default search action
Weidong Qiu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Min. Knowl. Discov. 38(3): 1171-1192 (2024) - [j35]Guowei Ling, Fei Tang, Chaochao Cai, Jinyong Shan, Haiyang Xue, Wulu Li, Peng Tang, Xinyi Huang, Weidong Qiu:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 19: 2201-2216 (2024) - [c59]Haozhang Li, Yangde Wang, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning. ACISP (3) 2024: 404-423 - [c58]Huina Li, Haochen Zhang, Kai Hu, Guozhen Liu, Weidong Qiu:
AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective. ACISP (1) 2024: 450-471 - [c57]Peng Tang, Lifan Wang, Weidong Qiu, Zheng Huang, Qiangmin Wang:
Fuzzy Clustered Federated Learning Under Mixed Data Distributions. AAMAS 2024: 2501-2503 - [c56]Yanbo Zhang, Mi Wen, Weiwei Li, Ben Niu, Weidong Qiu, Fenghua Li:
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning. ICC 2024: 5184-5189 - [c55]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains. IJCAI 2024: 4136-4146 - [c54]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Fine-Grained Contrastive Learning for Pulmonary Nodule Classification. IJCNN 2024: 1-8 - [i15]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Federated Semi-supervised Learning for Medical Image Segmentation with intra-client and inter-client Consistency. CoRR abs/2403.12695 (2024) - [i14]Jiazhou Ji, Ruizhe Li, Shujun Li, Jie Guo, Weidong Qiu, Zheng Huang, Chiyu Chen, Xiaoyu Jiang, Xinru Lu:
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated. CoRR abs/2406.18259 (2024) - [i13]Yangde Wang, Haozhang Li, Weidong Qiu, Shujun Li, Peng Tang:
PassTSL: Modeling Human-Created Passwords through Two-Stage Learning. CoRR abs/2407.14145 (2024) - [i12]Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li:
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers. CoRR abs/2410.04754 (2024) - [i11]Guowei Ling, Peng Tang, Weidong Qiu:
Low-Communication Updatable PSI from Asymmetric PSI and PSU. IACR Cryptol. ePrint Arch. 2024: 1712 (2024) - 2023
- [j34]Yangyang Bao, Weidong Qiu, Xiaochun Cheng:
Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices. Expert Syst. J. Knowl. Eng. 40(6) (2023) - [j33]Ijazul Haq, Weidong Qiu, Jie Guo, Peng Tang:
Pashto offensive language detection: a benchmark dataset and monolingual Pashto BERT. PeerJ Comput. Sci. 9: e1617 (2023) - [j32]Ijazul Haq, Weidong Qiu, Jie Guo, Peng Tang:
Correction of whitespace and word segmentation in noisy Pashto text using CRF. Speech Commun. 153: 102970 (2023) - [j31]Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu:
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications. IEEE Trans. Inf. Forensics Secur. 18: 3517-3530 (2023) - [j30]Yangyang Bao, Weidong Qiu, Xiaochun Cheng, Jianfei Sun:
Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV. IEEE Trans. Intell. Transp. Syst. 24(11): 13035-13049 (2023) - [j29]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. IACR Trans. Symmetric Cryptol. 2023(3): 74-100 (2023) - [j28]Yangyang Bao, Rongxing Lu, Songnian Zhang, Xiaochun Cheng, Huijuan Lian, Yunguo Guan, Weidong Qiu:
Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service. IEEE Trans. Veh. Technol. 72(11): 13969-13984 (2023) - [c53]Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu:
Automatic Search of Linear Structure: Applications to Keccak and Ascon. Inscrypt (2) 2023: 172-192 - [c52]Yubin Zheng, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo, Zheng Huang:
A Novel Deep Learning Framework for Interpretable Drug-Target Interaction Prediction with Attention and Multi-task Mechanism. DASFAA (4) 2023: 336-352 - [c51]Dan Wang, Fan Li, Weidong Qiu, Yixing Zhang, Xiaoman Wu, Kexin Zhang, Taikun Tao, Ruanming Huang:
Control Parameter Analysis of AC/DC Systems Based on Input to State Stability Theory and Regression Decision Tree. EEET 2023: 192-196 - [c50]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. EMNLP 2023: 4268-4280 - [c49]Xinrui Deng, Zheng Huang, Kefan Ma, Kai Chen, Jie Guo, Weidong Qiu:
GenTC: Generative Transformer via Contrastive Learning for Receipt Information Extraction. ICANN (6) 2023: 394-406 - [c48]Xinrui Deng, Zheng Huang, Kefan Ma, Kai Chen, Jie Guo, Weidong Qiu:
RRecT: Chinese Text Recognition with Radical-Enhanced Recognition Transformer. ICANN (6) 2023: 509-521 - [c47]Kefan Ma, Zheng Huang, Xinrui Deng, Jie Guo, Weidong Qiu:
LED: Label Correlation Enhanced Decoder for Multi-Label Text Classification. ICASSP 2023: 1-5 - [c46]Kefan Ma, Yuchen Luo, Zheng Huang, Kai Chen, Jie Guo, Weidong Qiu:
TDAE: Text Detection with Affinity Areas and Evolution Strategies. ICDAR (6) 2023: 22-35 - [c45]Bo Wang, Jie Guo, Zheng Huang, Weidong Qiu:
A Multi-Modal Approach for the Detection of Account Anonymity on Social Media Platforms. IJCNN 2023: 1-7 - [i10]Yangde Wang, Weidong Qiu, Weicheng Zhang, Hao Tian, Shujun Li:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. CoRR abs/2306.06824 (2023) - [i9]Xin Yuan, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. CoRR abs/2311.01766 (2023) - [i8]Zhanbo Liang, Jie Guo, Weidong Qiu, Zheng Huang, Shujun Li:
When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification. CoRR abs/2311.15917 (2023) - [i7]Ke Hu, Weidong Qiu, Peng Tang:
Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights. CoRR abs/2312.06951 (2023) - [i6]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. IACR Cryptol. ePrint Arch. 2023: 1266 (2023) - 2022
- [j27]Yangyang Bao, Weidong Qiu, Xiaochun Cheng:
Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System. IEEE Internet Things J. 9(4): 2513-2526 (2022) - [j26]Yangyang Bao, Weidong Qiu, Peng Tang, Xiaochun Cheng:
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Informatics 26(5): 2041-2051 (2022) - [c44]Yuchen Luo, Zheng Huang, Jie Guo, Weidong Qiu:
GTRNet: a graph-based table reconstructed network. ICTAI 2022: 494-499 - [c43]Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li:
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. TrustCom 2022: 383-390 - [i5]Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu:
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications. IACR Cryptol. ePrint Arch. 2022: 1573 (2022) - [i4]Huina Li, Guozhen Liu, Haochen Zhang, Kai Hu, Jian Guo, Weidong Qiu:
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective. IACR Cryptol. ePrint Arch. 2022: 1641 (2022) - 2021
- [j25]Yangyang Bao, Weidong Qiu, Xiaochun Cheng:
Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure. IEEE Internet Things J. 8(11): 9189-9205 (2021) - [c42]Jinian Luo, Jie Guo, Weidong Qiu, Zheng Huang, Hong Hui:
Scale Invariant Domain Generalization Image Recapture Detection. ICONIP (4) 2021: 75-86 - [c41]Chenyi Wang, Jie Guo, Weidong Qiu, Zheng Huang, Yuhang Yang:
Terroristic Content Detection using a Multi-scene classification system. ICTAI 2021: 896-901 - [c40]Jiaming Feng, Zheng Huang, Jie Guo, Weidong Qiu:
