Qinghao Wang

Orcid: 0000-0002-2123-440X

According to our database1, Qinghao Wang authored at least 23 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
RiskPO: Risk-based Policy Optimization via Verifiable Reward for LLM Post-Training.
CoRR, October, 2025

A Survey on Large Language Model-Based Social Agents in Game-Theoretic Scenarios.
Trans. Mach. Learn. Res., 2025

Carbon Trading Supply Chain Management Based on Constrained Deep Reinforcement Learning.
Proceedings of the 24th International Conference on Autonomous Agents and Multiagent Systems, 2025

A Unified Framework for Multi-Stage Decision Optimization with Deep Reinforcement Learning and Foundation Models.
Proceedings of the 21st IEEE International Conference on Automation Science and Engineering, 2025

2024
A novel fusion feature imageization with improved extreme learning machine for network anomaly detection.
Appl. Intell., October, 2024

Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024

A Survey on Large Language Model-Based Social Agents in Game-Theoretic Scenarios.
CoRR, 2024

Deep Reinforcement Learning for Solving Management Problems: Towards A Large Management Mode.
CoRR, 2024

A novel immune detector training method for network anomaly detection.
Appl. Intell., 2024

RiskMiner: Discovering Formulaic Alphas via Risk Seeking Monte Carlo Tree Search.
Proceedings of the 5th ACM International Conference on AI in Finance, 2024

2023
OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023

SR-IDS: A Novel Network Intrusion Detection System Based on Self-taught Learning and Representation Learning.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

2022
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection.
IEEE Trans. Netw. Serv. Manag., December, 2022

Sensorless Control of PMSM With State Estimation PLL Base on Injection of High Frequency Rectangular Signal into Stationary Reference Frame.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
E-DSDV routing protocol for mobile ad hoc network for underwater electrocommunication.
Sci. China Inf. Sci., 2021

2020
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues.
IEEE Access, 2020

An Electrocommunication System Using FSK Modulation and Deep Learning Based Demodulation for Underwater Robots.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

A Survey on the Application of SGX in Blockchain Area.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2018
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity.
CoRR, 2018

2017
A New Method for Evaluating Air Traffic Control Safety.
Proceedings of the VI International Conference on Network, Communication and Computing, 2017


  Loading...