Qiong Li

According to our database1, Qiong Li authored at least 112 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Identifying Flood Events over the Poyang Lake Basin Using Multiple Satellite Remote Sensing Observations, Hydrological Models and In Situ Data.
Remote Sensing, 2018

Finite-data-size study on practical universal blind quantum computation.
Quantum Information Processing, 2018

A new algorithm of vehicle license plate location based on convolutional neural network.
J. Comput. Meth. in Science and Engineering, 2018

Cross-layer coordination in the I/O software stack of extreme-scale systems.
Concurrency and Computation: Practice and Experience, 2018

SMRC: An Endurable SSD Cache for Host-Aware Shingled Magnetic Recording Drives.
IEEE Access, 2018

A High-Immersive Medical Training Platform Using Direct Intraoperative Data.
IEEE Access, 2018

Walking into ancient paintings with virtual candles.
Proceedings of the 24th ACM Symposium on Virtual Reality Software and Technology, 2018

Duchy: Achieving Both SSD Durability and Controllable SMR Cleaning Overhead in Hybrid Storage Systems.
Proceedings of the 47th International Conference on Parallel Processing, 2018

The Exploration of Facial Expression Recognition in Distance Education Learning System.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018

2017
Characterizing Drought and Flood Events over the Yangtze River Basin Using the HUST-Grace2016 Solution and Ancillary Data.
Remote Sensing, 2017

A novel quantum representation of color digital images.
Quantum Information Processing, 2017

Ferrography Wear Particles Image Recognition Based on Extreme Learning Machine.
J. Electrical and Computer Engineering, 2017

Multiplicative repetition-based spinal codes with low computational complexity.
IET Communications, 2017

PRSP: A Plugin-based Framework for RDF Stream Processing.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

A novel framework for visuo-haptic percutaneous therapy simulation based on patient-specific clinical trials.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

An Adaptive Framework for RDF Stream Reasoning.
Proceedings of the ISWC 2017 Posters & Demonstrations and Industry Tracks co-located with 16th International Semantic Web Conference (ISWC 2017), Vienna, Austria, October 23rd - to, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Using Facial Expression to Detect Emotion in E-learning System: A Deep Learning Method.
Proceedings of the Emerging Technologies for Education - Second International Symposium, 2017

An Adaptive Framework for RDF Stream Processing.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

2016
GRACE-Derived Terrestrial Water Storage Changes in the Inter-Basin Region and Its Possible Influencing Factors: A Case Study of the Sichuan Basin, China.
Remote Sensing, 2016

Least significant qubit algorithm for quantum images.
Quantum Information Processing, 2016

Study on the security of the authentication scheme with key recycling in QKD.
Quantum Information Processing, 2016

Storage wall for exascale supercomputing.
Frontiers of IT & EE, 2016

Visual exploration of tsunami evacuation planning.
J. Visualization, 2016

A fast channel assignment scheme based on power control in wireless ultraviolet networks.
Computers & Electrical Engineering, 2016

2015
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system.
Signal, Image and Video Processing, 2015

Efficient bit sifting scheme of post-processing in quantum key distribution.
Quantum Information Processing, 2015

Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics.
Multimedia Tools Appl., 2015

Energy Hole Mitigation through Cooperative Transmission in Wireless Sensor Networks.
IJDSN, 2015

Finger multibiometric cryptosystem based on score-level fusion.
IJCAT, 2015

A New Reduced-Latency SC Decoder for Polar Codes.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

CER-IOS: Internal Resource Utilization Optimized I/O Scheduling for Solid State Drives.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

An Adaptive Improved Winnow Algorithm.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Study on error reconciliation in quantum key distribution.
Quantum Information & Computation, 2014

Toward accurate localization and high recognition performance for noisy iris images.
Multimedia Tools Appl., 2014

An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients.
Multimedia Tools Appl., 2014

Finger multibiometric cryptosystems: fusion strategy and template security.
J. Electronic Imaging, 2014

Hybrid hierarchy storage system in MilkyWay-2 supercomputer.
Frontiers Comput. Sci., 2014

A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An FPGA-Based Communication Scheme of Classical Channel in High-Speed QKD System.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An FPGA-Based Design of Efficient QKD Sifting Module.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A FPGA Based Real-time Design of Efficient Sifting Module in QKD System.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Design and performance of spinal codes over fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2014

Work in progress: Threshold analysis for full area coverage in three dimensions based on bin-covering technique.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
Conjugate gradient type methods for the nondifferentiable convex minimization.
Optimization Letters, 2013

Improve the security of image robust hash using fuzzy commitment scheme.
Neural Computing and Applications, 2013

Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification.
J. Electronic Imaging, 2013

Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns.
IEICE Transactions, 2013

A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An effective preprocessing method for finger vein recognition.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

A new encryption scheme for color images based on quantum chaotic system in transform domain.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

ECAM: An Efficient Cache Management Strategy for Address Mappings in Flash Translation Layer.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
An almost smooth equation reformulation to the nonlinear complementarity problem and Newton's method.
Optimization Methods and Software, 2012

Annotating traditional Chinese paintings for immersive virtual exhibition.
JOCCH, 2012

Mitigating energy holes in wireless sensor networks using cooperative communication.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Finger-vein Verification Using Gabor Filter and SIFT Feature Matching.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Iterative Receiver with Joint Channel Estimation and Decoding in LTE Downlink.
Proceedings of the Pervasive Computing and the Networked World, 2012

A new image segmentation method via fusing NCut eigenvectors maps.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

An accurate iris location method for low quality iris images.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A novel evaluation method for perceptual hash algorithm in authentication mode.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A new image encryption based on chaotic systems and singular value decomposition.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

Player detection using one-class SVM.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

2011
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Continuous, online monitoring and analysis in large water distribution networks.
Proceedings of the 27th International Conference on Data Engineering, 2011

A Study on a New Method for the Analysis of Flood Risk Assessment Based on Artificial Neural Network.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Continuously Identifying Representatives Out of Massive Streams.
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011

2010
Equitable Coloring of 2-degenerate Graph and Plane Graphs without cycles of Specific lengths.
Discrete Math., Alg. and Appl., 2010

A Hybrid Support Vector Regression for Time Series Prediction.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

A Novel and Secure Image Interpolation Methods for Image Disguise.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

An Image Structure Information Based Robust Hash for Tamper Detection and Localization.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Equitable list coloring of planar graphs without 4- and 6-cycles.
Discrete Mathematics, 2009

A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed Video.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Perceptual Content Authentication and Tamper Detection of Facial Image.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Digital Recordable Integrated Television Based on Embedded Linux Operating System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

High Performance Support of Lustre over Customized HSNI for HPC.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

Multimodal Biometric Recognition Based on Complex KFDA.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Multi-Channel Combination Method of Image Perceptual Hashing.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Distributed Shared Parallel IO System for HPC.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Key-Dependent Compressed Domain Audio Hashing.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

The W-Model for Testing Software Product Lines.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Digital Watermarking Algorithms for Vector Images.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Perceptually Transparent Information Hiding in G.729 Bitstream.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Content-Based Audio Retrieval Using Perceptual Hash.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Compressed Domain Perceptual Hashing for MELP Coded Speech.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Face Recognition Scheme with Renewable Templates.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A GPDMA-based Distributed Shared I/O Solution for CC-NUMA System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

High-Performance Storage for DSM System Using Global Cache.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Color Image Segmentation Scheme for Retinopathic Fundus.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Investigation on Color Shifts for Different Gamma of Display System in CIECAM02-Based Uniform Color Space.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Streaming-Viability Analysis and Packet Scheduling for Video Over In-Vehicle Wireless Networks.
IEEE Trans. Vehicular Technology, 2007

The Design and Implementation of a Topic-Driven Crawler.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

Performance Evaluation of Fingerprint Orientation Estimation Algorithms.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Design and Implementation of a PKI-Based Electronic Documents Protection Management System.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improved Adaptive Lifting Scheme for Wavelet-Based Image Compression.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Content Integrity Verification for G.729 Coded Speech.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Analysis and Problems on Fuzzy Vault Scheme.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006

2005
Calculation of eigenvalues for a class of crosswise vibration equation of the beam.
Applied Mathematics and Computation, 2005

The Research on Information Hiding Based on Command Sequence of FTP Protocol.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Verifiable Fingerprint Vault Scheme.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

GIS-based modeling fluvial erosion in arid region of Northwest China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
Providing adaptive QoS to layered video over wireless local area networks through real-time retry limit adaptation.
IEEE Trans. Multimedia, 2004

Error protection of video over wireless local area networks through real-time retry limit adaptation.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

Real-time ubiquitous multimedia streaming using rate-distortion-complexity models.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
The Implication of Short-Range Dependency on Delay Variation Measurement.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

A New High-Performance Distributed Shared I/O System.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

2002
Periodic solutions of the higher-dimensional non-autonomous systems.
Applied Mathematics and Computation, 2002

Control architecture for tuning intensity and burstiness of traffic.
Proceedings of the Global Telecommunications Conference, 2002

2001
Jitter-based delay-boundary prediction of wide-area networks.
IEEE/ACM Trans. Netw., 2001


  Loading...