Zhiqiang Yao

According to our database1, Zhiqiang Yao authored at least 50 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet of Things Journal, 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

Horizontal Pyramid Matching for Person Re-Identification.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
MONET, 2018

Multi-attribute group decision-making under probabilistic uncertain linguistic environment.
JORS, 2018

Clustering algorithms based on correlation coefficients for probabilistic linguistic term sets.
Int. J. Intell. Syst., 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

2017
Sum-Power Minimization Problem in Multisource Single-AF-Relay Networks: A New Revisit to Study the Optimality.
IEEE Trans. Vehicular Technology, 2017

Dynamic Resource Allocation for Energy Efficient Transmission in Digital Subscriber Lines.
IEEE Trans. Signal Processing, 2017

Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A Low-Complexity Power Allocation Strategy to Minimize Sum-Source-Power for Multi-User Single-AF-Relay Networks.
IEEE Trans. Communications, 2016

History-aware page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electronics, 2016

A Semiautomated Structure-Based Method To Predict Substrates of Enzymes via Molecular Docking: A Case Study with Candida antarctica Lipase B.
Journal of Chemical Information and Modeling, 2016

ADME Properties Evaluation in Drug Discovery: Prediction of Caco-2 Cell Permeability Using a Combination of NSGA-II and Boosting.
Journal of Chemical Information and Modeling, 2016

Energy-efficient power allocation for multi-user single-AF-relay underlay cognitive radio networks.
Computer Networks, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Optimal Resource Allocation for Energy Efficient Transmission in DSL.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Dynamic garbage collection scheme based on past update times for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electronics, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Networking and Applications, 2015

Channel estimation of sparse multipath based on compressed sensing using Golay sequences.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Computing, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
TIIS, 2014

2013
Robust Fixed-Complexity Sphere Decoders for Rank-Deficient MIMO Systems.
IEEE Trans. Wireless Communications, 2013

Quantum private comparison protocol with d-dimensional Bell states.
Quantum Information Processing, 2013

The Realization of Students Ranking Assessment Management Information System.
JSW, 2013

Implementation of the AutoComplete Feature of the Textbox Based on Ajax and Web Service.
JCP, 2013

Access control requirements for structured document in cloud computing.
IJGUC, 2013

High performance parallel evolutionary algorithm model based on MapReduce framework.
IJCAT, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2011
A Novel Robust Mesh Watermarking Based on BNBW.
EURASIP J. Adv. Sig. Proc., 2011

2010
A Data Hiding Scheme based on Local Coordinate System for 3D Triangle Mesh Models.
JSW, 2010

2009
The Theory about CD-CAT Based on FCA and Its Application.
IJDET, 2009

Biorthogonal nonuniform B-spline wavelets based on a discrete norm.
Computer Aided Geometric Design, 2009

An efficient and effective image representation for region-based image retrieval.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Improved Blind Watermarking of 3D Objects Based on Partition.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
A Novel Watermarking Extraction Based on Error Correcting Code and Evidence Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Non-Uniform Scale, Rotation and Translation Resilient Public Watermarking for 3D Models.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A Practical Model for Dynamic Software Measurement.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A fast robot feedback decision algorithm.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

2006
Directly Modeling of Correlation Matrices for GMM in Speaker Identification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Improved Two-stage Wiener Filter for Robust Speaker Identification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A New Hybrid GMM/SVM for Speaker Verification.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Kurtosis Normalization in Feature Space for Robust Speaker Verification.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Improved GMM-UBM/SVM For Speaker Verification.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Improved covariance modeling for GMM in speaker identification.
Proceedings of the INTERSPEECH 2005, 2005

Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...