default search action
Qi Chai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Jie Ma, Jun Liu, Qi Chai, Pinghui Wang, Jing Tao:
Diagram Perception Networks for Textbook Question Answering via Joint Optimization. Int. J. Comput. Vis. 132(5): 1578-1591 (2024) - [j5]Jie Ma, Qi Chai, Jun Liu, Qingyu Yin, Pinghui Wang, Qinghua Zheng:
XTQA: Span-Level Explanations for Textbook Question Answering. IEEE Trans. Neural Networks Learn. Syst. 35(11): 16493-16503 (2024) - [i4]Jie Ma, Zhitao Gao, Qi Chai, Wangchun Sun, Pinghui Wang, Hongbin Pei, Jing Tao, Lingyun Song, Jun Liu, Chen Zhang, Lizhen Cui:
Debate on Graph: a Flexible and Reliable Reasoning Framework for Large Language Models. CoRR abs/2409.03155 (2024) - 2023
- [j4]Fangzhi Xu, Qika Lin, Jun Liu, Lingling Zhang, Tianzhe Zhao, Qi Chai, Yudai Pan, Yi Huang, Qianying Wang:
MoCA: Incorporating domain pretraining and cross attention for textbook question answering. Pattern Recognit. 140: 109588 (2023) - [c14]Xinxin Fan, Zhi Zhong, Dong Guo, Qi Chai, Simone Romano:
Connecting Smart Devices to Smart Contracts with W3bstream. ICBC 2023: 1-2 - 2022
- [j3]Jie Ma, Qi Chai, Jingyue Huang, Jun Liu, Yang You, Qinghua Zheng:
Weakly Supervised Learning for Textbook Question Answering. IEEE Trans. Image Process. 31: 7378-7388 (2022) - 2021
- [c13]Lei Xu, Xinxin Fan, Lucas Hall, Qi Chai:
New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner. ICBC 2021: 43-58 - [i3]Fangzhi Xu, Qika Lin, Jun Liu, Lingling Zhang, Tianzhe Zhao, Qi Chai, Yudai Pan:
MoCA: Incorporating Multi-stage Domain Pretraining and Cross-guided Multimodal Attention for Textbook Question Answering. CoRR abs/2112.02839 (2021) - 2020
- [c12]Seoyoung Ko, Xinxin Fan, Zhi Zhong, Qi Chai:
EMS: An Extensible and Modular Staking Architecture for Proof-of-Stake Systems. BCCA 2020: 122-128 - [c11]Xinxin Fan, Qi Chai, Lei Xu, Dong Guo:
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things. BSCI 2020: 186-191 - [c10]Xinxin Fan, Qi Chai, Zhi Zhong:
MULTAV: A Multi-chain Token Backed Voting Framework for Decentralized Blockchain Governance. ICBC 2020: 33-47 - [c9]Xinxin Fan, Zhi Zhong, Qi Chai, Dong Guo:
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. SecureComm (2) 2020: 311-323 - [c8]Xinxin Fan, Qi Chai, Zhefeng Li, Tian Pan:
Decentralized IoT Data Authorization with Pebble Tracker. WF-IoT 2020: 1-2
2010 – 2019
- 2018
- [c7]Xinxin Fan, Qi Chai:
Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. MobiQuitous 2018: 482-484 - 2012
- [b1]Qi Chai:
Design and Analysis of Security Schemes for Low-cost RFID Systems. University of Waterloo, Ontario, Canada, 2012 - [c6]Qi Chai, Guang Gong:
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. ICC 2012: 917-922 - [c5]Qi Chai, Guang Gong, Daniel W. Engels:
How to develop clairaudience - active eavesdropping in passive RFID systems. WOWMOM 2012: 1-6 - [i2]Qi Chai, Guang Gong:
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis. IACR Cryptol. ePrint Arch. 2012: 233 (2012) - 2011
- [j2]Qi Chai, Guang Gong:
On the (in)security of two Joint Encryption and Error Correction schemes. Int. J. Secur. Networks 6(4): 191-200 (2011) - [c4]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. ARES 2011: 581-584 - [c3]Qi Chai, Guang Gong:
Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes. GLOBECOM 2011: 1-6 - [c2]Qi Chai, Guang Gong:
BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements. RFIDSec 2011: 127-146 - [i1]Qi Chai, Xinxin Fan, Guang Gong:
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. IACR Cryptol. ePrint Arch. 2011: 247 (2011) - 2010
- [j1]Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:
Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf. Secur. 4(4): 390-396 (2010) - [c1]Yiyuan Luo, Qi Chai, Guang Gong, Xuejia Lai:
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. GLOBECOM 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint