Qihui Zhou

Orcid: 0000-0002-8927-3325

According to our database1, Qihui Zhou authored at least 15 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Circinus: Fast Redundancy-Reduced Subgraph Matching.
Proc. ACM Manag. Data, 2023

DSP: Efficient GNN Training with Multiple GPUs.
Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 2023

The malicious resource consumption detection in permissioned blockchain based on traffic analysis.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
RACE: One-sided RDMA-conscious Extendible Hashing.
ACM Trans. Storage, 2022

LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence.
Proceedings of the IEEE Smartworld, 2022

VSGM: View-Based GPU-Accelerated Subgraph Matching on Large Graphs.
Proceedings of the SC22: International Conference for High Performance Computing, 2022

HGL: Accelerating Heterogeneous GNN Training with Holistic Representation and Optimization.
Proceedings of the SC22: International Conference for High Performance Computing, 2022

An atomic member addition mechanism for permissioned blockchain based on autonomous rollback.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2019
A Frequency Selective Rasorber With Three Transmission Bands and Three Absorption Bands.
IEEE Access, 2019

2018
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes.
Cybersecur., 2018

2017
A Miniaturized Absorptive/Transmissive Radome with Switchable Passband and Wide Absorbing Band.
IEICE Trans. Commun., 2017

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2013
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013


  Loading...