Fang Qi

Orcid: 0000-0003-1447-0428

According to our database1, Fang Qi authored at least 52 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Two guidance joint network based on coarse map and edge map for camouflaged object detection.
Appl. Intell., August, 2024

An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

A New Routing Strategy to Improve Success Rates of Quantum Computers.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
Improved Pest-YOLO: Real-time pest detection based on efficient channel attention mechanism and transformer encoder.
Ecol. Informatics, December, 2023

Real-time and effective detection of agricultural pest using an improved YOLOv5 network.
J. Real Time Image Process., April, 2023

An improved lightweight and real-time YOLOv5 network for detection of surface defects on indocalamus leaves.
J. Real Time Image Process., February, 2023

Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat.
Concurr. Comput. Pract. Exp., 2023

Graph Neural Network Assisted Quantum Compilation for Qubit Allocation.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

2022
P &GGD: A Joint-Way Model Optimization Strategy Based on Filter Pruning and Filter Grafting For Tea Leaves Classification.
Neural Process. Lett., 2022

Lightweight Plant Disease Classification Combining GrabCut Algorithm, New Coordinate Attention, and Channel Pruning.
Neural Process. Lett., 2022

End-to-end pest detection on an improved deformable DETR with multihead criss cross attention.
Ecol. Informatics, 2022

On authenticated skyline query processing over road networks.
Concurr. Comput. Pract. Exp., 2022

GeauxTrace: A Scalable Privacy-Protecting Contact Tracing App Design Using Blockchain.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
Related Study Based on Otsu Watershed Algorithm and New Squeeze-and-Excitation Networks for Segmentation and Level Classification of Tea Buds.
Neural Process. Lett., 2021

Relational reasoning for real-time object searching.
J. Electronic Imaging, 2021

Multi-models and dual-sampling periods quality prediction with time-dimensional K-means and state transition-LSTM network.
Inf. Sci., 2021

Pest-YOLO: Deep Image Mining and Multi-Feature Fusion for Real-Time Agriculture Pest Detection.
Proceedings of the IEEE International Conference on Data Mining, 2021

A Physarum-based Boost Algorithm for Network Optimization in Dense Wireless Sensor Networks.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Bidirectional LSTM with self-attention mechanism and multi-channel features for sentiment classification.
Neurocomputing, 2020

Grape disease image classification based on lightweight convolution neural networks and channelwise attention.
Comput. Electron. Agric., 2020

A Function-Centric Risk Assessment Approach for Android Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Robust Cache-Aware Quantum Processor Layout.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

A Hybrid Task Scheduling Algorithm Combining Symbiotic Organisms Search with Fuzzy Logic in Cloud Computing.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019

Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks.
Proceedings of the Tenth International Green and Sustainable Computing Conference, 2019

Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Fooling AI with AI: An Accelerator for Adversarial Attacks on Deep Learning Visual Classification.
Proceedings of the 30th IEEE International Conference on Application-specific Systems, 2019

2018
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.
Telecommun. Syst., 2018

2017
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Module-Level Software Streaming Loading Model Based on Hypervisor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Optimal transitional trajectory generation for automatic machines.
Int. J. Comput. Sci. Eng., 2016

Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
A local binary pattern based texture descriptors for classification of tea leaves.
Neurocomputing, 2015

Selective partial recovery optimisation strategy for SSL connection migration.
Int. J. Auton. Adapt. Commun. Syst., 2015

Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems.
Proceedings of the 2015 IEEE International Conference on Peer-to-Peer Computing, 2015

Efficient Private Matching Scheme for Friend Information Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

New Escrow-Free Scheme for Hierarchical Identity-Based Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Some topics in modeling ranking data.
PhD thesis, 2014

Unified Security Architecture Research for 5G Wireless System.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
User requirements-aware security ranking in SSL protocol.
J. Supercomput., 2013

2011
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
Secur. Commun. Networks, 2011

Dynamic fuzzy neural network for the intelligent control of a humanoid robot.
Comput. Syst. Sci. Eng., 2011

2009
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Attacks vs. Countermeasures of SSL Protected Trust Model.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

2005
Batching SSL/TLS Handshake Improved.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Available Bandwidth Measurement Schemes over Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...