default search action
Qi Zhong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Lieqing Lin, Qi Zhong, Jiasheng Qiu, Zhenyu Liang:
E-GRACL: an IoT intrusion detection system based on graph neural networks. J. Supercomput. 81(1): 42 (2025) - 2024
- [j11]Ivan Liu, Fangyuan Liu, Qi Zhong, Fei Ma, Shiguang Ni:
Your blush gives you away: detecting hidden mental states with remote photoplethysmography and thermal imaging. PeerJ Comput. Sci. 10: e1912 (2024) - [j10]Qi Zhong, Tiwei Jia, Enguang Xu, Zhenyu Yao, Yanbiao Li, Huayong Yang:
A Vibration-Based Measurement Method for Dynamic Characteristic of Solenoid Switching Valve. IEEE Trans. Instrum. Meas. 73: 1-10 (2024) - [j9]Qi Zhong, Junliang Shang, Qianqian Ren, Feng Li, Cui-Na Jiao, Jin-Xing Liu:
FSCME: A Feature Selection Method Combining Copula Correlation and Maximal Information Coefficient by Entropy Weights. IEEE J. Biomed. Health Informatics 28(9): 5638-5648 (2024) - [c20]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. AAAI 2024: 19902-19910 - [i9]Ivan Liu, Fangyuan Liu, Qi Zhong, Fei Ma, Shiguang Ni:
Your blush gives you away: detecting hidden mental states with remote photoplethysmography and thermal imaging. CoRR abs/2401.09145 (2024) - [i8]Ivan Liu, Fangyuan Liu, Qi Zhong, Shiguang Ni:
A Finger on the Pulse of Cardiovascular Health: Smartphone Photoplethysmography-Based Pulse Waveform Analysis for Blood Pressure Measurement. CoRR abs/2401.11117 (2024) - [i7]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. CoRR abs/2403.07673 (2024) - 2023
- [c19]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. AsiaCCS 2023: 925-937 - [c18]Yuankai Lin, Yulin Zhou, Kaiji Huang, Qi Zhong, Tao Cheng, Hua Yang, Zhouping Yin:
GelSplitter: Tactile Reconstruction from Near Infrared and Visible Images. ICIRA (7) 2023: 14-25 - [i6]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. CoRR abs/2304.08767 (2023) - [i5]Yuankai Lin, Yulin Zhou, Kaiji Huang, Qi Zhong, Tao Cheng, Hua Yang, Zhouping Yin:
GelSplitter: Tactile Reconstruction from Near Infrared and Visible Images. CoRR abs/2309.08096 (2023) - 2022
- [j8]Yi-Peng Liu, Qi Zhong, Ronghua Liang, Zhanqing Li, Haixia Wang, Peng Chen:
Layer Segmentation of OCT Fingerprints With an Adaptive Gaussian Prior Guided Transformer. IEEE Trans. Instrum. Meas. 71: 1-15 (2022) - [c17]Yuankai Lin, Tao Cheng, Qi Zhong, Wending Zhou, Hua Yang:
Dynamic Spatial Propagation Network for Depth Completion. AAAI 2022: 1638-1646 - [c16]Ivan Liu, Qi Zhong, Fangyuan Liu, Hushan Xu, Wenxi Chen, Xiaoqing Zhu, Yingbo Ma, Shiguang Ni:
Assessing Mental Health During Covid-19 Lockdown: A Smartphone-Based Multimodal Emotion Recognition Approach. CCHI 2022: 262-269 - [c15]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. ICME 2022: 1-6 - [c14]Bilal Hussain Abbasi, Qi Zhong, Leo Yu Zhang, Shang Gao, Antonio Robles-Kelly, Robin Doss:
A Generic Enhancer for Backdoor Attacks on Deep Neural Networks. ICONIP (7) 2022: 296-307 - [c13]Qi Zhong, Qian Wang, Ji Liu:
Combining Knowledge and Multi-modal Fusion for Meme Classification. MMM (1) 2022: 599-611 - [i4]Yuankai Lin, Tao Cheng, Qi Zhong, Wending Zhou, Hua Yang:
Dynamic Spatial Propagation Network for Depth Completion. CoRR abs/2202.09769 (2022) - [i3]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. CoRR abs/2204.01934 (2022) - [i2]Cheng-Yu Fang, Xian-Feng Han, Qi Zhong, Shi-Jie Sun, Guo-Qiang Xiao:
Learning to Generate Artistic Character Line Drawing. CoRR abs/2206.02998 (2022) - 2021
- [j7]Rui Zhong, Huaiyu Wu, Zhihuan Chen, Qi Zhong:
Fusion facial semantic feature and incremental learning mechanism for efficient face recognition. Soft Comput. 25(14): 9347-9363 (2021) - 2020
- [j6]Qi Zhong, Yuan Zhang, Jinguo Zhang, Kaixuan Shi, Yang Yu, Chang Liu:
Key Frame Extraction Algorithm of Motion Video Based on Priori. IEEE Access 8: 174424-174436 (2020) - [c12]Qi Zhong, Leo Yu Zhang, Jun Zhang, Longxiang Gao, Yong Xiang:
Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps. PAKDD (2) 2020: 462-474 - [c11]Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. TrustCom 2020: 402-409
2010 – 2019
- 2018
- [j5]Yining Liu, Qi Zhong, Ming Xie, Zu-Bin Chen:
A novel multiple-level secret image sharing scheme. Multim. Tools Appl. 77(5): 6017-6031 (2018) - [c10]Jianguo Sun, Qi Zhong, Liang Kou, Wenshan Wang, Qingan Da, Yun Lin:
A lightweight multi-factor mobile user authentication scheme. INFOCOM Workshops 2018: 831-836 - 2017
- [j4]Yi-Ning Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5): 250-255 (2017) - [j3]Yi-Ning Liu, Wei Guo, Qi Zhong, Gang Yao:
LVAP: Lightweight V2I authentication protocol using group communication in VANETs. Int. J. Commun. Syst. 30(16) (2017) - [i1]David Fifield, Lynn Tsai, Qi Zhong:
Detecting Censor Detection. CoRR abs/1709.08718 (2017) - 2016
- [j2]Qi Zhong, Zewen Liu:
Wideband attenuators using distributed resistors for attenuation up to 30 dB. IEICE Electron. Express 13(10): 20160321 (2016) - 2014
- [j1]Bili Chen, Wenhua Zeng, Yangbin Lin, Qi Zhong:
An Enhanced Differential Evolution Based Algorithm with Simulated Annealing for Solving Multiobjective Optimization Problems. J. Appl. Math. 2014: 931630:1-931630:13 (2014) - [c9]Qi Zhong, Jing Wang, Keyi Wang:
Object-centric bank partition for reducing memory interference in CMP systems. Conf. Computing Frontiers 2014: 30:1-30:2 - 2013
- [c8]Tao Huang, Jing Wang, Xuetao Guan, Qi Zhong, Keyi Wang:
Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore Systems. TrustCom/ISPA/IUCC 2013: 1153-1160 - 2012
- [c7]Qi Zhong, Zhongjin Zhang, Danqing Yan, Erwen Jin, Xuelian Yu:
Airport Runway FOD Detection Based on LFMCW Radar Using Interpolated FFT and CLEAN. CIT 2012: 747-750 - [c6]Qi Zhong, Xuetao Guan, Tao Huang, Xu Cheng, Keyi Wang:
Affinity-aware DMA buffer management for reducing off-chip memory access. SAC 2012: 1588-1593 - [c5]Tao Huang, Qi Zhong, Xuetao Guan, Xiaoyin Wang, Xu Cheng, Keyi Wang:
Reducing last level cache pollution through OS-level software-controlled region-based partitioning. SAC 2012: 1779-1784
2000 – 2009
- 2006
- [c4]Qi Zhong, Iosif Lazaridis, Mayur Deshpande, Chen Li, Sharad Mehrotra, Hal S. Stern:
Supporting Approximate Similarity Queries with Quality Guarantees in P2P Systems. COMAD 2006: 60-71 - [c3]Yiming Ma, Sharad Mehrotra, Dawit Yimam Seid, Qi Zhong:
RAF: An Activation Framework for Refining Similarity Queries Using Learning Techniques. DASFAA 2006: 587-601 - 2004
- [c2]Yiming Ma, Qi Zhong, Sharad Mehrotra, Dawit Yimam Seid:
A framework for refining similarity queries using learning techniques. CIKM 2004: 158-159 - [c1]Chen Li, Jia Li, Qi Zhong:
RACCOON: A Peer-Based System for Data Integration and Sharing. ICDE 2004: 852
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint