Qiyan Wang

Orcid: 0000-0002-3816-0830

According to our database1, Qiyan Wang authored at least 12 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Research on target detection method of underwater robot in low illumination environment.
Multim. Tools Appl., July, 2023

2015
An Old Story Retold: Loss of G1 Control Defines A Distinct Genomic Subtype of Esophageal Squamous Cell Carcinoma.
Genom. Proteom. Bioinform., 2015

2014
VeCure: A practical security framework to protect the CAN bus of vehicles.
Proceedings of the 4th International Conference on the Internet of Things, 2014

2013
Robust censorship-resistant communication
PhD thesis, 2013

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012

Octopus: A Secure and Anonymous DHT Lookup.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
COADA: Leveraging Dynamic Coalition Peer-to-Peer Network for Adaptive Content Download of Cellular Users.
Int. J. Adapt. Resilient Auton. Syst., 2011

2010
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009


  Loading...