default search action
Jinqing Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Haiyang Shen, Jinqing Li, Xiaoqiang Di, Xusheng Li, Zhenxun Liu, Makram Ibrahim:
A novel secure scheme for remote sensing image transmission: an integrated approach with compression and encoding. Earth Sci. Informatics 17(5): 4875-4900 (2024) - [j24]Mengli Gao, Jinqing Li, Xiaoqiang Di, Xusheng Li, Mingao Zhang:
A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher. Expert Syst. Appl. 246: 123215 (2024) - [j23]Jinhui Cao, Xiaoqiang Di, Xu Liu, Rui Xu, Jinqing Li, Weiwu Ren, Hui Qi, Pengfei Hu, Kehan Zhang, Bo Li:
Towards robust log parsing using self-supervised learning for system security analysis. Intell. Data Anal. 28(4): 1093-1113 (2024) - [j22]Xusheng Li, Jinqing Li, Xiaoqiang Di, Hongmei Guan, Mingao Zhang, Mengli Gao, Makram Ibrahim:
3D point cloud encryption algorithm based on hybrid key and spatial maintenance. J. Inf. Secur. Appl. 87: 103896 (2024) - [j21]Yibo Han, Meiting Lin, Ni Li, Qi Qi, Jinqing Li, Qingxin Liu:
DCWPSO: particle swarm optimization with dynamic inertia weight updating and enhanced learning strategies. PeerJ Comput. Sci. 10: e2253 (2024) - [j20]Jinhui Cao, Xiaoqiang Di, Xu Liu, Jinqing Li, Zhi Li, Liang Zhao, Ammar Hawbani, Mohsen Guizani:
Anomaly Detection for In-Vehicle Network Using Self-Supervised Learning With Vehicle-Cloud Collaboration Update. IEEE Trans. Intell. Transp. Syst. 25(7): 7454-7466 (2024) - [c16]Jinqing Li, Qi Qi, Ni Li, Yibo Han:
Robust modeling of the multi-depot vehicle routing problem under uncertain demands. CSCWD 2024: 2185-2190 - 2023
- [j19]Zhenlong Man, Jinqing Li, Xiaoqiang Di, Ripei Zhang, Xusheng Li, Xiaohan Sun:
Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf. Sci. 622: 629-651 (2023) - [c15]Yibo Han, Qi Qi, Ni Li, Jinqing Li:
Robust optimization for minimizing total tardiness on unrelated parallel machine scheduling. ICPADS 2023: 242-247 - 2022
- [j18]Wenming Hou, Xiaoqiang Di, Jinqing Li, Li Cheng, Huamin Yang:
Research on the behaviour and law of quantity growth of followers based on WeChat official account. Behav. Inf. Technol. 41(8): 1724-1739 (2022) - [j17]Zefei Liu, Jinqing Li, Xiaoqiang Di:
A New Hyperchaotic 4D-FDHNN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption. Entropy 24(7): 900 (2022) - [j16]Xin Meng, Jinqing Li, Xiaoqiang Di, Yaohui Sheng, Donghua Jiang:
An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map. Entropy 24(7): 901 (2022) - [j15]Yaohui Sheng, Jinqing Li, Xiaoqiang Di, Xusheng Li, Rui Xu:
An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion. Entropy 24(9): 1247 (2022) - [j14]Yaohui Sheng, Jinqing Li, Xiaoqiang Di, Zhenlong Man, Zefei Liu:
Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels. IET Image Process. 16(10): 2769-2790 (2022) - [j13]Donghan Li, Jinqing Li, Xiaoqiang Di:
A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. J. Inf. Secur. Appl. 69: 103304 (2022) - [j12]Jinqing Li, Jia Wang, Xiaoqiang Di:
Image encryption algorithm based on bit-level permutation and "Feistel-like network" diffusion. Multim. Tools Appl. 81(30): 44335-44362 (2022) - [c14]Yuwei Li, Dakui Wang, Jinqing Li, Yangyang Ding, Xiaojun Chen:
Noise Suppression with Label Graph in Distantly Supervised Relation Extraction. CSCWD 2022: 1143-1148 - 2021
- [j11]Xu Liu, Weiyou Liu, Xiaoqiang Di, Jinqing Li, Binbin Cai, Weiwu Ren, Huamin Yang:
LogNADS: Network anomaly detection scheme based on log semantics representation. Future Gener. Comput. Syst. 124: 390-405 (2021) - [j10]Zhenlong Man, Jinqing Li, Xiaoqiang Di:
Medical image encryption scheme based on self-verification matrix. IET Image Process. 15(12): 2787-2798 (2021) - [j9]Zhenlong Man, Jinqing Li, Xiaoqiang Di, Xu Liu, Jian Zhou, Jia Wang, Xingxu Zhang:
A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multim. Tools Appl. 80(18): 27445-27469 (2021) - [c13]Jinqing Li, Xiaojun Chen, Dakui Wang, Yuwei Li:
Enhancing Label Representations with Relational Inductive Bias Constraint for Fine-Grained Entity Typing. IJCAI 2021: 3843-3849 - 2020
- [j8]Jian Zhou, Jinqing Li, Xiaoqiang Di:
A Novel Lossless Medical Image Encryption Scheme Based on Game Theory With Optimized ROI Parameters and Hidden ROI Position. IEEE Access 8: 122210-122228 (2020) - [j7]Jia Wang, Jinqing Li, Xiaoqiang Di, Jian Zhou, Zhenlong Man:
Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion. IEEE Access 8: 160004-160024 (2020) - [j6]Xu Liu, Xiaoqiang Di, Qiang Ding, Weiyou Liu, Hui Qi, Jinqing Li, Huamin Yang:
NADS-RA: Network Anomaly Detection Scheme Based on Feature Representation and Data Augmentation. IEEE Access 8: 214781-214800 (2020) - [c12]Jinqing Li, Dakui Wang, Xiaojun Chen, Pencheng Liao, Shujuan Chen:
A Shared-Word Sensitive Sequence-to-Sequence Features Extractor for Sentences Matching. ECAI 2020: 2070-2077 - [c11]Xu Liu, Xiaoqiang Di, Weiyou Liu, Xingxu Zhang, Hui Qi, Jinqing Li, Jianping Zhao, Huamin Yang:
NADSR: A Network Anomaly Detection Scheme Based on Representation. KSEM (1) 2020: 380-387
2010 – 2019
- 2019
- [j5]Zhenlong Man, Jinqing Li, Xiaoqiang Di, Ou Bai:
An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System. IEEE Access 7: 103047-103058 (2019) - [j4]Jinqing Li, Jun Ma:
Maximum penalized likelihood estimation of additive hazards models with partly interval censoring. Comput. Stat. Data Anal. 137: 170-180 (2019) - [j3]Hefei Jia, Xu Liu, Xiaoqiang Di, Hui Qi, Binbin Cai, Jinqing Li, Huamin Yang, Jianping Zhao:
A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks. J. Adv. Comput. Intell. Intell. Informatics 23(5): 898-908 (2019) - [c10]Ziyi Ma, Xiaoqiang Di, Jinqing Li, Ligang Cong, Ping Li:
MPTCP Based Load Balancing Mechanism in Software Defined Satellite Networks. WISATS (1) 2019: 294-302 - [c9]Hui Qi, Yue Wang, Jinyu Dai, Jinqing Li, Xiaoqiang Di:
Attention-Based Hybrid Model for Automatic Short Answer Scoring. SimuTools 2019: 385-394 - [i1]Xu Liu, Xiaoqiang Di, Jinqing Li, Huan Wang, Jianping Zhao, Huamin Yang, Ligang Cong:
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model. CoRR abs/1902.08712 (2019) - 2018
- [j2]Hui Qi, Xiaoqiang Di, Jinqing Li:
Formal definition and analysis of access control model based on role and attribute. J. Inf. Secur. Appl. 43: 53-60 (2018) - [c8]Hefei Jia, Xu Liu, Xiaoqiang Di, Hui Qi, Ligang Cong, Jinqing Li, Huamin Yang:
Security Strategy for Virtual Machine Allocation in Cloud Computing. IIKI 2018: 140-144 - 2017
- [c7]Xiaoqiang Di, Yingzheng Wang, Jinqing Li, Ligang Cong, Hui Qi, Yuxin Zhang:
An optimized video selective encryption algorithm. CISP-BMEI 2017: 1-5 - [c6]Jinqing Li, Xiaoqiang Di, Xingchen Liu, Xiaodong Chen:
Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform. CISP-BMEI 2017: 1-6 - [c5]Hui Qi, Xiaoqiang Di, Jinqing Li:
Heuristic Map Tiles Prefetch Strategy Based on Road Network Analysis. ISCID (2) 2017: 321-325 - 2016
- [c4]Xu Liu, Xiaoqiang Di, Jinqing Li, Hui Qi, Huamin Yang, Ligang Cong:
Optimal backup strategy in cloud disaster tolerance. CITS 2016: 1-5 - [c3]Hui Qi, Xiong Luo, Xiaoqiang Di, Jinqing Li, Huamin Yang, Zhengang Jiang:
Access Control Model Based on Role and Attribute and Its Implementation. CyberC 2016: 66-71 - [c2]Min Wang, Xiaoqiang Di, Yuming Jiang, Jinqing Li, Huilin Jiang, Huamin Yang:
End-to-End Stochastic QoS Performance Under Multi-layered Satellite Network. SINC 2016: 182-201 - 2013
- [j1]Jinqing Li, Fengming Bai, Xiaoqiang Di:
New color image encryption algorithm based on compound chaos mapping and hyperchaotic cellular neural network. J. Electronic Imaging 22(1): 013036 (2013) - 2011
- [c1]Jinqing Li, Fengming Bai:
A Distributed Cross-Realm Identification Scheme Based on Hyperchaos System. CSISE (2) 2011: 147-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint