Qi Xie
According to our database1,
Qi Xie
authored at least 108 papers
between 2004 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2020
Full-Spectrum-Knowledge-Aware Tensor Model for Energy-Resolved CT Iterative Reconstruction.
IEEE Trans. Medical Imaging, 2020
Enhanced 3DTV Regularization and Its Applications on HSI Denoising and Compressed Sensing.
IEEE Trans. Image Process., 2020
Contrast-Medium Anisotropy-Aware Tensor Total Variation Model for Robust Cerebral Perfusion CT Reconstruction With Low-Dose Scans.
IEEE Trans. Computational Imaging, 2020
Int. J. Mach. Learn. Cybern., 2020
BMC Medical Informatics Decis. Mak., 2020
Inf. Technol. Control., 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020
Proceedings of the 13th International Congress on Image and Signal Processing, 2020
2019
An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.
IEEE Trans. Medical Imaging, 2019
Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city.
Neurocomputing, 2019
Push the Student to Learn Right: Progressive Gradient Correcting by Meta-learner on Corrupted Labels.
CoRR, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2018
Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018
Enhanced 3DTV Regularization and Its Applications on Hyper-spectral Image Denoising and Compressed Sensing.
CoRR, 2018
Intelligent Electro-Pneumatic Position Tracking System Using Improved Mode-Switching Sliding Control With Fuzzy Nonlinear Gain.
IEEE Access, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017
Low-Dose Dynamic Cerebral Perfusion Computed Tomography Reconstruction via Kronecker-Basis-Representation Tensor Sparsity Regularization.
IEEE Trans. Medical Imaging, 2017
IEEE Trans. Medical Imaging, 2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
Transcription elongation factors represent <i>in vivo</i> cancer dependencies in glioblastoma.
Nat., 2017
An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
Int. J. Netw. Secur., 2017
Int. J. Comput. Vis., 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Data Flow-Oriented Multi-Path Semantic Web Service Composition Using Extended SPARQL.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
Proceedings of the Database Systems for Advanced Applications, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.
Int. J. Commun. Syst., 2016
Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016
2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Secur. Commun. Networks, 2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014
J. Comput. Networks Commun., 2014
Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks.
Int. J. Distributed Sens. Networks, 2014
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurr. Comput. Pract. Exp., 2014
Real-time accurate ball trajectory estimation with "asynchronous" stereo camera system for humanoid Ping-Pong robot.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Big Data, 2014
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
IEEE Trans. Ind. Informatics, 2013
J. Medical Syst., 2013
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
2012
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme.
Sci. Iran., 2012
J. Networks, 2012
Int. J. Commun. Syst., 2012
IET Inf. Secur., 2012
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Thinking of comparative effectiveness research of the combination in the real traditional Chinese medicine world.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Construction of national clinical research data center of Traditional Chinese medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
A predictive modeling engine using neural networks: Diabetes management from sensor and activity data.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Research on the nomenclature relations of conceptual system in fundamental theory of Traditional Chinese Medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
2011
Comput. Animat. Virtual Worlds, 2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the International Conference on Complex, 2011
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2010
Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card.
J. Networks, 2010
The obstacle crossing analysis and improvement of a wheel-based cable climbing robot.
Int. J. Intell. Syst. Technol. Appl., 2010
Personalized Context-Aware QoS Prediction for Web Services Based on Collaborative Filtering.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008
2007
Proceedings of the Knowledge Science, 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Int. J. Netw. Secur., 2006
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006
Proceedings of the Advances in Intelligent IT, 2006
2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers.
Appl. Math. Comput., 2005
2004
Appl. Math. Comput., 2004