Qingsong Yao

Orcid: 0000-0002-0895-797X

According to our database1, Qingsong Yao authored at least 62 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Medical Image With Hierarchical Feature Hiding.
IEEE Trans. Medical Imaging, April, 2024

Addressing fairness issues in deep learning-based medical image analysis: a systematic review.
npj Digit. Medicine, 2024

Which images to label for few-shot medical image analysis?
Medical Image Anal., 2024

E3D-GPT: Enhanced 3D Visual Foundation for Medical Vision-Language Model.
CoRR, 2024

APPLE: Adversarial Privacy-aware Perturbations on Latent Embedding for Unfairness Mitigation.
CoRR, 2024

SIX-Net: Spatial-Context Information miX-up for Electrode Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

HySparK: Hybrid Sparse Masking for Large Scale Medical Image Pre-training.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

Nowhere to Hide: Toward Robust Reactive Medical Adversarial Defense.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Long-Tailed Multi-Label Classification with Noisy Label of Thoracic Diseases from Chest X-Ray.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

CARZero: Cross-Attention Alignment for Radiology Zero-Shot Classification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
DND: Deep Learning-Based Directed Network Disintegrator.
IEEE J. Emerg. Sel. Topics Circuits Syst., September, 2023

Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023

Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023

ECAMP: Entity-centered Context-aware Medical Vision Language Pre-training.
CoRR, 2023

Unsupervised augmentation optimization for few-shot medical image segmentation.
CoRR, 2023

UOD: Universal One-Shot Detection of Anatomical Landmarks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

FairAdaBN: Mitigating Unfairness with Adaptive Batch Normalization and Its Application to Dermatological Disease Classification.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

2022
Information-guided pixel augmentation for pixel-wise contrastive learning.
CoRR, 2022

A Survey of Fairness in Medical Image Analysis: Concepts, Algorithms, Evaluations, and Challenges.
CoRR, 2022

DATR: Domain-adaptive transformer for multi-domain landmark detection.
CoRR, 2022

Relative distance matters for one-shot landmark detection.
CoRR, 2022

Rib Suppression in Digital Chest Tomosynthesis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

Which images to label for few-shot medical landmark detection?
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021

Label-Free Segmentation of COVID-19 Lesions in Lung CT.
IEEE Trans. Medical Imaging, 2021

Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy.
IEEE Internet Things J., 2021

Medical Aegis: Robust adversarial protectors for medical images.
CoRR, 2021

You only Learn Once: Universal Anatomical Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021

One-Shot Medical Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021

A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021

Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020

Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019

3D U<sup>2</sup>-Net: A 3D Universal U-Net for Multi-domain Medical Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

2017
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

2016
On the architecture and development life cycle of secure cyber-physical systems.
J. Commun. Inf. Networks, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

2015
Vulnerability aware graphs for RFID protocol security benchmarking.
J. Comput. Syst. Sci., 2015

2014
A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013

Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2011
MAP: Authenticating Multiple-Tags.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011

2010
A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
New Programming Model for Pervasive Computing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Applying language modeling to session identification from database trace logs.
Knowl. Inf. Syst., 2006

Mining and Modeling Database User Access Patterns.
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006

2005
A Distance-Based Algorithm for Clustering Database User Sessions.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

A Machine Learning Approach to Identifying Database Sessions Using Unlabeled Data.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

Finding and Analyzing Database User Sessions.
Proceedings of the Database Systems for Advanced Applications, 2005

2004
Characterizing Database User's Access Patterns.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

2003
SQL-Relay: An Event-Driven Rule-Based Database Gateway.
Proceedings of the Advances in Web-Age Information Management, 2003

Using User Access Patterns for Semantic Query Caching.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003


  Loading...