Qinglong Wang

Orcid: 0000-0002-7077-5392

According to our database1, Qinglong Wang authored at least 58 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep learning-based flatness prediction via multivariate industrial data for steel strip during tandem cold rolling.
Expert Syst. Appl., March, 2024

Tracking and navigation of a microswarm under laser speckle contrast imaging for targeted delivery.
Sci. Robotics, February, 2024

Method for Audio-to-Tactile Cross-Modality Generation Based on Residual U-Net.
IEEE Trans. Instrum. Meas., 2024

2023
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms.
J. Inf. Secur. Appl., November, 2023

A higher-order noise perturbed predator-prey system with fear effect and mixed functional responses.
J. Appl. Math. Comput., October, 2023

Dephasing Dynamics in a Non-Equilibrium Fluctuating Environment.
Entropy, April, 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Two delayed commensalism models with noise coupling and interval biological parameters.
J. Appl. Math. Comput., April, 2022

Autonomous environment-adaptive microrobot swarm navigation enabled by deep learning-based real-time distribution planning.
Nat. Mach. Intell., 2022

Protecting image privacy through adversarial perturbation.
Multim. Tools Appl., 2022

Prediction and analysis of the soil organic matter distribution with the spatiotemporal kriging method.
Earth Sci. Informatics, 2022

Enhanced Interactive Performance of Zoom-In/Out Gestures Using Electrostatic Tactile Feedback on Touchscreens.
Comput. J., 2022

Industry practice of configuration auto-tuning for cloud applications and services.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
Vibrotactile Feedback Rendering of Patterned Textures Using a Waveform Segment Table Method.
IEEE Trans. Haptics, 2021

Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures.
Secur. Commun. Networks, 2021

A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications.
Int. J. Digit. Crime Forensics, 2021

An Entropy Metric for Regular Grammar Classification and Learning with Recurrent Neural Networks.
Entropy, 2021

2020
Shapley Homology: Topological Analysis of Sample Influence for Neural Networks.
Neural Comput., 2020

Prediction and analysis of cold rolling mill vibration based on a data-driven method.
Appl. Soft Comput., 2020

Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks.
IEEE Access, 2020

Deep Learning, Grammar Transfer, and Transportation Theory.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

Adversarial Models for Deterministic Finite Automata.
Proceedings of the Advances in Artificial Intelligence, 2020

2019
针对车联网认证方案CPAV和ABV的安全分析 (Security Analysis on VANETs Authentication Schemes: CPAV and ABV).
计算机科学, 2019

Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks.
IACR Cryptol. ePrint Arch., 2019

Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata.
CoRR, 2019

Gated Attentive-Autoencoder for Content-Aware Recommendation.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

2018
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks.
Neural Comput., 2018

Verification of Recurrent Neural Networks Through Rule Extraction.
CoRR, 2018

When Renewable Energy Meets Building Thermal Mass: A Real-time Load Management Scheme.
CoRR, 2018

Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks.
CoRR, 2018

A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity.
CoRR, 2018

Defending Against Adversarial Samples Without Security through Obscurity.
Proceedings of the IEEE International Conference on Data Mining, 2018

Point-of-Interest Recommendation: Exploiting Self-Attentive Autoencoders with Neighbor-Aware Influence.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

2017
Tactile modeling and rendering image-textures based on electrovibration.
Vis. Comput., 2017

Existence and stability of positive almost periodic solutions for a competitive system on time scales.
Math. Comput. Simul., 2017

An Empirical Evaluation of Recurrent Neural Network Rule Extraction.
CoRR, 2017

Drone privacy shield: A WiFi based defense.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Enhancing Pen-based Interaction using Electrovibration and Vibration Haptic Feedback.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Random Feature Nullification for Adversary Resistant Deep Architecture.
CoRR, 2016

Learning Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Smart Charging for Electric Vehicles: A Survey From the Algorithmic Perspective.
IEEE Commun. Surv. Tutorials, 2016

EV-Pen: Leveraging Electrovibration Haptic Feedback in Pen Interaction.
Proceedings of the 2016 ACM on Interactive Surfaces and Spaces, 2016

EV-pen: an electrovibration haptic feedback pen for touchscreens.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016 - Emerging Technologies, 2016

Smart Rate Control and Demand Balancing for Electric Vehicle Charging.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

2015
Nanomaterials-Based Optical Techniques for the Detection of Acetylcholinesterase and Pesticides.
Sensors, 2015

随机背包公钥密码的分析与改进 (Analysis and Improvement of Public Key Cryptosystem Using Random Knapsacks).
计算机科学, 2015

Efficient k-out-of-n oblivious transfer protocol.
IACR Cryptol. ePrint Arch., 2015

I know what you did on your smartphone: Inferring app usage over encrypted data traffic.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Positive Periodic Solutions of a Periodic Discrete Competitive System Subject to Feedback Controls.
J. Appl. Math., 2014

Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol.
Cryptologia, 2014

An almost periodic competitive system subject to impulsive perturbations.
Appl. Math. Comput., 2014

2013
Positive Almost Periodic Solutions for a Discrete Competitive System Subject to Feedback Controls.
J. Appl. Math., 2013

Uniformly Asymptotic Stability of Positive Almost Periodic Solutions for a Discrete Competitive System.
J. Appl. Math., 2013

2012
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol.
IACR Cryptol. ePrint Arch., 2012

2010
Certificates Distributed Storage Scheme in the Trust Management System.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010


  Loading...