Fang Qi

According to our database1, Fang Qi authored at least 31 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Bidirectional LSTM with self-attention mechanism and multi-channel features for sentiment classification.
Neurocomputing, 2020

Grape disease image classification based on lightweight convolution neural networks and channelwise attention.
Comput. Electron. Agric., 2020

Robust Cache-Aware Quantum Processor Layout.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

2019
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019

Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks.
Proceedings of the Tenth International Green and Sustainable Computing Conference, 2019

Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Fooling AI with AI: An Accelerator for Adversarial Attacks on Deep Learning Visual Classification.
Proceedings of the 30th IEEE International Conference on Application-specific Systems, 2019

2018
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.
Telecommun. Syst., 2018

2017
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Module-Level Software Streaming Loading Model Based on Hypervisor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Optimal transitional trajectory generation for automatic machines.
Int. J. Comput. Sci. Eng., 2016

Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
A local binary pattern based texture descriptors for classification of tea leaves.
Neurocomputing, 2015

Selective partial recovery optimisation strategy for SSL connection migration.
Int. J. Auton. Adapt. Commun. Syst., 2015

Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems.
Proceedings of the 2015 IEEE International Conference on Peer-to-Peer Computing, 2015

Efficient Private Matching Scheme for Friend Information Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

New Escrow-Free Scheme for Hierarchical Identity-Based Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Some topics in modeling ranking data.
PhD thesis, 2014

Unified Security Architecture Research for 5G Wireless System.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
User requirements-aware security ranking in SSL protocol.
J. Supercomput., 2013

2011
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
Secur. Commun. Networks, 2011

Dynamic fuzzy neural network for the intelligent control of a humanoid robot.
Comput. Syst. Sci. Eng., 2011

2009
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Attacks vs. Countermeasures of SSL Protected Trust Model.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

2005
Batching SSL/TLS Handshake Improved.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Available Bandwidth Measurement Schemes over Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...