Qihua Wang

Orcid: 0000-0001-9548-8683

According to our database1, Qihua Wang authored at least 58 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Distributed Nonparametric Regression Imputation for Missing Response Problems with Large-scale Data.
J. Mach. Learn. Res., 2023

2022
FishNet: Fish visual recognition with one stage multi-task learning.
IET Image Process., 2022

A two-stage optimal subsampling estimation for missing data problems with large-scale data.
Comput. Stat. Data Anal., 2022

A convex programming solution based debiased estimator for quantile with missing response and high-dimensional covariables.
Comput. Stat. Data Anal., 2022

Surrogate space based dimension reduction for nonignorable nonresponse.
Comput. Stat. Data Anal., 2022

2021
Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021

Blockchain-Based Private Provable Data Possession.
IEEE Trans. Dependable Secur. Comput., 2021

Bias-corrected Kullback-Leibler distance criterion based model selection with covariables missing at random.
Comput. Stat. Data Anal., 2021

A beyond multiple robust approach for missing response problem.
Comput. Stat. Data Anal., 2021

2020
Model-free feature screening for ultrahigh dimensional classification.
J. Multivar. Anal., 2020

Conditional probability estimation based classification with class label missing at random.
J. Multivar. Anal., 2020

Feature screening under missing indicator imputation with non-ignorable missing response.
Comput. Stat. Data Anal., 2020

Function-on-function quadratic regression models.
Comput. Stat. Data Anal., 2020

2019
A Distributed Access Control with Outsourced Computation in Fog Computing.
Secur. Commun. Networks, 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

Simultaneous variable selection and class fusion with penalized distance criterion based classifiers.
Comput. Stat. Data Anal., 2019

2018
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wirel. Commun. Mob. Comput., 2018

2017
Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks.
Symmetry, 2017

Stable prediction in high-dimensional linear models.
Stat. Comput., 2017

Research on the Optimized Dispatch and Transportation Scheme for Emergency Logistics.
Proceedings of the 2017 International Conference on Identification, 2017

2016
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016

2015
Semiparametric linear transformation model with differential measurement error and validation sampling.
J. Multivar. Anal., 2015

2014
Semiparametric efficient estimation for partially linear single-index models with responses missing at random.
J. Multivar. Anal., 2014

Model detection for functional polynomial regression.
Comput. Stat. Data Anal., 2014

Variable selection and semiparametric efficient estimation for the heteroscedastic partially linear single-index model.
Comput. Stat. Data Anal., 2014

2013
Variable selection in the additive rate model for recurrent event data.
Comput. Stat. Data Anal., 2013

2012
Exploring the varying covariate effects in proportional odds models with censored data.
J. Multivar. Anal., 2012

Bias-corrected GEE estimation and smooth-threshold GEE variable selection for single-index models with clustered data.
J. Multivar. Anal., 2012

An analytical solution for consent management in patient privacy preservation.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Secur. Comput., 2011

Statistical inference in partially-varying-coefficient single-index model.
J. Multivar. Anal., 2011

Empirical likelihood calibration estimation for the median treatment difference in observational studies.
Comput. Stat. Data Anal., 2011

Social Analytics for Personalization in Work Environments.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

Data leakage mitigation for discretionary access control in collaboration clouds.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Decision Support for Patient Consent Management.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

Quantified risk-adaptive access control for patient privacy protection in health information systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Satisfiability and Resiliency in Workflow Authorization Systems.
ACM Trans. Inf. Syst. Secur., 2010

Mining Roles with Multiple Objectives.
ACM Trans. Inf. Syst. Secur., 2010

Semiparametric analysis based on weighted estimating equations for transformation models with missing covariates.
J. Multivar. Anal., 2010

Collaboration analytics: mining work patterns from collaboration activities.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Exploring online social activities for adaptive search personalization.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Resiliency Policies in Access Control.
ACM Trans. Inf. Syst. Secur., 2009

Statistical estimation in varying coefficient models with surrogate data and validation sampling.
J. Multivar. Anal., 2009

Probability density estimation for survival data with censoring indicators missing at random.
J. Multivar. Anal., 2009

Model checking for partially linear models with missing responses at random.
J. Multivar. Anal., 2009

Evaluating role mining algorithms.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
Proceedings of the Computer Security, 2009

Selective message distribution with people-tagging in user-collaborative environments.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2008

Beyond separation of duty: An algebra for specifying high-level security policies.
J. ACM, 2008

Mining roles with semantic meanings.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

On the Security of Delegation in Access Control Systems.
Proceedings of the Computer Security, 2008

Access Control Friendly Query Verification for Outsourced Data Publishing.
Proceedings of the Computer Security, 2008

Automatic Categorization of Tags in Collaborative Environments.
Proceedings of the Collaborative Computing: Networking, 2008

2007
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Satisfiability and Resiliency in Workflow Systems.
Proceedings of the Computer Security, 2007

Direct static enforcement of high-level security policies.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007


  Loading...