Zhiguang Qin
Orcid: 0009-0007-6105-0254
According to our database1,
Zhiguang Qin
authored at least 236 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Pattern Recognit., 2025
2024
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation.
Peer Peer Netw. Appl., September, 2024
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network.
Peer Peer Netw. Appl., July, 2024
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition.
IEEE Trans. Artif. Intell., April, 2024
A cascaded framework with cross-modality transfer learning for whole heart segmentation.
Pattern Recognit., March, 2024
Hyperspectral image classification using Second-Order Pooling with Graph Residual Unit Network.
Expert Syst. Appl., March, 2024
Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System.
IEEE Internet Things J., February, 2024
IEEE Trans. Multim., 2024
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.
IEEE Trans. Inf. Forensics Secur., 2024
C2FResMorph: A high-performance framework for unsupervised 2D medical image registration.
Pattern Recognit., 2024
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing.
Comput. Sci. Rev., 2024
2023
FastNet: A Lightweight Convolutional Neural Network for Tumors Fast Identification in Mobile-Computer-Assisted Devices.
IEEE Internet Things J., June, 2023
Pers. Ubiquitous Comput., April, 2023
PiCovS: Pixel-Level With Covariance Pooling Feature and Superpixel-Level Feature Fusion for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction.
Sensors, 2023
Synthetic Aperture Radar Automatic Target Recognition Based on a Simple Attention Mechanism.
Int. J. Interact. Multim. Artif. Intell., 2023
Differentiable Attention Unet-like Nerual Architecture Search for Multimodal Magnetic Resonance Imaging-based Glioma Segmentaion DAUNAS for Multimodal MRI-based Glioma Segmentation.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023
2022
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption.
IEEE Trans. Neural Networks Learn. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.
IEEE J. Biomed. Health Informatics, 2022
MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation.
IEEE J. Biomed. Health Informatics, 2022
Attention Autoencoder for Generative Latent Representational Learning in Anomaly Detection.
Sensors, 2022
Secur. Commun. Networks, 2022
MallesNet: A multi-object assistance based network for brachial plexus segmentation in ultrasound images.
Medical Image Anal., 2022
Facial expression recognition via coarse-grained and fine-grained feature representation.
J. Intell. Fuzzy Syst., 2022
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.
J. Ambient Intell. Humaniz. Comput., 2022
Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation.
Inf. Process. Manag., 2022
Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones.
IEEE Internet Things J., 2022
Generic network for domain adaptation based on self-supervised learning and deep clustering.
Neurocomputing, 2022
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system.
Trans. Emerg. Telecommun. Technol., 2022
Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Comput. Speech Lang., 2022
LCSB-inception: Reliable and effective light-chroma separated branches for Covid-19 detection from chest X-ray images.
Comput. Biol. Medicine, 2022
Dual_Pachi: Attention-based dual path framework with intermediate second order-pooling for Covid-19 detection from chest X-ray images.
Comput. Biol. Medicine, 2022
Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
2021
Wirel. Networks, 2021
Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks.
Wirel. Commun. Mob. Comput., 2021
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021
Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data".
IEEE Trans. Cloud Comput., 2021
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
Secure and dynamic access control for the Internet of Things (IoT) based traffic system.
PeerJ Comput. Sci., 2021
Multim. Tools Appl., 2021
Spatial self-attention network with self-attention distillation for fine-grained image recognition.
J. Vis. Commun. Image Represent., 2021
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
KSII Trans. Internet Inf. Syst., 2021
DeepSeg: Deep-Learning-Based Activity Segmentation Framework for Activity Recognition Using WiFi.
IEEE Internet Things J., 2021
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things.
IEEE Internet Things J., 2021
Informatica (Slovenia), 2021
ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation.
Neurocomputing, 2021
A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing.
Future Gener. Comput. Syst., 2021
Attention augmented residual network for tomato disease detection and classification.
Turkish J. Electr. Eng. Comput. Sci., 2021
Comput. Secur., 2021
Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images.
Complex., 2021
Features to Text: A Comprehensive Survey of Deep Learning on Semantic Segmentation and Image Captioning.
Complex., 2021
Image Inpainting and Classification Agent Training Based on Reinforcement Learning and Generative Models with Attention Mechanism.
Proceedings of the International Conference on Microelectronics, 2021
Attention Augmented Convolutional Neural Network for Fine-Grained Plant Disease Classification and Visualization Using Stochastic Sample Transformations.
Proceedings of the ICAIP 2021: 5th International Conference on Advances in Image Processing, Chengdu, China, November 12, 2021
FDO-ABE: A Fully Decentralized Lightweight Access Control Architecture for Mobile Edge Computing.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain.
Inf., 2020
Inf., 2020
Evaluation of Tree-Based Ensemble Machine Learning Models in Predicting Stock Price Direction of Movement.
Inf., 2020
Stock market decision support modeling with tree-based AdaBoost ensemble machine learning models.
Informatica (Slovenia), 2020
Inf. Fusion, 2020
Neurocomputing, 2020
Neurocomputing, 2020
Neurocomputing, 2020
Computer-Mediated Communication Portal Implementation Framework: A Higher Education Institutional Perspective.
Int. J. Emerg. Technol. Learn., 2020
CoRR, 2020
A Multi-View Dynamic Fusion Framework: How to Improve the Multimodal Brain Tumor Segmentation from Multi-Views?
CoRR, 2020
CoRR, 2020
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks.
CCF Trans. Netw., 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers.
IEEE Access, 2020
IEEE Access, 2020
A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles.
IEEE Access, 2020
Proceedings of the Intelligent Human Systems Integration 2020, 2020
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
FuzzyNet: Context Encoding and Spatial Fuzzy Refinement Network in Semantic Segmentation.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020
2019
A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks.
Wirel. Commun. Mob. Comput., 2019
Modeling Embedding Dimension Correlations via Convolutional Neural Collaborative Filtering.
ACM Trans. Inf. Syst., 2019
Symmetry, 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Managing an Information System Transformation in Higher Educational Institutions: A Case Study on CMC Portal in Ghana.
Int. J. Emerg. Technol. Learn., 2019
Iterative tighter nonparallel hyperplane support vector clustering with simultaneous feature selection.
Clust. Comput., 2019
High-order correlation detecting in features for diagnosis of Alzheimer's disease and mild cognitive impairment.
Biomed. Signal Process. Control., 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Negative Authorization by Implementing Negative Attributes in Attribute-Based Access Control Model for Internet of Medical Things.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Proceedings of the ICETC 2019, 2019
An Intelligent Bidding Strategy Based on Model-Free Reinforcement Learning for Real-Time Bidding in Display Advertising.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019
2018
Wirel. Pers. Commun., 2018
Sci. Program., 2018
Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018
Int. J. Web Serv. Res., 2018
An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018
Int. J. Imaging Syst. Technol., 2018
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation.
Int. J. Netw. Secur., 2018
Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.
Int. J. Netw. Secur., 2018
RUN: Residual U-Net for Computer-Aided Detection of Pulmonary Nodules without Candidate Selection.
CoRR, 2018
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records.
IEEE Access, 2018
Brain Tumor Segmentation Using Concurrent Fully Convolutional Networks and Conditional Random Fields.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018
2017
Frequent Symptom Sets Identification from Uncertain Medical Data in Differentially Private Way.
Sci. Program., 2017
S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol.
IEEE Internet Things J., 2017
Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare.
Int. J. Netw. Secur., 2017
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
Int. J. Netw. Secur., 2017
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
Int. J. Netw. Secur., 2017
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Comput. Stand. Interfaces, 2017
CoRR, 2017
Brain MR Image Classification for Alzheimer's Disease Diagnosis Based on Multifeature Fusion.
Comput. Math. Methods Medicine, 2017
LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context.
IEEE Access, 2017
PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing.
IEEE Access, 2017
Wheel: Accelerating CNNs with Distributed GPUs via Hybrid Parallelism and Alternate Strategy.
Proceedings of the 2017 ACM on Multimedia Conference, 2017
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
MESA: An Efficient Matching Scheme in Content-Based Publish/Subscribe System with Simplified Bayesian Approach.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
Secur. Commun. Networks, 2016
计算机科学, 2016
Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience.
IACR Cryptol. ePrint Arch., 2016
Concurr. Comput. Pract. Exp., 2016
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016
Proceedings of the 6th IEEE International Conference on Computational Advances in Bio and Medical Sciences, 2016
Proceedings of the Artificial Intelligence Research and Development, 2016
Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015
Wirel. Pers. Commun., 2015
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.
IEEE Trans. Inf. Forensics Secur., 2015
Simul. Model. Pract. Theory, 2015
功耗感知的自适应粒子群优化虚拟机动态映射 (Power-aware Virtual Machine Dynamic Mapper Using Particle Swarm Optimization).
计算机科学, 2015
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015
Distance-bounding trust protocol in anonymous radio-frequency identification systems.
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Network coding based cooperative device-to-device communications in the uplink of cellular network.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015
Fast Community Discovery and Its Evolution Tracking in Time-Evolving Social Networks.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
Classification of Alzheimer's disease based on the combination of morphometric feature and texture feature.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015
2014
Wirel. Pers. Commun., 2014
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
Wirel. Pers. Commun., 2014
Int. J. Netw. Secur., 2014
Simultaneous community discovery and user interests extraction in social network based on probabilistic model.
Int. J. Intell. Inf. Database Syst., 2014
Sci. China Inf. Sci., 2014
Incorporating Language Patterns and Domain Knowledge into Feature-Opinion Extraction.
Proceedings of the Text, Speech and Dialogue - 17th International Conference, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the International Conference on Audio, 2014
MRI brain image segmentation based on Kerneled FCM algorithm and using image filtering method.
Proceedings of the International Conference on Audio, 2014
An Architecture and a Platform for Recording and Replaying the Healthcare Information.
Proceedings of the Health Information Science - Third International Conference, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
IEEE Trans. Inf. Theory, 2013
IEEE Trans. Inf. Forensics Secur., 2013
J. Networks, 2013
SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2012
Theor. Comput. Sci., 2012
Comput. Electr. Eng., 2012
Accelerating pairwise statistical significance estimation for local alignment by harvesting GPU's power.
BMC Bioinform., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
A co-commitment based secure data collection scheme for tiered wireless sensor networks.
J. Syst. Archit., 2011
Int. J. Netw. Secur., 2011
Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
2010
A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach.
J. Digit. Content Technol. its Appl., 2010
Informatica, 2010
Int. J. Netw. Secur., 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Discovery Science - 13th International Conference, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks.
J. Digit. Content Technol. its Appl., 2009
Int. J. Netw. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
CoRR, 2009
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
SDC: Secure Data Collection for Time Based Queries in Tiered Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009
DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the Complex Sciences, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Fundam. Informaticae, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007
2006
Proceedings of the 2006 International Conference on Semantics, 2006
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003