Qingjia Huang

According to our database1, Qingjia Huang authored at least 23 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Non-transferable blockchain-based identity authentication.
Peer Peer Netw. Appl., May, 2023

2021
Security-Aware computation offloading for Mobile edge computing-Enabled smart city.
J. Cloud Comput., 2021

2020
Energy- and Resource-Aware Computation Offloading for Complex Tasks in Edge Environment.
Complex., 2020

PiDicators: An Efficient Artifact to Detect Various VMs.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Powerful Speaker Embedding Training Framework by Adversarially Disentangled Identity Representation.
CoRR, 2019

EG-GAN: Cross-Language Emotion Gain Synthesis based on Cycle-Consistent Adversarial Networks.
CoRR, 2019

Study on the posts and performance evaluation model of inpatients in public hospitals based on .NET platform DRGs payment mode.
Concurr. Comput. Pract. Exp., 2019

2018
A Survey on Mobile Edge Computing: Focusing on Service Adoption and Provision.
Wirel. Commun. Mob. Comput., 2018

Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data.
IEEE Access, 2018

A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Enhanced Energy-Efficient Scheduling for Parallel Tasks Using Partial Optimal Slacking.
Comput. J., 2015

2014
Prediction-based Dynamic Resource Scheduling for Virtualized Cloud Systems.
J. Networks, 2014

2013
Cost-efficient task scheduling for executing large programs in the cloud.
Parallel Comput., 2013

Migration-Based Elastic Consolidation Scheduling in Cloud Data Center.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Reducing Operational Costs through Consolidation with Resource Prediction in the Cloud.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Enhanced Energy-Efficient Scheduling for Parallel Applications in Cloud.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Cost-Conscious Scheduling for Large Graph Processing in the Cloud.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011


  Loading...