Yuqing Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Yuqing Zhang 001 (University of Chinese Academy of Sciences, National Computer Network Intrusion Protection Center, Beijing, China)
- Yuqing Zhang 002 (Liaoning Normal University, Dalian, China)
- Yuqing Zhang 003 (Beijing Language and Culture University, Beijing, China)
- Yuqing Zhang 004 (Northeastern University, Boston, MA, USA)
- Yuqing Zhang 005 (Zhejiang University, Hangzhou, China)
Bibliography
2024
J. Sci. Comput., October, 2024
IET Image Process., July, 2024
IEEE Trans. Ind. Informatics, May, 2024
Cross-modal fusion encoder via graph neural network for referring image segmentation.
IET Image Process., March, 2024
Semi-supervised Video Object Segmentation Via an Edge Attention Gated Graph Convolutional Network.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
Int. J. Bifurc. Chaos, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
MSAVI-Enhanced CASA Model for Estimating the Carbon Sink in Coastal Wetland Area: A Case Study of Shandong Province.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
MLC30: A New 30 m Land Cover Dataset for Myanmar From 1990 to 2020 Using Training Sample Migration Framework.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Relaxometry network based on MRI R2⁎ mapping revealing brain iron accumulation patterns in Parkinson's disease.
NeuroImage, 2024
Comput. Animat. Virtual Worlds, 2024
Model-based event/self-triggered fixed-time consensus of nonlinear multi-agent systems.
J. Syst. Control. Eng., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Memory Matching is not Enough: Jointly Improving Memory Matching and Decoding for Video Object Segmentation.
CoRR, 2024
CoRR, 2024
MJ-Bench: Is Your Multimodal Reward Model Really a Good Judge for Text-to-Image Generation?
CoRR, 2024
SDR-Former: A Siamese Dual-Resolution Transformer for Liver Lesion Classification Using 3D Multi-Phase Imaging.
CoRR, 2024
Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0.
Comput. Networks, 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Defense Contrastive Poisoning: An Application of JPEG to Self-Supervised Contrastive Learning Indiscriminate Poisoning Attacks.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IGARSS 2024, 2024
Memory Matching is Not Enough: Jointly Improving Memory Matching and Decoding for Video Object Segmentation.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service Priorities.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
SHPAC: Fine-grained and Multi-platform Supported Access Control System for Smart Home Scenario.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries.
Proceedings of the Computer Security - ESORICS 2024, 2024
PhiloGPT: A Philology-Oriented Large Language Model for Ancient Chinese Manuscripts with Dunhuang as Case Study.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
LLMCO4MR: LLMs-Aided Neural Combinatorial Optimization for Ancient Manuscript Restoration from Fragments with Case Studies on Dunhuang.
Proceedings of the Computer Vision - ECCV 2024, 2024
Endowing Neural Language Learners with Human-like Biases: A Case Study on Dependency Length Minimization.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024
2023
Remote. Sens., December, 2023
Capability-based remaining useful life prediction of machining tools considering non-geometry and tolerancing features with a hybrid model.
Int. J. Prod. Res., November, 2023
Substantial Reduction in Vegetation Photosynthesis Capacity during Compound Droughts in the Three-River Headwaters Region, China.
Remote. Sens., October, 2023
On the Normalized Laplacian Spectrum of the Linear Pentagonal Derivation Chain and Its Application.
Axioms, October, 2023
A systematic review of generative adversarial imputation network in missing data imputation.
Neural Comput. Appl., September, 2023
A dynamic resource-aware endorsement strategy for improving throughput in blockchain systems.
Expert Syst. Appl., September, 2023
Prediction of corn variety yield with attribute-missing data via graph neural network.
Comput. Electron. Agric., August, 2023
Comput. Biol. Medicine, August, 2023
Unified construction and L<sup>2</sup> analysis for the finite volume element method over tensorial meshes.
Adv. Comput. Math., February, 2023
Quantum Inf. Process., 2023
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023
DPF-S2S: A novel dual-pathway-fusion-based sequence-to-sequence text recognition model.
Neurocomputing, 2023
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023
CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Reconnecting the Broken Civilization: Patchwork Integration of Fragments from Ancient Manuscripts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023
Virtual Kitakyushu Revitalization Design Based on the Case Study of Immersive Legacies Exhibition in Wellington Museum.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Influence of Stressors on Adolescent Behavioral Problems: the Mediating effect of Psychological Resilience.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023
Influence of early skin-to-skin contact on mother-infant relationship -a qualitative study based on Nvivo12 software analysis.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023
Effect of Childhood Trauma on PTSD and PTG among College Students: The Mediating Role of Attachment.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023
The Relationship Between Self-concept Clarity and Procrastination among College Students: A Mediation Chain Model.
Proceedings of the 6th International Conference on Big Data and Education, 2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023
From Homoglyphs to Enhancedhomoglyphs: Enhancing NLP Backdoor Strategies through Character Substitution.
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023
2022
IEEE Trans. Emerg. Top. Comput., 2022
Group Consensus in Finite Time for Fractional Multiagent Systems With Discontinuous Inherent Dynamics Subject to Hölder Growth.
IEEE Trans. Cybern., 2022
A Spectrally Accurate Numerical Method for Computing the Bogoliubov-de Gennes Excitations of Dipolar Bose-Einstein Condensates.
SIAM J. Sci. Comput., 2022
Damage Monitoring of Engineered Cementitious Composite Beams Reinforced with Hybrid Bars Using Piezoceramic-Based Smart Aggregates.
Sensors, 2022
Product quality monitoring approach considering non-geometric dimensioning data with rapid production process simulation.
Int. J. Prod. Res., 2022
Frontiers Big Data, 2022
On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain.
Axioms, 2022
Parental expectation, cognitive development, and family function: a moderating inverted-U model.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Mechanism of action of cognitive behavioral therapy on pain in adult women with major TMJ disorders.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022
The relationship between fathers' rejection and adolescents' creativity and externalizing behavior: the moderating effect of sensation seeking.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022
Revision of the child and adolescent COVID-19 stressors scale and Big Data-Based Analysis of Disparities in Urban and Rural Areas.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
Proceedings of the 15th International Congress on Image and Signal Processing, 2022
2021
Analysis and Evaluation of Ultrasound Imaging Features and Pathological Results of Ovarian Cancer.
J. Medical Imaging Health Informatics, 2021
Global Mittag-Leffler consensus for fractional singularly perturbed multi-agent systems with discontinuous inherent dynamics via event-triggered control strategy.
J. Frankl. Inst., 2021
The Development of an Evaluation Model to Assess the Effect of Online English Teaching Based on Fuzzy Mathematics.
Int. J. Emerg. Technol. Learn., 2021
Cogn. Comput. Syst., 2021
Network pharmacology-based and molecular docking prediction of the active ingredients and mechanism of ZaoRenDiHuang capsules for application in insomnia treatment.
Comput. Biol. Medicine, 2021
Bioinform., 2021
Chinese parents' evaluation of children's temperament differences: Factor Analysis Based on PTQ Child Temperament Scale.
Proceedings of the ICETT 2021: 7th International Conference on Education and Training Technologies, Macau, China, April 14, 2021
2020
PhD thesis, 2020
IEEE Trans. Circuits Syst. II Express Briefs, 2020
J. Cloud Comput., 2020
IEEE Access, 2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
A Kernel Density Estimation-Based Variation Sampling for Class Imbalance in Defect Prediction.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
2019
Machine Learning Allows Calibration Models to Predict Trace Element Concentration in Soil with Generalized LIBS Spectra.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Optical Network Design and Modeling, 2019
2018
Alternative empirical Bayes models for adjusting for batch effects in genomic studies.
BMC Bioinform., 2018
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018
2017
CoRR, 2017
2016
Appl. Math. Comput., 2016
Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data.
J. Commun., 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Repost Number Prediction of Micro-blog on Sina Weibo Using Time Series Fitting and Regression Analysis.
Proceedings of the International Conference on Identification, 2015
2014
Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research.
Proceedings of the IEEE Computers, 2014
Proceedings of the IEEE Computers, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2010
Public Transp., 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Comput. Commun., 2008
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2005
Proceedings of the 2005 International Conference on Semantics, 2005
Proceedings of the Progress in Cryptology, 2005
Running-mode Analysis of the SSL Protocol.
Proceedings of The 2005 International Conference on Internet Computing, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
The Analysis of Peer-to-Peer Network Security.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005
Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005
An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005
Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
An approach to the formal verification of the three-principal cryptographic protocols.
ACM SIGOPS Oper. Syst. Rev., 2004
SAP2P: A P2P Network Security Architecture Based on Trust Management System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
2001
ACM SIGOPS Oper. Syst. Rev., 2001