Unsupervised Anomaly Detection for Time Series with Outlier Exposure. SSDBM 2021: 1-12 - [i3]Yangde Wang, Weidong Qiu, Yuming Xie, Yan Zha:
PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos. CoRR abs/2102.01509 (2021) - [i2]Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu:
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction. CoRR abs/2103.06487 (2021) - [i1]Jinian Luo, Jie Guo, Weidong Qiu, Zheng Huang, Hong Hui:
Scale Invariant Domain Generalization Image Recapture Detection. CoRR abs/2110.03496 (2021) - 2020
- [j24]Huijuan Lian, Weidong Qiu, Di Yan, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 96: 101845 (2020) - [j23]Peng Tang, Weidong Qiu, Zheng Huang, Shuang Chen, Min Yan, Huijuan Lian, Zhe Li:
Anomaly detection in electronic invoice systems based on machine learning. Inf. Sci. 535: 172-186 (2020) - [j22]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
Detection of SQL injection based on artificial neural network. Knowl. Based Syst. 190: 105528 (2020) - [j21]Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. Peer-to-Peer Netw. Appl. 13(6): 2324-2333 (2020) - [c39]Yuan Hua, Zheng Huang, Jie Guo, Weidong Qiu:
Attention-Based Graph Neural Network with Global Context Awareness for Document Understanding. CNCL 2020: 45-56 - [c38]Xuan Peng, Zheng Huang, Kai Chen, Jie Guo, Weidong Qiu:
RLST: A Reinforcement Learning Approach to Scene Text Detection Refinement. ICPR 2020: 1521-1528 - [c37]Qian Xie, Zheng Huang, Jie Guo, Weidong Qiu:
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting. ML4CS (1) 2020: 153-159 - [c36]Shiyin He, Zheng Huang, Kai Chen, Jie Guo, Weidong Qiu:
CellIdNet: Automatic Cell Instance Segmentation and Classification in Bone Marrow Examination with Double Backbone Networks. ML4CS (3) 2020: 248-258 - [c35]Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. SocialSec 2020: 203-214
2010 – 2019
- 2019
- [j20]Bozhong Liu, Ling Chen, Xingquan Zhu, Weidong Qiu:
Encrypted data indexing for the secure outsourcing of spectral clustering. Knowl. Inf. Syst. 60(3): 1307-1328 (2019) - [j19]Guozhen Liu, Weidong Qiu, Yi Tu:
New Techniques for Searching Differential Trails in Keccak. IACR Trans. Symmetric Cryptol. 2019(4): 407-437 (2019) - [c34]Hao Tian, Yan Li, Yangde Wang, Tang Peng, Shaopei Shi, Weidong Qiu:
Optimized Password Recovery based on GPUs for SM3 Algorithm. CSAE 2019: 148:1-148:5 - [c33]Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. DSC 2019: 84-91 - [c32]Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. DSC 2019: 300-305 - [c31]Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. DSC 2019: 306-311 - [c30]Zhaohui Jiang, Zheng Huang, Yunrui Lian, Jie Guo, Weidong Qiu:
Integrating Coordinates with Context for Information Extraction in Document Images. ICDAR 2019: 363-368 - [c29]Yuting Gao, Zheng Huang, Yuchen Dai, Kai Chen, Jie Guo, Weidong Qiu:
Wacnet: Word Segmentation Guided Characters Aggregation Net for Scene Text Spotting With Arbitrary Shapes. ICIP 2019: 3382-3386 - [c28]Xiaohui Fanhe, Jie Guo, Zheng Huang, Weidong Qiu, Yuele Zhang:
Multi-Task Learning with Knowledge Transfer for Facial Attribute Classification. ICIT 2019: 877-882 - [c27]Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu:
Software Tamper Resistance Based on White-Box SMS4 Implementation. iSCI 2019: 486-495 - 2018
- [j18]Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu:
A new efficient authorized private set intersection protocol from Schnorr signature and its applications. Clust. Comput. 21(1): 287-297 (2018) - [j17]Yunlu Xu, Jie Guo, Zheng Huang, Weidong Qiu:
