default search action
Qinglong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Qinglong Wang, Yongjian Li, Shihao Cui, Na Li, Xinchun Zhang, Wenqiang Jiang, Wen Peng, Jie Sun:
Enhanced recognition of insulator defects on power transmission lines via proposal-based detection model with integrated improvement methods. Eng. Appl. Artif. Intell. 136: 109078 (2024) - [j32]Qinglong Wang, Jie Sun, Yunjian Hu, Wenqiang Jiang, Xinchun Zhang, Zhangqi Wang:
Deep learning-based flatness prediction via multivariate industrial data for steel strip during tandem cold rolling. Expert Syst. Appl. 237(Part C): 121777 (2024) - [j31]Qinglong Wang, Qianqian Wang, Zhipeng Ning, Kai Fung Chan, Jialin Jiang, Yuqiong Wang, Lin Su, Shuai Jiang, Ben Wang, Bonaventure Yiu Ming Ip, Ho Ko, Thomas Wai Hong Leung, Philip Wai Yan Chiu, Simon Chun-Ho Yu, Li Zhang:
Tracking and navigation of a microswarm under laser speckle contrast imaging for targeted delivery. Sci. Robotics 9(87) (2024) - [j30]Ning Liu, Qinglong Wang, Weizhi Nai, Xiaoying Sun:
Haptic Feedback Relative Fidelity Measure for Stylus Writing Based on Triplet-CNN. IEEE Trans. Instrum. Meas. 73: 1-12 (2024) - [j29]Yan Zhan, Xiaoying Sun, Qinglong Wang, Weizhi Nai:
Method for Audio-to-Tactile Cross-Modality Generation Based on Residual U-Net. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j28]Na Fan, Chase Wu, Slimane Benabdallah, Jialong Li, Yuxin Gao, Qinglong Wang:
On a security scheme against collusive attacks in vehicular ad hoc networks. Veh. Commun. 49: 100821 (2024) - 2023
- [j27]Xiangjia Meng, Yaxin Sun, Qinglong Wang, Jing Ren, Xiangji Cai, Artur Czerwinski:
Dephasing Dynamics in a Non-Equilibrium Fluctuating Environment. Entropy 25(4): 634 (2023) - [j26]Qinglong Wang, YongYong Li, Zhiqiang Tan, Na Fan, GuDi Yao:
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms. J. Inf. Secur. Appl. 78: 103616 (2023) - [j25]Wenwen Zhang, Zhijun Liu, Qinglong Wang:
A higher-order noise perturbed predator-prey system with fear effect and mixed functional responses. J. Appl. Math. Comput. 69(5): 3999-4021 (2023) - [c15]Qinglong Wang, Runzhe Wang, Yuxi Hu, Xiaohai Shi, Zheng Liu, Tao Ma, Houbing Song, Heyuan Shi:
KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization. ISSTA 2023: 1487-1490 - [i17]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. CoRR abs/2309.14122 (2023) - 2022
- [j24]Qinglong Wang, Xiaoying Sun, Dekun Cao, Guohong Liu:
Enhanced Interactive Performance of Zoom-In/Out Gestures Using Electrostatic Tactile Feedback on Touchscreens. Comput. J. 65(2): 261-274 (2022) - [j23]Yong Yang, Hao Li, Shudan Deng, Xue Yang, Mingxia Wang, Wenfeng Tan, Zhengyu Wu, Qinglong Wang, Yuzhi Zhou:
Prediction and analysis of the soil organic matter distribution with the spatiotemporal kriging method. Earth Sci. Informatics 15(3): 1621-1633 (2022) - [j22]Qian Jiang, Zhijun Liu, Qinglong Wang, Ronghua Tan, Lianwen Wang:
Two delayed commensalism models with noise coupling and interval biological parameters. J. Appl. Math. Comput. 68(2): 979-1011 (2022) - [j21]Baoyu Liang, Chao Tong, Chao Lang, Qinglong Wang, Joel J. P. C. Rodrigues, Sergei A. Kozlov:
Protecting image privacy through adversarial perturbation. Multim. Tools Appl. 81(24): 34759-34774 (2022) - [j20]Lidong Yang, Jialin Jiang, Xiaojie Gao, Qinglong Wang, Qi Dou, Li Zhang:
Autonomous environment-adaptive microrobot swarm navigation enabled by deep learning-based real-time distribution planning. Nat. Mach. Intell. 4(5): 480-493 (2022) - [c14]Runzhe Wang, Qinglong Wang, Yuxi Hu, Heyuan Shi, Yuheng Shen, Yu Zhan, Ying Fu, Zheng Liu, Xiaohai Shi, Yu Jiang:
Industry practice of configuration auto-tuning for cloud applications and services. ESEC/SIGSOFT FSE 2022: 1555-1565 - 2021
- [j19]Kaixuan Zhang, Qinglong Wang, C. Lee Giles:
