Yuqing Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Flexible Ultra-convergence Structures for the Finite Volume Element Method.
J. Sci. Comput., October, 2024

Video object segmentation via couple streams and feature memory.
IET Image Process., July, 2024

DPMSN: A Dual-Pathway Multiscale Network for Image Forgery Detection.
IEEE Trans. Ind. Informatics, May, 2024

Cross-modal fusion encoder via graph neural network for referring image segmentation.
IET Image Process., March, 2024

Semi-supervised Video Object Segmentation Via an Edge Attention Gated Graph Convolutional Network.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Generating Chaos with Saddle-Focus Homoclinic Orbit.
Int. J. Bifurc. Chaos, January, 2024

Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability.
IEEE Trans. Inf. Forensics Secur., 2024

MSAVI-Enhanced CASA Model for Estimating the Carbon Sink in Coastal Wetland Area: A Case Study of Shandong Province.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

MLC30: A New 30 m Land Cover Dataset for Myanmar From 1990 to 2020 Using Training Sample Migration Framework.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Unsupervised Semantic Segmentation of PolSAR Images Based on Multiview Similarity.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Relaxometry network based on MRI R2⁎ mapping revealing brain iron accumulation patterns in Parkinson's disease.
NeuroImage, 2024

Frontal person image generation based on arbitrary-view human images.
Comput. Animat. Virtual Worlds, 2024

Model-based event/self-triggered fixed-time consensus of nonlinear multi-agent systems.
J. Syst. Control. Eng., 2024

Bounded Collusion-Resistant Registered Functional Encryption for Circuits.
IACR Cryptol. ePrint Arch., 2024

COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts.
CoRR, 2024

Memory Matching is not Enough: Jointly Improving Memory Matching and Decoding for Video Object Segmentation.
CoRR, 2024

A Functional Trade-off between Prosodic and Semantic Cues in Conveying Sarcasm.
CoRR, 2024

MJ-Bench: Is Your Multimodal Reward Model Really a Good Judge for Text-to-Image Generation?
CoRR, 2024

SDR-Former: A Siamese Dual-Resolution Transformer for Liver Lesion Classification Using 3D Multi-Phase Imaging.
CoRR, 2024

Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0.
Comput. Networks, 2024

Enhancing Data-Free Robustness Stealing Attack via Boundary Data Generation.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

Defense Contrastive Poisoning: An Application of JPEG to Self-Supervised Contrastive Learning Indiscriminate Poisoning Attacks.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

Learning Meta Model for Strong Generalization Deepfake Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024

YOLOX-Drone: An Improved Object Detection Method for UAV Images.
Proceedings of the IGARSS 2024, 2024

Memory Matching is Not Enough: Jointly Improving Memory Matching and Decoding for Video Object Segmentation.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service Priorities.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

SHPAC: Fine-grained and Multi-platform Supported Access Control System for Smart Home Scenario.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Communication-Efficient Personalized Federated Learning for Speech-to-Text Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024

SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries.
Proceedings of the Computer Security - ESORICS 2024, 2024

PhiloGPT: A Philology-Oriented Large Language Model for Ancient Chinese Manuscripts with Dunhuang as Case Study.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

LLMCO4MR: LLMs-Aided Neural Combinatorial Optimization for Ancient Manuscript Restoration from Fragments with Case Studies on Dunhuang.
Proceedings of the Computer Vision - ECCV 2024, 2024

Endowing Neural Language Learners with Human-like Biases: A Case Study on Dependency Length Minimization.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Security Evaluation of Emojis in NLP Tasks.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

2023
ERF-RTMDet: An Improved Small Object Detection Method in Remote Sensing Images.
Remote. Sens., December, 2023

Capability-based remaining useful life prediction of machining tools considering non-geometry and tolerancing features with a hybrid model.
Int. J. Prod. Res., November, 2023

Substantial Reduction in Vegetation Photosynthesis Capacity during Compound Droughts in the Three-River Headwaters Region, China.
Remote. Sens., October, 2023

On the Normalized Laplacian Spectrum of the Linear Pentagonal Derivation Chain and Its Application.
Axioms, October, 2023

A systematic review of generative adversarial imputation network in missing data imputation.
Neural Comput. Appl., September, 2023

