Qi Xie

According to our database1, Qi Xie authored at least 108 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Full-Spectrum-Knowledge-Aware Tensor Model for Energy-Resolved CT Iterative Reconstruction.
IEEE Trans. Medical Imaging, 2020

Enhanced 3DTV Regularization and Its Applications on HSI Denoising and Compressed Sensing.
IEEE Trans. Image Process., 2020

Contrast-Medium Anisotropy-Aware Tensor Total Variation Model for Robust Cerebral Perfusion CT Reconstruction With Low-Dose Scans.
IEEE Trans. Computational Imaging, 2020

Single image rain streaks removal: a review and an exploration.
Int. J. Mach. Learn. Cybern., 2020

A semi-supervised approach for extracting TCM clinical terms based on feature words.
BMC Medical Informatics Decis. Mak., 2020

Feature Selection Using Improved Forest Optimization Algorithm.
Inf. Technol. Control., 2020

Automating App Review Response Generation Based on Contextual Knowledge.
CoRR, 2020

From Rain Removal to Rain Generation.
CoRR, 2020

Learning to Purify Noisy Labels via Meta Soft Label Corrector.
CoRR, 2020

Structural Residual Learning for Single Image Rain Removal.
CoRR, 2020

A Model-Driven Deep Neural Network for Single Image Rain Removal.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Knowledge-Enabled Diagnosis Assistant Based on Obstetric EMRs and Knowledge Graph.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Malware Family Classification using LSTM with Attention.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.
IEEE Trans. Medical Imaging, 2019

Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city.
Neurocomputing, 2019

Push the Student to Learn Right: Progressive Gradient Correcting by Meta-learner on Corrupted Labels.
CoRR, 2019

Meta-Weight-Net: Learning an Explicit Mapping For Sample Weighting.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Exploration of TCM Health Service Mode in the Context of Aging Society.
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019

Standardized Research of Clinical Diagnosis and Treatment Data of Epilepsy.
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019

Tools and benchmarks for automated log parsing.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Multispectral and Hyperspectral Image Fusion by MS/HS Fusion Net.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

Enhanced 3DTV Regularization and Its Applications on Hyper-spectral Image Denoising and Compressed Sensing.
CoRR, 2018

Unsupervised/Semi-supervised Deep Learning for Low-dose CT Enhancement.
CoRR, 2018

Intelligent Electro-Pneumatic Position Tracking System Using Improved Mode-Switching Sliding Control With Fuzzy Nonlinear Gain.
IEEE Access, 2018

Video Rain Streak Removal by Multiscale Convolutional Sparse Coding.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Detecting Duplicate Bug Reports with Convolutional Neural Networks.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017

An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017

Low-Dose Dynamic Cerebral Perfusion Computed Tomography Reconstruction via Kronecker-Basis-Representation Tensor Sparsity Regularization.
IEEE Trans. Medical Imaging, 2017

Robust Low-Dose CT Sinogram Preprocessing via Exploiting Noise-Generating Mechanism.
IEEE Trans. Medical Imaging, 2017

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017

Transcription elongation factors represent <i>in vivo</i> cancer dependencies in glioblastoma.
Nat., 2017

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
Int. J. Netw. Secur., 2017

Weighted Nuclear Norm Minimization and Its Applications to Low Level Vision.
Int. J. Comput. Vis., 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017

CARP: Context-Aware Reliability Prediction of Black-Box Web Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Data Flow-Oriented Multi-Path Semantic Web Service Composition Using Extended SPARQL.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Self-Paced Co-training.
Proceedings of the 34th International Conference on Machine Learning, 2017

Should We Encode Rain Streaks in Video as Deterministic or Stochastic?
Proceedings of the IEEE International Conference on Computer Vision, 2017

An Online Prediction Framework for Dynamic Service-Generated QoS Big Data.
Proceedings of the Database Systems for Advanced Applications, 2017

A Survey of Wireless Sensor Technique Applications for Medical Care.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.
Int. J. Commun. Syst., 2016

Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2016

An Improved, Feature-Centric LoG Approach for Edge Detection.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Multispectral Images Denoising by Intrinsic Tensor Sparsity Regularization.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015

A Novel Sparsity Measure for Tensor Recovery.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Convolutional Sparse Coding for Image Super-Resolution.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

QoS Prediction in Dynamic Web Services with Asymmetric Correlation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Availability and Network-Aware MapReduce Task Scheduling over the Internet.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Self-Paced Learning for Matrix Factorization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Correlation-Based Top-k Recommendation for Web Services.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

A practical anonymous authentication protocol for wireless roaming.
Secur. Commun. Networks, 2014

Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014

Pairing-Free Certificateless Signature with Security Proof.
J. Comput. Networks Commun., 2014

Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks.
Int. J. Distributed Sens. Networks, 2014

On the Optimal Solution of Weighted Nuclear Norm Minimization.
CoRR, 2014

Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurr. Comput. Pract. Exp., 2014

Real-time accurate ball trajectory estimation with "asynchronous" stereo camera system for humanoid Ping-Pong robot.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

TCM syndrome classification of AIDS based on Manifold ranking.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Big Data, 2014

TCM syndrome differentiation of AIDS using subspace clustering algorithm.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Road Detection Based on Off-Line and On-Line Learning.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Ind. Informatics, 2013

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Complex network approach for analyzing TCM clinical herb-symptom relationships.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme.
Sci. Iran., 2012

Provably Secure Self-certified Multi-proxy Signature with Message Recovery.
J. Networks, 2012

A new authenticated key agreement for session initiation protocol.
Int. J. Commun. Syst., 2012

Provably secure convertible multi-authenticated encryption scheme.
IET Inf. Secur., 2012

Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Thinking of comparative effectiveness research of the combination in the real traditional Chinese medicine world.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Constructing ideas of health service platform for the elderly.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Construction of national clinical research data center of Traditional Chinese medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

A predictive modeling engine using neural networks: Diabetes management from sensor and activity data.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Research on the nomenclature relations of conceptual system in fundamental theory of Traditional Chinese Medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Practical research of conceptual system framework based on TCM basic theory.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Subdivision connectivity remeshing and its applications.
Comput. Animat. Virtual Worlds, 2011

Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

QoS Driven Web Services Evolution.
Proceedings of the International Conference on Complex, 2011

Near-optimal configuration of service pool size in service composition.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card.
J. Networks, 2010

The obstacle crossing analysis and improvement of a wheel-based cable climbing robot.
Int. J. Intell. Syst. Technol. Appl., 2010

Personalized Context-Aware QoS Prediction for Web Services Based on Collaborative Filtering.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

FaceCloak: An Architecture for User Privacy on Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Novel User Authentication Scheme Using Smart Cards.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

The Diffie-Hellman Authentication Test in the Strand-Space Mode.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

Investigation of wireless data transmission between hearing aids.
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008

2007
Combinative Reasoning with RCC5 and Cardinal Direction Relations.
Proceedings of the Knowledge Science, 2007

Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes.
Int. J. Netw. Secur., 2006

Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model.
Proceedings of the Advances in Intelligent IT, 2006

2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers.
Appl. Math. Comput., 2005

2004
Cryptanalysis of Tseng et al.'s authenticated encryption schemes.
Appl. Math. Comput., 2004


  Loading...