Weidong Qiu

Orcid: 0000-0001-6428-1655

According to our database1, Weidong Qiu authored at least 105 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification.
Data Min. Knowl. Discov., May, 2024

P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection.
IEEE Trans. Inf. Forensics Secur., 2024

Low-Communication Updatable PSI from Asymmetric PSI and PSU.
IACR Cryptol. ePrint Arch., 2024

A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers.
CoRR, 2024

Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated.
CoRR, 2024

Federated Semi-supervised Learning for Medical Image Segmentation with intra-client and inter-client Consistency.
CoRR, 2024

Fine-Grained Contrastive Learning for Pulmonary Nodule Classification.
Proceedings of the International Joint Conference on Neural Networks, 2024

Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

Fuzzy Clustered Federated Learning Under Mixed Data Distributions.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service.
IEEE Trans. Veh. Technol., November, 2023

Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV.
IEEE Trans. Intell. Transp. Syst., November, 2023

Correction of whitespace and word segmentation in noisy Pashto text using CRF.
Speech Commun., September, 2023

Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices.
Expert Syst. J. Knowl. Eng., July, 2023

Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach.
IACR Trans. Symmetric Cryptol., 2023

Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.
IEEE Trans. Inf. Forensics Secur., 2023

Pashto offensive language detection: a benchmark dataset and monolingual Pashto BERT.
PeerJ Comput. Sci., 2023

Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights.
CoRR, 2023

SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking.
CoRR, 2023

A Multi-Modal Approach for the Detection of Account Anonymity on Social Media Platforms.
Proceedings of the International Joint Conference on Neural Networks, 2023

TDAE: Text Detection with Affinity Areas and Evolution Strategies.
Proceedings of the Document Analysis and Recognition - ICDAR 2023, 2023

LED: Label Correlation Enhanced Decoder for Multi-Label Text Classification.
Proceedings of the IEEE International Conference on Acoustics, 2023

RRecT: Chinese Text Recognition with Radical-Enhanced Recognition Transformer.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

GenTC: Generative Transformer via Contrastive Learning for Receipt Information Extraction.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Control Parameter Analysis of AC/DC Systems Based on Input to State Stability Theory and Regression Decision Tree.
Proceedings of the 6th International Conference on Electronics and Electrical Engineering Technology, 2023

A Novel Deep Learning Framework for Interpretable Drug-Target Interaction Prediction with Attention and Multi-task Mechanism.
Proceedings of the Database Systems for Advanced Applications, 2023

Automatic Search of Linear Structure: Applications to Keccak and Ascon.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System.
IEEE J. Biomed. Health Informatics, 2022

Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System.
IEEE Internet Things J., 2022

AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022

"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments.
Proceedings of the IEEE International Conference on Trust, 2022

GTRNet: a graph-based table reconstructed network.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure.
IEEE Internet Things J., 2021

DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction.
CoRR, 2021

PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos.
CoRR, 2021

Unsupervised Anomaly Detection for Time Series with Outlier Exposure.
Proceedings of the SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, 2021

Terroristic Content Detection using a Multi-scene classification system.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Scale Invariant Domain Generalization Image Recapture Detection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

2020
Efficient and secure k-nearest neighbor query on outsourced data.
Peer-to-Peer Netw. Appl., 2020

Detection of SQL injection based on artificial neural network.
Knowl. Based Syst., 2020

Anomaly detection in electronic invoice systems based on machine learning.
Inf. Sci., 2020

Privacy-preserving spatial query protocol based on the Moore curve for location-based service.
Comput. Secur., 2020

Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

CellIdNet: Automatic Cell Instance Segmentation and Classification in Bone Marrow Examination with Double Backbone Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

RLST: A Reinforcement Learning Approach to Scene Text Detection Refinement.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Attention-Based Graph Neural Network with Global Context Awareness for Document Understanding.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

2019
New Techniques for Searching Differential Trails in Keccak.
IACR Trans. Symmetric Cryptol., 2019

Encrypted data indexing for the secure outsourcing of spectral clustering.
Knowl. Inf. Syst., 2019

Software Tamper Resistance Based on White-Box SMS4 Implementation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Multi-Task Learning with Knowledge Transfer for Facial Attribute Classification.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Wacnet: Word Segmentation Guided Characters Aggregation Net for Scene Text Spotting With Arbitrary Shapes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Integrating Coordinates with Context for Information Extraction in Document Images.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Optimized Password Recovery based on GPUs for SM3 Algorithm.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
A generic optimization method of multivariate systems on graphic processing units.
Soft Comput., 2018

Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach.
Peer-to-Peer Netw. Appl., 2018

Sparse coding with cross-view invariant dictionaries for person re-identification.
Multim. Tools Appl., 2018

A new efficient authorized private set intersection protocol from Schnorr signature and its applications.
Clust. Comput., 2018

Fused Text Segmentation Networks for Multi-oriented Scene Text Detection.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Distributed Large Scale Privacy-Preserving Deep Mining.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

SQL Injection Behavior Mining Based Deep Learning.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Efficient Privacy-Preserving Protocol for<i> k</i>-NN Search over Encrypted Data in Location-Based Service.
Complex., 2017

Deep Recurrent Model for Server Load and Performance Prediction in Data Center.
Complex., 2017

Person Re-Identification by Weighted Integration of Sparse and Collaborative Representation.
IEEE Access, 2017

Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

Password Guessing Based on LSTM Recurrent Neural Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Optimized Password Recovery for SHA-512 on GPUs.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
GPU-Based High Performance Password Recovery Technique for Hash Functions.
J. Inf. Sci. Eng., 2016

Optimizations for High Performance Network Virtualization.
J. Comput. Sci. Technol., 2016

An Improved Automatic Search Method for Differential Trails in TEA Cipher.
Int. J. Netw. Secur., 2016

Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity.
Int. J. High Perform. Comput. Appl., 2016

Biclique cryptanalysis using balanced complete bipartite subgraphs.
Sci. China Inf. Sci., 2016

Mining Co-locations from Continuously Distributed Uncertain Spatial Data.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
RCP Mining: Towards the Summarization of Spatial Co-location Patterns.
Proceedings of the Advances in Spatial and Temporal Databases, 2015

2014
A New Approach to Multimedia Files Carving.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014

Acceleration of AES Encryption with OpenCL.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
iOS Data Recovery Using Low-Level NAND Images.
IEEE Secur. Priv., 2013

2011
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011

On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs.
Proceedings of the Information Security Practice and Experience, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010

2009
A key management protocol with robust continuity for sensor networks.
Comput. Stand. Interfaces, 2009

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Secure Multiparty Computation Protocol in Asynchronous Network.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Bagging very weak learners with lazy local learning.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

2007
A Fair Off-line Electronic Payment System.
Proceedings of the Contributions to Ubiquitous Computing, 2007

Efficient Receipt-Free Electronic Auction Protocol.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity-Based Threshold Decryption Revisited.
Proceedings of the Information Security Practice and Experience, 2007

2005
Identity oriented signature scheme based on quadratic residues.
Appl. Math. Comput., 2005

Converting normal DLP-based signatures into blind.
Appl. Math. Comput., 2005

SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

Fast on-line real-time scheduling algorithm for reconfigurable computing.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

An Operating System Framework for Reconfigurable Systems.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2003
Group Oriented Digital Certificate Architecture.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

2002
A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Proceedings of the Information Security, 5th International Conference, 2002

Component Priority Assignment in tha Data Flow Dominated Embedded Systems with Timing Constraints.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

How to Play Sherlock Holmes in the World of Mobile Agents.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...