Qi Xiong

According to our database1, Qi Xiong authored at least 30 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network.
Proceedings of the World Wide Web Conference, 2019

2018
Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network.
IEEE Trans. Industrial Informatics, 2018

Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks.
IEEE Communications Magazine, 2018

Single Biometric Recognition Research: A Summary.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018

Random Access Preamble Generation and Procedure Design for 5G-NR System.
Proceedings of the IEEE Globecom Workshops, 2018

ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Low Complexity Detection Algorithm for Low PAPR Interleaving Based NOMA Schemes.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Identification Approach of Hammerstein-Wiener Model Corrupted by Colored Process Noise.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

SNR-based adaptive computing resource allocation in centralized baseband pool.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Computational requirments analysis on the conjunctive and disjunctive assumptions for The Belief Rule Base.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Advanced NoMA Scheme for 5G Cellular Network: Interleave-Grid Multiple Access.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme.
IEEE Trans. Information Forensics and Security, 2016

2015
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems.
IEEE Trans. Information Forensics and Security, 2015

A two-way training method for defending against pilot spoofing attack in MISO systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

2014
Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information.
IEEE Wireless Commun. Letters, 2014

2013
Achieving secrecy capacity of MISO fading wiretap channels with artificial noise.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

Mining Frequent Rooted Ordered Tree Generators Efficiently.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Fair resource allocation for relay aided OFDMA systems under outage constraints.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Similar vulnerability query based on text mining.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

2009
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
A Searchable Knowledge Map Based on Ontology.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

A Method to Guarantee Ontology Consistency on Property Range Changes.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008


  Loading...