Qifan Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
A Novel Voltage-Sensorless Grid Voltage Full Feedforward Estimator-Based Current Control Strategy for a Grid-Connected Inverter.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2025

PASS: Probabilistic Agentic Supernet Sampling for Interpretable and Adaptive Chest X-Ray Reasoning.
CoRR, August, 2025

Balancing Semantic Relevance and Engagement in Related Video Recommendations.
CoRR, July, 2025

BarkBeetle: Stealing Decision Tree Models with Fault Injection.
CoRR, July, 2025

Accurate Prediction of Multi-Dimensional Required Resources in 5G via Federated Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., March, 2025

Dual-path geometric relation-aware transformer for point cloud classification and segmentation.
Appl. Soft Comput., 2025

Inference Compute-Optimal Video Vision Language Models.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
Confidential Computing on Heterogeneous Systems: Survey and Implications.
CoRR, 2024

A Clustering Algorithm for Connectivity in Cognitive Vehicular Network with Digital Twin.
Proceedings of the 2024 4th International Conference on Internet of Things and Machine Learning, 2024

Efficient Transformer-based Edge Detector.
Proceedings of the International Joint Conference on Neural Networks, 2024

Research on the Development Status of the Combination of Biology, Chemistry, Geology and Artificial Intelligence.
Proceedings of the 2024 International Conference on Digital Society and Artificial Intelligence, 2024

2023
Liver CT Image Recognition Method Based on Capsule Network.
Inf., 2023

Identification of grape leaf diseases based on VN-BWT and Siamese DWOAM-DRNet.
Eng. Appl. Artif. Intell., 2023

Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
CoRR, 2023

CryptoMask: Privacy-Preserving Face Recognition.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Multi-channel feature fusion networks with hard coordinate attention mechanism for maize disease identification under complex backgrounds.
Comput. Electron. Agric., 2022

EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Detecting Movement Timing from Primate Intracortical Signals for Brain-machine Interfaces in Dynamic Environment.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

AC Prediction Error Propagation-based Encryption for Texture Protection of JPEG Compressed Images.
Proceedings of the Picture Coding Symposium, 2021

Reinforcement of Neuropixels probes for high-density neural recording in non-human primates.
Proceedings of the 10th International IEEE/EMBS Conference on Neural Engineering, 2021

Serial Decoding of Macaque Intracortical Activity for Feedforward Control of Coherent Sequential Reach.
Proceedings of the 10th International IEEE/EMBS Conference on Neural Engineering, 2021

2020
DUGRA: Dual-Graph Representation Learning for Health Information Networks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

2018
Super-Resolution in Optical Coherence Tomography.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

An Implementation of Brain-Machine Interface by Decoding Predictive Intracortical Signals toward a Moving Object<sup>*</sup>.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2018

2017
Ribosome Profiling Reveals Genome-wide Cellular Translational Regulation upon Heat Stress in <i>Escherichia coli</i>.
Genom. Proteom. Bioinform., 2017

Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2014
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges.
Int. J. Cyber Warf. Terror., 2014


  Loading...