Ziqiang Luo
Orcid: 0009-0008-6160-9174
According to our database1,
Ziqiang Luo
authored at least 15 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
1
1
1
1
1
1
1
2
1
2
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Product Selection Calculation Method Based on the Similarity of Psychological Expectation Cloud Models.
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024
2022
Proceedings of the 15th International Symposium on Computational Intelligence and Design, 2022
2021
M-A-R: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approach.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
2018
Cogn. Technol. Work., 2018
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018
2016
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Proceedings of the 13th Web Information Systems and Applications Conference, 2016
2014
J. Softw., 2014
2013
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the Ninth Web Information Systems and Applications Conference, 2012
2011
A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011