Qian Kong

Orcid: 0000-0002-4776-4898

According to our database1, Qian Kong authored at least 22 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optimal Shortcuts to Adiabatic Control by Lagrange Mechanics.
Entropy, 2023

2022
Low-Hit-Zone Frequency-Hopping Sequence Sets with Wide-Gap and Optimal Hamming Correlation Properties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2021
Location of the Leakage From a Simulated Water-Cooling Wall Tube Based on Acoustic Method and an Artificial Neural Network.
IEEE Trans. Instrum. Meas., 2021

2020
Shortcuts to Adiabaticity for Optical Beam Propagation in Nonlinear Gradient Refractive-Index Media.
Entropy, 2020

A traffic data collection and analysis method based on wireless sensor network.
EURASIP J. Wirel. Commun. Netw., 2020

2019
A Novel Algorithm for Segmentation of Solitary Pulmonary Nodules in Chest Computed Tomography Based on Three-Dimensional Connected Voxels.
J. Medical Imaging Health Informatics, 2019

Acceleration of the Scheduled Relaxation Jacobi method: Promising strategies for solving large, sparse linear systems.
J. Comput. Phys., 2019

2018
A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real Time Image Process., 2018

Optical comb enabled flexible-bandwidth single-carrier frequency-division-multiplexed-based intra-data centre interconnect.
IET Commun., 2018

On the fractional metric dimension of corona product graphs and lexicographic product graphs.
Ars Comb., 2018

2016
The emergency response management based on Bayesian decision network.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2014
Fragmentation assessment based on-line routing and spectrum allocation for intra-data-center networks with centralized control.
Opt. Switch. Netw., 2014

Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation.
J. Inf. Hiding Multim. Signal Process., 2014

Two-in-One Image Secret Sharing Scheme Based on Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A DSCP-Based Method of QoS Class Mapping between WLAN and EPS Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Essential secret image sharing scheme with different importance of shadows.
J. Vis. Commun. Image Represent., 2013

Sharing more information in gray visual cryptography scheme.
J. Vis. Commun. Image Represent., 2013

On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters.
J. Inf. Hiding Multim. Signal Process., 2013

The Terwilliger algebra of Odd graphs.
Discret. Math., 2013

The Terwilliger Algebra of the Incidence Graphs of Johnson Geometry.
Electron. J. Comb., 2013

Probabilistic Visual Secret Sharing Scheme Based on Random Grids.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2010
On bipartite distance-regular graphs with a strongly closed subgraph of diameter three.
Discret. Math., 2010


  Loading...