Qi Xie

According to our database1, Qi Xie authored at least 84 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multimedia Tools Appl., 2018

Enhanced 3DTV Regularization and Its Applications on Hyper-spectral Image Denoising and Compressed Sensing.
CoRR, 2018

Unsupervised/Semi-supervised Deep Learning for Low-dose CT Enhancement.
CoRR, 2018

Intelligent Electro-Pneumatic Position Tracking System Using Improved Mode-Switching Sliding Control With Fuzzy Nonlinear Gain.
IEEE Access, 2018

2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wireless Personal Communications, 2017

An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wireless Personal Communications, 2017

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wireless Personal Communications, 2017

Low-Dose Dynamic Cerebral Perfusion Computed Tomography Reconstruction via Kronecker-Basis-Representation Tensor Sparsity Regularization.
IEEE Trans. Med. Imaging, 2017

Robust Low-Dose CT Sinogram Preprocessing via Exploiting Noise-Generating Mechanism.
IEEE Trans. Med. Imaging, 2017

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Information Forensics and Security, 2017

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
I. J. Network Security, 2017

Weighted Nuclear Norm Minimization and Its Applications to Low Level Vision.
International Journal of Computer Vision, 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
SCIENCE CHINA Information Sciences, 2017

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Computers & Electrical Engineering, 2017

CARP: Context-Aware Reliability Prediction of Black-Box Web Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Data Flow-Oriented Multi-Path Semantic Web Service Composition Using Extended SPARQL.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Self-Paced Co-training.
Proceedings of the 34th International Conference on Machine Learning, 2017

Should We Encode Rain Streaks in Video as Deterministic or Stochastic?
Proceedings of the IEEE International Conference on Computer Vision, 2017

An Online Prediction Framework for Dynamic Service-Generated QoS Big Data.
Proceedings of the Database Systems for Advanced Applications, 2017

A Survey of Wireless Sensor Technique Applications for Medical Care.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

The Design and Research of the Internet of Things Technology in the Training of Spatial Navigation Ability of Patients with Mild Cognitive Impairment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.
Int. J. Communication Systems, 2016

Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2016

An Improved, Feature-Centric LoG Approach for Edge Detection.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Multispectral Images Denoising by Intrinsic Tensor Sparsity Regularization.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Security and Communication Networks, 2015

A Novel Sparsity Measure for Tensor Recovery.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Convolutional Sparse Coding for Image Super-Resolution.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

QoS Prediction in Dynamic Web Services with Asymmetric Correlation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Availability and Network-Aware MapReduce Task Scheduling over the Internet.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Self-Paced Learning for Matrix Factorization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Correlation-Based Top-k Recommendation for Web Services.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wireless Personal Communications, 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

A practical anonymous authentication protocol for wireless roaming.
Security and Communication Networks, 2014

Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Systems, 2014

Pairing-Free Certificateless Signature with Security Proof.
Journal Comp. Netw. and Communic., 2014

Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks.
IJDSN, 2014

On the Optimal Solution of Weighted Nuclear Norm Minimization.
CoRR, 2014

Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.
Concurrency and Computation: Practice and Experience, 2014

Real-time accurate ball trajectory estimation with "asynchronous" stereo camera system for humanoid Ping-Pong robot.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

TCM syndrome classification of AIDS based on Manifold ranking.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Big Data, 2014

TCM syndrome differentiation of AIDS using subspace clustering algorithm.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Road Detection Based on Off-Line and On-Line Learning.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Industrial Informatics, 2013

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems.
J. Medical Systems, 2013

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
ITC, 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Complex network approach for analyzing TCM clinical herb-symptom relationships.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Provably Secure Self-certified Multi-proxy Signature with Message Recovery.
JNW, 2012

A new authenticated key agreement for session initiation protocol.
Int. J. Communication Systems, 2012

Provably secure convertible multi-authenticated encryption scheme.
IET Information Security, 2012

Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks.
IACR Cryptology ePrint Archive, 2012

Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Thinking of comparative effectiveness research of the combination in the real traditional Chinese medicine world.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Constructing ideas of health service platform for the elderly.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Construction of national clinical research data center of Traditional Chinese medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

A predictive modeling engine using neural networks: Diabetes management from sensor and activity data.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Research on the nomenclature relations of conceptual system in fundamental theory of Traditional Chinese Medicine.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Practical research of conceptual system framework based on TCM basic theory.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Subdivision connectivity remeshing and its applications.
Journal of Visualization and Computer Animation, 2011

Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

QoS Driven Web Services Evolution.
Proceedings of the International Conference on Complex, 2011

Near-optimal configuration of service pool size in service composition.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card.
JNW, 2010

The obstacle crossing analysis and improvement of a wheel-based cable climbing robot.
IJISTA, 2010

Personalized Context-Aware QoS Prediction for Web Services Based on Collaborative Filtering.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

FaceCloak: An Architecture for User Privacy on Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Novel User Authentication Scheme Using Smart Cards.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

The Diffie-Hellman Authentication Test in the Strand-Space Mode.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

Investigation of wireless data transmission between hearing aids.
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008

2007
Combinative Reasoning with RCC5 and Cardinal Direction Relations.
Proceedings of the Knowledge Science, 2007

Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes.
I. J. Network Security, 2006

Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model.
Proceedings of the Advances in Intelligent IT, 2006

2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers.
Applied Mathematics and Computation, 2005

2004
Cryptanalysis of Tseng et al.'s authenticated encryption schemes.
Applied Mathematics and Computation, 2004


  Loading...