A dynamic resource-aware endorsement strategy for improving throughput in blockchain systems.
Expert Syst. Appl., September, 2023

Prediction of corn variety yield with attribute-missing data via graph neural network.
Comput. Electron. Agric., August, 2023

Health warning based on 3R ECG Sample's combined features and LSTM.
Comput. Biol. Medicine, August, 2023

Unified construction and L<sup>2</sup> analysis for the finite volume element method over tensorial meshes.
Adv. Comput. Math., February, 2023

CFRWD-GAN for SAR-to-Optical Image Translation.
Remote. Sens., 2023

Quantum thermometry in electromagnetic field of cosmic string spacetime.
Quantum Inf. Process., 2023

Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023

DPF-S2S: A novel dual-pathway-fusion-based sequence-to-sequence text recognition model.
Neurocomputing, 2023

SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023

DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023

CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Reconnecting the Broken Civilization: Patchwork Integration of Fragments from Ancient Manuscripts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

A Survey on the Security of the Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Dense Contrastive Learning Based Object Detection for Remote Sensing Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Virtual Kitakyushu Revitalization Design Based on the Case Study of Immersive Legacies Exhibition in Wellington Museum.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Influence of Stressors on Adolescent Behavioral Problems: the Mediating effect of Psychological Resilience.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Influence of early skin-to-skin contact on mother-infant relationship -a qualitative study based on Nvivo12 software analysis.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Effect of Childhood Trauma on PTSD and PTG among College Students: The Mediating Role of Attachment.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

The Relationship Between Self-concept Clarity and Procrastination among College Students: A Mediation Chain Model.
Proceedings of the 6th International Conference on Big Data and Education, 2023

Lullaland: A Multisensory Virtual Reality Experience to Reduce Stress.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

GNMS: A novel method for model stealing based on GAN.
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023

From Homoglyphs to Enhancedhomoglyphs: Enhancing NLP Backdoor Strategies through Character Substitution.
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023

2022
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs.
IEEE Trans. Emerg. Top. Comput., 2022

Group Consensus in Finite Time for Fractional Multiagent Systems With Discontinuous Inherent Dynamics Subject to Hölder Growth.
IEEE Trans. Cybern., 2022

A Spectrally Accurate Numerical Method for Computing the Bogoliubov-de Gennes Excitations of Dipolar Bose-Einstein Condensates.
SIAM J. Sci. Comput., 2022

Damage Monitoring of Engineered Cementitious Composite Beams Reinforced with Hybrid Bars Using Piezoceramic-Based Smart Aggregates.
Sensors, 2022

Product quality monitoring approach considering non-geometric dimensioning data with rapid production process simulation.
Int. J. Prod. Res., 2022

Multiple Chronic Diseases Associated With Tooth Loss Among the US Adult Population.
Frontiers Big Data, 2022

On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain.
Axioms, 2022

Parental expectation, cognitive development, and family function: a moderating inverted-U model.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Batch Adaptative Streaming for Video Analytics.
Proceedings of the IEEE INFOCOM 2022, 2022

Mechanism of action of cognitive behavioral therapy on pain in adult women with major TMJ disorders.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

The relationship between fathers' rejection and adolescents' creativity and externalizing behavior: the moderating effect of sensation seeking.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022

Revision of the child and adolescent COVID-19 stressors scale and Big Data-Based Analysis of Disparities in Urban and Rural Areas.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022

CSL: A Large-scale Chinese Scientific Literature Dataset.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

SAResU-Net: Shuffle attention residual U-Net for brain tumor segmentation.
Proceedings of the 15th International Congress on Image and Signal Processing, 2022

2021
Analysis and Evaluation of Ultrasound Imaging Features and Pathological Results of Ovarian Cancer.
J. Medical Imaging Health Informatics, 2021

Global Mittag-Leffler consensus for fractional singularly perturbed multi-agent systems with discontinuous inherent dynamics via event-triggered control strategy.
J. Frankl. Inst., 2021

The Development of an Evaluation Model to Assess the Effect of Online English Teaching Based on Fuzzy Mathematics.
Int. J. Emerg. Technol. Learn., 2021

Intelligent flow control algorithm for microservice system.
Cogn. Comput. Syst., 2021

