Ying Qiu

According to our database1, Ying Qiu authored at least 34 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
EVM-CNN: Real-Time Contactless Heart Rate Estimation From Facial Video.
IEEE Trans. Multimedia, 2019

2018
Critical Analysis of New Protocols on Lightweight Authentication.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2016
Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks.
CoRR, 2016

Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Experimental demonstration of few-mode fiber transmission with self-homodyne coherent detection.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Flexible coherent PON system based on cost-effective heterodyne detection of PDM-PAM-n signal.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Radio over WDM-PON by spatial multiplexing in few mode fiber.
Proceedings of the 10th International Symposium on Communication Systems, 2016

2014
Limiting Integral Loop Digital Control for DC-DC Converters Subject to Changes in Load Current and Source Voltage.
IEEE Trans. Industrial Informatics, 2014

Uniform Models of PWM DC-DC Converters for Discontinuous Conduction Mode Considering Parasitics.
IEEE Trans. Industrial Electronics, 2014

2010
Mobile IPv6 Location Privacy Solutions.
RFC, February, 2010

Digital Average Current-Mode Control of PWM DC-DC Converters Without Current Sensors.
IEEE Trans. Industrial Electronics, 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

Detecting and Analyzing System for the Vibration Comfort of Car Seats Based on LabVIEW.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Blocking Foxy Phishing Emails with Historical Information.
Proceedings of IEEE International Conference on Communications, 2010

2009
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

Tracing Stateful Pirate Decoders.
Proceedings of IEEE International Conference on Communications, 2009

A Lightweight Fast Handover Authentication Scheme in Mobile Networks.
Proceedings of IEEE International Conference on Communications, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
The Simulation of VRML Based Manipulator and Techniques.
Proceedings of the PACIIA 2008, 2008

Model-Based Neural Network and Wavelet Packets Decomposition on Damage Detecting of Composites.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

2007
A Mobile Firewall Framework - Design and Implementation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Securing Mobile Auctions in the Presence of Malicious Adversaries.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Firewall for Dynamic IP Address in Mobile IPv6.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

More on Shared-Scalar-Product Protocols.
Proceedings of the Information Security Practice and Experience, 2006

2005
Cooperation in wireless ad hoc networks: a market-based approach.
IEEE/ACM Trans. Netw., 2005

Security Analysis and Improvement of Return Routability Protocol.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Protecting all traffic channels in mobile IPv6 network.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Mobile personal firewall.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

2003
Bandwidth Allocation in Wireless Ad Hoc Networks: A Price-Based Approach.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003


  Loading...