Weidong Qiu
Orcid: 0000-0001-6428-1655
According to our database1,
Weidong Qiu
authored at least 105 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification.
Data Min. Knowl. Discov., May, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers.
CoRR, 2024
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated.
CoRR, 2024
Federated Semi-supervised Learning for Medical Image Segmentation with intra-client and inter-client Consistency.
CoRR, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service.
IEEE Trans. Veh. Technol., November, 2023
Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV.
IEEE Trans. Intell. Transp. Syst., November, 2023
Speech Commun., September, 2023
Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices.
Expert Syst. J. Knowl. Eng., July, 2023
IACR Trans. Symmetric Cryptol., 2023
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.
IEEE Trans. Inf. Forensics Secur., 2023
Pashto offensive language detection: a benchmark dataset and monolingual Pashto BERT.
PeerJ Comput. Sci., 2023
Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights.
CoRR, 2023
A Multi-Modal Approach for the Detection of Account Anonymity on Social Media Platforms.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Document Analysis and Recognition - ICDAR 2023, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
GenTC: Generative Transformer via Contrastive Learning for Receipt Information Extraction.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Control Parameter Analysis of AC/DC Systems Based on Input to State Stability Theory and Regression Decision Tree.
Proceedings of the 6th International Conference on Electronics and Electrical Engineering Technology, 2023
A Novel Deep Learning Framework for Interpretable Drug-Target Interaction Prediction with Attention and Multi-task Mechanism.
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System.
IEEE J. Biomed. Health Informatics, 2022
Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System.
IEEE Internet Things J., 2022
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
2021
IEEE Internet Things J., 2021
CoRR, 2021
PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos.
CoRR, 2021
Proceedings of the SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, 2021
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021
Proceedings of the Neural Information Processing - 28th International Conference, 2021
2020
Peer-to-Peer Netw. Appl., 2020
Knowl. Based Syst., 2020
Inf. Sci., 2020
Privacy-preserving spatial query protocol based on the Moore curve for location-based service.
Comput. Secur., 2020
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
CellIdNet: Automatic Cell Instance Segmentation and Classification in Bone Marrow Examination with Double Backbone Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Attention-Based Graph Neural Network with Global Context Awareness for Document Understanding.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Knowl. Inf. Syst., 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the IEEE International Conference on Industrial Technology, 2019
Wacnet: Word Segmentation Guided Characters Aggregation Net for Scene Text Spotting With Arbitrary Shapes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
2018
Soft Comput., 2018
Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach.
Peer-to-Peer Netw. Appl., 2018
Multim. Tools Appl., 2018
A new efficient authorized private set intersection protocol from Schnorr signature and its applications.
Clust. Comput., 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
2017
Efficient Privacy-Preserving Protocol for<i> k</i>-NN Search over Encrypted Data in Location-Based Service.
Complex., 2017
Complex., 2017
Person Re-Identification by Weighted Integration of Sparse and Collaborative Representation.
IEEE Access, 2017
Proceedings of the 20th International Conference on Extending Database Technology, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
J. Inf. Sci. Eng., 2016
J. Comput. Sci. Technol., 2016
Int. J. Netw. Secur., 2016
Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity.
Int. J. High Perform. Comput. Appl., 2016
Sci. China Inf. Sci., 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
Proceedings of the Advances in Spatial and Temporal Databases, 2015
2014
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
2011
Knowl. Inf. Syst., 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010
2009
Comput. Stand. Interfaces, 2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Contributions to Ubiquitous Computing, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Information Security Practice and Experience, 2007
2005
Appl. Math. Comput., 2005
SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
Proceedings of the Computer Supported Cooperative Work in Design II, 2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Component Priority Assignment in tha Data Flow Dominated Embedded Systems with Timing Constraints.
Proceedings of the Seventh International Conference on CSCW in Design, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002