An Entropy Metric for Regular Grammar Classification and Learning with Recurrent Neural Networks. Entropy 23(1): 127 (2021) - [j18]Hai Lu, Liping Shao, Qinglong Wang:
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications. Int. J. Digit. Crime Forensics 13(6): 1-23 (2021) - [j17]Jabar Mahmood, Zongtao Duan, Yun Yang, Qinglong Wang, Jamel Nebhen, Muhammad Nasir Mumtaz Bhutta:
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures. Secur. Commun. Networks 2021: 9997771:1-9997771:20 (2021) - [j16]Weizhi Nai, Jianyu Liu, Chongyang Sun, Qinglong Wang, Guohong Liu, Xiaoying Sun:
Vibrotactile Feedback Rendering of Patterned Textures Using a Waveform Segment Table Method. IEEE Trans. Haptics 14(4): 849-861 (2021) - 2020
- [j15]Qinglong Wang, Min Ou, Yun Yang, Zongtao Duan:
Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks. IEEE Access 8: 217592-217602 (2020) - [j14]Xing Lu, Jie Sun, Zhixin Song, Guangtao Li, Zhenhua Wang, Yunjian Hu, Qinglong Wang, Dian-hua Zhang:
Prediction and analysis of cold rolling mill vibration based on a data-driven method. Appl. Soft Comput. 96: 106706 (2020) - [j13]Kaixuan Zhang, Qinglong Wang, Xue Liu, C. Lee Giles:
Shapley Homology: Topological Analysis of Sample Influence for Neural Networks. Neural Comput. 32(7): 1355-1378 (2020) - [c13]Kaixuan Zhang, Qinglong Wang, C. Lee Giles:
Adversarial Models for Deterministic Finite Automata. Canadian AI 2020: 540-552 - [c12]Kaixuan Zhang, Qinglong Wang, C. Lee Giles:
Deep Learning, Grammar Transfer, and Transportation Theory. ECML/PKDD (2) 2020: 609-623
2010 – 2019
- 2019
- [j12]Qinglong Wang, Rui Qiao, Zongtao Duan:
针对车联网认证方案CPAV和ABV的安全分析 (Security Analysis on VANETs Authentication Schemes: CPAV and ABV). 计算机科学 46(4): 177-182 (2019) - [c11]Chen Ma, Peng Kang, Bin Wu, Qinglong Wang, Xue Liu:
Gated Attentive-Autoencoder for Content-Aware Recommendation. WSDM 2019: 519-527 - [i16]Kaixuan Zhang, Qinglong Wang, Xue Liu, C. Lee Giles:
Shapley Homology: Topological Analysis of Sample Influence for Neural Networks. CoRR abs/1910.06509 (2019) - [i15]Qinglong Wang, Kaixuan Zhang, Xue Liu, C. Lee Giles:
Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata. CoRR abs/1911.04644 (2019) - [i14]Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan:
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks. IACR Cryptol. ePrint Arch. 2019: 469 (2019) - 2018
- [j11]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks. Neural Comput. 30(9) (2018) - [c10]Chen Ma, Yingxue Zhang, Qinglong Wang, Xue Liu:
Point-of-Interest Recommendation: Exploiting Self-Attentive Autoencoders with Neighbor-Aware Influence. CIKM 2018: 697-706 - [c9]Wenbo Guo, Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Sui Huang, Xue Liu, C. Lee Giles, Lin Lin, Xinyu Xing:
Defending Against Adversarial Samples Without Security through Obscurity. ICDM 2018: 137-146 - [i13]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity. CoRR abs/1801.05420 (2018) - [i12]Qinglong Wang:
Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks. CoRR abs/1802.04931 (2018) - [i11]Yan Shen, Zhonghao Sun, Qinglong Wang:
When Renewable Energy Meets Building Thermal Mass: A Real-time Load Management Scheme. CoRR abs/1802.08047 (2018) - [i10]Chen Ma, Yingxue Zhang, Qinglong Wang, Xue Liu:
Point-of-Interest Recommendation: Exploiting Self-Attentive Autoencoders with Neighbor-Aware Influence. CoRR abs/1809.10770 (2018) - [i9]Qinglong Wang, Kaixuan Zhang, Xue Liu, C. Lee Giles:
Verification of Recurrent Neural Networks Through Rule Extraction. CoRR abs/1811.06029 (2018) - [i8]Chen Ma, Peng Kang, Bin Wu, Qinglong Wang, Xue Liu:
Gated Attentive-Autoencoder for Content-Aware Recommendation. CoRR abs/1812.02869 (2018) - 2017
- [j10]Qinglong Wang, Zhijun Liu:
Existence and stability of positive almost periodic solutions for a competitive system on time scales. Math. Comput. Simul. 138: 65-77 (2017) - [j9]Saiwen Wu, Xiaoying Sun, Qinglong Wang, Jian Chen:
