Qi Xiong

Orcid: 0009-0006-4914-9385

According to our database1, Qi Xiong authored at least 82 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RCEP and China: An Application of GE-PPML Model to Goods, Services, and Value Chains.
J. Adv. Comput. Intell. Intell. Informatics, May, 2024

More on minors of Hermitian (quasi-)Laplacian matrix of the second kind for mixed graphs.
Comput. Appl. Math., February, 2024

A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition.
CoRR, 2024

TDT Loss Takes It All: Integrating Temporal Dependencies among Targets into Non-Autoregressive Time Series Forecasting.
CoRR, 2024

A Signature Based Approach towards Global Channel Charting with Ultra Low Complexity.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
An approach to internal threats detection based on sentiment analysis and network analysis.
J. Inf. Secur. Appl., September, 2023

CTFuseNet: A Multi-Scale CNN-Transformer Feature Fused Network for Crop Type Segmentation on UAV Remote Sensing Imagery.
Remote. Sens., February, 2023

A New Pelican Optimization Algorithm for the Parameter Identification of Memristive Chaotic System.
Symmetry, 2023

AICons: An AI-Enabled Consensus Algorithm Driven by Energy Preservation and Fairness.
CoRR, 2023

Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App.
CoRR, 2023

5G-Advanced Duplex Evolution for Massive MIMO and Multi-Beam Operations.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Rényi Divergence Deep Mutual Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Load Prediction of Exhaust Gas Treatment System Based on Genetic Algorithm Optimization Neural Network.
Proceedings of the 6th International Conference on Robot Systems and Applications, 2023

Design and Implementation of a Control System for Atmospheric Pressure Microwave Plasma Torch Based on PLC.
Proceedings of the 6th International Conference on Robot Systems and Applications, 2023

Enabling Light-Weight AI-Based Positioning by Log Signature Transform of Wireless Channels.
Proceedings of the IEEE Global Communications Conference, 2023

An Innovative Approach to Multi-Objective Infrared Temperature Measurement for Electrical Power Equipment Using K-Means.
Proceedings of the 8th International Conference on Control, Robotics and Cybernetics, 2023

2022
K-Means Clustering Algorithm Based on Memristive Chaotic System and Sparrow Search Algorithm.
Symmetry, 2022

Robust Iris-Localization Algorithm in Non-Cooperative Environments Based on the Improved YOLO v4 Model.
Sensors, 2022

Data Augmentation for Small Sample Iris Image Based on a Modified Sparrow Search Algorithm.
Int. J. Comput. Intell. Syst., 2022

An improved iris localization method.
Int. Arab J. Inf. Technol., 2022

Blind Image Quality Assessment for Multiple Distortion Image.
Circuits Syst. Signal Process., 2022

Rényi Divergence Deep Mutual Learning.
CoRR, 2022

Session-based recommendation: Learning multi-dimension interests via a multi-head attention graph neural network.
Appl. Soft Comput., 2022

Enabling Accurate Positioning in NLOS Scenarios by Hybrid Machine Learning with Denoising and Inpainting.
Proceedings of the 96th Vehicular Technology Conference, 2022

SPARVIS: Combining Smartphone and Augmented Reality for Visual Data Analytics.
Proceedings of the 2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct), 2022

Full Duplex Communication with Practical Self-Interference Cancellation Implementation.
Proceedings of the IEEE International Conference on Communications, 2022

2021
A Dense Long Short-Term Memory Model for Enhancing the Imagery-Based Brain-Computer Interface.
Comput. Intell. Neurosci., 2021

TRIDENT Schemes for Small Data Transmission in Industrial IoT System.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Heterogeneous Temporal Graph Transformer: An Intelligent System for Evolving Android Malware Detection.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Disentangled Representation Learning in Heterogeneous Information Network for Large-scale Android Malware Detection in the COVID-19 Era and Beyond.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
An ECoG-Based Binary Classification of BCI Using Optimized Extreme Learning Machine.
Complex., 2020

A Parallel Algorithm Framework for Feature Extraction of EEG Signals on MPI.
Comput. Math. Methods Medicine, 2020

Optimization of the Attractive Electromagnetic Bulging of Small Tubes Based on Non-Uniform Solenoid Coils.
IEEE Access, 2020

Flaring Forming of Small Tube Based on Electromagnetic Attraction.
IEEE Access, 2020

A Dual-Coil Method for Electromagnetic Attraction Forming of Sheet Metals.
IEEE Access, 2020

Electromagnetic Force Distribution and Forming Performance in Electromagnetic Forming With Discretely Driven Rings.
IEEE Access, 2020

Coil Temperature Rise and Workpiece Forming Efficiency of Electromagnetic Forming Based on Half-Wave Current Method.
IEEE Access, 2020

Research on Forming Efficiency in Double-Sheet Electromagnetic Forming Process.
IEEE Access, 2020

Electromagnetic Force Distribution and Forming Performance in Electromagnetic Tube Expansion with Axial Compression.
IEEE Access, 2020

Construction and Analysis of Two-Dimensional Axisymmetric Model of Electromagnetic Tube Bulging With Field Shaper.
IEEE Access, 2020

Electromagnetic Force Distribution and Wall Thickness Reduction of Three-Coil Electromagnetic Tube Bulging With Axial Compression.
IEEE Access, 2020

Metagraph Aggregated Heterogeneous Graph Neural Network for Illicit Traded Product Identification in Underground Market.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Electromagnetic Force Distribution and Deformation Homogeneity of Electromagnetic Tube Expansion With a New Concave Coil Structure.
IEEE Access, 2019

Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network.
Proceedings of the World Wide Web Conference, 2019

An Evolved Non-Orthogonal Multiple Access for User Multiplexing with Small-Data Transmission.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

A Multimodal Biometric Recognition Algorithm Based on Second Generation Curvelet and 2D Gabor Filter.
Proceedings of the 4th International Conference on Control, Robotics and Cybernetics, 2019

<i>αCyber</i>: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network.
IEEE Trans. Ind. Informatics, 2018

AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection.
CoRR, 2018

Towards the Standardization of Non-orthogonal Multiple Access for Next Generation Wireless Networks.
CoRR, 2018

Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks.
IEEE Commun. Mag., 2018

Single Biometric Recognition Research: A Summary.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018

Random Access Preamble Generation and Procedure Design for 5G-NR System.
Proceedings of the IEEE Globecom Workshops, 2018

ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Low Complexity Detection Algorithm for Low PAPR Interleaving Based NOMA Schemes.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Identification Approach of Hammerstein-Wiener Model Corrupted by Colored Process Noise.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

SNR-based adaptive computing resource allocation in centralized baseband pool.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Computational requirments analysis on the conjunctive and disjunctive assumptions for The Belief Rule Base.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Advanced NoMA Scheme for 5G Cellular Network: Interleave-Grid Multiple Access.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme.
IEEE Trans. Inf. Forensics Secur., 2016

2015
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems.
IEEE Trans. Inf. Forensics Secur., 2015

基于熵权法和神经网络的口岸物流综合能力评价方法研究 (Evaluation of Port-logistics Capability Based on Entropy Weight and BP Neural Network).
计算机科学, 2015

A two-way training method for defending against pilot spoofing attack in MISO systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

2014
Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information.
IEEE Wirel. Commun. Lett., 2014

2013
Achieving secrecy capacity of MISO fading wiretap channels with artificial noise.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

Mining Frequent Rooted Ordered Tree Generators Efficiently.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Fair resource allocation for relay aided OFDMA systems under outage constraints.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Similar vulnerability query based on text mining.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

2009
A new method for correcting vehicle license plate tilt.
Int. J. Autom. Comput., 2009

EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
A Searchable Knowledge Map Based on Ontology.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

A Method to Guarantee Ontology Consistency on Property Range Changes.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008


  Loading...