According to our database1, Qi Xiong authored at least 30 papers between 2008 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network.
Proceedings of the World Wide Web Conference, 2019
Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network.
IEEE Trans. Industrial Informatics, 2018
Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks.
IEEE Communications Magazine, 2018
Single Biometric Recognition Research: A Summary.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018
Random Access Preamble Generation and Procedure Design for 5G-NR System.
Proceedings of the IEEE Globecom Workshops, 2018
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Low Complexity Detection Algorithm for Low PAPR Interleaving Based NOMA Schemes.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Identification Approach of Hammerstein-Wiener Model Corrupted by Colored Process Noise.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017
SNR-based adaptive computing resource allocation in centralized baseband pool.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Computational requirments analysis on the conjunctive and disjunctive assumptions for The Belief Rule Base.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017
Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Advanced NoMA Scheme for 5G Cellular Network: Interleave-Grid Multiple Access.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme.
IEEE Trans. Information Forensics and Security, 2016
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems.
IEEE Trans. Information Forensics and Security, 2015
A two-way training method for defending against pilot spoofing attack in MISO systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015
Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information.
IEEE Wireless Commun. Letters, 2014
Achieving secrecy capacity of MISO fading wiretap channels with artificial noise.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013
Mining Frequent Rooted Ordered Tree Generators Efficiently.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Fair resource allocation for relay aided OFDMA systems under outage constraints.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012
The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Similar vulnerability query based on text mining.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
A Searchable Knowledge Map Based on Ontology.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008
A Method to Guarantee Ontology Consistency on Property Range Changes.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008