Genqing Bian

Orcid: 0000-0002-6058-4832

According to our database1, Genqing Bian authored at least 27 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Healthcare entity recognition based on deep learning.
Multim. Tools Appl., March, 2024

Real-time portrait image retouching extended from DualBLN.
Expert Syst. Appl., March, 2024

2023
A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things.
J. Supercomput., November, 2023

A journal name semantic augmented multi-dimensional feature fusion model for scholarly journal recommendation.
Inf. Process. Manag., September, 2023

Dynamic decision-making strategy of replica number based on data hot.
J. Supercomput., June, 2023

Certificateless network coding scheme from certificateless public auditing protocol.
J. Supercomput., 2023

A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
Entropy, 2023

Real-time network virtualization based on SDN and Docker container.
Clust. Comput., 2023

2022
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage".
IEEE Trans. Serv. Comput., 2022

RTFTL: design and implementation of real-time FTL algorithm for flash memory.
J. Supercomput., 2022

Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property.
Clust. Comput., 2022

Research on Data Routing Strategy of Deduplication in Cloud Environment.
IEEE Access, 2022

Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier.
IEEE Access, 2022

Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment.
IEEE Access, 2022

2021
A survey of research hotspots and frontier trends of recommendation systems from the perspective of knowledge graph.
Expert Syst. Appl., 2021

Research on Routing Strategy in Cluster Deduplication System.
IEEE Access, 2021

2020
Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding".
IEEE Trans. Parallel Distributed Syst., 2020

Research on Multifeature Data Routing Strategy in Deduplication.
Sci. Program., 2020

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited.
IEEE Commun. Lett., 2020

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited.
Appl. Math. Comput., 2020

A Survey of Research Progress and Hot Front of Natural Gas Load Forecasting From Technical Perspective.
IEEE Access, 2020

Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case.
IEEE Access, 2020

2019
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model.
Comput. J., 2019

Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
IEEE Access, 2019

2018
Rack Aware Data Placement for Network Consumption in Erasure-Coded Clustered Storage Systems.
Inf., 2018

Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment.
IEEE Access, 2018

2014
Construction of Software and Hardware Resource Pool in Data Center Using Virtualization.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014


  Loading...