Ziqing Wang

Orcid: 0000-0001-8791-0805

According to our database1, Ziqing Wang authored at least 48 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Correction to: Smart scheduling of dynamic job shop based on discrete event simulation and deep reinforcement learning.
J. Intell. Manuf., August, 2024

Smart scheduling of dynamic job shop based on discrete event simulation and deep reinforcement learning.
J. Intell. Manuf., August, 2024

A new construction of public key authenticated encryption with keyword search based on LWE.
Telecommun. Syst., June, 2024

A learning and potential area-mining evolutionary algorithm for large-scale multi-objective optimization.
Expert Syst. Appl., March, 2024

Spiking Neural Network as Adaptive Event Stream Slicer.
CoRR, 2024

LayerKV: Optimizing Large Language Model Serving with Layer-wise KV Cache Management.
CoRR, 2024

Spiking Diffusion Models.
CoRR, 2024

Mamba as Decision Maker: Exploring Multi-scale Sequence Modeling in Offline Reinforcement Learning.
CoRR, 2024

Autonomous Driving with Spiking Neural Networks.
CoRR, 2024

Multi-user ISAC through Stacked Intelligent Metasurfaces: New Algorithms and Experiments.
CoRR, 2024

Spiking Denoising Diffusion Probabilistic Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Autost: Training-Free Neural Architecture Search For Spiking Transformers.
Proceedings of the IEEE International Conference on Acoustics, 2024

Spiking Wavelet Transformer.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
Multimodal Mutual Attention-Based Sentiment Analysis Framework Adapted to Complicated Contexts.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Horizontal Magnetic Anomaly Accompanying the Co-Seismic Earthquake Light of the M7.3 Fukushima Earthquake of 16 March 2022: Phenomenon and Mechanism.
Remote. Sens., October, 2023

A group key agreement protocol based on ECDH and short signature.
J. Inf. Secur. Appl., 2023

Bursting Spikes: Efficient and High-performance SNNs for Event-based Vision.
CoRR, 2023

Construction practice of intelligent combination of medical and elderly care mode.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

Job Shop Scheduling Problem Using Proximal Policy Optimization.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2023

Masked Spiking Transformer.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Performance analysis of inter-satellite round-robin differential-phase-shift quantum key distribution.
Quantum Inf. Process., 2022

A two rounds dynamic authenticated group key agreement protocol based on LWE.
J. Syst. Archit., 2022

A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles.
IEEE Internet Things J., 2022

Temporal Modes of Light in Satellite-to-Earth Quantum Communications.
IEEE Commun. Lett., 2022

Image denoising based on global image similar patches searching and HOSVD to patches tensor.
EURASIP J. Adv. Signal Process., 2022

Efficient Spiking Transformer Enabled By Partial Information.
CoRR, 2022

A centerline symmetry and double-line transformation based algorithm for large-scale multi-objective optimization.
Connect. Sci., 2022

Satellite-to-Ground Multi-dimensional Quantum Teleportation via Orbital Angular Momentum.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Data-driven Trajectory Planning Strategy for Connected Vehicles at Signalized Intersection.
Proceedings of the 17th International Conference on Control, 2022

AMD-DBSCAN: An Adaptive Multi-density DBSCAN for datasets of extremely variable density.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

2021
A public key encryption scheme based on a new variant of LWE with small cipher size.
J. Syst. Archit., 2021

Digital signature with cryptographic reverse firewalls.
J. Syst. Archit., 2021

A Reference Point Selection and Direction Guidance-Based Algorithm for Large-Scale Multi-Objective Optimization.
Int. J. Pattern Recognit. Artif. Intell., 2021

A Novel Conflict Management Method Based on Uncertainty of Evidence and Reinforcement Learning for Multi-Sensor Information Fusion.
Entropy, 2021

Video-Based Inpatient Fall Risk Assessment: A Case Study.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

Performance Comparison of LASSO Variants with Genome-Wide Association Studies (GWAS).
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
An efficient and practical certificateless signcryption scheme for wireless body area networks.
Comput. Commun., 2020

Satellite-Based Entanglement Distribution using Orbital Angular Momentum of Light.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

2019
A Blockchain-Based Medical Data Sharing and Protection Scheme.
IEEE Access, 2019

Quantum Communications: From Space to the Nano.
Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, 2019

Inter-Satellite Quantum Key Distribution at Terahertz Frequencies.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Detecting Orbital Angular Momentum of Light in Satellite-to-Ground Quantum Communications.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Artificial Intelligence and Location Verification in Vehicular Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A 20GS/s Track-and-Hold Amplifier based on InP DHBT Process.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
Physical Intrusion Detection System Based on Behavioral Sign Recognition.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

2011
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

K-times Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2003
Neuro-fuzzy synergism to the intelligent system for edge detection and enhancement.
Pattern Recognit., 2003


  Loading...