Network pharmacology-based and molecular docking prediction of the active ingredients and mechanism of ZaoRenDiHuang capsules for application in insomnia treatment.
Comput. Biol. Medicine, 2021

Robustifying genomic classifiers to batch effects via ensemble learning.
Bioinform., 2021

Chinese parents' evaluation of children's temperament differences: Factor Analysis Based on PTQ Child Temperament Scale.
Proceedings of the ICETT 2021: 7th International Conference on Education and Training Technologies, Macau, China, April 14, 2021

2020
Statistical and computational methods for addressing heterogeneity in genomic data
PhD thesis, 2020

An Efficient and Parallel R-LWE Cryptoprocessor.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Energy-efficient sensory data gathering based on compressed sensing in IoT networks.
J. Cloud Comput., 2020

Perturbed Pricing.
CoRR, 2020

Robust Video Object Segmentation via Propagating Seams and Matching Superpixels.
IEEE Access, 2020

Pattern-Based Personalized Workflow Fragment Discovery.
Proceedings of the 2020 IEEE World Congress on Services, 2020

Service Availability Guarantee with Adaptive Automatic Flow Control.
Proceedings of the 2020 IEEE World Congress on Services, 2020

A Kernel Density Estimation-Based Variation Sampling for Class Imbalance in Defect Prediction.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Machine Learning Allows Calibration Models to Predict Trace Element Concentration in Soil with Generalized LIBS Spectra.
CoRR, 2019

Attack-Defense Quantification Based On Game-Theory.
CoRR, 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

Resource Analysis and Cost Modeling for End-to-End 5G Mobile Networks.
Proceedings of the Optical Network Design and Modeling, 2019

2018
Alternative empirical Bayes models for adjusting for batch effects in genomic studies.
BMC Bioinform., 2018

A Real-Time Method for Marking the Extent of a Lipid Plaque Based on IV-OCT Imaging.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

2017
A Novel Approach for Security Situational Awareness in the Internet of Things.
CoRR, 2017

Adaptively Detecting Malicious Queries in Web Attacks.
CoRR, 2017

2016
Error estimates of two-level finite element method for Smagorinsky model.
Appl. Math. Comput., 2016

Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
Quantum controlled-not gate in the bad cavity regime.
Quantum Inf. Process., 2015

ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data.
J. Commun., 2015

A Novel Automatic Severity Vulnerability Assessment Framework.
J. Commun., 2015

Hot Topics Extraction from Chinese Micro-blog Based on Sentence.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A Microblog Data Acquisition Method Based on Follow-Group Mode.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Repost Number Prediction of Micro-blog on Sina Weibo Using Time Series Fitting and Regression Analysis.
Proceedings of the International Conference on Identification, 2015

2014
Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research.
Proceedings of the IEEE Computers, 2014

Hot topics detected from micro-bloggings based on word co-occurrence model.
Proceedings of the IEEE Computers, 2014

AraTRM: Attack Resistible Ant-based Trust and Reputation Model.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2010
The multi-class schedule-based transit assignment model under network uncertainties.
Public Transp., 2010

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Secure Signcryption Scheme Based on a Hybrid Encryption.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Comput. Stand. Interfaces, 2009

A new provably secure authentication and key agreement protocol for SIP using ECC.
Comput. Stand. Interfaces, 2009

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Integrated Approach to Worm Detection and Automatic Signature Generation.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Automatic Vulnerability Locating in Binary Patches.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of a client-to-client password-authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2008

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Comput. Commun., 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008

Secure and Efficient Key Management Protocol in Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Security Analysis of WAPI Authentication and Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2007

A New Security Model for Cross-Realm C2C-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2007

Research on User Applying Mode for Video Conference System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Provable Secure Key Management Program for Wireless Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Running-mode Analysis of the SSL Protocol.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Research of Security Architecture for P2P Network Based on Trust Management System.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

The Analysis of Peer-to-Peer Network Security.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005

The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Running-mode analysis of the Security Socket Layer protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

An approach to the formal verification of the three-principal cryptographic protocols.
ACM SIGOPS Oper. Syst. Rev., 2004

SAP2P: A P2P Network Security Architecture Based on Trust Management System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

2003
Authentication and Access Control in P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Using SMV for Cryptographic Protocol Analysis: A Case Study.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...