Kai Qian

According to our database1, Kai Qian authored at least 116 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Data Protection with SMSD Labware.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Application and Research of Image-Based Modeling and 3D Printing Technology in Intangible Cultural Heritage Quanzhou Marionette Protection.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Mobile Software Security with Dynamic Analysis.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Detectors for Intent ICC Security Vulnerability with Android IDE.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Security Threat Analysis of SDN Switch Flow Table.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

OSSpal: Finding and Evaluating Open Source Software.
Proceedings of the Open Source Systems: Towards Robust Practices, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Designing an Undergraduate Minor Program in E-Discovery.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

FlowVisor vulnerability analysis.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Hands-On Learning for Computer Network Security with Mobile Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Using monkey hand exoskeleton to explore finger passive joint movement response in primary motor cortex.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Photonic Crystal Magnetic Field Sensor Using a Shoulder-Coupled Resonant Cavity Infiltrated with Magnetic Fluid.
Sensors, 2016

Design and evaluation of an actuated exoskeleton for examining motor control in stroke thumb.
Advanced Robotics, 2016

A hybrid analysis for mobile security threat detection.
Proceedings of the IEEE 7th Annual Ubiquitous Computing, 2016

Static Mining and Dynamic Taint for Mobile Security Threats Analysis.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Multi-dimensional and customizable open-source labware for promoting big data analytical skills in STEM education.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

OpenFlow flow table overflow attacks and countermeasures.
Proceedings of the European Conference on Networks and Communications, 2016

MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Hardware Attacks and Security Education.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Using Real-Time Fear Appeals to Improve Social Media Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Impact of Data Preprocessing on the Performance of a Naive Bayes Classifier.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Low Cost, Portable Platform for Information Assurance and Security Education.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015

A Neural-Network Based DDoS Detection System Using Hadoop and HBase.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Automated Detection and Analysis for Android Ransomware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Innovative mobile tool for engineering embedded design and security educations.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Mobile security education on portable labs.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Learning Hands-on Information Assurance and Security on Mobile Devices.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Web Service-Enabled Spam Filtering with Naïve Bayes Classification.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Learning Mobile Security with Labware.
IEEE Security & Privacy, 2014

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

Learning cloud computing and security through CloudSim simulation.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Authentic learning in network and security with portable labs.
Proceedings of the IEEE Frontiers in Education Conference, 2014

A multidisciplinary project for undergraduate summer research in computer systems.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

A fostering embedded system educationwith android sensory embedded system labware.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Contradistinction and Relevant Learning for Transform Processing with Smartphones in Engineering Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Low-cost and portable labware for computing curriculum using scalable mobile sensory platform.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Operant conditioning of a multiple degree-of-freedom brain-machine interface in a primate model of amputation.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
The cross-curriculum mobile computing labware for CS (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Real-World Relevant Learning with Android Smartphones.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

Work in progress: Enhance CS/CE student learning in computer architecture and organization through a remote instrument control lab with mixed reality.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Work in progress: Multi-faceted penetration of fast fourier transform by interactively analyzing real-world objects via mobile technology.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
ThinStore: Out-of-Band Virtualization with Thin Provisioning.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Live Programming Learning Objects on Cloud.
Proceedings of the ICALT 2011, 2011

A Simple Low-Cost Portable Energy Efficient Device to Supplement Operating System Curriculum.
Proceedings of the ICALT 2011, 2011

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011

A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011

Work in progress - Live programming learning objects repository.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Event-related desynchronization/ synchronization-based brain-computer interface towards volitional cursor control in a 2D center-out paradigm.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence, 2011

Teaching operating systems with simple low-cost portable energy efficient devices.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
A new method of information decision-making based on D-S evidence theory.
Proceedings of the IEEE International Conference on Systems, 2010

BAUT: A Bayesian Driven Tutoring System.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Design of Online Runtime and Testing Environment for Instant Java Programming Assessment.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Portable labs in a box for embedded system education.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Innovative CS capstone projects on green energy applications with WSN in a box.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Green Computing Methodology for Next Generation Computing Scientists.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Leveraging CS capstone project and green smart energy computing with WSN in a box.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

A novel embedded system curriculum with portable hands-on labs in a box.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

Using the online webwork for student's homework practice in education.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
A discussion on security typing and measurement for SOA.
ACM SIGSOFT Software Engineering Notes, 2009

Teach real-time embedded system online with real hands-on labs.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

2008
Under Development - UCD in Chinese IT enterprises.
Interactions, 2008

APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Dynamical Proxy for Dynamic Services.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

SAFELI: SQL injection scanner using symbolic execution.
Proceedings of the 2008 Workshop on Testing, 2008

The automated web application testing (AWAT) system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Race condition in Ajax-based web application.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
A User Experience Study on C2C E-Commerce Localization in China.
Proceedings of the Usability and Internationalization. Global and Local User Interfaces, 2007

A Static Analysis Framework For Detecting SQL Injection Vulnerabilities.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Recursion detection testing on software components.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Service Oriented Dynamic Decoupling Metrics.
Proceedings of the 2006 International Conference on Semantic Web & Web Services, 2006

Asynchronous Callback in Web Services.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Adapter Pattern in Component and Service Levels vs. Class and Object Levels.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Recursion Detection Testing on Software Components.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Incremental, Spiral, Topic-Driven Approach -- Designing labs and projects for a Web technology course.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

Decoupling Metrics for Services Composition.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
Enhanced water level model in image classification.
Proceedings of the Visual Information Processing XIV, 2005

2004
Water-level model in density-based unsupervised classification.
Proceedings of the Visual Information Processing XIII, Orlando, FL, USA, April 12, 2004, 2004

Design Patterns for Web Services.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

2003
Some Experiments on Peer Group Pixels Based Spatial Classifier.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2002
A Parallel Prefix Convex Hill Algorithm Using MasPar.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Component based development of UDBC.
Proceedings of the Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, 2002

A spatial classification algorithm using peer group pixels.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2000
Polynomial morphological approach in pattern recognition.
Proceedings of the Visual Information Processing IX, Orlando, FL, USA, April 24, 2000, 2000

1999
Gray Image Skeletonization with Hollow Preprocessing Using Distance Transformation.
IJPRAI, 1999

1998
Three-dimensional skeletonization using distance transform.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

1997
Skeletonization of gray-scale images by gray weighted distance transform.
Proceedings of the Visual Information Processing VI, Orlando, FL, USA, April 21, 1997, 1997

1993
An algebraic approach for morphological operations on 2D and 3D images.
Pattern Recognition, 1993

1992
A 3D object recognition system using voxel representation.
Pattern Recognition Letters, 1992

A template polynomial approach for image processing and visual recognition.
Pattern Recognition, 1992

Determining holes and connectivity in binary images.
Computers & Graphics, 1992

1991
An algebraic method for processing colored images.
Pattern Recognition Letters, 1991

3-D vision algorithms based on polynomial representation(abstract and references only).
Proceedings of the 19th annual conference on Computer Science, 1991

1990
Binary image processing by polynomial approach.
Pattern Recognition Letters, 1990

Software Development: Image Processing by Template Polynomials.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990


  Loading...