Qinglei Zhou

Orcid: 0000-0002-1156-1108

Affiliations:
  • Zhengzhou University, Zhengzhou, China


According to our database1, Qinglei Zhou authored at least 53 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A model-based infrared and visible image fusion network with cooperative optimization.
Expert Syst. Appl., 2025

2024
Path test data generation using adaptive simulated annealing particle swarm optimization.
Soft Comput., September, 2024

An Efficient SM9 Aggregate Signature Scheme for IoV Based on FPGA.
Sensors, September, 2024

Nice to meet images with Big Clusters and Features: A cluster-weighted multi-modal co-clustering method.
Inf. Process. Manag., 2024

Self-supervised Weighted Information Bottleneck for Multi-view Clustering.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning.
Inf. Process. Manag., November, 2023

A color image decomposition model for image enhancement.
Neurocomputing, November, 2023

GraphNEI: A GNN-based network entity identification method for IP geolocation.
Comput. Networks, November, 2023

LPN: Label-Enhanced Prototypical Network for Legal Judgment Prediction.
Entropy, October, 2023

GWS-Geo: A graph neural network based model for street-level IPv6 geolocation.
J. Inf. Secur. Appl., June, 2023

FPGA-Based Vehicle Detection and Tracking Accelerator.
Sensors, February, 2023

Multi-View Clustering via Triplex Information Maximization.
IEEE Trans. Image Process., 2023

GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Research on a Lightweight Vehicle Detection Method Based on the DFC-GSConv Structure.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
Emotion Recognition with Conversational Generation Transfer.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

A Survey of Automatic Source Code Summarization.
Symmetry, 2022

CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing.
Sensors, 2022

Robustness evaluation for deep neural networks via mutation decision boundaries analysis.
Inf. Sci., 2022

Re_Trans: Combined Retrieval and Transformer Model for Source Code Summarization.
Entropy, 2022

Cognitively reconfigurable mimic-based heterogeneous password recovery system.
Comput. Secur., 2022

Adversarial Transfer for Classical Chinese NER with Translation Word Segmentation.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

Time Interest Network for Click-Through Rate Prediction.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
A Deep Learning-Based Trust Assessment Method for Cloud Users.
Secur. Commun. Networks, 2021

Machine Learning Empowered Trust Evaluation Method for IoT Devices.
IEEE Access, 2021

Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model.
Proceedings of the Data Science, 2021

Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors.
Proceedings of the Data Science, 2021

Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors.
Proceedings of the Data Science, 2021

Design And Implementation of Video Learning Platform Based on B / S Architecture.
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021

2020
Modelling the Mimic Defence Technology for Multimedia Cloud Servers.
Secur. Commun. Networks, 2020

基于FPGA的7-Zip加密文档高能效口令恢复方法 (Energy-efficient Password Recovery Method for 7-Zip Document Based on FPGA).
计算机科学, 2020

Predicting the results of molecular specific hybridization using boosted tree algorithm.
Concurr. Comput. Pract. Exp., 2020

High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing.
Complex., 2020

Trie Tree Probabilistic Password Cracking Method Based on FPGA.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

Design of Blood Group Pairing Logic Circuit Based on DNA Strand Displacement.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2020

2019
Performing CTL model checking via DNA computing.
Soft Comput., 2019

有向图k顶点导出子图的DNA粘贴算法 (DNA Sticker Algorithm for k-vertex Induced Sub-graphs of Directed Graphs).
计算机科学, 2019

基于DNA计算的计算树逻辑模型检测方法研究进展 (Survey on DNA-computing Based Methods of Computation Tree Logic Model Checking).
计算机科学, 2019

Detecting air-gapped attacks using machine learning.
Cogn. Syst. Res., 2019

Mimic automata: A novel formal model for mimic computing.
Cogn. Syst. Res., 2019

Exploring Computation Tree Logic with Past-Time Operator Model Checking Using DNA Computing.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2019

2018
基于时序逻辑的3种网络攻击建模 (Modeling for Three Kinds of Network Attacks Based on Temporal Logic).
计算机科学, 2018

An intrusion detection algorithm for wireless networks based on ASDL.
IEEE CAA J. Autom. Sinica, 2018

Mimic computing for password recovery.
Future Gener. Comput. Syst., 2018

Mimic Encryption System for Network Security.
IEEE Access, 2018

The Algorithms of Weightening Based on DNA Sticker Model.
Proceedings of the Data Science, 2018

An Algorithm to Generate Password Structure Dictionary Based on Gene Bank.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

Research on the Addition, Subtraction, Multiplication and Division Complex Logical Operations Based on the DNA Strand Displacement.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2018

2017
混合拓扑结构的粒子群算法及其在测试数据生成中的应用研究 (MPSO and Its Application in Test Data Automatic Generation).
计算机科学, 2017

Model Checking for Computation Tree Logic with Past Based on DNA Computing.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2017

2016
Model Checking Computational Tree Logic Using Sticker Automata.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2012
A Fuzzy-Rough Sets Based Compact Rule Induction Method for Classifying Hybrid Data.
Proceedings of the Rough Sets and Knowledge Technology - 7th International Conference, 2012

Rough Sets Based Inequality Rule Learner for Knowledge Discovery.
Proceedings of the Rough Sets and Current Trends in Computing, 2012

2010
An Approach on Service Component Selection and Analysis of the Resulting System Reliability.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...