Sparse coding with cross-view invariant dictionaries for person re-identification. Multim. Tools Appl. 77(9): 10715-10732 (2018) - [j16]Weidong Qiu, Bozhong Liu, Can Ge, Lingzhi Xu, Xiaoming Tang, Guozhen Liu:
Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach. Peer-to-Peer Netw. Appl. 11(2): 252-264 (2018) - [j15]Guohong Liao, Zheng Gong, Zheng Huang, Weidong Qiu:
A generic optimization method of multivariate systems on graphic processing units. Soft Comput. 22(23): 7857-7864 (2018) - [c26]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
SQL Injection Behavior Mining Based Deep Learning. ADMA 2018: 445-454 - [c25]Hao Xue, Zheng Huang, Huijuan Lian, Weidong Qiu, Jie Guo, Shen Wang, Zheng Gong:
Distributed Large Scale Privacy-Preserving Deep Mining. DSC 2018: 418-422 - [c24]Yuchen Dai, Zheng Huang, Yuting Gao, Youxuan Xu, Kai Chen, Jie Guo, Weidong Qiu:
Fused Text Segmentation Networks for Multi-oriented Scene Text Detection. ICPR 2018: 3604-3609 - 2017
- [j14]Jie Guo, Yuele Zhang, Zheng Huang, Weidong Qiu:
Person Re-Identification by Weighted Integration of Sparse and Collaborative Representation. IEEE Access 5: 21632-21639 (2017) - [j13]Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Jie Guo:
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service. Complex. 2017: 1490283:1-1490283:14 (2017) - [j12]Zheng Huang, Jiajun Peng, Huijuan Lian, Jie Guo, Weidong Qiu:
Deep Recurrent Model for Server Load and Performance Prediction in Data Center. Complex. 2017: 8584252:1-8584252:10 (2017) - [c23]Can Ge, Lingzhi Xu, Weidong Qiu, Zheng Huang, Jie Guo, Guozhen Liu, Zheng Gong:
Optimized Password Recovery for SHA-512 on GPUs. CSE/EUC (2) 2017: 226-229 - [c22]Lingzhi Xu, Can Ge, Weidong Qiu, Zheng Huang, Zheng Gong, Jie Guo, Huijuan Lian:
Password Guessing Based on LSTM Recurrent Neural Networks. CSE/EUC (1) 2017: 785-788 - [c21]Bozhong Liu, Ling Chen, Xingquan Zhu, Ying Zhang, Chengqi Zhang, Weidong Qiu:
Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data. EDBT 2017: 478-481 - 2016
- [j11]Zheng Gong, Shusheng Liu, Yamin Wen, Yiyuan Luo, Weidong Qiu:
Biclique cryptanalysis using balanced complete bipartite subgraphs. Sci. China Inf. Sci. 59(4): 049101:1-049101:3 (2016) - [j10]Bozhong Liu, Weidong Qiu, Lin Jiang, Zheng Gong:
Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity. Int. J. High Perform. Comput. Appl. 30(2): 169-185 (2016) - [j9]Kai-Hao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong:
An Improved Automatic Search Method for Differential Trails in TEA Cipher. Int. J. Netw. Secur. 18(4): 644-649 (2016) - [j8]Fanfu Zhou, Ruhui Ma, Jian Li, Li-Xia Chen, Weidong Qiu, Haibing Guan:
Optimizations for High Performance Network Virtualization. J. Comput. Sci. Technol. 31(1): 107-116 (2016) - [j7]Weidong Qiu, Zheng Gong, Yidong Guo, Bozhong Liu, Xiaoming Tang, Yuheng Yuan:
GPU-Based High Performance Password Recovery Technique for Hash Functions. J. Inf. Sci. Eng. 32(1): 97-112 (2016) - [c20]Bozhong Liu, Ling Chen, Chunyang Liu, Chengqi Zhang, Weidong Qiu:
Mining Co-locations from Continuously Distributed Uncertain Spatial Data. APWeb (1) 2016: 66-78 - 2015
- [c19]Bozhong Liu, Ling Chen, Chunyang Liu, Chengqi Zhang, Weidong Qiu:
RCP Mining: Towards the Summarization of Spatial Co-location Patterns. SSTD 2015: 451-469 - 2014
- [c18]Yuheng Yuan, Zhenzhong He, Zheng Gong, Weidong Qiu:
Acceleration of AES Encryption with OpenCL. AsiaJCIS 2014: 64-70 - [c17]Weidong Qiu, Run Zhu, Jie Guo, Xiaoming Tang, Bozhong Liu, Zheng Huang:
A New Approach to Multimedia Files Carving. BIBE 2014: 105-110 - 2013
- [j6]Weidong Qiu, Qian Su, Bozhong Liu, Yan Li:
iOS Data Recovery Using Low-Level NAND Images. IEEE Secur. Priv. 11(5): 49-55 (2013) - [e2]Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2 [contents] - [e1]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - 2011
- [j5]Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen:
Restrictive partially blind signature for resource-constrained information systems. Knowl. Inf. Syst. 26(1): 87-103 (2011) - [c16]Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng:
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. ISPEC 2011: 247-256 - 2010
- [j4]Xiangxue Li, Weidong Qiu, Dong Zheng, Kefei Chen, Jianhua Li:
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 57(2): 793-800 (2010)
2000 – 2009
- 2009
- [j3]Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:
A key management protocol with robust continuity for sensor networks. Comput. Stand. Interfaces 31(4): 642-647 (2009) - [c15]Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen:
Efficient Secure Multiparty Computation Protocol in Asynchronous Network. ISA 2009: 152-158 - [c14]Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong:
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ISA 2009: 200-209 - [c13]Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu:
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. WISM 2009: 413-425 - 2008
- [c12]Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 - [c11]Xingquan Zhu, Chengyi Bao, Weidong Qiu:
Bagging very weak learners with lazy local learning. ICPR 2008: 1-4 - 2007
- [c10]Shengli Liu, Kefei Chen, Weidong Qiu:
Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343 - [c9]Zheng Huang, Weidong Qiu, Haibin Guan, Kefei Chen:
Efficient Receipt-Free Electronic Auction Protocol. SITIS 2007: 1023-1028 - [p1]Weidong Qiu:
A Fair Off-line Electronic Payment System. Contributions to Ubiquitous Computing 2007: 177-195 - 2005
- [j2]Weidong Qiu, Kefei Chen:
Identity oriented signature scheme based on quadratic residues. Appl. Math. Comput. 168(1): 235-242 (2005) - [j1]Weidong Qiu:
Converting normal DLP-based signatures into blind. Appl. Math. Comput. 170(1): 657-665 (2005) - [c8]Bo Zhou, Weidong Qiu, Chenglian Peng:
An Operating System Framework for Reconfigurable Systems. CIT 2005: 788-792 - [c7]Bo Zhou, Yonghui Chen, Weidong Qiu, Yan Chen, Chenglian Peng:
Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems. CSCWD (Selected papers) 2005: 636-645 - [c6]Weidong Qiu, Bo Zhou, Yan Chen, Chenglian Peng:
Fast on-line real-time scheduling algorithm for reconfigurable computing. CSCWD (2) 2005: 793-798 - [c5]Bo Zhou, Weidong Qiu, Yan Chen, Chenglian Peng:
SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks. CSCWD (2) 2005: 984-989 - 2003
- [c4]Weidong Qiu, Mingxing He, Firoz Kaderali:
Group Oriented Digital Certificate Architecture. CEC 2003: 233-237 - 2002
- [c3]Biljana Cubaleska, Weidong Qiu, Markus Schneider:
How to Play Sherlock Holmes in the World of Mobile Agents. ACISP 2002: 449-463 - [c2]Baifeng Wu, Chenglian Peng, Weidong Qiu, Xiaoguang Sun:
Component Priority Assignment in tha Data Flow Dominated Embedded Systems with Timing Constraints. CSCWD 2002: 385-388 - [c1]Weidong Qiu, Kefei Chen, Dawu Gu:
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint