Qiang Wei

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Yesterday Once MorE: Facilitating Linux Kernel Bug Reproduction via Reverse Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2025

MixUNETR: A U-shaped network based on W-MSA and depth-wise convolution with channel and spatial interactions for zonal prostate segmentation in MRI.
Neural Networks, 2025

Adaptive window adjustment with boundary DoU loss for cascade segmentation of anatomy and lesions in prostate cancer using bpMRI.
Neural Networks, 2025

Camera-Based Bi-Modal PPG-SCG: Sleep Privacy-Protected Contactless Vital Signs Monitoring.
IEEE Internet Things J., 2025

A DLM watermarking method based on a spatiotemporal chaos with DNA computing.
Neurocomputing, 2025

IPSMInfer: Industrial proprietary protocol state machine inference from network traces.
Int. J. Crit. Infrastructure Prot., 2025

ASIRDetector: Scheduling-driven, asynchronous execution to discover asynchronous improper releases bug in linux kernel.
Comput. Secur., 2025

Survey of source code vulnerability analysis based on deep learning.
Comput. Secur., 2025

2024
Harden-IoT: hardening the EoL devices by intercepting the attack vector for future B5G/6G IoT.
Wirel. Networks, November, 2024

Scythe: A Low-latency RDMA-enabled Distributed Transaction System for Disaggregated Memory.
ACM Trans. Archit. Code Optim., September, 2024

An Improved Current-Source-Converter-Based Series-Connected Wind Energy Conversion System.
IEEE Trans. Ind. Electron., May, 2024

SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices.
Comput. Secur., March, 2024

Towards Tightly-Coupled Hybrid Fuzzing via Excavating Input Specifications.
IEEE Trans. Dependable Secur. Comput., 2024

Enhancing Remote Sensing Visual Question Answering: A Mask-Based Dual-Stream Feature Mutual Attention Network.
IEEE Geosci. Remote. Sens. Lett., 2024

Control Logic Attack Detection and Forensics Through Reverse-Engineering and Verifying PLC Control Applications.
IEEE Internet Things J., 2024

Ranking academic influence with integration of weighted PageRank and HITS for paper citation network.
Int. J. Grid Util. Comput., 2024

A performance simulation and verification method of packet scheduling algorithms for data stream based on QoS.
Evol. Intell., 2024

DIMN: Dual Integrated Matching Network for multi-choice reading comprehension.
Eng. Appl. Artif. Intell., 2024

G-HFIN: Graph-based Hierarchical Feature Integration Network for propaganda detection of We-media news articles.
Eng. Appl. Artif. Intell., 2024

Enhanced Cascade Prostate Cancer Classifier in mp-MRI Utilizing Recall Feedback Adaptive Loss and Prior Knowledge-Based Feature Extraction.
CoRR, 2024

Altered Resting-State Brain Entropy in Cerebral Small Vessel Disease Patients with Cognitive Impairment.
Brain Connect., 2024

Demystifying the Security Implications in IoT Device Rental Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Source Code Vulnerability Detection Method Based on Adaptive Graph Neural Networks.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Unveiling the Dynamics of Relationship Marketing in Online Communication: A Relational Dialectical View.
Proceedings of the 45th International Conference on Information Systems, 2024

The Impact of VR Museum Exhibition Design on User Emotional Experience: A Meta-Analysis.
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024

A Medium-Frequency Transformer-Based Hybrid Converter for Wind Energy Conversion System.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024

Switching Sequence Investigation for the Harmonic Performance of the X-Type Five-Level Current Source Inverter.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024

Power Loss Investigation of Series-connected Current Source Inverters with Different Modulations.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024

2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Intracranial Atherosclerotic Stenosis Is Associated with Cognitive Impairment in Patients with Nondisabling Ischemic Stroke: A pCASL-Based Study.
Brain Connect., October, 2023

Transformerless Series-Connected Current-Source Converter With Less Switch Count.
IEEE Trans. Ind. Electron., July, 2023

Defending Cyber-Physical Systems Through Reverse-Engineering-Based Memory Sanity Check.
IEEE Internet Things J., May, 2023

Structure-aware attributed heterogeneous network embedding.
Knowl. Inf. Syst., April, 2023

ASTF: Visual Abstractions of Time-Varying Patterns in Radio Signals.
IEEE Trans. Vis. Comput. Graph., 2023

ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs.
IEEE Trans. Inf. Forensics Secur., 2023

Modified Transformerless Series-Connected Current Source Converter Without Series-Connected Switches.
IEEE Trans. Ind. Electron., 2023

NFE-PCN: A Node Feature Enhanced Embedding Framework for Pattern Change in Dynamic Network.
IEEE Access, 2023

Binary Arithmetic Optimization Algorithm for Feature Selection in Pattern Recognition.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

KBEE: Linux Kernel Vulnerability Exploitability Exploration.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

Serialized Knowledge Enhanced Multi-objective Person-job Matching Recommendation in a High Mobility Job Market.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

A comprehensive survey of vulnerability detection method towards Linux-based IoT devices.
Proceedings of the 2nd International Conference on Networks, 2023

PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
TVAR: assessing tissue-specific functional effects of non-coding variants with deep learning.
Bioinform., October, 2022

Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm.
Wirel. Pers. Commun., 2022

Fault-tolerant adaptive PID switched control of robot manipulator based on average dwell time.
Trans. Inst. Meas. Control, 2022

A New Power Converter for Current Source Converter-Based Wind Energy System.
IEEE Trans. Ind. Electron., 2022

Evaluating graph neural networks under graph sampling scenarios.
PeerJ Comput. Sci., 2022

Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis.
Frontiers Inf. Technol. Electron. Eng., 2022

Detection and localization of cyber attacks on water treatment systems: an entropy-based approach.
Frontiers Inf. Technol. Electron. Eng., 2022

On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems.
IEEE Internet Things J., 2022

Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study.
CoRR, 2022

CD93 orchestrates the tumor microenvironment and predicts the molecular subtype and therapy response of bladder cancer.
Comput. Biol. Medicine, 2022

A Bayesian framework to integrate multi-level genome-scale data for Autism risk gene prioritization.
BMC Bioinform., 2022

A computational framework to unify orthogonal information in DNA methylation and copy number aberrations in cell-free DNA for early cancer detection.
Briefings Bioinform., 2022

Digital Twin Application in Ground Simulating Space Debris System With Laser-Driven Flyer Technology.
IEEE Access, 2022

Visual Question Answering of Remote Sensing Image Based on Attention Mechanism.
Proceedings of the Intelligence Science IV - 5th IFIP TC 12 International Conference, 2022

2021
Human-in-the-Loop Control Strategy of Unilateral Exoskeleton Robots for Gait Rehabilitation.
IEEE Trans. Cogn. Dev. Syst., 2021

Technical and Tactical Command Decision Algorithm of Football Matches Based on Big Data and Neural Network.
Sci. Program., 2021

HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller.
J. Comput. Sci. Technol., 2021

A Systematic Treat Model for Software-Defined Networking.
KSII Trans. Internet Inf. Syst., 2021

Unifying Node Labels, Features, and Distances for Deep Network Completion.
Entropy, 2021

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., 2021

Inventory and pricing decisions when dealing with strategic consumers: A comprehensive analysis.
Comput. Oper. Res., 2021

Sharing Economy for Cost Reduction and Efficiency Increase: The Case of Sharing E-Commerce Logistics.
Complex., 2021

Restrain Price Collusion in Trade-Based Supply Chain Finance.
Complex., 2021

Optimal Financing Decision in a Contract Food Supply Chain with Capital Constraint.
Complex., 2021

Coordination Mechanisms for the Two-Echelon Newsvendor Model with Rapidly Responsive and Strategic Consumers.
Complex., 2021

Design and development of psychological virtual simulation experiment teaching system.
Comput. Appl. Eng. Educ., 2021

Thermal Error Model of Linear Motor Feed System Based on Bayesian Neural Network.
IEEE Access, 2021

Adaptive PID Switched Tracking Control of Robot Manipulator.
Proceedings of the 2021 International Conference on Security, 2021

DenseGAN: A Password Guessing Model Based on DenseNet and PassGAN.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Power Loss Investigation of Series-Connected Current Source Inverters.
Proceedings of the IECON 2021, 2021

2020
Cancer classification based on chromatin accessibility profiles with deep adversarial learning model.
PLoS Comput. Biol., November, 2020

Human-Inspired Control of Dual-Arm Exoskeleton Robots With Force and Impedance Adaptation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

A Robust Image Watermarking Approach Using Cycle Variational Autoencoder.
Secur. Commun. Networks, 2020

DRAMS: A tool to detect and re-align mixed-up samples for integrative studies of multi-omics data.
PLoS Comput. Biol., 2020

EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization.
KSII Trans. Internet Inf. Syst., 2020

Robust Iterative Learning Control in Finite Frequency Ranges for Differential Spatially Interconnected Systems.
Circuits Syst. Signal Process., 2020

Synchronization of Coupled Boolean Networks With Different Update Scheme.
IEEE Access, 2020

Improvement of Association Rule Algorithm Based on Hadoop for Medical Data.
Proceedings of the Data Science, 2020

Adaptive Neural Network Control of Lower Limb Exoskeleton Robots Using Disturbance Observer.
Proceedings of the 5th International Conference on Advanced Robotics and Mechatronics, 2020

2019
一种求解子图同构问题的改进遗传算法 (Improved Genetic Algorithm for Subgraph Isomorphism Problem).
计算机科学, 2019

一种基于通联数据的信息扩散路径推测算法 (Information Diffusion Path Inferring Algorithm Based on Communication Data).
计算机科学, 2019

ER-Fuzz:Conditional Code Removed Fuzzing.
KSII Trans. Internet Inf. Syst., 2019

Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System.
IEEE Internet Things J., 2019

Joint optimal decision of the shared distribution system through revenue-sharing and cooperative investment contracts.
Ind. Manag. Data Syst., 2019

Electroconvulsive Therapy Induces Cortical Morphological Alterations in Major Depressive Disorder Revealed with Surface-Based Morphometry Analysis.
Int. J. Neural Syst., 2019

Privacy-aware cross-cloud service recommendations based on Boolean historical invocation records.
EURASIP J. Wirel. Commun. Netw., 2019

Exploring difference in public perceptions on HPV vaccine between gender groups from Twitter using deep learning.
CoRR, 2019

De novo pattern discovery enables robust assessment of functional consequences of non-coding variants.
Bioinform., 2019

NeuFuzz: Efficient Fuzzing With Deep Neural Network.
IEEE Access, 2019

UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching.
IEEE Access, 2019

On-Line Inspection and Sorting System for Mechanical Parts Based on Machine Vision.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

2018
Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment.
Wirel. Commun. Mob. Comput., 2018

Synchronization in mutual-coupled temporal Boolean networks.
Trans. Inst. Meas. Control, 2018

CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement.
Secur. Commun. Networks, 2018

基于区块链技术的动态数据存储安全机制研究 (Blockchain Based Secure Storage Scheme of Dynamic Data).
计算机科学, 2018

Transient Stability Enhancement Brought by Rotor Angle Droop Control When Tie-line Faults Happen.
Proceedings of the TENCON 2018, 2018

The Research and Construction of Complaint Orders Classification Corpus in Mobile Customer Service.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Frequency Diverse MIMO Radar Sparse Imaging Using Annihilating Filter.
Proceedings of the 2018 IEEE International Conference on Signal Processing, 2018

Deep Transfer Learning via Minimum Enclosing Balls.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

An Image Matching Algorithm based on Mutual Information for Small Dimensionality Target.
Proceedings of the 14th International Conference on Natural Computation, 2018

Detecting PLC Program Malicious Behaviors Based on State Verification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Improved Offline Symbolic Execution Approach.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
Power Balancing Investigation of Grid-Side Series-Connected Current Source Inverters in Wind Conversion Systems.
IEEE Trans. Ind. Electron., 2017

基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network).
计算机科学, 2017

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks.
KSII Trans. Internet Inf. Syst., 2017

Cancer driver gene discovery through an integrative genomics approach in a non-parametric Bayesian framework.
Bioinform., 2017

Analysis on the performance of several data association algorithms using Doppler information.
Proceedings of the 13th International Conference on Natural Computation, 2017

DP-MFTD algorithm based on the conditional probability ratio accumulation model.
Proceedings of the 13th International Conference on Natural Computation, 2017

IT-Enabled Role Playing in Service Encounter: Design a Customer Emotion Management System in Call Centers.
Proceedings of the International Conference on Information Systems, 2017

2016
基于静态污点分析的Android应用Intent注入漏洞检测方法 (Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis).
计算机科学, 2016

An OpenFlow User-Switch Remapping Approach for DDoS Defense.
KSII Trans. Internet Inf. Syst., 2016

Lightweight semantic service modelling for IoT: an environment-based approach.
Int. J. Embed. Syst., 2016

Dynamic iteration stopping algorithm for non-binary LDPC-coded high-order PRCPM in the Rayleigh fading channel.
EURASIP J. Wirel. Commun. Netw., 2016

GM-PHD filter-based multi-target tracking in the presence of Doppler blind zone.
Digit. Signal Process., 2016

SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System.
Proceedings of the Security and Privacy in Communication Networks, 2016

Path hopping based SDN network defense technology.
Proceedings of the 12th International Conference on Natural Computation, 2016

MIMO radar arrays optimization analysis.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
A Bayesian framework for <i>de novo</i> mutation calling in parents-offspring trios.
Bioinform., 2015

A haplotype-based framework for group-wise transmission/disequilibrium tests for rare variant association analysis.
Bioinform., 2015

Nonuniform resampling for staggered SAR.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

A weak signal detection system: Design and simulation.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2014
Chaos Synchronization in Complex Oscillators Networks with Time Delay via Adaptive Complex Feedback Control.
Circuits Syst. Signal Process., 2014

DCDB 2.0: a major update of the drug combination database.
Database J. Biol. Databases Curation, 2014

How can Product Text Snippets Benefit from Online Customer Reviews?
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Feature selection and classification algorithm for non-destructive detecting of high-speed rail defects based on vibration signals.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2014

Static-Dynamic Control Flow Integrity.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Human interactome resource and gene set linkage analysis for the functional interpretation of biologically meaningful gene sets.
Bioinform., 2013

Rail defect detection based on vibration acceleration signals.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2013

2012
Comparative genomic analysis of NAC transcriptional factors to dissect the regulatory mechanisms for cell wall biosynthesis.
BMC Bioinform., 2012

Service discovery for internet of things: a context-awareness perspective.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

Modeling and Analyzing the Reliability and Cost of Service Composition in the IoT: A Probabilistic Approach.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A New Type of IPT System with Large Lateral Tolerance and its Circuit Analysis.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

Adaptive controller design of piezo-stage base on neural networks.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Modeling of piezoelectric actuator based on genetic neural network.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Authorization recycling in hierarchical RBAC systems.
ACM Trans. Inf. Syst. Secur., 2011

A Novel HAVE Message of Peer-to-peer Protocol in BitTorrent Systems.
J. Networks, 2011

Neural Network Adaptive Control of Piezoelectric Actuator in Scanning Tunneling Microscope.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Dynamic hysteresis modeling of piezoelectric actuator in Scanning Tunneling Microscope.
Proceedings of the IEEE International Conference on Automation and Logistics, 2011

Converting Digital Image to SVG for User Interaction.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
Research on the architecture of vulnerability discovery technology.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
Cooperative Secondary Authorization Recycling.
IEEE Trans. Parallel Distributed Syst., 2009

Early neural activation for lexico-semantic access in the left anterior temporal area analyzed by an fMRI-assisted MEG multidipole method.
NeuroImage, 2009

Fuzzy-Inference Based Fault Diagnosis System for Pneumatic Press.
Proceedings of the Fuzzy Information and Engineering, 2009

A Novel Trust Model Based on Temporal Historical Data for Access Control.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Authorization recycling in RBAC systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Authorization Using the Publish-Subscribe Model.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Modeling piezoelectrically driven micro/nanopositioning systems with high operating frequency.
Proceedings of the 10th International Conference on Control, 2008

2007
Lexical access and selection of contextually appropriate meaning for ambiguous words.
NeuroImage, 2007

A Shape Detection Method Based on the Radial Symmetry Nature and Direction-Discriminated Voting.
Proceedings of the International Conference on Image Processing, 2007

2005
Bounded optimization of resource allocation among multiple agents using an organizational decision model.
Adv. Eng. Informatics, 2005

2001
An extended organizational choice model applied to loading arrangement and scheduling problems.
Proceedings of the IEEE International Conference on Systems, 2001


  Loading...