Qi He

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
An effective automatic object detection algorithm for continuous sonar image sequences.
Multim. Tools Appl., January, 2024

A Flexible and Stretchable MXene/Waterborne Polyurethane Composite-Coated Fiber Strain Sensor for Wearable Motion and Healthcare Monitoring.
Sensors, 2024

Your Vision-Language Model Itself Is a Strong Filter: Towards High-Quality Instruction Tuning with Data Selection.
CoRR, 2024

2023
Deep reinforcement learning for multi-objective combinatorial optimization: A case study on multi-objective traveling salesman problem.
Swarm Evol. Comput., December, 2023

SDNet: Image-based sonar detection network for multi-scale objects.
IET Image Process., March, 2023

Explicit formula for positive integer powers of k-tridiagonal Toeplitz matrices.
J. Appl. Math. Comput., February, 2023

False Data Injection Attack Detection Based on Redundant Sparse Reconstruction.
IEEE Trans. Serv. Comput., 2023

Marine Small Floating Target Detection Method Based on Fusion Weight and Graph Dynamic Attention Mechanism.
IEEE Trans. Geosci. Remote. Sens., 2023

Query2: Query over queries for improving gastrointestinal stromal tumour detection in an endoscopic ultrasound.
Comput. Biol. Medicine, 2023

Improving Anomaly Segmentation with Multi-Granularity Cross-Domain Alignment.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Human-Object-Object Interaction: Towards Human-Centric Complex Interaction Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Studying the Placement of EV Charging Stations in Parking Facilities in Cities.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Two-Stage Attention Model to Solve Large-Scale Traveling Salesman Problems.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Research on Novel Lightweight Object Detection and Recognition Algorithms.
Proceedings of the 8th International Conference on Information Systems Engineering, 2023

Joint Transmission and Understanding of Semantics with Edge Intelligence.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Lunar Mare Fecunditatis: A Science-Rich Region and a Concept Mission for Long-Distance Exploration.
Remote. Sens., 2022

Toward Automatic Detection of Gastric Lesion for Upper Gastrointestinal Endoscopy with Neural Network.
J. Medical Robotics Res., 2022

An Optimized Fixed Equalizer for Speech Enhancement.
Circuits Syst. Signal Process., 2022

Domain-Specific Conditional Jigsaw Adaptation for Enhancing transferability and Discriminability.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

A Low-Complexity Transceiver Design for Terahertz Communication based on Deep Learning.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Robust Semantic Transmission of Images with Generative Adversarial Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Multi-Label Classification Scheme Based on Local Regression for Retinal Vessel Segmentation.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

How SoLoMo-based product recommendations influence consumers' acceptance intention: the moderating role of gender.
Int. J. Serv. Technol. Manag., 2021

Syntax grounded graph convolutional network for joint entity and event extraction.
Neurocomputing, 2021

Category-consistent deep network learning for accurate vehicle logo recognition.
Neurocomputing, 2021

A novel class restriction loss for unsupervised domain adaptation.
Neurocomputing, 2021

Trees in transformers: a theoretical analysis of the Transformer's ability to represent trees.
CoRR, 2021

A Coupled Pair Based Routing Protocol in Energy Harvesting Wireless Sensor Network.
Proceedings of the ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23, 2021

MBSE Adoption for Cabin Temperature Control System Design of Civil Aircraft.
Proceedings of the 4th International Conference on Complex Systems Design & Management Asia, 2021

2020
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020

Locally Adaptive Total p-Variation Regularization for Non-Rigid Image Registration With Sliding Motion.
IEEE Trans. Biomed. Eng., 2020

Inlet Effect Caused by Multichannel Structure for Molecular Electronic Transducer Based on a Turbulent-Laminar Flow Model.
Sensors, 2020

Toward Massive Connectivity for IoT in Mixed-ADC Distributed Massive MIMO.
IEEE Internet Things J., 2020

Deep learning-based anatomical site classification for upper gastrointestinal endoscopy.
Int. J. Comput. Assist. Radiol. Surg., 2020

Normally-Off Hydrogen-Terminated Diamond Field Effect Transistor With Ferroelectric HfZrO<sub>x</sub>/Al<sub>2</sub>O<sub>3</sub> Gate Dielectrics.
IEEE Access, 2020

Low On-Resistance H-Diamond MOSFETs With 300 °C ALD-Al<sub>2</sub>O<sub>3</sub> Gate Dielectric.
IEEE Access, 2020

An Adaptable Robotic Snake Using a Compliant Actuated Tensegrity Structure for Locomotion.
Proceedings of the Towards Autonomous Robotic Systems - 21st Annual Conference, 2020

Hybrid Loss with Network Trimming for Disease Recognition in Gastrointestinal Endoscopy.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Enhancing Generalization in Natural Language Inference by Syntax.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Distinguishing Individual Red Pandas from Their Faces.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

2018
Compressive Channel Estimation and Multi-User Detection in C-RAN With Low-Complexity Methods.
IEEE Trans. Wirel. Commun., 2018

基于多属性最优化的海洋监测数据副本布局策略 (Marine Monitoring Data Replica Layout Strategy Based on Multiple Attribute Optimization).
计算机科学, 2018

3D Filtering by Block Matching and Convolutional Neural Network for Image Denoising.
J. Comput. Sci. Technol., 2018

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018

Compressive Channel Estimation and User Activity Detection in Distributed-Input Distributed-Output Systems.
IEEE Commun. Lett., 2018

Distributed optimization in fog radio access networks - channel estimation and multi-user detection.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline.
Proceedings of the 2018 International Conference on Security, 2018

External Damage Risk Detection of Transmission Lines Using E-OHEM Enhanced Faster R-CNN.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm.
Proceedings of the Intelligent Systems Design and Applications, 2018

Non-Smooth Control of PMSM Position Servo System Based on Model Compensation.
Proceedings of the IECON 2018, 2018

Multi-Label Classification Scheme Based on Local Regression for Retinal Vessel Segmentation.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

A Novel Cross-Layer Protocol for Random Access in Massive Machine-Type Communications.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

A Weighted MMSE Approach to Amorphous Cell for Mixed-ADC Distributed Massive MIMO.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Multiplicative Update of Auto-Regressive Gains for Codebook-Based Speech Enhancement.
IEEE ACM Trans. Audio Speech Lang. Process., 2017

Another pedagogy for pure-integer Gomory.
RAIRO Oper. Res., 2017

Robust Optimization for Energy Efficiency in Multicast Downlink C-RAN.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Multi-modal Emotion Recognition Based on Speech and Image.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Compressive channel estimation and multi-user detection in C-RAN.
Proceedings of the IEEE International Conference on Communications, 2017

2016
An iteratively reweighted method for recovery of block-sparse signal with unknown block partition.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Multiplicative update of AR gains in codebook-driven speech enhancement.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
System Identification Under Regular, Binary, and Quantized Observations: Moderate Deviations Error Bounds.
IEEE Trans. Autom. Control., 2015

Minimization of ℓ<sub>1-2</sub> for Compressed Sensing.
SIAM J. Sci. Comput., 2015

Computing Sparse Representation in a Highly Coherent Dictionary Based on Difference of L<sub>1</sub> and L<sub>2</sub>.
J. Sci. Comput., 2015

Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

Codebook-based speech enhancement using Markov process and speech-presence probability.
Proceedings of the INTERSPEECH 2015, 2015

Research on Data Calibration Model for the Working State Detection About Traffic Sound Barrier.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

A gain-adaptive parallel HMM for speech enhancement.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Using priced timed automaton to analyse the energy consumption in cloud computing environment.
Clust. Comput., 2014

Large deviations for multi-scale Markovian switching systems with a small diffusion.
Asymptot. Anal., 2014

2013
Sociality-Aware Access Point Selection in Enterprise Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2013

Moderate Deviations Analysis for System Identification under Regular and Binary Observations.
Proceedings of the SIAM Conference on Control and its Applications, 2013

Detecting Runtime Business Process Compliance with Artifact Lifecycles.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

A randomly perturbed infomax algorithm for blind source separation.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Real-time urban traffic information estimation with a limited number of surveillance cameras.
Frontiers Comput. Sci., 2012

Convergence analysis of a randomly perturbed infomax algorithm for blind source separation.
Commun. Inf. Syst., 2012

Hybrid deterministic-stochastic gradient Langevin dynamics for Bayesian learning.
Commun. Inf. Syst., 2012

Recognizing Valid Artifacts in Business Processes.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Large deviations for systems driven by two-time-scale nonhomogeneous Markovian chains and applications to optimal control problems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Large Deviations for Two-Time-Scale Systems Driven by Nonhomogeneous Markov Chains and Associated Optimal Control Problems.
SIAM J. Control. Optim., 2011

Invariant density, Lapunov exponent, and almost sure stability of Markovian-regime-switching linear systems.
J. Syst. Sci. Complex., 2011

Design of Adaptive Controller for Micro Reactor Temperature Control.
Proceedings of the Advances in Computer Science, 2011

Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Evolution of Node Behavior in Link Prediction.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2009
Creating the Cryptograph Index by Query Frequencies in DAS Models.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Preserving FDs in K-Anonymization by K-MSDs and Association Generalization.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2006
Location Privacy Protection in Mobile Wireless Networks.
Proceedings of the Handbook of Mobile Middleware., 2006

A secure incentive architecture for ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme.
EURASIP J. Wirel. Commun. Netw., 2006

An ontology based approach to the integration of entity-relationship schemas.
Data Knowl. Eng., 2006

2004
The quest for personal control over mobile location privacy.
IEEE Commun. Mag., 2004

SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Resolving Schematic Discrepancy in the Integration of Entity-Relationship Schemas.
Proceedings of the Conceptual Modeling, 2004

Extending and inferring functional dependencies in schema transformation.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
A Novel System for Publishing Relational Data in XML Based on ER-DTD Method.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
A Practical Study on Security of Agent-Based Ubiquitous Computing.
Proceedings of the Trust, 2002

2000
SMP Scalability Comparisons of Linux Kernels 2.2.14 and 2.3.99.
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000

1998
Personal Security Agent: KQML-Based PKI.
Proceedings of the Second International Conference on Autonomous Agents, 1998

A Solution to Open Standard of PKI.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...