![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Zhengrui Qin
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Siyue Zheng, Xiaojun Zhu
, Zhengrui Qin, Chao Dong:
Cross-layer UAV network routing protocol for spectrum denial environments. Ad Hoc Networks 167: 103702 (2025) - 2024
- [c15]Jinyao Sun, Chao Dong, Xiaojun Zhu, Zhengrui Qin, Lei Zhang:
Enhancing Routing Protocol Resilience for Dynamic UAV Networks in Frequency-Sweeping Jamming Environments. VTC Fall 2024: 1-5 - [c14]Jiajing Wu, Chao Dong, Xiaojun Zhu, Zhengrui Qin:
Distributed Protocol for Maximizing Sampling Frequency of Spectrum Reconnaissance UAV Clusters. WCNC 2024: 1-6 - 2022
- [j7]Yutao Tang
, Zhengrui Qin
, Zhiqiang Lin, Yue Li
, Shanhe Yi
, Fengyuan Xu, Qun Li
:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [j6]Xiaojun Zhu
, Yu Wang, Zhengrui Qin:
RoV: receiving files from voice calls using dual-tone multi-frequency method. J. Supercomput. 78(5): 7304-7320 (2022) - 2021
- [j5]Yutao Tang, Yue Li, Qun Li
, Kun Sun, Haining Wang, Zhengrui Qin
:
User input enrichment via sensing devices. Comput. Networks 196: 108262 (2021)
2010 – 2019
- 2019
- [c13]Yutao Tang, Zhengrui Qin, Shanhe Yi
, Qun Li
:
Virtual machine migration for IoT applications. SEC 2019: 437-442 - 2018
- [j4]Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin:
Graphical passwords for older computer users. Int. J. Secur. Networks 13(4): 211-227 (2018) - [c12]Zhengrui Qin, Qun Li
:
Household Electrical Load Scheduling Algorithms with Renewable Energy. WASA 2018: 387-399 - 2017
- [j3]Cheng Li
, Zhengrui Qin, Ed Novak, Qun Li
:
Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks. IEEE Internet Things J. 4(5): 1156-1164 (2017) - [c11]Nancy J. Carter, Cheng Li, Qun Li
, Jennifer A. Stevens, Ed Novak, Zhengrui Qin, Jiquo Yu:
Graphical passwords for older computer users. HotWeb 2017: 7:1-7:7 - [c10]Shanhe Yi
, Zhengrui Qin, Nancy J. Carter, Qun Li
:
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. ICDCS 2017: 469-479 - [c9]Tianyang Wang, Zhengrui Qin, Michelle Zhu:
An ELU Network with Total Variation for Image Denoising. ICONIP (3) 2017: 227-237 - [i1]Tianyang Wang, Zhengrui Qin, Michelle Zhu:
An ELU Network with Total Variation for Image Denoising. CoRR abs/1708.04317 (2017) - 2016
- [c8]Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li
:
MobiPlay: a remote execution based record-and-replay tool for mobile applications. ICSE 2016: 571-582 - [c7]Shanhe Yi
, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li
:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM 2016: 1-9 - [c6]Shanhe Yi
, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li
:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM Workshops 2016: 1017-1018 - 2015
- [c5]Shanhe Yi
, Zijiang Hao, Zhengrui Qin, Qun Li
:
Fog Computing: Platform and Applications. HotWeb 2015: 73-78 - [c4]Shanhe Yi
, Zhengrui Qin, Qun Li
:
Security and Privacy Issues of Fog Computing: A Survey. WASA 2015: 685-695 - 2014
- [c3]Zhengrui Qin, Shanhe Yi
, Qun Li
, Dmitry Zamkov:
Preserving secondary users' privacy in cognitive radio networks. INFOCOM 2014: 772-780 - 2013
- [j2]Zhengrui Qin, Qun Li
, Mooi Choo Chuah:
Defending against Unidentifiable Attacks in Electric Power Grids. IEEE Trans. Parallel Distributed Syst. 24(10): 1961-1971 (2013) - [j1]Zhengrui Qin, Qun Li
, George Hsieh:
Defending Against Cooperative Attacks in Cooperative Spectrum Sensing. IEEE Trans. Wirel. Commun. 12(6): 2680-2687 (2013) - 2012
- [c2]Zhengrui Qin, Qun Li
, Mooi Choo Chuah:
Unidentifiable Attacks in Electric Power Systems. ICCPS 2012: 193-202 - 2011
- [c1]Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li
:
IMDGuard: Securing implantable medical devices with the external wearable guardian. INFOCOM 2011: 1862-1870
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint