiaosong Zhang:
An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity. J. Syst. Archit. 142: 102935 (2023) - [j49]Zeyi Tao, Qi Xia, Songqing Chen, Qun Li:
An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation. IEEE Trans. Cloud Comput. 11(2): 1733-1745 (2023) - [j48]Qi Xia, Zeyi Tao, Qun Li, Songqing Chen:
Byzantine Tolerant Algorithms for Federated Learning. IEEE Trans. Netw. Sci. Eng. 10(6): 3172-3183 (2023) - [j47]Jianbin Gao, Kwame Omono Asamoah, Qi Xia, Emmanuel Boateng Sifah, Isaac Amankona Obiri, Hu Xia:
A Blockchain Peer-to-Peer Energy Trading System for Microgrids. IEEE Trans. Smart Grid 14(5): 3944-3960 (2023) - [c52]Ziwen Dai, Qi Xia:
Blockchain for IoT Scenarios: Lightweight Three-Tier Architecture with GH-PBFT Consensus. ICBTA 2023: 54-60 - [c51]Zeyi Tao, Jindi Wu, Qi Xia, Qun Li:
LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks. QSW 2023: 76-82 - [c50]Qi Xia, Qian Chen, Shouhuai Xu:
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone. USENIX Security Symposium 2023: 4589-4606 - [i5]Ping Li, Weijie Zhao, Chao Wang, Qi Xia, Alice Wu, Lijun Peng:
Practice with Graph-based ANN Algorithms on Sparse Data: Chi-square Two-tower model, HNSW, Sign Cauchy Projections. CoRR abs/2306.07607 (2023) - 2022
- [j46]Kang Yang, Ye Tian, Tielin Shi, Qi Xia:
A Level Set Based Density Method for Optimizing Structures with Curved Grid Stiffeners. Comput. Aided Des. 153: 103407 (2022) - [j45]Qi Xia, Thomas K. F. Chiu, Min Lee, Ismaila Temitayo Sanusi, Yun Dai, Ching Sing Chai:
A self-determination theory (SDT) design approach for inclusive and diverse artificial intelligence (AI) education. Comput. Educ. 189: 104582 (2022) - [j44]Bonsu Adjei-Arthur, Jianbin Gao, Qi Xia, Eliezer da Silva Tavares, Hu Xia, Sandro Amofa, Yu Wang:
A blockchain-adaptive contractual approach for multi-contracting organizational entities. Future Gener. Comput. Syst. 132: 93-107 (2022) - [j43]Qiben Yan, Qi Xia, Yuanda Wang, Pan Zhou, Huacheng Zeng:
URadio: Wideband Ultrasound Communication for Smart Home Applications. IEEE Internet Things J. 9(15): 13113-13125 (2022) - [j42]Isaac Amankona Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao:
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. J. Comput. Secur. 30(2): 291-324 (2022) - [j41]Jianbin Gao, Bonsu Adjei-Arthur, Emmanuel Boateng Sifah, Hu Xia, Qi Xia:
Supply chain equilibrium on a game theory-incentivized blockchain network. J. Ind. Inf. Integr. 26: 100288 (2022) - [j40]Emmanuel Boateng Sifah, Qi Xia, Kwame Opuni-Boachie Obour Agyekum, Hu Xia, Abla Smahi, Jianbin Gao:
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem. IEEE Syst. J. 16(1): 1673-1684 (2022) - [j39]Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Christian Nii Aflah Cobblah, Hu Xia, Jianbin Gao:
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain. IEEE Syst. J. 16(1): 1685-1696 (2022) - [c49]Sandro Amofa, Xiaodong Lin, Qi Xia, Hu Xia, Jianbin Gao:
Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments. ICPADS 2022: 185-192 - [c48]Xunhan Chen, Zhiyong Ma, Zhenghong Xiao, Qi Xia, Shaopeng Liu:
KGESS - A Knowledge Graph Embedding Method Based on Semantics and Structure. KSEM (1) 2022: 295-308 - [i4]Zeyi Tao, Jindi Wu, Qi Xia, Qun Li:
LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks. CoRR abs/2205.02666 (2022) - 2021
- [j38]Emmanuel Boateng Sifah, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kingsley Nketia Acheampong, Christian Nii Aflah Cobblah, Jianbin Gao:
Selective Sharing of Outsourced Encrypted Data in Cloud Environments. IEEE Internet Things J. 8(18): 14141-14155 (2021) - [j37]Qi Xia, Zeyi Tao, Qun Li:
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(3): 2025-2035 (2021) - [c47]Zeyi Tao, Qi Xia, Qun Li, Songqing Chen:
CE-SGD: Communication-Efficient Distributed Machine Learning. GLOBECOM 2021: 1-7 - [c46]Qi Xia, Qun Li:
QuantumFed: A Federated Learning Framework for Collaborative Quantum Training. GLOBECOM 2021: 1-6 - [c45]Sandro Amofa, Jianbin Gao, Isaac Amankona Obiri, Qi Xia, Xiaokang Su:
Complementary Blockchain-Based Privacy Protection for Covid-19 Contact Tracing. ICCT 2021: 1455-1460 - [c44]Abla Smahi, Qi Xia, Jianbin Gao, Hu Xia:
An Efficient and Secure Blockchain-Based SVM Classification for a COVID-19 Healthcare System. ICMAI 2021: 122-129 - [c43]Zeyi Tao, Qi Xia, Qun Li:
Neuron Manifold Distillation for Edge Deep Learning. IWQoS 2021: 1-10 - [c42]Qi Xia, Zeyi Tao, Qun Li:
Defending Against Byzantine Attacks in Quantum Federated Learning. MSN 2021: 145-152 - [c41]Jindi Wu, Qi Xia, Qun Li:
Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices. MSN 2021: 191-198 - [c40]Qi Xia, Zeyi Tao, Qun Li:
ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning. SecureComm (1) 2021: 229-248 - [i3]Qi Xia, Qun Li:
QuantumFed: A Federated Learning Framework for Collaborative Quantum Training. CoRR abs/2106.09109 (2021) - 2020
- [j36]Emmanuel Boateng Sifah, Hu Xia, Christian Nii Aflah Cobblah, Qi Xia, Jianbin Gao, Xiaojiang Du:
BEMPAS: A Decentralized Employee Performance Assessment System Based on Blockchain for Smart City Governance. IEEE Access 8: 99528-99539 (2020) - [j35]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j34]Jianbin Gao, Kwame Opuni-Boachie Obour Agyekum, Emmanuel Boateng Sifah, Kingsley Nketia Acheampong, Qi Xia, Xiaojiang Du, Mohsen Guizani, Hu Xia:
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 7(5): 4278-4291 (2020) - [j33]Kwame Omono Asamoah, Hu Xia, Sandro Amofa, Isaac Amankona Obiri, Kecheng Luo, Qi Xia, Jianbin Gao, Xiaojiang Du, Mohsen Guizani:
Zero-Chain: A Blockchain-Based Identity for Digital City Operating System. IEEE Internet Things J. 7(10): 10336-10346 (2020) - [j32]Abla Smahi, Qi Xia, Hu Xia, Nantogma Sulemana, Ahmed Ameen Fateh, Jianbin Gao, Xiaojiang Du, Mohsen Guizani:
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data. Pervasive Mob. Comput. 66: 101195 (2020) - [j31]Isaac Amankona Obiri, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Xiaosong Zhang, Jianbin Gao:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. Secur. Commun. Networks 2020: 8869057:1-8869057:18 (2020) - [j30]Shoucong Xiong, Hongdi Zhou, Shuai He, Leilei Zhang, Qi Xia, Jianping Xuan, Tielin Shi:
A Novel End-To-End Fault Diagnosis Approach for Rolling Bearings by Integrating Wavelet Packet Transform into Convolutional Neural Network Structures. Sensors 20(17): 4965 (2020) - [j29]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j28]Jianbing Ni, Kuan Zhang, Qi Xia, Xiaodong Lin, Xuemin Sherman Shen:
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing. IEEE Trans. Mob. Comput. 19(6): 1317-1331 (2020) - [c39]Abla Smahi, Qi Xia, Jianbin Gao, Emmanuel Boateng Sifah, Kwame Opuni-Boachie Obour Agyekum, Hu Xia:
Blockchain-Based Outsourced Privacy-Preserving Support Vector Machine Classification on IoT Data. ICCT 2020: 818-823 - [c38]Qi Xia, Haojie Liu, Zhan Ma:
Object-Based Image Coding: A Learning-Driven Revisit. ICME 2020: 1-6 - [c37]Goodlet Akwasi Kusi, Qi Xia, Christian Nii Aflah Cobblah, Jianbin Gao, Hu Xia:
Training Machine Learning Models Through Preserved Decentralization. MSN 2020: 465-472 - [i2]Qi Xia, Haojie Liu, Zhan Ma:
Object-Based Image Coding: A Learning-Driven Revisit. CoRR abs/2003.08033 (2020)
2010 – 2019
- 2019
- [j27]Zhenhua Li, Tielin Shi, Liang Xia, Qi Xia:
Maximizing the first eigenfrequency of structures subjected to uniform boundary erosion through the level set method. Eng. Comput. 35(1): 21-33 (2019) - [j26]Qi Xia, Emmanuel Boateng Sifah, Kwame Opuni-Boachie Obour Agyekum, Hu Xia, Kingsley Nketia Acheampong, Abla Smahi, Jianbin Gao, Xiaojiang Du, Mohsen Guizani:
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments. IEEE Internet Things J. 6(6): 10749-10762 (2019) - [j25]Zeyi Tao, Qi Xia, Zijiang Hao, Cheng Li, Lele Ma, Shanhe Yi, Qun Li:
A Survey of Virtual Machine Management in Edge Computing. Proc. IEEE 107(8): 1482-1499 (2019) - [j24]Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Jianbin Gao, Hu Xia, Xiaojiang Du, Mohsen Guizani:
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors 19(5): 1235 (2019) - [j23]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [c36]Ruonan Hu, Junjie J. Shang, Qi Xia:
A Study of Primary School Pupils' Motivation, Emotional Intelligence and Attentional Control Ability. ICBL 2019: 327-338 - [c35]Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Yansong Liu, Hong Pu, Christian Nii Aflah Cobblah, Goodlet Akwasi Kusi, Hanlin Yang, Jianbin Gao:
Digital Media Copyright and Content Protection Using IPFS and Blockchain. ICIG (3) 2019: 266-277 - [c34]Qi Xia, Zeyi Tao, Zijiang Hao, Qun Li:
FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks. IJCAI 2019: 4824-4830 - [c33]Qi Xia, Chung-Hsing Yeh, Xiang-Yu Chen:
A Deep Bidirectional Highway Long Short-Term Memory Network Approach to Chinese Semantic Role Labeling. IJCNN 2019: 1-6 - 2018
- [j22]Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiaosong Zhang, Guishan Dong:
GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access 6: 9917-9925 (2018) - [j21]Yuexiao Dong, Qi Xia, Cheng Yong Tang, Zeda Li:
On sufficient dimension reduction with missing responses through estimating equations. Comput. Stat. Data Anal. 126: 67-77 (2018) - [j20]Emmanuel Boateng Sifah, Qi Xia, Kwame Opuni-Boachie Obour Agyekum, Sandro Amofa, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
Chain-based big data access control infrastructure. J. Supercomput. 74(10): 4945-4964 (2018) - [c32]Sandro Amofa, Emmanuel Boateng Sifah, Kwame Opuni-Boachie Obour Agyekum, Abla Smahi, Qi Xia, James C. Gee, Jianbin Gao:
A Blockchain-based Architecture Framework for Secure Sharing of Personal Health Data. HealthCom 2018: 1-6 - [c31]Qi Xia, Emmanuel Boateng Sifah, Ke Huang, Ruidong Chen, Xiaojiang Du, Jianbin Gao:
Secure Payment Routing Protocol for Economic Systems Based on Blockchain. ICNC 2018: 177-181 - [c30]Qi Xia, Qiben Yan, Qin Zhou:
High-bandwidth ultrasonic communication using graphene-based acoustic devices. INFOCOM Workshops 2018: 1-2 - [c29]Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Sandro Amofa, Kingsley Nketia Acheampong, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
V-Chain: A Blockchain-Based Car Lease Platform. iThings/GreenCom/CPSCom/SmartData 2018: 1317-1325 - [i1]Jianbing Ni, Kuan Zhang, Qi Xia, Xiaodong Lin, Xuemin Shen:
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing. CoRR abs/1806.04057 (2018) - 2017
- [j19]Qi Xia, Emmanuel Boateng Sifah, Kwame Omono Asamoah, Jianbin Gao, Xiaojiang Du, Mohsen Guizani:
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain. IEEE Access 5: 14757-14767 (2017) - [j18]Zhenhua Li, Tielin Shi, Qi Xia:
Eliminate localized eigenmodes in level set based topology optimization for the maximization of the first eigenfrequency of vibration. Adv. Eng. Softw. 107: 59-70 (2017) - [j17]Qi Xia, Naiming Qi, Dong Ye, Yubo Guo, Tianye Wang:
Real-time calibration of space zoom cameras based on fixed stars. IET Comput. Vis. 11(5): 342-349 (2017) - [j16]Qi Xia, Emmanuel Boateng Sifah, Abla Smahi, Sandro Amofa, Xiaosong Zhang:
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments. Inf. 8(2): 44 (2017) - [j15]Qi Xia, Yuexiao Dong:
On a new hybrid estimator for the central mean space. J. Syst. Sci. Complex. 30(1): 111-121 (2017) - [c28]Jianbing Ni, Xiaodong Lin, Qi Xia, Xuemin Sherman Shen:
Dual-anonymous reward distribution for mobile crowdsensing. ICC 2017: 1-6 - [c27]Jianbing Ni, Kuan Zhang, Xiaodong Lin, Qi Xia, Xuemin Sherman Shen:
Privacy-preserving mobile crowdsensing for located-based applications. ICC 2017: 1-6 - [c26]Xinyu Jin, Huimin Ye, Lanjuan Li, Qi Xia:
Image Segmentation of Liver CT Based on Fully Convolutional Network. ISCID (1) 2017: 210-213 - [c25]Xinyu Jin, Fenghao Zhu, Lanjuan Li, Qi Xia:
Unsupervised Representation Learning for Pulmonary Nodule Classification. ISCID (1) 2017: 362-365 - 2016
- [j14]Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang, Xiaosong Zhang:
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds. Concurr. Comput. Pract. Exp. 28(10): 2877-2888 (2016) - [j13]Jian Hou, Huijun Gao, Qi Xia, Naiming Qi:
Feature Combination and the kNN Framework in Object Classification. IEEE Trans. Neural Networks Learn. Syst. 27(6): 1368-1378 (2016) - 2015
- [j12]Jian Hou, Qi Xia, Naiming Qi:
Experimental study on dominant sets clustering. IET Comput. Vis. 9(2): 208-215 (2015) - [j11]Lei Niu, Changqing Zhang, Qi Xia, Yong Yu:
Advanced security analysis of a signature scheme with message recovery. Int. J. Inf. Comput. Secur. 7(1): 39-48 (2015) - [j10]Qi Xia, Jianbing Ni, Ansuura John Bosco Aristotle Kanpogninge, James C. Gee:
Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage. J. Univers. Comput. Sci. 21(3): 440-453 (2015) - [j9]Jian Hou, Xu E, Qi Xia, Naiming Qi:
Evaluating classifier combination in object classification. Pattern Anal. Appl. 18(4): 799-816 (2015) - [c24]Jian Hou, Chunshi Sha, Xu E, Qi Xia, Naiming Qi:
Density Based Cluster Extension and Dominant Sets Clustering. GbRPR 2015: 262-271 - 2014
- [j8]Jianbin Gao, Qi Xia, Lixue Yin, Ji Zhou, Li Du, Yunfeng Fan:
A Novel Blind Separation Method in Magnetic Resonance Images. Comput. Math. Methods Medicine 2014: 726712:1-726712:6 (2014) - [j7]Jianbing Ni, Yong Yu, Yi Mu, Qi Xia:
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(10): 2760-2761 (2014) - [c23]Qiong Xie, Min Zhou, Zhou Yin, Yiyi Chen, Yunqing Qiu, Qi Xia:
The Design and Use of a Computerized Management of Follow-up Data for Liver Transplantation Patients. ES 2014: 51-56 - [c22]Jian Hou, Chunshi Sha, Lei Chi, Qi Xia, Naiming Qi:
Merging dominant sets and DBSCAN for robust clustering and image segmentation. ICIP 2014: 4422-4426 - [c21]Jian Hou, Xu E, Lei Chi, Qi Xia, Naiming Qi:
Robust Clustering Based on Dominant Sets. ICPR 2014: 1466-1471 - [c20]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - 2013
- [j6]Jian Hou, Xu E, Wei-Xue Liu, Qi Xia, Naiming Qi:
A density-based enhancement to dominant sets clustering. IET Comput. Vis. 7(5): 354-361 (2013) - [j5]Ke Wang, Tielin Shi, Guanglan Liao, Qi Xia:
Image registration using a point-line duality based line matching method. J. Vis. Commun. Image Represent. 24(5): 615-626 (2013) - [j4]Jian Hou, Wei-Xue Liu, Xu E, Qi Xia, Naiming Qi:
An experimental study on the universality of visual vocabularies. J. Vis. Commun. Image Represent. 24(7): 1204-1211 (2013) - [c19]Jian Hou, Xu E, Lei Chi, Qi Xia, Naiming Qi:
DSET++: A robust clustering algorithm. ICIP 2013: 3795-3799 - [c18]Yannan Li, Qi Xia, Jianbing Ni, Yong Yu:
A New Construction of Proxy Signature Using Chameleon Hash Function. INCoS 2013: 388-391 - [c17]Jiandong Cai, Michael Yu Wang, Qi Xia:
Tailoring the ratios between eigenfrequencies of tapping mode atomic force microscope probe using concentrated masses. RAM 2013: 207-211 - 2012
- [j3]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [c16]Jian Hou, Xu E, Lei Chi, Qi Xia, Naiming Qi:
Dominant set and target clique extraction. ICPR 2012: 1831-1834 - [c15]Bo Yang, Ying Sun, Yong Yu, Qi Xia:
A Strong Designated Verifier Signature Scheme with Secure Disavowability. INCoS 2012: 286-291 - 2011
- [j2]Jianbin Gao, Mao Ye, Jianping Li, Qi Xia:
A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition. Int. J. Comput. Intell. Syst. 4(5): 991-1001 (2011) - [c14]Ke Wang, Qi Xia, Tielin Shi, Guanglan Liao, Shiyuan Liu:
A pattern matching method using geometric information of images. NEMS 2011: 33-36
2000 – 2009
- 2009
- [c13]Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu:
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. IAS 2009: 661-664 - [c12]Qi Xia, Chunxiang Xu:
Cryptanalysis of Two Identity Based Signcryption Schemes. DASC 2009: 292-294 - 2008
- [j1]Qi Xia, Michael Yu Wang:
Simultaneous optimization of the material properties and the topology of functionally graded structures. Comput. Aided Des. 40(6): 660-675 (2008) - 2007
- [c11]Qi Xia, Michael Yu Wang:
Level set based method for simultaneous optimization of material property and topology of functionally graded structures. Symposium on Solid and Physical Modeling 2007: 171-182 - 2006
- [c10]Qi Xia, Michael Yu Wang, Xiaojun Wu:
Orthogonal Least Squares in Partition of Unity Surface Reconstruction with Radial Basis Function. GMAI 2006: 28-33 - [c9]Xiaojun Wu, Michael Yu Wang, Qi Xia:
Orthogonal Least Square RBF Based Implicit Surface Reconstruction Methods. VSMM 2006: 232-241 - 2005
- [c8]Ruijun Yang, Qi Xia, Qunhua Pan, Minglu Li, Weinong Wang:
New Enhancement Scheme for Secure Routing Protocol in Mobile Ad Hoc Networks. CIT 2005: 685-689 - [c7]Qi Xia, Ruijun Yang, Weinong Wang, De Yang:
Fully Decentralized DHT based Approach to Grid Service Discovery using Overlay Networks. CIT 2005: 1140-1045 - [c6]Xiaojun Wu, Michael Yu Wang, Qi Xia:
Implicit fitting and smoothing using radial basis functions with partition of unity. CAD/Graphics 2005: 10 - [c5]Qi Xia, Weinong Wang, Ruijun Yang:
A Fully Decentralized Approach to Grid Service Discovery Using Self-organized Overlay Networks. EGC 2005: 164-172 - [c4]Ruijun Yang, Qi Xia, Qunhua Pan, Weinong Wang, Minglu Li:
Cost Management Based Secure Framework in Mobile Ad Hoc Networks. MSN 2005: 63-72 - [c3]Xiao Chen, Ruijun Yang, Qi Xia, Weinong Wang:
Overlay Multicasting over Multihomed Proxie. PDCAT 2005: 144-148 - [c2]Ruijun Yang, Qi Xia, Weinong Wang, Qunhua Pan, Xinli Huang, Minglu Li:
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks. PDCAT 2005: 201-204 - [c1]Qi Xia, Ruijun Yang, Weinong Wang:
Spatial Gossip on the Percolation Model. PDCAT 2005: 755-758
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint