Qiushi Yang

According to our database1, Qiushi Yang authored at least 19 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hierarchical Bias Mitigation for Semi-Supervised Medical Image Classification.
IEEE Trans. Medical Imaging, 2023

Review of Large Vision Models and Visual Prompt Engineering.
CoRR, 2023

Prompt Engineering for Healthcare: Methodologies and Applications.
CoRR, 2023

Combat Long-Tails in Medical Classification with Relation-Aware Consistency and Virtual Features Compensation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

MRM: Masked Relation Modeling for Medical Image Pre-Training with Genetics.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
D<sup>2</sup>-Net: Dual Disentanglement Network for Brain Tumor Segmentation With Missing Modalities.
IEEE Trans. Medical Imaging, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Semi-supervised Medical Image Classification with Temporal Knowledge-Aware Regularization.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

Towards Robust Adaptive Object Detection under Noisy Annotations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

Learning Dynamic Convolutions for Multi-modal 3D MRI Brain Tumor Segmentation.
Proceedings of the Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2020

2018
Detection of rail surface defects based on CNN image recognition and classification.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2013
An Investigation of e-Government Services in China.
Electron. J. Inf. Syst. Dev. Ctries., 2013

2011
Perfectly Secure Message Transmission.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure message transmission in the general adversary model.
PhD thesis, 2011

Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol.
IACR Cryptol. ePrint Arch., 2011

Secure Communication in Multicast Graphs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
General Perfectly Secure Message Transmission Using Linear Codes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Cryptanalysis of Secure Message Transmission Protocols with Feedback.
IACR Cryptol. ePrint Arch., 2009


  Loading...