Qiwei Hu

Orcid: 0000-0003-0220-961X

According to our database1, Qiwei Hu authored at least 30 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interdependent Cell-Free and Cellular Networks: Thinking the Role of Cell-Free Architecture for 6G.
IEEE Netw., September, 2024

Lightweight Cross-Domain Authentication Scheme for Securing Wireless IoT Devices Using Backscatter Communication.
IEEE Internet Things J., June, 2024

Bayesian Game-Driven Incentive Mechanism for Blockchain-Enabled Secure Federated Learning in 6G Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2024

Towards accountable and privacy-preserving blockchain-based access control for data sharing.
J. Inf. Secur. Appl., 2024

Blockchain-Based Secure Federated Learning with Incentives: An Incomplete Information Static Game Approach.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Toward Massive Active Connectivity: Performance Analysis and Near-Optimal Detectors for Grant-Free Random Access Systems.
IEEE Trans. Commun., November, 2023

Enhancing Account Privacy in Blockchain-Based IoT Access Control via Zero Knowledge Proof.
IEEE Netw., November, 2023

An Adaptive Harmonic Product Spectrum for Rotating Machinery Fault Diagnosis.
IEEE Trans. Instrum. Meas., 2023

Micro-Newton Thrust Stand Calibration Using Electrostatic Lantern Rings.
IEEE Trans. Instrum. Meas., 2023

Reconstruction of 3-D Ocean Chlorophyll a Structure in the Northern Indian Ocean Using Satellite and BGC-Argo Data.
IEEE Trans. Geosci. Remote. Sens., 2023

2022
Joint Content and Radio Access for the Internet of Things: A Smart-Contract-Based Trusted Framework.
IEEE Internet Things J., 2022

A Smart Contract based Spectrum Trading System for Elastic Virtual Optical Networks.
Proceedings of the 96th Vehicular Technology Conference, 2022

2021
RepChain: A Reputation-Based Secure, Fast, and High Incentive Blockchain System via Sharding.
IEEE Internet Things J., 2021

2020
Blockchain Enabled Federated Slicing for 5G Networks with AI Accelerated Optimization.
IEEE Netw., 2020

Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies.
Digit. Commun. Networks, 2020

A New State Recognition and Prognosis Method Based on a Sparse Representation Feature and the Hidden Semi-Markov Model.
IEEE Access, 2020

2019
Dynamic multi-objective optimization for multi-period emergency logistics network.
J. Intell. Fuzzy Syst., 2019

Fuzzy Network Based Framework for Software Maintainability Prediction.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2019

Multi-Bitrate Video Caching for D2D-Enabled Cellular Networks.
IEEE Multim., 2019

2018
Integrated maintenance policy optimization with finite spares.
Int. J. Syst. Assur. Eng. Manag., 2018

A literature review on selective maintenance for multi-unit systems.
Qual. Reliab. Eng. Int., 2018

Selective maintenance optimization for fuzzy multi-state systems.
J. Intell. Fuzzy Syst., 2018

OR in spare parts management: A review.
Eur. J. Oper. Res., 2018

2017
Spare parts classification in industrial manufacturing using the dominance-based rough set approach.
Eur. J. Oper. Res., 2017

2016
基于QoS和多级索引的Web服务发布订阅 (QoS and Multilevel Index Based Web Service Publish/Subscribe).
计算机科学, 2016

An Exact Method for Solving Selective Maintenance Problems Considering Imperfect Maintenance.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Mission-Oriented Maintenance Optimization Subject to Resources Constraints.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2014
Application Study on Intrusion Detection System Using IRBF.
J. Softw., 2014

2013
Equipment supportability assessment using matter-element and cloud model integrated method.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
Research on Intrusion Detection System Based on IRBF.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012


  Loading...