Qi Xie
Orcid: 0009-0001-7851-4605
According to our database1,
Qi Xie
authored at least 174 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Vis. Comput., November, 2024
IEEE Trans. Neural Networks Learn. Syst., November, 2024
Rotation Equivariant Proximal Operator for Deep Unfolding Methods in Image Restoration.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
IEEE Internet Things J., October, 2024
RCDNet: An Interpretable Rain Convolutional Dictionary Network for Single Image Deraining.
IEEE Trans. Neural Networks Learn. Syst., June, 2024
Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System.
IEEE Internet Things J., April, 2024
Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024
IEEE Trans. Wirel. Commun., January, 2024
IEEE Trans. Medical Imaging, January, 2024
IEEE Trans. Engineering Management, 2024
A Hybrid Simulation Model for the Allocation of Shared Resources in a Project Portfolio.
IEEE Trans. Engineering Management, 2024
M2Diffuser: Diffusion-based Trajectory Optimization for Mobile Manipulation in 3D Scenes.
CoRR, 2024
CoRR, 2024
A hob-type smart weeding machine for use in wheat fields: Towards a low power consumption and high-efficiency design.
Comput. Electron. Agric., 2024
Dynamic selection of risk response strategies with resource allocation for construction project portfolios.
Comput. Ind. Eng., 2024
Multi-Source Augmentation and Composite Prompts for Visual Recognition with Missing Modality.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
Proceedings of the IEEE International Conference on Web Services, 2024
2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud.
J. Cloud Comput., December, 2023
Provably secure and lightweight three-factor authentication scheme for industrial medical CPS.
J. Inf. Secur. Appl., December, 2023
Comput. Secur., December, 2023
Vis. Comput., September, 2023
Precision weed detection in wheat fields for agriculture 4.0: A survey of enabling technologies, methods, and research challenges.
Comput. Electron. Agric., September, 2023
IEEE Trans. Pattern Anal. Mach. Intell., April, 2023
Digit. Signal Process., March, 2023
IEEE Trans. Intell. Transp. Syst., 2023
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2023
Big Data Analytic Toolkit: A general-purpose, modular, and heterogeneous acceleration toolkit for data analytical engines.
Proc. VLDB Endow., 2023
Int. J. Comput. Vis., 2023
FRS-Nets: Fourier Parameterized Rotation and Scale Equivariant Networks for Retinal Vessel Segmentation.
CoRR, 2023
A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain.
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the Image and Graphics - 12th International Conference, 2023
The Function of Transmembrane Helix and Signal Sequence of Coronavirus in Co-Translational Targeting and Insertion Towards Er.
Proceedings of the 13th International Conference on Bioscience, 2023
JARAD: An Approach for Java API Mention Recognition and Disambiguation in Stack Overflow.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Fiber Coupling Efficiency of Partially Coherent Gaussian Beam in Ground-to-HAP Free-Space Optical Communication Systems.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023
2022
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022
ACM Trans. Softw. Eng. Methodol., 2022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022
MHF-Net: An Interpretable Deep Network for Multispectral and Hyperspectral Image Fusion.
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Soft Actor-Critic-Based Multilevel Cooperative Perception for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022
A two-factor security authentication scheme for wireless sensor networks in IoT environments.
Neurocomputing, 2022
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022
Multigroup recognition of dementia patients with dynamic brain connectivity under multimodal cortex parcellation.
Biomed. Signal Process. Control., 2022
CProtMEDIAS: clustering of amino acid sequences encoded by gene families by MErging and DIgitizing Aligned Sequences.
Briefings Bioinform., 2022
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022
Proceedings of the International Conference on Machine Learning, 2022
Household Load Identification Based on Multi-label and Convolutional Neural Networks.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022
Proceedings of the International Conference on Asian Language Processing, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Research and Implementation of Real World Traditional Chinese Medicine Clinical Scientific Research Information Electronic Medical Record Sharing System.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022
2021
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things.
Secur. Commun. Networks, 2021
Syntactic Information and Multiple Semantic Segments for Aspect-Based Sentiment Classification.
Int. J. Asian Lang. Process., 2021
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
EURASIP J. Wirel. Commun. Netw., 2021
RCDNet: An Interpretable Rain Convolutional Dictionary Network for Single Image Deraining.
CoRR, 2021
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time.
IEEE Access, 2021
Aspect-based Sentiment Classification with Dependency Relation and Structured Attention.
Proceedings of the International Conference on Asian Language Processing, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Full-Spectrum-Knowledge-Aware Tensor Model for Energy-Resolved CT Iterative Reconstruction.
IEEE Trans. Medical Imaging, 2020
Enhanced 3DTV Regularization and Its Applications on HSI Denoising and Compressed Sensing.
IEEE Trans. Image Process., 2020
Contrast-Medium Anisotropy-Aware Tensor Total Variation Model for Robust Cerebral Perfusion CT Reconstruction With Low-Dose Scans.
IEEE Trans. Computational Imaging, 2020
Int. J. Mach. Learn. Cybern., 2020
BMC Medical Informatics Decis. Mak., 2020
Screening and Identification of Key Biomarkers in Pancreatic Cancer: Evidence from Bioinformatic Analysis.
J. Comput. Biol., 2020
Inf. Technol. Control., 2020
Color and direction-invariant nonlocal self-similarity prior and its application to color image denoising.
Sci. China Inf. Sci., 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020
Obstetric Diagnosis Assistant via Knowledge Powered Attention and Information-Enhanced Strategy.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020
Proceedings of the 13th International Congress on Image and Signal Processing, 2020
2019
An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.
IEEE Trans. Medical Imaging, 2019
Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city.
Neurocomputing, 2019
Push the Student to Learn Right: Progressive Gradient Correcting by Meta-learner on Corrupted Labels.
CoRR, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2018
Trans. Inst. Meas. Control, 2018
Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018
Enhanced 3DTV Regularization and Its Applications on Hyper-spectral Image Denoising and Compressed Sensing.
CoRR, 2018
Intelligent Electro-Pneumatic Position Tracking System Using Improved Mode-Switching Sliding Control With Fuzzy Nonlinear Gain.
IEEE Access, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017
Low-Dose Dynamic Cerebral Perfusion Computed Tomography Reconstruction via Kronecker-Basis-Representation Tensor Sparsity Regularization.
IEEE Trans. Medical Imaging, 2017
IEEE Trans. Medical Imaging, 2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
Transcription elongation factors represent <i>in vivo</i> cancer dependencies in glioblastoma.
Nat., 2017
An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
Int. J. Netw. Secur., 2017
Int. J. Comput. Vis., 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Data Flow-Oriented Multi-Path Semantic Web Service Composition Using Extended SPARQL.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
Proceedings of the Database Systems for Advanced Applications, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.
Int. J. Commun. Syst., 2016
Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016
2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Secur. Commun. Networks, 2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014
J. Comput. Networks Commun., 2014
Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks.
Int. J. Distributed Sens. Networks, 2014
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurr. Comput. Pract. Exp., 2014
Real-time accurate ball trajectory estimation with "asynchronous" stereo camera system for humanoid Ping-Pong robot.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Big Data, 2014
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
IEEE Trans. Ind. Informatics, 2013
J. Medical Syst., 2013
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
2012
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme.
Sci. Iran., 2012
J. Networks, 2012
Int. J. Commun. Syst., 2012
IET Inf. Secur., 2012
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Thinking of comparative effectiveness research of the combination in the real traditional Chinese medicine world.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Construction of national clinical research data center of Traditional Chinese medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
A predictive modeling engine using neural networks: Diabetes management from sensor and activity data.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Research on the nomenclature relations of conceptual system in fundamental theory of Traditional Chinese Medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
2011
Comput. Animat. Virtual Worlds, 2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the International Conference on Complex, 2011
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2010
Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card.
J. Networks, 2010
The obstacle crossing analysis and improvement of a wheel-based cable climbing robot.
Int. J. Intell. Syst. Technol. Appl., 2010
Personalized Context-Aware QoS Prediction for Web Services Based on Collaborative Filtering.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008
2007
Proceedings of the Knowledge Science, 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Int. J. Netw. Secur., 2006
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006
Proceedings of the Advances in Intelligent IT, 2006
2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers.
Appl. Math. Comput., 2005
2004
Appl. Math. Comput., 2004