Tactile modeling and rendering image-textures based on electrovibration. Vis. Comput. 33(5): 637-646 (2017) - [c8]Qinglong Wang, Xiangshi Ren, Xiaoying Sun:
Enhancing Pen-based Interaction using Electrovibration and Vibration Haptic Feedback. CHI 2017: 3746-3750 - [c7]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
Adversary Resistant Deep Neural Networks with an Application to Malware Detection. KDD 2017: 1145-1153 - [c6]Andy Sun, Wei Gong, Ryan Shea, Jiangchuan Liu, Xue (Steve) Liu, Qinglong Wang:
Drone privacy shield: A WiFi based defense. PIMRC 2017: 1-5 - [i7]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Recurrent Neural Network Rule Extraction. CoRR abs/1709.10380 (2017) - 2016
- [j8]Qinglong Wang, Xue Liu, Jian Du, Fanxin Kong:
Smart Charging for Electric Vehicles: A Survey From the Algorithmic Perspective. IEEE Commun. Surv. Tutorials 18(2): 1500-1517 (2016) - [c5]Fanxin Kong, Xue Liu, Zhonghao Sun, Qinglong Wang:
Smart Rate Control and Demand Balancing for Electric Vehicle Charging. ICCPS 2016: 4:1-4:10 - [c4]Qinglong Wang, Xiangshi Ren, Xiaoying Sun:
EV-pen: an electrovibration haptic feedback pen for touchscreens. SIGGRAPH ASIA Emerging Technologies 2016: 8:1-8:2 - [c3]Qinglong Wang, Xiangshi Ren, Sayan Sarcar, Xiaoying Sun:
EV-Pen: Leveraging Electrovibration Haptic Feedback in Pen Interaction. ISS 2016: 57-66 - [i6]Qinglong Wang, Xue Liu, Jian Du, Fanxin Kong:
Smart Charging for Electric Vehicles: A Survey From the Algorithmic Perspective. CoRR abs/1607.07298 (2016) - [i5]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Xinyu Xing, C. Lee Giles, Xue Liu:
Random Feature Nullification for Adversary Resistant Deep Architecture. CoRR abs/1610.01239 (2016) - [i4]Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong:
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks. CoRR abs/1610.01934 (2016) - [i3]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, C. Lee Giles, Xue Liu:
Learning Adversary-Resistant Deep Neural Networks. CoRR abs/1612.01401 (2016) - 2015
- [j7]Qinglong Wang, Xiangmo Zhao:
随机背包公钥密码的分析与改进 (Analysis and Improvement of Public Key Cryptosystem Using Random Knapsacks). 计算机科学 42(6): 158-161 (2015) - [j6]Ning Xia, Qinglong Wang, Lin Liu:
Nanomaterials-Based Optical Techniques for the Detection of Acetylcholinesterase and Pesticides. Sensors 15(1): 499-514 (2015) - [c2]Qinglong Wang, Amir Yahyavi, Bettina Kemme, Wenbo He:
I know what you did on your smartphone: Inferring app usage over encrypted data traffic. CNS 2015: 433-441 - [i2]Qinglong Wang:
Efficient k-out-of-n oblivious transfer protocol. IACR Cryptol. ePrint Arch. 2015: 218 (2015) - 2014
- [j5]Zhijun Liu, Qinglong Wang:
An almost periodic competitive system subject to impulsive perturbations. Appl. Math. Comput. 231: 377-385 (2014) - [j4]Qinglong Wang, Jintai Ding:
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. Cryptologia 38(4): 370-376 (2014) - [j3]Ronghua Tan, Zuxiong Li, Qinglong Wang, Zhijun Liu:
Positive Periodic Solutions of a Periodic Discrete Competitive System Subject to Feedback Controls. J. Appl. Math. 2014: 927626:1-927626:10 (2014) - 2013
- [j2]Qinglong Wang, Zhijun Liu:
Uniformly Asymptotic Stability of Positive Almost Periodic Solutions for a Discrete Competitive System. J. Appl. Math. 2013: 182158:1-182158:9 (2013) - [j1]Qinglong Wang, Zhijun Liu, Zuxiong Li:
Positive Almost Periodic Solutions for a Discrete Competitive System Subject to Feedback Controls. J. Appl. Math. 2013: 429163:1-429163:14 (2013) - 2012
- [i1]Qinglong Wang, Li Xu:
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol. IACR Cryptol. ePrint Arch. 2012: 478 (2012) - 2010
- [c1]Ying Cai, Qinglong Wang:
Certificates Distributed Storage Scheme in the Trust Management System. IIH-MSP 2010: 490-493
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint