Zhiqiang Yao

Orcid: 0000-0002-2211-5517

According to our database1, Zhiqiang Yao authored at least 75 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Navigation Adaptability for Ground Vehicles: Fine-Grained Urban Environment Recognition Based on GNSS Measurements.
IEEE Trans. Instrum. Meas., 2024

FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle.
IEEE Trans. Inf. Forensics Secur., 2024

Vision-based trajectory generation and tracking algorithm for maneuvering of a paddy field robot.
Comput. Electron. Agric., 2024

2023
A modified multivariate spectral gradient projection method for nonlinear complementarity problems.
Comput. Appl. Math., December, 2023

Dynamic Multi-Objective AWPSO in DT-Assisted UAV Cooperative Task Assignment.
IEEE J. Sel. Areas Commun., November, 2023

Privacy Risk Estimation of Online Social Networks.
J. Inf. Sci. Eng., September, 2023

Fusion Pre-trained Emoji Feature Enhancement for Sentiment Analysis.
ACM Trans. Asian Low Resour. Lang. Inf. Process., April, 2023

Ranging Estimation and Implementation with Cellular signals for UAV Navigation.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

MAP-GAN: Generative Adversarial Network for Privacy Preserving of Multiple Facial Attributes.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023

Grid Construction of 5G Beam-Space via Matrix Completion and Principal Component Analysis.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Firewall Anomaly Detection Based on Double Decision Tree.
Symmetry, 2022

Deconv-transformer (DecT): A histopathological image classification model for breast cancer based on color deconvolution and transformer architecture.
Inf. Sci., 2022

A Fair Federated Learning Framework based on Clustering.
Proceedings of the International Conference on Networking and Network Applications, 2022

Research on UAV Cooperative Task Assignment Based on Dynamic Multi-objective Evolutionary Algorithm.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Privacy Measurement Based on Social Network Properties and Structure.
Proceedings of the Big Data and Security - 4th International Conference, 2022

2021
A novel method for asynchronous source localisation based on time of arrival measurements.
Int. J. Distributed Sens. Networks, 2021

A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021

Locating the source in wireless sensor networks with unknown start transmission time.
Proceedings of the 11th International Conference on Localization and GNSS, 2021

Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

A Novel Method for Asynchronous Time-of-Arrival-Based Source Localization: Algorithms, Performance and Complexity.
Sensors, 2020

Distributed Blanket Jamming Resource Scheduling for Satellite Navigation Based on Particle Swarm Optimization and Genetic Algorithm.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

Horizontal Pyramid Matching for Person Re-Identification.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
Mob. Networks Appl., 2018

Multi-attribute group decision-making under probabilistic uncertain linguistic environment.
J. Oper. Res. Soc., 2018

Clustering algorithms based on correlation coefficients for probabilistic linguistic term sets.
Int. J. Intell. Syst., 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

2017
Sum-Power Minimization Problem in Multisource Single-AF-Relay Networks: A New Revisit to Study the Optimality.
IEEE Trans. Veh. Technol., 2017

Dynamic Resource Allocation for Energy Efficient Transmission in Digital Subscriber Lines.
IEEE Trans. Signal Process., 2017

Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Service-based general power system data exchange mode.
Proceedings of the 2017 IEEE Innovative Smart Grid Technologies - Asia, 2017

DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A Low-Complexity Power Allocation Strategy to Minimize Sum-Source-Power for Multi-User Single-AF-Relay Networks.
IEEE Trans. Commun., 2016

History-aware page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2016

A Semiautomated Structure-Based Method To Predict Substrates of Enzymes via Molecular Docking: A Case Study with <i>Candida antarctica</i> Lipase B.
J. Chem. Inf. Model., 2016

ADME Properties Evaluation in Drug Discovery: Prediction of Caco-2 Cell Permeability Using a Combination of NSGA-II and Boosting.
J. Chem. Inf. Model., 2016

Energy-efficient power allocation for multi-user single-AF-relay underlay cognitive radio networks.
Comput. Networks, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Optimal Resource Allocation for Energy Efficient Transmission in DSL.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Dynamic garbage collection scheme based on past update times for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

Channel estimation of sparse multipath based on compressed sensing using Golay sequences.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

2013
Robust Fixed-Complexity Sphere Decoders for Rank-Deficient MIMO Systems.
IEEE Trans. Wirel. Commun., 2013

Quantum private comparison protocol with <i>d</i>-dimensional Bell states.
Quantum Inf. Process., 2013

The Realization of Students Ranking Assessment Management Information System.
J. Softw., 2013

Implementation of the AutoComplete Feature of the Textbox Based on Ajax and Web Service.
J. Comput., 2013

Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013

High performance parallel evolutionary algorithm model based on MapReduce framework.
Int. J. Comput. Appl. Technol., 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2011
A Novel Robust Mesh Watermarking Based on BNBW.
EURASIP J. Adv. Signal Process., 2011

2010
A Data Hiding Scheme based on Local Coordinate System for 3D Triangle Mesh Models.
J. Softw., 2010

2009
The Theory about CD-CAT Based on FCA and Its Application.
Int. J. Distance Educ. Technol., 2009

Biorthogonal nonuniform B-spline wavelets based on a discrete norm.
Comput. Aided Geom. Des., 2009

An efficient and effective image representation for region-based image retrieval.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Improved Blind Watermarking of 3D Objects Based on Partition.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Clustering transactions based on weighting maximal frequent itemsets.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

A Novel Watermarking Extraction Based on Error Correcting Code and Evidence Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Non-Uniform Scale, Rotation and Translation Resilient Public Watermarking for 3D Models.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A Practical Model for Dynamic Software Measurement.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A fast robot feedback decision algorithm.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

2006
Directly Modeling of Correlation Matrices for GMM in Speaker Identification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Improved Two-stage Wiener Filter for Robust Speaker Identification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A New Hybrid GMM/SVM for Speaker Verification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Kurtosis Normalization in Feature Space for Robust Speaker Verification.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Improved GMM-UBM/SVM For Speaker Verification.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Improved covariance modeling for GMM in speaker identification.
Proceedings of the 9th European Conference on Speech Communication and Technology, 2005

Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...