Qiang Yan

Orcid: 0000-0002-7328-2278

Affiliations:
  • WeBank Co. Ltd., Shenzhen, China
  • Google, Zurich, Switzerland (former)
  • Singapore Management University, School of Information Systems, Singapore (PhD 2013)


According to our database1, Qiang Yan authored at least 35 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Modeling Sequential Recommendation as Missing Information Imputation.
CoRR, 2023

A Knowledge Enhanced Hierarchical Fusion Network for CTR Prediction under Account Search Scenario in WeChat.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

A Self-Correcting Sequential Recommender.
Proceedings of the ACM Web Conference 2023, 2023

Self-supervised Bidirectional Prompt Tuning for Entity-enhanced Pre-trained Language Model.
Proceedings of the International Joint Conference on Neural Networks, 2023

K-DLM: A Domain-Adaptive Language Model Pre-Training Framework with Knowledge Graph.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

An Auxiliary Task Boosted Multi-task Learning Method for Service Account Retrieval with Limited Human Annotation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: EMNLP 2023, 2023

2022
Secure and Reliable Transfer Learning Framework for 6G-Enabled Internet of Vehicles.
IEEE Wirel. Commun., 2022

Communication-Efficient and Cross-Chain Empowered Federated Learning for Artificial Intelligence of Things.
IEEE Trans. Netw. Sci. Eng., 2022

DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.
IEEE Trans. Computers, 2022

Paying More Attention to Self-attention: Improving Pre-trained Language Models via Attention Guiding.
CoRR, 2022

Efficient Two-stage Label Noise Reduction for Retrieval-based Tasks.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Accelerating Elliptic Curve Digital Signature Algorithms on GPUs.
Proceedings of the SC22: International Conference for High Performance Computing, 2022

MGAD: Learning Descriptional Representation Distilled from Distributional Semantics for Unseen Entities.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

FL-Market: Trading Private Models in Federated Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus.
IEEE Netw., 2021

Few-Shot Electronic Health Record Coding through Graph Contrastive Learning.
CoRR, 2021

Semi-Supervised Federated Learning with non-IID Data: Algorithm and System Design.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Throughput-Efficient Blockchain for Internet-of-Vehicles.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
ModCon: a model-based testing platform for smart contracts.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
Blockchain-Based Credible and Privacy-Preserving QoS-Aware Web Service Recommendation.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

2015
Leakage Resilient Password Systems
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Comput. Secur., 2015

Privacy leakage analysis in online social networks.
Comput. Secur., 2015

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009


  Loading...