Qi Cui

Orcid: 0000-0003-1829-6658

According to our database1, Qi Cui authored at least 31 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024

Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024

ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning.
IEEE Trans. Multim., 2024

Deep Evidential Remote Sensing Landslide Image Classification With a New Divergence, Multiscale Saliency and an Improved Three-Branched Fusion.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2023
Underwater image enhancement based on a portion denoising adversarial network.
Int. J. Intell. Robotics Appl., September, 2023

discourseGT: An R package to analyze discourse networks in educational contexts.
J. Open Source Softw., August, 2023

3D Object Detection with Attention: Shell-Based Modeling.
Comput. Syst. Sci. Eng., 2023

2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Unsupervised SAR and Optical Image Matching Using Siamese Domain Adaptation.
IEEE Trans. Geosci. Remote. Sens., 2022

An Adaptive Designer Network Model and Its Robustness Research.
Symmetry, 2022

Highly Sensing and Selective Performance Based on Bi-Doped Porous ZnSnO3 Nanospheres for Detection of n-Butanol.
Sensors, 2022

Traceable and Authenticable Image Tagging for Fake News Detection.
CoRR, 2022

2021
Research on Classification of Fine-Grained Rock Images Based on Deep Learning.
Comput. Intell. Neurosci., 2021

Chapter Five - Fingerprint liveness detection using an improved CNN with the spatial pyramid pooling structure.
Adv. Comput., 2021

The realization and optimization of path planning algorithm for autonomous mobile robot.
Proceedings of the ICIIP 2021: 2021 6th International Conference on Intelligent Information Processing, 2021

Visual Relationship Learning for Cross-Modal Retrieval.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Facing COVID-19 in China and the US: Do we have the same emotions?
Proceedings of the 8th International Conference on Behavioral and Social Computing, 2021

2020
Multi-objective flexible flow shop batch scheduling problem with renewable energy.
Int. J. Autom. Control., 2020

Synchronization Control Design Based on Observers for Time-Delay Lur'e Systems.
IEEE Access, 2020

Second-Order Consensus for Multi-Agent Systems With Time-Varying Delays Based on Delay-Partitioning.
IEEE Access, 2020

Design and optimization of multiplier base on FPGA.
Proceedings of the ISBDAI 2020, 2020

A Cloud Computing Task Scheduling Strategy Based on Improved Particle Swarm Optimization.
Proceedings of the ISBDAI 2020, 2020

Adaptive Attention Mechanism Based Semantic Compositional Network for Video Captioning.
Proceedings of the Intelligent Systems and Applications, 2020

2019
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

Improved Design of Biogas Engineering Alarm Based on STM32.
Proceedings of the ICIIP 2019: 4th International Conference on Intelligent Information Processing, 2019

2017
BELIA: bandwidth estimate-based link increase algorithm for MPTCP.
IET Networks, 2017

An object-based image analysis system based on region-line primitive association framework.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

2016
Energy-saving cross-layer optimization for multihop cognitive networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Multi adaptive hardware Trojan detection method based on power characteristics template.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2008
An Approach for Compliance Validation of Trusted Computing Applications.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008


  Loading...