Jing Qiu

Orcid: 0000-0003-4202-7802

Affiliations:
  • Guangzhou University, Cyberspace Institute of Advanced Technology, China


According to our database1, Jing Qiu authored at least 59 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext.
Frontiers Comput. Sci., February, 2025

2024
ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution.
IEEE Trans. Knowl. Data Eng., December, 2024

PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network.
IEEE Trans. Comput. Soc. Syst., August, 2024

A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS.
J. Signal Process. Syst., March, 2024

ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024

FedGA: A greedy approach to enhance federated learning with Non-IID data.
Knowl. Based Syst., 2024

Ada-FFL: Adaptive computing fairness federated learning.
CAAI Trans. Intell. Technol., 2024

2023
Efficient and Effective Nonconvex Low-Rank Subspace Clustering via SVT-Free Operators.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023

Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023

Conserving Semantic Unit Information and Simplifying Syntactic Constituents to Improve Implicit Discourse Relation Recognition.
Entropy, September, 2023

Diverse classifiers with label dependencies for long-tail relation extraction in big data.
Comput. Electr. Eng., September, 2023

A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023

Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection.
IEEE Trans. Knowl. Data Eng., May, 2023

Super-resolution-based part collaboration network for vehicle re-identification.
World Wide Web (WWW), March, 2023

ASNN-FRR: A traffic-aware neural network for fastest route recommendation.
GeoInformatica, 2023

Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023

Towards Scale-Aware Self-Supervised Multi-Frame Depth Estimation with IMU Motion Dynamics.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence Reports.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Efficient Algorithms for Obnoxious Facility Location on a Line Segment or Circle.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022

STPrompt: Semantic-guided and Task-driven prompts for Effective Few-shot Classification.
CoRR, 2022

An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Contract Vulnerability Detection Model Based on Siamese Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge Graphs.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Modeling Dynamic Entities in Temporal Knowledge Graphs.
Proceedings of the 8th IEEE International Conference on Cloud Computing and Intelligent Systems, 2022

2021
The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021

An Efficient Approach for Spatial Trajectory Anonymization.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Adversarial Attacks on Vehicle Re-Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020

A Distributed Deep Learning System for Web Attack Detection on Edge Devices.
IEEE Trans. Ind. Informatics, 2020

Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020

Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City.
IEEE Trans. Comput. Soc. Syst., 2020

Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020

A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020

A consistency-guaranteed approach for Internet of Things <i>software refactoring</i>.
Int. J. Distributed Sens. Networks, 2020

Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020

SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019

Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation.
IEEE Access, 2019

An Graph-Based Adaptive Method for Fast Detection of Transformed Data Leakage in IOT Via WSN.
IEEE Access, 2019

Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks.
IEEE Access, 2019

Resonance p-Laplacian Problem in Edge Device Control of IoT.
IEEE Access, 2019

Group-Intelligence Construction of Linguistic-Humanity KG in Chinese Verses.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

A Review of Network Representation Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Tutorial of Graph Representation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Construction and Application of Teaching System Based on Crowdsourcing Knowledge Graph.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Computing and Language Understanding, 2019

2018
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018

Automatic Taxonomy Construction for Eye Colors Data without Using Context Information.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018


  Loading...