Qiming Li

Orcid: 0009-0003-1916-8946

According to our database1, Qiming Li authored at least 77 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Learning Geometric Information via Transformer Network for Key-Points Based Motion Segmentation.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

Predicting ICU Interventions: A Transparent Decision Support Model Based on Multivariate Time Series Graph Convolutional Neural Network.
IEEE J. Biomed. Health Informatics, June, 2024

Influencing Factor Identification and Simulation for Urban Metro System Operation Processes - A Resilience Enhancement Perspective.
Syst., February, 2024

Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation.
Int. J. Crit. Infrastructure Prot., 2024

GMFL-Net: A Global Multi-geometric Feature Learning Network for Repetitive Action Counting.
CoRR, 2024

Enhancing power marketing audit through IoT and multi-sensor information fusion: A substation scenario analysis.
Comput. Electr. Eng., 2024

Investigating and Mitigating the Multimodal Hallucination Snowballing in Large Vision-Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Topic-aware Intention Network for Explainable Recommendation with Knowledge Enhancement.
ACM Trans. Inf. Syst., October, 2023

An Enhance Relative Total Variation With BF Model for Edge-Preserving Image Smoothing.
IEEE Trans. Circuits Syst. Video Technol., October, 2023

CFRLA-Net: A Context-Aware Feature Representation Learning Anchor-Free Network for Pedestrian Detection.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Modeling and optimization of collaborative computing in regional multi-energy systems for energy Internet.
Sustain. Comput. Informatics Syst., September, 2023

A Fast and Accurate Human Pose Estimation Method Based on Multi-Scale Feature Fusion Grid Structure.
Int. J. Pattern Recognit. Artif. Intell., January, 2023

Resilience-oriented network reconfiguration strategies for community emergency medical services.
Reliab. Eng. Syst. Saf., 2023

Automatic Generation of Formal BIP Models for C Programs.
Proceedings of the 7th International Conference on Computer Science and Application Engineering, 2023

2022
OAF-Net: An Occlusion-Aware Anchor-Free Network for Pedestrian Detection in a Crowd.
IEEE Trans. Intell. Transp. Syst., 2022

Forgery-Domain-Supervised Deepfake Detection With Non-Negative Constraint.
IEEE Signal Process. Lett., 2022

MVIP: multi-omics portal of viral infection.
Nucleic Acids Res., 2022

Distributed collaboration and anti-interference optimization in edge computing for IoT.
J. Parallel Distributed Comput., 2022

2D Multi-Person Pose Estimation Combined with Face Detection.
Int. J. Pattern Recognit. Artif. Intell., 2022

Occluded pedestrian detection through bi-center prediction in anchor-free network.
Neurocomputing, 2022

A Fast Hash Family for Memory Integrity.
IACR Cryptol. ePrint Arch., 2022

Towards Understanding the Effect of Node Features on the Predictions of Graph Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Conditional random fields as message passing mechanism in anchor-free network for multi-scale pedestrian detection.
Inf. Sci., 2021

ASER: Animal Sex Reversal Database.
Genom. Proteom. Bioinform., 2021

2020
Efficient Robust Model Fitting for Multistructure Data Using Global Greedy Search.
IEEE Trans. Cybern., 2020

Low-Light Image Enhancement Based on Deep Symmetric Encoder-Decoder Convolutional Networks.
Symmetry, 2020

Single image dehazing via self-constructing image fusion.
Signal Process., 2020

Single image dehazing via a dual-fusion method.
Image Vis. Comput., 2020

Information fusion on the two-layer network for robust estimation of multiple geometric structures.
Inf. Sci., 2020

Evaluation criterion of underwater object clustering segmentation with pulse-coupled neural network.
IET Image Process., 2020

2019
Robust Model Fitting Based on Greedy Search and Specified Inlier Threshold.
IEEE Trans. Ind. Electron., 2019

An Adaptive Denoising and Detection Approach for Underwater Sonar Image.
Remote. Sens., 2019

2018
Human activity recognition using dynamic representation and matching of skeleton feature sequences from RGB-D images.
Signal Process. Image Commun., 2018

Single fog image restoration with multi-focus image fusion.
J. Vis. Commun. Image Represent., 2018

Outliers Removed via Spectral Clustering for Robust Model Fitting.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

Multi-feature Joint Sparse Representation for RGB-D Object Recognition.
Proceedings of the IEEE International Conference on Information and Automation, 2018

2017
Local Co-Occurrence Selection via Partial Least Squares for Pedestrian Detection.
IEEE Trans. Intell. Transp. Syst., 2017

An Human-Computer Interactive Augmented Reality System for Coronary Artery Diagnosis Planning and Training.
J. Medical Syst., 2017

Low-Carbon Architectural Design and Data Analysis Based on BIM.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

HCI Based on Gesture Recognition in an Augmented Reality System for Diagnosis Planning and Training.
Proceedings of the Intelligence Science I, 2017

A Two-Step Pedestrian Detection Algorithm Based on RGB-D Data.
Proceedings of the Intelligence Science I, 2017

2016
Discriminative Weighted Sparse Partial Least Squares for Human Detection.
IEEE Trans. Intell. Transp. Syst., 2016

Methods for downlink performance enhancement in HST SFN.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

2014
A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings.
Sensors, 2014

2013
Topology Vulnerability Analysis and Measure of Urban Metro Network: The case of Nanjing.
J. Networks, 2013

Secure Sketches for Protecting Biometric Templates.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
On the Security and Efficiency of Content Distribution via Network Coding.
IEEE Trans. Dependable Secur. Comput., 2012

Access and monitor vulnerability of urban metro network system in China.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Theoretical Investigation of the Closed Type Parabolic Trough.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2011
Subway System Safety Risk Analysis Based on Bayesian Network.
Proceedings of the Modeling Risk Management in Sustainable Construction, 2011

Content based JPEG fragmentation point detection.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Identity leakage mitigation on asymmetric secure sketch.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2010
Secure Robust Hash Functions and Their Applications in Non-interactive Communications.
Int. J. Digit. Crime Forensics, 2010

A Reversible Data Hiding Scheme for JPEG Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

An Empirical Study of Residential Hedonic Prices in Nanjing.
Proceedings of the International Conference on E-Business and E-Government, 2010

A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification.
Proceedings of the South African Information Security Multi-Conference, 2010

Secure Sketch for Multiple Secrets.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2008
Optimizing the capacity of distortion-freewatermarking on palette images.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

On the security of non-forgeable robust hash functions.
Proceedings of the International Conference on Image Processing, 2008

Fuzzy extractors for asymmetric biometric representations.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

2007
Protecting Biometric Templates With Sketch: Theory and Practice.
IEEE Trans. Inf. Forensics Secur., 2007

How to protect biometric templates.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A new approach to countering ambiguity attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Security Models of Digital Watermarking.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Practical Security of Non-Invertiblewatermarking Schemes.
Proceedings of the International Conference on Image Processing, 2007

Secure Biometric Templates from Fingerprint-Face Features.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

2006
Secure Sketch for Multi-Sets.
IACR Cryptol. ePrint Arch., 2006

Zero-knowledge watermark detection resistant to ambiguity attacks.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Robust, short and sensitive authentication tags using secure sketch.
Proceedings of the 8th workshop on Multimedia & Security, 2006

On the Practical and Security Issues of Batch Content Distribution Via Network Coding.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Hiding Secret Points Amidst Chaff.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Secure Sketch for Biometric Templates.
Proceedings of the Advances in Cryptology, 2006

2005
Small Secure Sketch for Point-Set Difference.
IACR Cryptol. ePrint Arch., 2005

On the effectiveness of DDoS attacks on statistical filtering.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
On the Possibility of Non-invertible Watermarking Schemes.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2003
Public Watermark Detection Using Multiple Proxies and Secret Sharing.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
Security of Public Watermarking Schemes for Binary Sequences.
Proceedings of the Information Hiding, 5th International Workshop, 2002


  Loading...