default search action
Peng Qian
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Lei Yang, Keju Liu, Ruisi Ou, Peng Qian, Yunjie Wu, Zhuang Tian, Changping Zhu, Sining Feng, Fan Yang:
Surface Defect-Extended BIM Generation Leveraging UAV Images and Deep Learning. Sensors 24(13): 4151 (2024) - [c58]Vu San Ha Huynh, Peng Qian, Ning Wang, Carl C. Udora, Rahim Tafazolli:
User-Intent Aware Transport-Layer Intelligence for Frame Synchronisation in Multi-Party XR Application. GEM 2024: 1-6 - [c57]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-Image Backdoor Attacks. ICANN (10) 2024: 187-202 - [c56]Jingxuan Men, Ning Wang, Yi Ma, Peng Qian, Carl C. Udora, Mike Nilsson:
Spatial-temporal Semantic Communications for Point Cloud-based Volumetric Media. ICC 2024: 4704-4710 - [c55]Carl C. Udora, Peng Qian, Sweta Anmulwar, Anil Fernando, Ning Wang:
Quality of Experience Modelling and Analysis for Live Holographic Teleportation. ICNC 2024: 598-604 - [c54]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. ICDE 2024: 1972-1985 - [c53]Peng Qian, Ning Wang, Chuan Heng Foh, Jia Zhang, Carl C. Udora, Rahim Tafazolli:
Enabling eBPF-based packet duplication for robust volumetric video streaming. ISCC 2024: 1-7 - [c52]Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185 - [c51]Peng Qian, Ning Wang, Chuan Heng Foh, Carl C. Udora, Rahim Tafazolli:
Enabling User Intent-based Network Path Adaptation for Live Volumetric Streaming. IFIP Networking 2024: 395-403 - [i22]Ningyu Xu, Qi Zhang, Menghan Zhang, Peng Qian, Xuanjing Huang:
On the Tip of the Tongue: Analyzing Conceptual Representation in Large Language Models with Reverse-Dictionary Probe. CoRR abs/2402.14404 (2024) - [i21]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-image Backdoor Attacks. CoRR abs/2403.15010 (2024) - 2023
- [j28]Xiaoxiao Wang, Lin Zhang, Nanzhen Yao, Peng Qian:
Depth Image Hashing Algorithm Based on Local Global Feature Fusion. IEEE Access 11: 123373-123381 (2023) - [j27]Hua Xu, Xiaofei Chen, Peng Qian, Fufeng Li:
A two-stage segmentation of sublingual veins based on compact fully convolutional networks for Traditional Chinese Medicine images. Health Inf. Sci. Syst. 11(1): 19 (2023) - [j26]Lei Yang, Fangshuo Zhang, Fan Yang, Peng Qian, Quankai Wang, Yunjie Wu, Keli Wang:
Generating Topologically Consistent BIM Models of Utility Tunnels from Point Clouds. Sensors 23(14): 6503 (2023) - [j25]Lingling Lu, Zhenyu Wen, Ye Yuan, Binru Dai, Peng Qian, Changting Lin, Qinming He, Zhenguang Liu, Jianhai Chen, Rajiv Ranjan:
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform. IEEE Trans. Dependable Secur. Comput. 20(6): 4578-4592 (2023) - [j24]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. IEEE Trans. Inf. Forensics Secur. 18: 1237-1251 (2023) - [j23]Zhenguang Liu, Peng Qian, Xiaoyang Wang, Yuan Zhuang, Lin Qiu, Xun Wang:
Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection. IEEE Trans. Knowl. Data Eng. 35(2): 1296-1310 (2023) - [j22]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Software Eng. 49(7): 3793-3810 (2023) - [c50]Yufeng Xu, Lun Zhang, Turan Vural, Peng Qian, Yanbin Wang, Yuqing Fan, Ming Li, Xueyan Tang, Zheng Cao:
STFN: Spatio-Temporal Fusion Network to Detect Ethereum Phishing Scams. EITCE 2023: 599-605 - [c49]Sonia K. Murthy, Kiera Parece, Sophie Bridgers, Peng Qian, Tomer D. Ullman:
Comparing the Evaluation and Production of Loophole Behavior in Humans and Large Language Models. EMNLP (Findings) 2023: 4010-4025 - [c48]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. ICDE 2023: 1747-1760 - [c47]Peng Qian, Zhenguang Liu, Yifang Yin, Qinming He:
Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode. WWW 2023: 2220-2229 - [i20]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. CoRR abs/2301.03943 (2023) - [i19]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. CoRR abs/2304.12645 (2023) - [i18]Peng Qian, Rui Cao, Zhenguang Liu, Wenqing Li, Ming Li, Lun Zhang, Yufeng Xu, Jianhai Chen, Qinming He:
Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair. CoRR abs/2309.02391 (2023) - [i17]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. CoRR abs/2312.04512 (2023) - 2022
- [j21]Peng Qian, Vu San Ha Huynh, Ning Wang, Sweta Anmulwar, De Mi, Rahim Tafazolli:
Remote Production for Live Holographic Teleportation Applications in 5G Networks. IEEE Trans. Broadcast. 68(2): 451-463 (2022) - [c46]Peng Qian, Roger Levy:
Flexible Generation from Fragmentary Linguistic Input. ACL (1) 2022: 8176-8196 - [c45]Jili Sun, Zheng Chen, Hao Yu, Peng Qian, Dahai Zhang, Yulin Si:
Multi-Objective Offshore Wind Farm Wake Redirection Optimization for Power Maximization and Load Reduction. ACC 2022: 5235-5240 - [c44]Peng Qian, Edward Gibson, Roger Levy:
Rational Inference from Number Agreement Mismatch. CogSci 2022 - [c43]Xiaofei Chen, Hua Xu, Peng Qian, Yunfeng Xu, Fufeng Li, Shengwang Li:
Multi-kernel Convolutional Neural Network for Wrist Pulse Signal Classification. FRUCT 2022: 75-86 - [c42]Peng Qian, Ning Wang, Rahim Tafazolli:
User Intent Driven Path Switching in Video Delivery - An Edge Computing Based Approach. INFOCOM Workshops 2022: 1-6 - [c41]Mycal Tucker, Tiwalayo Eisape, Peng Qian, Roger Levy, Julie Shah:
When Does Syntax Mediate Neural Language Model Performance? Evidence from Dropout Probes. NAACL-HLT 2022: 5393-5408 - [i16]Mycal Tucker, Tiwalayo Eisape, Peng Qian, Roger Levy, Julie Shah:
When Does Syntax Mediate Neural Language Model Performance? Evidence from Dropout Probes. CoRR abs/2204.09722 (2022) - [i15]Peng Qian, Zhenguang Liu, Qinming He, Butian Huang, Duanzheng Tian, Xun Wang:
Smart Contract Vulnerability Detection Technique: A Survey. CoRR abs/2209.05872 (2022) - [i14]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. CoRR abs/2211.14582 (2022) - 2021
- [j20]Manhua Liu, Peng Qian:
Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets. IEEE Trans. Inf. Forensics Secur. 16: 1709-1719 (2021) - [c40]Mycal Tucker, Peng Qian, Roger Levy:
What if This Modified That? Syntactic Interventions with Counterfactual Embeddings. ACL/IJCNLP (Findings) 2021: 862-875 - [c39]Peng Qian, Tahira Naseem, Roger Levy, Ramón Fernandez Astudillo:
Structural Guidance for Transformer Language Models. ACL/IJCNLP (1) 2021: 3735-3745 - [c38]Yiwen Wang, Jennifer Hu, Roger Levy, Peng Qian:
Controlled Evaluation of Grammatical Knowledge in Mandarin Chinese Language Models. EMNLP (1) 2021: 5604-5620 - [c37]Ting Yang, Serdar Vural, Peng Qian, Yogaratnam Rahulan, Ning Wang, Rahim Tafazolli:
Achieving Robust Performance for Traffic Classification Using Ensemble Learning in SDN Networks. ICC 2021: 1-6 - [c36]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. IJCAI 2021: 2751-2759 - [i13]Mycal Tucker, Peng Qian, Roger Levy:
What if This Modified That? Syntactic Interventions via Counterfactual Embeddings. CoRR abs/2105.14002 (2021) - [i12]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. CoRR abs/2106.09282 (2021) - [i11]Zhenguang Liu, Peng Qian, Xiaoyang Wang, Yuan Zhuang, Lin Qiu, Xun Wang:
Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection. CoRR abs/2107.11598 (2021) - [i10]Peng Qian, Tahira Naseem, Roger Levy, Ramón Fernandez Astudillo:
Structural Guidance for Transformer Language Models. CoRR abs/2108.00104 (2021) - [i9]Yiwen Wang, Jennifer Hu, Roger Levy, Peng Qian:
Controlled Evaluation of Grammatical Knowledge in Mandarin Chinese Language Models. CoRR abs/2109.11058 (2021) - 2020
- [j19]Peng Qian, Zhenguang Liu, Qinming He, Roger Zimmermann, Xun Wang:
Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models. IEEE Access 8: 19685-19695 (2020) - [j18]Yulin Si, Zheng Chen, Jili Sun, Dahai Zhang, Peng Qian:
A Data-Driven Fault Detection Framework Using Mahalanobis Distance Based Dynamic Time Warping. IEEE Access 8: 108359-108370 (2020) - [c35]Jon Gauthier, Jennifer Hu, Ethan Wilcox, Peng Qian, Roger Levy:
SyntaxGym: An Online Platform for Targeted Evaluation of Language Models. ACL (demo) 2020: 70-76 - [c34]Jennifer Hu, Jon Gauthier, Peng Qian, Ethan Wilcox, Roger Levy:
A Systematic Assessment of Syntactic Generalization in Neural Language Models. ACL 2020: 1725-1744 - [c33]Ethan Wilcox, Jon Gauthier, Jennifer Hu, Peng Qian, Roger Levy:
On the Predictive Power of Neural Language Models for Human Real-Time Comprehension Behavior. CogSci 2020 - [c32]Xijie Huang, Peng Qian, Manhua Liu:
Latent Fingerprint Image Enhancement Based on Progressive Generative Adversarial Network. CVPR Workshops 2020: 3481-3489 - [c31]Ethan Wilcox, Peng Qian, Richard Futrell, Ryosuke Kohita, Roger Levy, Miguel Ballesteros:
Structural Supervision Improves Few-Shot Learning and Syntactic Generalization in Neural Language Models. EMNLP (1) 2020: 4640-4652 - [c30]Yuan Zhuang, Zhenguang Liu, Peng Qian, Qi Liu, Xiang Wang, Qinming He:
Smart Contract Vulnerability Detection using Graph Neural Network. IJCAI 2020: 3283-3290 - [i8]Jennifer Hu, Jon Gauthier, Peng Qian, Ethan Wilcox, Roger P. Levy:
A Systematic Assessment of Syntactic Generalization in Neural Language Models. CoRR abs/2005.03692 (2020) - [i7]Ethan Gotlieb Wilcox, Jon Gauthier, Jennifer Hu, Peng Qian, Roger Levy:
On the Predictive Power of Neural Language Models for Human Real-Time Comprehension Behavior. CoRR abs/2006.01912 (2020) - [i6]Ethan Wilcox, Peng Qian, Richard Futrell, Ryosuke Kohita, Roger Levy, Miguel Ballesteros:
Structural Supervision Improves Few-Shot Learning and Syntactic Generalization in Neural Language Models. CoRR abs/2010.05725 (2020)
2010 – 2019
- 2019
- [j17]Peng Qian, Yan Guo, Ning Li, Zhengqin Xu:
Block Variational Bayesian Algorithm for Multiple Target Localization With Unknown and Time-Varying Transmit Powers in WSNs. IEEE Access 7: 54796-54808 (2019) - [j16]Peng Qian, Yan Guo, Ning Li, Sixing Yang:
Variational Bayesian Inference-Based Multiple Target Localization in WSNs With Quantized Received Signal Strength. IEEE Access 7: 60228-60241 (2019) - [j15]Sixing Yang, Yan Guo, Ning Li, Peng Qian:
Compressive Sensing Based Device-Free Multi-Target Localization Using Quantized Measurement. IEEE Access 7: 73172-73181 (2019) - [j14]Xiaoxiang Song, Yan Guo, Ning Li, Peng Qian:
A novel approach for missing data prediction in coevolving time series. Computing 101(11): 1565-1584 (2019) - [j13]Yan Guo, Peng Qian, Ning Li:
Several Bits Are Enough: Off-Grid Target Localization in WSNs Using Variational Bayesian EM Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(7): 926-929 (2019) - [j12]Sixing Yang, Yan Guo, Dongping Yu, Peng Qian:
Device-Free Targets Tracking with Sparse Sampling: A Kronecker Compressive Sensing Approach. IEICE Trans. Commun. 102-B(10): 1951-1959 (2019) - [j11]Peng Qian, Xiandong Ma, Dahai Zhang, Junheng Wang:
Data-Driven Condition Monitoring Approaches to Improving Power Output of Wind Turbines. IEEE Trans. Ind. Electron. 66(8): 6012-6020 (2019) - [c29]Chao Wan, Yue Zhang, Chunming Xia, Peng Qian, Yiqin Wang:
Fissured Tongue Image Recognition Based on Support Vector Machine. CISP-BMEI 2019: 1-5 - [c28]Peng Qian, Zhenguang Liu, Xun Wang, Jianhai Chen, Bei Wang, Roger Zimmermann:
Digital Resource Rights Confirmation and Infringement Tracking Based on Smart Contracts. CCIS 2019: 62-67 - [c27]Peng Qian, Luke B. Hewitt, Josh Tenenbaum, Roger Levy:
Inferring Structured Visual Concepts from Minimal Data. CogSci 2019: 2620-2626 - [c26]Aixiu An, Peng Qian, Ethan Wilcox, Roger Levy:
Representation of Constituents in Neural Language Models: Coordination Phrase as a Case Study. EMNLP/IJCNLP (1) 2019: 2888-2899 - [c25]Peng Qian, Aojie Li, Manhua Liu:
Latent Fingerprint Enhancement Based on DenseUNet. ICB 2019: 1-6 - [c24]Bo Feng, Dahai Zhang, Yulin Si, Xiange Tian, Peng Qian:
A condition monitoring method of wind turbines based on Long Short-Term Memory neural network. ICAC 2019: 1-4 - [c23]Richard Futrell, Ethan Wilcox, Takashi Morita, Peng Qian, Miguel Ballesteros, Roger Levy:
Neural language models as psycholinguistic subjects: Representations of syntactic state. NAACL-HLT (1) 2019: 32-42 - [c22]Ethan Wilcox, Peng Qian, Richard Futrell, Miguel Ballesteros, Roger Levy:
Structural Supervision Improves Learning of Non-Local Grammatical Dependencies. NAACL-HLT (1) 2019: 3302-3312 - [i5]Ethan Wilcox, Peng Qian, Richard Futrell, Miguel Ballesteros, Roger Levy:
Structural Supervision Improves Learning of Non-Local Grammatical Dependencies. CoRR abs/1903.00943 (2019) - [i4]Richard Futrell, Ethan Wilcox, Takashi Morita, Peng Qian, Miguel Ballesteros, Roger Levy:
Neural Language Models as Psycholinguistic Subjects: Representations of Syntactic State. CoRR abs/1903.03260 (2019) - [i3]Aixiu An, Peng Qian, Ethan Wilcox, Roger Levy:
Representation of Constituents in Neural Language Models: Coordination Phrase as a Case Study. CoRR abs/1909.04625 (2019) - 2018
- [j10]Peng Qian, Ning Wang, Rahim Tafazolli:
Achieving Robust Mobile Web Content Delivery Performance Based on Multiple Coordinated QUIC Connections. IEEE Access 6: 11313-11328 (2018) - [j9]Peng Qian, Yan Guo, Ning Li, Dagang Fang:
Compressive Sensing Based Multiple Source Localization in the Presence of Sensor Position Uncertainty and Nonuniform Noise. IEEE Access 6: 36571-36583 (2018) - [j8]Yan Guo, Sixing Yang, Ning Li, Baoming Sun, Peng Qian:
非基于测距的压缩感知多测量向量目标定位 (Range-free Localization Based on Compressive Sensing Using Multiple Measurement Vectors). 计算机科学 45(7): 99-103 (2018) - [j7]Sixing Yang, Yan Guo, Ning Li, Baoming Sun, Peng Qian:
基于数据融合的压缩感知多目标定位算法 (Compressive Sensing Multi-target Localization Algorithm Based on Data Fusion). 计算机科学 45(9): 161-165 (2018) - [c21]Xue Li, Zhiyue Fu, Peng Qian, Lijuan Wang, Hongkai Zhang, Xiaofang Zhou, Wenqiang Zhang, Fufeng Li:
Computerized Wrist pulse signal Diagnosis using Gradient Boosting Decision Tree. BIBM 2018: 1941-1947 - 2017
- [j6]Yan Guo, Baoming Sun, Ning Li, Peng Qian:
Compressive Sensing Meets Dictionary Mismatch: Taylor Approximation-Based Adaptive Dictionary Algorithm for Multiple Target Localization in WSNs. IEICE Trans. Commun. 100-B(8): 1397-1405 (2017) - [j5]Peng Qian, Yan Guo, Ning Li, Baoming Sun:
Leveraging Compressive Sensing for Multiple Target Localization and Power Estimation in Wireless Sensor Networks. IEICE Trans. Commun. 100-B(8): 1428-1435 (2017) - [c20]Peng Qian, Ning Wang, Gerry Foster, Rahim Tafazolli:
Enabling context-aware HTTP with mobile edge hint. CCNC 2017: 420-426 - [c19]Peng Qian, Ning Wang, BongHwan Oh, Chang Ge, Rahim Tafazolli:
Optimization of Webpage Downloading Performance with Content-aware Mobile Edge Computing. MECOMM@SIGCOMM 2017: 31-36 - 2016
- [j4]Peng Qian, Yan Guo, Ning Li, Baoming Sun:
基于压缩感知的多目标定位与功率估计 (Compressive Sensing Based Target Localization and Power Estimation). 计算机科学 43(3): 103-106 (2016) - [j3]Yan Guo, Peng Qian, Ning Li, Baoming Sun:
基于压缩感知的多目标定位中的测量矩阵设计 (Measurement Matrix Design for Multiple Target Localization Based on Compressive Sensing). 计算机科学 43(11): 160-163 (2016) - [c18]Peng Qian, Xipeng Qiu, Xuanjing Huang:
Investigating Language Universal and Specific Properties in Word Embeddings. ACL (1) 2016 - [c17]Peng Qian, Xipeng Qiu, Xuanjing Huang:
A New Psychometric-inspired Evaluation Metric for Chinese Word Segmentation. ACL (1) 2016 - [c16]Wei-jie Gu, Wu Zheng, Peng Qian, Wei-Fei Xu, Guo-Ping Liu, Jianjun Yan, Tao Zhong, Yan Liu:
Tongue, complexion and pulse research of Chronic Gastritis based on spectral clustering and modularity. BIBM 2016: 1346-1349 - [c15]Peng Qian, Xipeng Qiu, Xuanjing Huang:
Analyzing Linguistic Knowledge in Sequential Model of Sentence. EMNLP 2016: 826-835 - [c14]Peng Qian, Xipeng Qiu, Xuanjing Huang:
Bridging LSTM Architecture and the Neural Dynamics during Reading. IJCAI 2016: 1953-1959 - [c13]Xipeng Qiu, Peng Qian, Zhan Shi:
Overview of the NLPCC-ICCPOL 2016 Shared Task: Chinese Word Segmentation for Micro-Blog Texts. NLPCC/ICCPOL 2016: 901-906 - [i2]Peng Qian, Xipeng Qiu, Xuanjing Huang:
Bridging LSTM Architecture and the Neural Dynamics during Reading. CoRR abs/1604.06635 (2016) - 2015
- [c12]Kan-Heng Zhou, Peng Qian, Chunming Xia, Yiqin Wang:
The Development of a New Three-channel Self-pressurized Wrist Pulse Acquisition System. BIODEVICES 2015: 23-28 - [c11]Kan-Heng Zhou, Peng Qian, Chun-Ming Xia, Yi-Qin Wang:
Research on a Novel Three-Channel Self-pressurized Wrist Pulse Acquisition System. BIOSTEC (Selected Papers) 2015: 49-59 - [c10]Peng Qian, Xiandong Ma, Yifei Wang:
Condition monitoring of wind turbines based on extreme learning machine. ICAC 2015: 1-6 - [c9]Xipeng Qiu, Peng Qian, Liusong Yin, Shiyu Wu, Xuanjing Huang:
Overview of the NLPCC 2015 Shared Task: Chinese Word Segmentation and POS Tagging for Micro-blog Texts. NLPCC 2015: 541-549 - [c8]Peng Qian, Yan Guo, Ning Li, Baoming Sun:
Multiple target localization and power estimation in wireless sensor networks using compressive sensing. WCSP 2015: 1-5 - [i1]Xipeng Qiu, Peng Qian, Liusong Yin, Xuanjing Huang:
Overview of the NLPCC 2015 Shared Task: Chinese Word Segmentation and POS Tagging for Micro-blog Texts. CoRR abs/1505.07599 (2015) - 2014
- [j2]Guo-Ping Liu, Jianjun Yan, Yiqin Wang, Wu Zheng, Tao Zhong, Xiong Lu, Peng Qian:
Deep Learning Based Syndrome Diagnosis of Chronic Gastritis. Comput. Math. Methods Medicine 2014: 938350:1-938350:8 (2014) - [c7]Peng Qian, Enqing Dong, Juan Xu, Xing Lan, Wei Liu, Wentao Cui:
Multipath Routing Protocol Based on Congestion Control Mechanism Implemented by Cross-Layer Design Concept for WSN. CSE 2014: 378-384 - [c6]Jianjun Yan, Tao Zhong, Guo-Ping Liu, Yiqin Wang, Rui Guo, Wu Zheng, Peng Qian:
Prosvms based diagnostic model of chronic gastritis in TCM. ICCA 2014: 1114-1117 - [c5]Xin Shan, Jinlian Wu, Xiaofeng Yang, Peng Qian, Yaming Jin, Haixia Yan:
Study of central aortic pressure in hypertensive patients and characteristic of radial artery pressure waveform in Traditional Chinese Medicine. ICCA 2014: 1125-1130 - 2010
- [c4]Yiming Hao, Yawei Cheng, Lei He, Peng Qian, Fufeng Li, Yiqin Wang, Wenjing Wang:
Research on proteins in tongue coating in patients with chronic renal failure and chronic gastritis based on SELDI-TOF-MS technique. BIBM Workshops 2010: 717-721 - [c3]Peng Qian, Guanfeng Bai, Jie Zhao, Yiqin Wang:
Metabonomics studies on urine specimens from patients with chronic renal failure. BIBM Workshops 2010: 763-768
2000 – 2009
- 2009
- [j1]Xiaoqiang Li, Fufeng Li, Yiqin Wang, Peng Qian, Xiaoyan Zheng:
Computer-aided disease diagnosis system in TCM based on facial image analysis. Int. J. Funct. Informatics Pers. Medicine 2(3): 303-314 (2009) - [c2]Guoping Liu, Yiqin Wang, Nai-Qing Zhao, Zhaoxiao Xu, Fufeng Li, Ying Dong, Peng Qian:
Concordance of Diagnosis Based on Zangfu-Organs Syndrome Differentiation by Clinicians of Traditional Chinese Medicine. IJCBS 2009: 384-387 - [c1]Fufeng Li, Dan Di, Xiaoqiang Li, Yiqin Wang, Peng Qian, Xiaoyan Zheng, Guoping Liu:
Facial Complexion Acquisition and Recognition System for Clinical Diagnosis in Traditional Chinese Medicine. IJCBS 2009: 392-396
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint