Qiao Hu

Orcid: 0000-0002-1916-4764

According to our database1, Qiao Hu authored at least 50 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combining Multi-View UAV Photogrammetry, Thermal Imaging, and Computer Vision Can Derive Cost-Effective Ecological Indicators for Habitat Assessment.
Remote. Sens., March, 2024

Sparsity-Based Processing to Enhance the Reverberation Suppression for FDA-MIMO Sonars.
IEEE Trans. Aerosp. Electron. Syst., 2024

2023
Editorial: Multimodal behavior from animals to bio-inspired robots.
Frontiers Neurorobotics, June, 2023

A Hf0.5Zr0.5O2 ferroelectric capacitor-based half-destructive read scheme for computing-in-memory.
Sci. China Inf. Sci., May, 2023

Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

2022
Revisiting Error-Correction in Precommitment Distance-Bounding Protocols.
IEEE Trans. Ind. Informatics, 2022

A 0.02% Accuracy Loss Voltage-Mode Parallel Sensing Scheme for RRAM-Based XNOR-Net Application.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A Dynamic Task Allocation Algorithm for Heterogeneous UUV Swarms.
Sensors, 2022

Using Sentinel-2 Imagery and Machine Learning Algorithms to Assess the Inundation Status of Nebraska Conservation Easements during 2018-2021.
Remote. Sens., 2022

Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

A hazardous chemical knowledge base construction method based on knowledge graph.
Int. J. Reason. based Intell. Syst., 2022

Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System.
IEEE Multim., 2022

SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Preventing Overshadowing Attacks in Self-Jamming Audio Channels.
IEEE Trans. Dependable Secur. Comput., 2021

Early Detection of Encroaching Woody Juniperus virginiana and Its Classification in Multi-Species Forest Using UAS Imagery and Semantic Segmentation Algorithms.
Remote. Sens., 2021

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

A novel security management system for hazardous chemicals.
Int. J. Secur. Networks, 2021

Evolution of Publications, Subjects, and Co-Authorships in Network-on-Chip Research From a Complex Network Perspective.
IEEE Access, 2021

Direction Identification of Underwater Moving Target with Active Electrosense and CNN.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

Underwater Moving Object Localisation Based on Weak Electric Fish Bionic Sensing Principle and LSTM.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

The Ground Motion Dynamics Analysis of a Bionic Amphibious Robot with Undulatory Fins.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

Kinetic Analysis and Design of a Bio-Inspired Amphibious Robot with Two Undulatory Fins.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

Water Surface Stability Prediction of Amphibious Bio-Inspired Undulatory Fin Robot.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

A binary variational mode decomposition algorithm based on similarity matching.
Proceedings of the ICDSP 2021: 5th International Conference on Digital Signal Processing, 2021

Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

A HfO2 Ferroelectric Capacitor based 10T2C High Reliability Non-Volatile SRAM for Low Power IoT Applications.
Proceedings of the 14th IEEE International Conference on ASIC, 2021

Novel 15T SRAM Cell for Low Voltage High Reliability Application.
Proceedings of the 14th IEEE International Conference on ASIC, 2021

2020
A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement.
IEEE Trans. Ind. Informatics, 2020

Extraction of road blockage information for the Jiuzhaigou earthquake based on a convolution neural network and very-high-resolution satellite images.
Earth Sci. Informatics, 2020

Inference for Network Structure and Dynamics from Time Series Data via Graph Neural Network.
CoRR, 2020

Improving Power Output of Battery and Mode Switching Frequency Based on Real-Time Average Power Method for Multi-Mode Hybrid Energy Storage System in Electric Vehicles.
IEEE Access, 2020

A Novel Feature Extraction Method for Underwater Acoustic Target Based on Parameter Optimized VMD and 1(1/2)-D Spectrum.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

Research on Blockchain Financial Derivatives Cluster.
Proceedings of the ICBTA 2020: The 3rd International Conference on Blockchain Technology and Applications, 2020

2019
Improving the Accuracy of Landslide Detection in "Off-site" Area by Machine Learning Model Portability Comparison: A Case Study of Jiuzhaigou Earthquake, China.
Remote. Sens., 2019

Multimode Decomposition and Wavelet Threshold Denoising of Mold Level Based on Mutual Information Entropy.
Entropy, 2019

A Review of Biomimetic Artificial Lateral Line Detection Technology for Unmanned Underwater Vehicles.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Correlation-Based Search against Friendly Jamming Data Exchange Schemes.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Security Implications of Implementing Multistate Distance-Bounding Protocols.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
HB+DB: Distance bounding meets human based authentication.
Future Gener. Comput. Syst., 2018

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.
Comput. Secur., 2018

Research on Fuzzy Rule-Based Reasoning System for CC Quality Assurance.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Intelligent Detection for Artificial Lateral Line of Bio-Inspired Robotic Fish Using EMD and SVMs.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

2017
A session hijacking attack on physical layer key generation agreement.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

2016
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Comput. Networks, 2016

Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

2015
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.
Proceedings of the Information Security Theory and Practice, 2015

2013
Optimal filter approach for the detection of vessel bifurcations in color fundus images.
Proceedings of the Medical Imaging 2013: Image Processing, 2013

Automated Separation of Binary Overlapping Trees in Low-Contrast Color Retinal Images.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2013, 2013

2005
Fuzzy Support Vector Machine and Its Application to Mechanical Condition Monitoring.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Hybrid Intelligent Forecasting Model Based on Empirical Mode Decomposition, Support Vector Regression and Adaptive Linear Neural Network.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...