Qi Xia

Orcid: 0000-0003-0538-7665

According to our database1, Qi Xia authored at least 107 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Normalizing Flow-Based Distribution Estimation of Pharmacokinetic Parameters in Dynamic Contrast-Enhanced Magnetic Resonance Imaging.
IEEE Trans. Biomed. Eng., March, 2024

PRIDN: A Privacy Preserving Data Sharing on Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2024

2023
A Blockchain Peer-to-Peer Energy Trading System for Microgrids.
IEEE Trans. Smart Grid, September, 2023

An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023

The mediating effects of needs satisfaction on the relationships between prior knowledge and self-regulated learning through artificial intelligence chatbot.
Br. J. Educ. Technol., July, 2023

Byzantine Tolerant Algorithms for Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2023

An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation.
IEEE Trans. Cloud Comput., 2023

The moderating effects of gender and need satisfaction on self-regulated learning through Artificial Intelligence (AI).
Educ. Inf. Technol., 2023

Practice with Graph-based ANN Algorithms on Sparse Data: Chi-square Two-tower model, HNSW, Sign Cauchy Projections.
CoRR, 2023

Systematic literature review on opportunities, challenges, and future research recommendations of artificial intelligence in education.
Comput. Educ. Artif. Intell., 2023

Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
Proceedings of the 32nd USENIX Security Symposium, 2023

LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks.
Proceedings of the IEEE International Conference on Quantum Software, 2023

2022
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem.
IEEE Syst. J., 2022

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain.
IEEE Syst. J., 2022

Supply chain equilibrium on a game theory-incentivized blockchain network.
J. Ind. Inf. Integr., 2022

Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable.
J. Comput. Secur., 2022

URadio: Wideband Ultrasound Communication for Smart Home Applications.
IEEE Internet Things J., 2022

A blockchain-adaptive contractual approach for multi-contracting organizational entities.
Future Gener. Comput. Syst., 2022

A self-determination theory (SDT) design approach for inclusive and diverse artificial intelligence (AI) education.
Comput. Educ., 2022

A Level Set Based Density Method for Optimizing Structures with Curved Grid Stiffeners.
Comput. Aided Des., 2022

KGESS - A Knowledge Graph Embedding Method Based on Semantics and Structure.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Selective Sharing of Outsourced Encrypted Data in Cloud Environments.
IEEE Internet Things J., 2021

ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning.
Proceedings of the Security and Privacy in Communication Networks, 2021

Defending Against Byzantine Attacks in Quantum Federated Learning.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Neuron Manifold Distillation for Edge Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

An Efficient and Secure Blockchain-Based SVM Classification for a COVID-19 Healthcare System.
Proceedings of the ICMAI 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19, 2021

Complementary Blockchain-Based Privacy Protection for Covid-19 Contact Tracing.
Proceedings of the 21st International Conference on Communication Technology, 2021

QuantumFed: A Federated Learning Framework for Collaborative Quantum Training.
Proceedings of the IEEE Global Communications Conference, 2021

CE-SGD: Communication-Efficient Distributed Machine Learning.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

A Novel End-To-End Fault Diagnosis Approach for Rolling Bearings by Integrating Wavelet Packet Transform into Convolutional Neural Network Structures.
Sensors, 2020

A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.
Secur. Commun. Networks, 2020

A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data.
Pervasive Mob. Comput., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks.
IEEE Internet Things J., 2020

Zero-Chain: A Blockchain-Based Identity for Digital City Operating System.
IEEE Internet Things J., 2020

BEMPAS: A Decentralized Employee Performance Assessment System Based on Blockchain for Smart City Governance.
IEEE Access, 2020

Training Machine Learning Models Through Preserved Decentralization.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Object-Based Image Coding: A Learning-Driven Revisit.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Blockchain-Based Outsourced Privacy-Preserving Support Vector Machine Classification on IoT Data.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

2019
Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
Sensors, 2019

A Survey of Virtual Machine Management in Edge Computing.
Proc. IEEE, 2019

Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments.
IEEE Internet Things J., 2019

Maximizing the first eigenfrequency of structures subjected to uniform boundary erosion through the level set method.
Eng. Comput., 2019

A Deep Bidirectional Highway Long Short-Term Memory Network Approach to Chinese Semantic Role Labeling.
Proceedings of the International Joint Conference on Neural Networks, 2019

FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Digital Media Copyright and Content Protection Using IPFS and Blockchain.
Proceedings of the Image and Graphics - 10th International Conference, 2019

A Study of Primary School Pupils' Motivation, Emotional Intelligence and Attentional Control Ability.
Proceedings of the Blended Learning: Educational Innovation for Personalized Learning, 2019

2018
Chain-based big data access control infrastructure.
J. Supercomput., 2018

On sufficient dimension reduction with missing responses through estimating equations.
Comput. Stat. Data Anal., 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

V-Chain: A Blockchain-Based Car Lease Platform.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

High-bandwidth ultrasonic communication using graphene-based acoustic devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Secure Payment Routing Protocol for Economic Systems Based on Blockchain.
Proceedings of the 2018 International Conference on Computing, 2018

A Blockchain-based Architecture Framework for Secure Sharing of Personal Health Data.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

2017
On a new hybrid estimator for the central mean space.
J. Syst. Sci. Complex., 2017

BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments.
Inf., 2017

Real-time calibration of space zoom cameras based on fixed stars.
IET Comput. Vis., 2017

Eliminate localized eigenmodes in level set based topology optimization for the maximization of the first eigenfrequency of vibration.
Adv. Eng. Softw., 2017

MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.
IEEE Access, 2017

Unsupervised Representation Learning for Pulmonary Nodule Classification.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Image Segmentation of Liver CT Based on Fully Convolutional Network.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

Dual-anonymous reward distribution for mobile crowdsensing.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Feature Combination and the kNN Framework in Object Classification.
IEEE Trans. Neural Networks Learn. Syst., 2016

SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

2015
Evaluating classifier combination in object classification.
Pattern Anal. Appl., 2015

Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage.
J. Univers. Comput. Sci., 2015

Advanced security analysis of a signature scheme with message recovery.
Int. J. Inf. Comput. Secur., 2015

Experimental study on dominant sets clustering.
IET Comput. Vis., 2015

Density Based Cluster Extension and Dominant Sets Clustering.
Proceedings of the Graph-Based Representations in Pattern Recognition, 2015

2014
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

A Novel Blind Separation Method in Magnetic Resonance Images.
Comput. Math. Methods Medicine, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

Robust Clustering Based on Dominant Sets.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Merging dominant sets and DBSCAN for robust clustering and image segmentation.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

The Design and Use of a Computerized Management of Follow-up Data for Liver Transplantation Patients.
Proceedings of the Enterprise Systems Conference, 2014

2013
Image registration using a point-line duality based line matching method.
J. Vis. Commun. Image Represent., 2013

An experimental study on the universality of visual vocabularies.
J. Vis. Commun. Image Represent., 2013

A density-based enhancement to dominant sets clustering.
IET Comput. Vis., 2013

Tailoring the ratios between eigenfrequencies of tapping mode atomic force microscope probe using concentrated masses.
Proceedings of the IEEE 6th International Conference on Robotics, 2013

A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

DSET++: A robust clustering algorithm.
Proceedings of the IEEE International Conference on Image Processing, 2013

2012
Improved certificateless signature scheme provably secure in the standard model.
IET Inf. Secur., 2012

A Strong Designated Verifier Signature Scheme with Secure Disavowability.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Dominant set and target clique extraction.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition.
Int. J. Comput. Intell. Syst., 2011

A pattern matching method using geometric information of images.
Proceedings of the 6th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2011

2009
Cryptanalysis of Two Identity Based Signcryption Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Simultaneous optimization of the material properties and the topology of functionally graded structures.
Comput. Aided Des., 2008

2007
Level set based method for simultaneous optimization of material property and topology of functionally graded structures.
Proceedings of the 2007 ACM Symposium on Solid and Physical Modeling, 2007

2006
Orthogonal Least Square RBF Based Implicit Surface Reconstruction Methods.
Proceedings of the Interactive Technologies and Sociotechnical Systems, 2006

Orthogonal Least Squares in Partition of Unity Surface Reconstruction with Radial Basis Function.
Proceedings of the 2006 International Conference on Geometric Modeling and Imaging, 2006

2005
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Spatial Gossip on the Percolation Model.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Overlay Multicasting over Multihomed Proxie.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Cost Management Based Secure Framework in Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

A Fully Decentralized Approach to Grid Service Discovery Using Self-organized Overlay Networks.
Proceedings of the Advances in Grid Computing, 2005

Implicit fitting and smoothing using radial basis functions with partition of unity.
Proceedings of the 9th International Conference on Computer-Aided Design and Computer Graphics, 2005

New Enhancement Scheme for Secure Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Fully Decentralized DHT based Approach to Grid Service Discovery using Overlay Networks.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005


  Loading...