Qingyi Zhu

Orcid: 0000-0002-1168-1599

According to our database1, Qingyi Zhu authored at least 48 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system.
Iran J. Comput. Sci., December, 2024

A graph neural network with context filtering and feature correction for conversational emotion recognition.
Inf. Sci., February, 2024

Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things.
Expert Syst. Appl., February, 2024

Enhancing microblog sentiment analysis through multi-level feature interaction fusion with social relationship guidance.
Appl. Intell., January, 2024

Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach.
IEEE Trans. Inf. Forensics Secur., 2024

Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game.
IEEE Trans. Inf. Forensics Secur., 2024

A survey of dialogic emotion analysis: Developments, approaches and perspectives.
Pattern Recognit., 2024

Transfer-learning enabled micro-expression recognition using dense connections and mixed attention.
Knowl. Based Syst., 2024

Video multimodal sentiment analysis using cross-modal feature translation and dynamical propagation.
Knowl. Based Syst., 2024

A multimodal fusion network with attention mechanisms for visual-textual sentiment analysis.
Expert Syst. Appl., 2024

Impact of cybersecurity awareness on mobile malware propagation: A dynamical model.
Comput. Commun., 2024

2023
Social tie-driven coupling propagation of user awareness and information in Device-to-Device communications.
Comput. Networks, December, 2023

An encrypted medical blockchain data search method with access control mechanism.
Inf. Process. Manag., November, 2023

Speech emotion recognition via multiple fusion under spatial-temporal parallel network.
Neurocomputing, October, 2023

What are the actual needs of visually impaired people?
Displays, July, 2023

CFNet: Facial expression recognition via constraint fusion under multi-task joint learning network.
Appl. Soft Comput., July, 2023

HCSC: A Hierarchical Certificate Service Chain Based on Reputation for VANETs.
IEEE Trans. Intell. Transp. Syst., June, 2023

Microblog sentiment analysis via user representative relationship under multi-interaction hybrid neural networks.
Multim. Syst., June, 2023

An industrial virus propagation model based on SCADA system.
Inf. Sci., June, 2023

Kernel-Based Feature Extraction for Time Series Clustering.
Proceedings of the Knowledge Science, Engineering and Management, 2023

2022
A notary group-based cross-chain mechanism.
Digit. Commun. Networks, December, 2022

A novel activation function based recurrent neural networks and their applications on sentiment classification and dynamic problems solving.
Frontiers Neurorobotics, September, 2022

Dynamical Behavior of Hybrid Propagation of Computer Viruses.
Secur. Commun. Networks, 2022

Facial expression recognition using densely connected convolutional neural network and hierarchical spatial attention.
Image Vis. Comput., 2022

DHF-Net: A hierarchical feature interactive fusion network for dialogue emotion recognition.
Expert Syst. Appl., 2022

Search-driven virus spreading on Social Internet of Things: A dynamical perspective.
Commun. Nonlinear Sci. Numer. Simul., 2022

A Malware Propagation Model Considering Conformity Psychology in Social Networks.
Axioms, 2022

2021
Minimum Variance Algorithm-Based Correlation Analysis between Body Mass Index and the Malignant Degree of Prostate Cancer Mediated under Ultrasound Images.
Sci. Program., 2021

Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor.
Multim. Tools Appl., 2021

LMFNet: Human Activity Recognition Using Attentive 3-D Residual Network and Multistage Fusion Strategy.
IEEE Internet Things J., 2021

A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System.
IEEE Internet Things J., 2021

An iterative MPD-CNN structure for massive MIMO detection under correlated noise channels.
IET Commun., 2021

Modeling and Analysis of the Spread of Malware with the Influence of User Awareness.
Complex., 2021

2020
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes.
Sensors, 2020

Human action recognition using convolutional LSTM and fully-connected LSTM with different attentions.
Neurocomputing, 2020

A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction.
Int. J. Distributed Sens. Networks, 2020

Massive MIMO CSI reconstruction using CNN-LSTM and attention mechanism.
IET Commun., 2020

Applications of Distributed Ledger Technologies to the Internet of Things: A Survey.
ACM Comput. Surv., 2020

Dynamical Propagation Model of Malware for Cloud Computing Security.
IEEE Access, 2020

2019
The optimally designed autoencoder network for compressed sensing.
EURASIP J. Image Video Process., 2019

Rumor Source Detection in Networks Based on the SEIR Model.
IEEE Access, 2019

2018
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking.
Secur. Commun. Networks, 2018

2014
The combined impact of external computers and network topology on the spread of computer viruses.
Int. J. Comput. Math., 2014

Propagation of computer virus both across the Internet and external computers: A complex-network approach.
Commun. Nonlinear Sci. Numer. Simul., 2014

A propagation model of computer virus with nonlinear vaccination probability.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
Epidemics of computer viruses: A complex-network approach.
Appl. Math. Comput., 2013

An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate.
Appl. Math. Comput., 2013

2012
Optimal control of computer virus under a delayed model.
Appl. Math. Comput., 2012


  Loading...