Qinghua Li

Orcid: 0000-0001-7484-9291

According to our database1, Qinghua Li authored at least 160 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Context-Aware Driver Attention Estimation Using Multi-Hierarchy Saliency Fusion With Gaze Tracking.
IEEE Trans. Intell. Transp. Syst., August, 2024

Robust Depth-Aided Visual-Inertial-Wheel Odometry for Mobile Robots.
IEEE Trans. Ind. Electron., August, 2024

TGLFusion: A Temperature-Guided Lightweight Fusion Method for Infrared and Visible Images.
Sensors, March, 2024

A Rotating Permanent Magnets Positioning System for Laying Underground Pipelines.
IEEE Trans. Instrum. Meas., 2024

Three-dimensional finite element simulation and reconstruction of jointed rock masses for bench blasting.
Simul. Model. Pract. Theory, 2024

Infrared and visible image fusion method based on hierarchical attention mechanism.
J. Electronic Imaging, 2024

Double-attention mechanism-based segmentation grasping detection network.
J. Electronic Imaging, 2024

Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor Matching.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

2023
ConPhrase: Enhancing Context-Aware Phrase Mining From Text Corpora.
IEEE Trans. Knowl. Data Eng., July, 2023

Effects of platform's blockchain strategy on brand manufacturer's distribution strategy in the presence of counterfeits.
Comput. Ind. Eng., March, 2023

Wi-Fi Sensing Based on IEEE 802.11bf.
IEEE Commun. Mag., January, 2023

Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming.
IEEE Trans. Cloud Comput., 2023

Fusing Spatio-Temporal Contexts into DeepFM for Taxi Pick-Up Area Recommendation.
Comput. Syst. Sci. Eng., 2023

Detection and Localization of Data Forgery Attacks in Automatic Generation Control.
IEEE Access, 2023

Robust Human Upper-Limbs Trajectory Prediction Based on Gaussian Mixture Prediction.
IEEE Access, 2023

DCCARES-Net: A Deep Learning Method for Overlapping Cervical Cell Segmentation.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

AI-based Cyber Event OSINT via Twitter Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Protecting Control Commands Using Low-Cost EM Sensors in the Smart Grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
A Framework for Personalized Location Privacy.
IEEE Trans. Mob. Comput., 2022

A Novel Heterogeneous Network for Modeling Driver Attention With Multi-Level Visual Content.
IEEE Trans. Intell. Transp. Syst., 2022

An Inertial Magneto-Inductive Positioning System Based on GWO-PF Algorithm.
IEEE Trans. Instrum. Meas., 2022

An Integrated Framework for Multi-State Driver Monitoring Using Heterogeneous Loss and Attention-Based Feature Decoupling.
Sensors, 2022

Investigation and optimization of electro-thermal performance of Double Gate-All-Around MOSFET.
Microelectron. J., 2022

Human-Machine Telecollaboration Accelerates the Safe Deployment of Large-Scale Autonomous Robots During the COVID-19 Pandemic.
Frontiers Robotics AI, 2022

Community Clustering Routing Algorithm Based on Information Entropy in Mobile Opportunity Network.
IEEE Access, 2022

Privacy Protection Against Shoulder Surfing in Mobile Environments.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

Privacy-Preserving and Secure Divide-and-Conquer Learning.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

2021
A wale optimization algorithm for distributed flow shop with batch delivery.
Soft Comput., 2021

Towards Automating the Assessment of Software Vulnerability Risk.
EAI Endorsed Trans. Security Safety, 2021

GACM: A Graph Attention Capsule Model for the Registration of TLS Point Clouds in the Urban Scene.
Remote. Sens., 2021

User logistics profiling for terminal distribution based on adaptive large adjacent search.
J. Intell. Fuzzy Syst., 2021

Channel Smoothing for 802.11ax Beamformed MIMO-OFDM.
IEEE Commun. Lett., 2021

Spectral Design of Light-Emitting Diodes for Plant Photosynthesis Based on Quantum Dots.
IEEE Access, 2021

Filter Pruning via Probabilistic Model-based Optimization for Accelerating Deep Convolutional Neural Networks.
Proceedings of the WSDM '21, 2021

A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange.
Proceedings of the Security and Privacy in Communication Networks, 2021

Towards Automated Assessment of Vulnerability Exposures in Security Operations.
Proceedings of the Security and Privacy in Communication Networks, 2021

A Unified-Model via Block Coordinate Descent for Learning the Importance of Filter.
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021

Automated Context-Aware Phrase Mining from Text Corpora.
Proceedings of the Database Systems for Advanced Applications, 2021

A Recommender System for Tracking Vulnerabilities.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Thermal and electrical performance investigation of FinFET with encased air-gap gate sidewalls from spacer encapsulation layer material and structure parameter perspectives.
Microelectron. J., 2020

Investigation and optimization of electrical and thermal performance for 5-nm GAA vertically stacked nanowire FETs.
Microelectron. J., 2020

Analysis of Source Influence on Guided Wave Excitation in Cylindrical Structures Using Spatial Fourier Transform Method.
J. Sensors, 2020

Magnetic-Based Positioning System for Moving Target With Feature Vector.
IEEE Access, 2020

Data Driven Models for Human Motion Prediction in Human-Robot Collaboration.
IEEE Access, 2020

An Incentive Mechanism Based on Bertrand Game for Opportunistic Edge Computing.
IEEE Access, 2020

Incremental Filter Pruning via Random Walk for Accelerating Deep Convolutional Neural Networks.
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020

Automatically Locating Mitigation Information for Security Vulnerabilities.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Automated Bystander Detection and Anonymization in Mobile Photography.
Proceedings of the Security and Privacy in Communication Networks, 2020

Dynamic Risk-Aware Patch Scheduling.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

An Effective Nuclear Extraction Mask Method for SVM Classification.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
Towards Uniform Point Density: Evaluation of an Adaptive Terrestrial Laser Scanner.
Remote. Sens., 2019

深度神经网络压缩综述 (Survey of Compressed Deep Neural Network).
计算机科学, 2019

A medical garbage bin recycling system based on AGV.
Proceedings of the RICAI 2019: International Conference on Robotics, 2019

Privacy-Preserving MEC-Enabled Contextual Online Learning via SDN for Service Selection in IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Detection and Classification of Cervical Exfoliated Cells Based on Faster R-CNN.
Proceedings of the 11th IEEE International Conference on Advanced Infocomm Technology, 2019

Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Insider Threat Detection via Hierarchical Neural Temporal Point Processes.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
多目标最优化云工作流调度进化遗传算法 (Evoluation Genetic Algorithm of Multi-objective Optimization Scheduling on Cloud Workflow).
计算机科学, 2018

Process Modeling and Monitoring With Incomplete Data Based on Robust Probabilistic Partial Least Square Method.
IEEE Access, 2018

Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud.
Proceedings of the Security and Privacy in Communication Networks, 2018

PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing.
Proceedings of the Security and Privacy in Communication Networks, 2018

Privacy-Preserving Multiparty Learning for Logistic Regression.
Proceedings of the Security and Privacy in Communication Networks, 2018

PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Optimal Data Collection of MP-MR-MC Wireless Sensors Network for Structural Monitoring.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Hiding Critical Targets in Smart Grid Networks.
Proceedings of the 2018 International Conference on Computing, 2018

2017
Discover Patterns and Mobility of Twitter Users - A Study of Four US College Cities.
ISPRS Int. J. Geo Inf., 2017

Dual-channel supply chain decisions under asymmetric information with a risk-averse retailer.
Ann. Oper. Res., 2017

Steady heat conduction analyses using an interpolating element-free Galerkin scaled boundary method.
Appl. Math. Comput., 2017

Flooding attacks against secure time-critical communications in the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

SecureHouse: A home security system based on smartphone sensors.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Inferring Mobile Apps from Resource Usage Patterns.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Access Control for Distributed Processing Systems: Use Cases and General Considerations.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Deep learning-based data forgery detection in automatic generation control.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Secure and efficient outsourcing of large-scale nonlinear programming.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum.
IEEE Trans. Mob. Comput., 2016

Providing Privacy-Aware Incentives in Mobile Sensing Systems.
IEEE Trans. Mob. Comput., 2016

PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2016

A Fuzzy Mean-Shift Approach to Lidar Waveform Decomposition.
IEEE Trans. Geosci. Remote. Sens., 2016

Cognitive Networking for Next-G Wireless Communications.
Int. J. Distributed Sens. Networks, 2016

Note on stratified L-ordered convergence structures.
Fuzzy Sets Syst., 2016

PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Decomposing LiDAR waveforms with nonparametric classification methods.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Differentiating Non-Isomorphic Graphlets for Graph Analytics.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation.
IEEE Trans. Mob. Comput., 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015

Privacy-preserving participatory sensing.
IEEE Commun. Mag., 2015

Evaluating the capability and performance of access control policy verification tools.
Proceedings of the 34th IEEE Military Communications Conference, 2015

The effects of flooding attacks on time-critical communications in the smart grid.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

An On-chip Interconnection QoS Verification Platform of Processor of Large Data for Architectural Modeling Analysis.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Privacy-aware and trustworthy data aggregation in mobile sensing.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Cell detection in high frequency band small cell networks.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2014

Concurrent PLS-based process monitoring with incomplete input and quality measurements.
Comput. Chem. Eng., 2014

Fast reference governors for second-order linear systems with constraints and an input time-delay.
Autom., 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Forwarding redundancy in opportunistic mobile networks: Investigation and elimination.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Minimum description length constrained LiDAR waveform decomposition.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Providing Efficient Privacy-Aware Incentives for Mobile Sensing.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks.
IEEE Trans. Dependable Secur. Comput., 2013

Autonomous Integrated Navigation for Indoor Robots Utilizing On-Line Iterated Extended Rauch-Tung-Striebel Smoothing.
Sensors, 2013

Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Providing privacy-aware incentives for mobile sensing.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications, 2013

Wakeup scheduling for energy-efficient communication in opportunistic mobile networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical downlink transmission schemes for future LTE systems with many base-station antennas.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Social-Aware Multicast in Disruption-Tolerant Networks.
IEEE/ACM Trans. Netw., 2012

Mitigating Routing Misbehavior in Disruption Tolerant Networks.
IEEE Trans. Inf. Forensics Secur., 2012

A Fully-Integrated Buck Converter Design and Implementation for On-Chip Power Supplies.
J. Comput., 2012

A routing protocol for socially selfish delay tolerant networks.
Ad Hoc Networks, 2012

iHEMS: An information-centric approach to secure home energy management.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Efficient and privacy-preserving data aggregation in mobile sensing.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Multicast Authentication in the Smart Grid With One-Time Signature.
IEEE Trans. Smart Grid, 2011

Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Tianjin INSAR time series analysis with L- and X-band.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

High resolution SAR change detection in Hong Kong.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Contact duration aware data replication in Delay Tolerant Networks.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

The Testing Technology Research of Automotive Fastener Comprehensive Performance.
Proceedings of the Advances in Computer Science, 2011

Research of Fault Diagnosis on Numerically-Controlled System.
Proceedings of the Advances in Computer Science, 2011

2010
A Transmit Beamforming and Nulling Approach with Distributed Scheduling to Improve Cell Edge Throughput.
Int. J. Digit. Multim. Broadcast., 2010

MIMO techniques in WiMAX and LTE: a feature overview.
IEEE Commun. Mag., 2010

Routing in Socially Selfish Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Advancement of MIMO technology in WiMAX: from IEEE 802.16d/e/j to 802.16m.
IEEE Commun. Mag., 2009

Overhearing-based Interference Cancellation for Relay Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Multicasting in delay tolerant networks: a social network perspective.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Multi-user MIMO and adaptive frequency reuse for next-generation mobile broadband networks.
Proceedings of the IEEE International Conference on Acoustics, 2009

An Analysis and Hierarchical Decomposition for HAMs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

An O(1.414n) Volume Molecular Solutions for the Subset-Product Problem on DNA-Based Supercomputing.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient spatial covariance estimation for asynchronous co-channel interference suppression in MIMO-OFDM systems.
IEEE Trans. Wirel. Commun., 2008

Centralized H<sub>infinity</sub> Fusion Filter Design in Multi-Sensor Data Fusion System.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Centralized H<sub>infinity</sub> Fusion Filter Design in Multi-sensor Nonlinear Fusion System.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Evading User-Specific Offensive Web Pages via Large-Scale Collaborations.
Proceedings of IEEE International Conference on Communications, 2008

2007
MIMO precoding in 802.16e WiMAX.
J. Commun. Networks, 2007

A unifying framework for HAMs-family HRL methods.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Communication-Aware Scheduling Algorithm Based on Heterogeneous Computing Systems.
Proceedings of the Computational Science, 2007

An Energy-Efficient Scheduling Algorithm for Real-Time Tasks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
A New Efficient Parallel Revised Relaxation Algorithm.
Proceedings of the Intelligent Computing, 2006

2005
Parallel Algorithm for Mining Frequent Closed Sequences.
Proceedings of the Autonomous Intelligent Systems: Agents and Data Mining, 2005

2004
Blind multiuser detection in uplink CDMA with multipath fading: a sequential EM approach.
IEEE Trans. Commun., 2004

A Novel Intrusion Detection Method.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Feedback stabilization of nonlinear stochastic time-delay systems with state and control-dependent noise.
Proceedings of the 2004 American Control Conference, 2004

An Efficient Scheduling Algorithm for Dependent Tasks.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

Dynamic Scheduling Algorithm for Parallel Real-Time Jobs in Heterogeneous System.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

Secure Dynamic Source Routing Protocol.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

A Self-Stabilizing Distributed Multicast Algorithm for Mobile Ad-Hoc Networks.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
A Maximal Frequent Itemset Algorithm.
Proceedings of the Rough Sets, 2003

Automated Detection of Design Patterns.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Turbo multiuser detection for turbo-coded CDMA in multipath fading channels.
IEEE Trans. Veh. Technol., 2002

Multiuser detection for DS-CDMA UWB in the home environment.
IEEE J. Sel. Areas Commun., 2002

2001
An iterative receiver for turbo-coded pilot-assisted modulation in fading channels.
IEEE Commun. Lett., 2001

2000
On a geometric view of multiuser detection for synchronous DS/CDMA channels.
IEEE Trans. Inf. Theory, 2000

An Iterative Multiuser Detector for Turbo-Coed CDMA in Multipath Fading Channels.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

An iterative decoding scheme for pilot-assisted modulation in fading channels.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1993
Learning control for a biped walking robot with a trunk.
Proceedings of 1993 IEEE/RSJ International Conference on Intelligent Robots and Systems, 1993

1992
Learning Control Of Compensative Trunk Motion For Biped Walking Robot Based On ZMP Stability Criterion.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 1992

1991
A biped walking robot having a ZMP measurement system using universal force-moment sensors.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 1991


  Loading...