Xiaofeng Qiu

According to our database1, Xiaofeng Qiu authored at least 46 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
"Dawn of South Lake" - - Design and Implementation of Immersive Interactive System Based on Virtual Reality Technology.
Proceedings of the BDET 2021: The 3rd International Conference on Big Data Engineering and Technology, 2021

Design and Implementation of "The Belt and Road Initiative" Immersive Interaction System Based on UE4+GIS Platform.
Proceedings of the AIVR 2021: The 5th International Conference on Artificial Intelligence and Virtual Reality, Kumamoto, Japan, July 23, 2021

Design and Implementation of Immersive and Interactive System Based on Unreal Engine.
Proceedings of the AIVR 2021: The 5th International Conference on Artificial Intelligence and Virtual Reality, Kumamoto, Japan, July 23, 2021

Design and Implementation of "Winning Luding Bridge" Immersion FPS Game Based on Unity3D Technology.
Proceedings of the AIVR 2021: The 5th International Conference on Artificial Intelligence and Virtual Reality, Kumamoto, Japan, July 23, 2021

2020
Super Resolution with Kernel Estimation and Dual Attention Mechanism.
Inf., 2020

Generating adversarial examples with input significance indicator.
Neurocomputing, 2020

2019
F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid Computing.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
An unsupervised degradation estimation framework for diagnostics and prognostics in cyber-physical system.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Service function chaining policy compliance checking.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Detection of IP Gangs: Strategically Organized Bots.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2018

CMD: A convincing mechanism for MITM detection in SDN.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Status-based Detection of malicious code in Internet of Things (IoT) devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Adversarial Attack? Don't Panic.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

2017
Global Flow Table: A convincing mechanism for security operations in SDN.
Comput. Networks, 2017

A security controller-based software defined security architecture.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Scheduling of Security Resources in Software Defined Security Architecture.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

SEA: SDN-Based Evolution Architecture for 5G Network.
Proceedings of the Communications and Networking, 2017

Two-Step Joint Attention Network for Visual Question Answering.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Hierarchical Bidirectional Long Short-Term Memory Networks for Chinese Messaging Spam Filtering.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Chinese Character Embedding Based Semantic Query Algorithm for Semi-structured Corpora.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
A data driven orchestration framework in software defined security.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

A software defined security architecture for SDN-based 5G network.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

Network anomaly detection based on frequent sub-graph mining approach and association analysis.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

Knowledge Graph Completion for Hyper-relational Data.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

Approximate Subgraph Matching Query over Large Graph.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

Path Sampling Based Relevance Search in Heterogeneous Networks.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Light field projection for lighting reproduction.
Proceedings of the 2015 IEEE Virtual Reality, 2015

Anomaly Detection of Single Sensors Using OCSVM_KNN.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Research on Light-Weight Compression Schemes Based on Simulative Column-Store.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

A multi-label model to predict undisclosed attributes in microblogging.
Proceedings of the 2015 International Conference on Behavioral, 2015

2014
The Social Web of Things (SWoT)- Structuring an Integrated Social Network for Human, Things and Services.
J. Comput., 2014

Identifying Relevant Messages for Social TV.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
An efficient relay node selection scheme to improve the performance of P2P-based VoIP applications in Chinese internet.
Multim. Tools Appl., 2013

Replacing Network Coordinate System with Internet Delay Matrix Service (IDMS): A Case Study in Chinese Internet.
CoRR, 2013

Design of policy language expression in SIoT.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

ASP2P: An advanced botnet based on social networks over hybrid P2P.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Trust Evaluation Method for Supplier Selection.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Defence against Botnets: A Formal Definition and a General Framework.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Architecture approach for ICT supply chain integrity.
Proceedings of the 20st International Conference on Telecommunications, 2013

A Device-Centric Policy Conflict in IoT.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Improved RETE Algorithm in Context Reasoning for Web of Things Environments.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Access Control Method for Web of Things Based on Role and SNS.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
The analysis of security threats in structured P2P load balancing schemes.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2009
SFDHT: A DHT Designed for Server Farm.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modal Policy Management Framework for Management of Distributed Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Quantitative Security Model of IMS System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...