default search action
Fang Qi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zhe Tang, Jing Tang, Dengpeng Zou, Junyi Rao, Fang Qi:
Two guidance joint network based on coarse map and edge map for camouflaged object detection. Appl. Intell. 54(15-16): 7531-7544 (2024) - [c29]Fang Qi, Xin Fu, Xu Yuan, Nian-Feng Tzeng, Lu Peng:
A New Routing Strategy to Improve Success Rates of Quantum Computers. ACM Great Lakes Symposium on VLSI 2024: 546-550 - [c28]Fang Qi, Rui Wang, Yong Guan, Xiaoyu Song:
An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control. ICECCS 2024: 290-300 - 2023
- [j21]Fang Qi, Yingkai Zhao, Md. Zakirul Alam Bhuiyan, Tao Hai, Md. Monirul Islam, Shaobo Zhang, Zhe Tang:
Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j20]Zhe Tang, Jiajia Lu, Zhengyun Chen, Fang Qi, Lingyan Zhang:
Improved Pest-YOLO: Real-time pest detection based on efficient channel attention mechanism and transformer encoder. Ecol. Informatics 78: 102340 (2023) - [j19]Zhe Tang, Lin Zhou, Fang Qi, Huarong Chen:
An improved lightweight and real-time YOLOv5 network for detection of surface defects on indocalamus leaves. J. Real Time Image Process. 20(1): 14 (2023) - [j18]Fang Qi, Yuxiang Wang, Zhe Tang, Shuhong Chen:
Real-time and effective detection of agricultural pest using an improved YOLOv5 network. J. Real Time Image Process. 20(2): 33 (2023) - [c27]Travis LeCompte, Fang Qi, Xu Yuan, Nian-Feng Tzeng, M. Hassan Najafi, Lu Peng:
Graph Neural Network Assisted Quantum Compilation for Qubit Allocation. ACM Great Lakes Symposium on VLSI 2023: 415-419 - 2022
- [j17]Xiaoyu Zhu, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo, Fang Qi, Qin Liu, Guojun Wang:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j16]Fang Qi, Gangming Chen, Jieyuan Liu, Zhe Tang:
End-to-end pest detection on an improved deformable DETR with multihead criss cross attention. Ecol. Informatics 72: 101902 (2022) - [j15]Zhe Tang, Zhe Li, Jialing Yang, Fang Qi:
P &GGD: A Joint-Way Model Optimization Strategy Based on Filter Pruning and Filter Grafting For Tea Leaves Classification. Neural Process. Lett. 54(5): 4391-4407 (2022) - [j14]Fang Qi, Yongle Wang, Zhe Tang:
Lightweight Plant Disease Classification Combining GrabCut Algorithm, New Coordinate Attention, and Channel Pruning. Neural Process. Lett. 54(6): 5317-5331 (2022) - [c26]Tao Lu, Fang Qi, John Ner, Tianqing Feng, Brian Cunningham, Lu Peng:
GeauxTrace: A Scalable Privacy-Protecting Contact Tracing App Design Using Blockchain. BDCAT 2022: 100-109 - 2021
- [j13]Xiongtao Shi, Yonggang Li, Yanhua Yang, Bei Sun, Fang Qi:
Multi-models and dual-sampling periods quality prediction with time-dimensional K-means and state transition-LSTM network. Inf. Sci. 580: 917-933 (2021) - [j12]Tao Ren, Zhuoran Dong, Fang Qi, Puqing Dong, Shuang Chen:
Relational reasoning for real-time object searching. J. Electronic Imaging 30(6) (2021) - [j11]Fang Qi, Zuoqi Xie, Zhe Tang, Huarong Chen:
Related Study Based on Otsu Watershed Algorithm and New Squeeze-and-Excitation Networks for Segmentation and Level Classification of Tea Buds. Neural Process. Lett. 53(3): 2261-2275 (2021) - [c25]Haiyang Zhang, Fang Qi, Xiaomeng Liu:
A Physarum-based Boost Algorithm for Network Optimization in Dense Wireless Sensor Networks. ICCCN 2021: 1-9 - [c24]Zhe Tang, Zhengyun Chen, Fang Qi, Lingyan Zhang, Shuhong Chen:
Pest-YOLO: Deep Image Mining and Multi-Feature Fusion for Real-Time Agriculture Pest Detection. ICDM 2021: 1348-1353 - 2020
- [j10]Zhe Tang, Jialing Yang, Zhe Li, Fang Qi:
Grape disease image classification based on lightweight convolution neural networks and channelwise attention. Comput. Electron. Agric. 178: 105735 (2020) - [j9]Weijiang Li, Fang Qi, Ming Tang, Zhengtao Yu:
Bidirectional LSTM with self-attention mechanism and multi-channel features for sentiment classification. Neurocomputing 387: 63-77 (2020) - [c23]Wenke Li, Zhe Tang, Fang Qi:
A Hybrid Task Scheduling Algorithm Combining Symbiotic Organisms Search with Fuzzy Logic in Cloud Computing. CSE 2020: 16-23 - [c22]Aqsa Younas, Raheela Nasim, Saqib Ali, Guojun Wang, Fang Qi:
Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches. CSE 2020: 66-71 - [c21]Travis LeCompte, Fang Qi, Lu Peng:
Robust Cache-Aware Quantum Processor Layout. SRDS 2020: 276-287 - [c20]Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. TrustCom 2020: 1187-1193 - [i1]Haoqiang Guo, Lu Peng, Jian Zhang, Fang Qi, Lide Duan:
Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks. CoRR abs/2008.01219 (2020)
2010 – 2019
- 2019
- [j8]Pengfei Yin, Guojun Wang, Md. Zakirul Alam Bhuiyan, Meijing Shan, Fang Qi:
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library. IEEE Access 7: 147302-147313 (2019) - [c19]Haoqiang Guo, Lu Peng, Jian Zhang, Fang Qi, Lide Duan:
Fooling AI with AI: An Accelerator for Adversarial Attacks on Deep Learning Visual Classification. ASAP 2019: 136 - [c18]Fang Qi, Xing Chang, Zhe Tang, Wenbo Wang:
Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud. DependSys 2019: 80-92 - [c17]Haoqiang Guo, Lu Peng, Jian Zhang, Fang Qi, Lide Duan:
Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks. IGSC 2019: 1-8 - 2018
- [j7]Quanyun Wei, Fang Qi, Zhe Tang:
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation. Telecommun. Syst. 69(2): 253-262 (2018) - 2017
- [c16]Fang Qi, Ke Li, Zhe Tang:
A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy. ISPA/IUCC 2017: 607-613 - [c15]Yanmei Li, Fang Qi, Zhe Tang:
Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network. SpaCCS 2017: 87-92 - [c14]Yuanlong Li, Fang Qi, Zhe Tang:
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow. SpaCCS 2017: 108-120 - [c13]Lian Duan, Fang Qi, Guojun Wang, Zhe Tang:
Module-Level Software Streaming Loading Model Based on Hypervisor. SpaCCS Workshops 2017: 627-636 - 2016
- [j6]Zhe Tang, Qiang Zhou, Fang Qi, Jianxin Wang:
Optimal transitional trajectory generation for automatic machines. Int. J. Comput. Sci. Eng. 12(2/3): 104-112 (2016) - [c12]Wenbo Wang, Fang Qi, Xiaoqiang Wu, Zhe Tang:
Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks. ICCS 2016: 617-626 - [c11]Fang Qi, Wenbo Wang, Zhe Tang:
Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks. SpaCCS 2016: 374-382 - 2015
- [j5]Fang Qi, Shaowei Wu, Zhe Tang, Guojun Wang:
Selective partial recovery optimisation strategy for SSL connection migration. Int. J. Auton. Adapt. Commun. Syst. 8(2/3): 213-227 (2015) - [j4]Zhe Tang, Yuancheng Su, Meng Joo Er, Fang Qi, Li Zhang, Jianyong Zhou:
A local binary pattern based texture descriptors for classification of tea leaves. Neurocomputing 168: 1011-1023 (2015) - [c10]Fang Qi, Wenbo Wang:
Efficient Private Matching Scheme for Friend Information Exchange. ICA3PP (3) 2015: 492-503 - [c9]Fang Qi, Xin Tang, Quanyun Wei:
New Escrow-Free Scheme for Hierarchical Identity-Based Encryption. ICA3PP (Workshops and Symposiums) 2015: 701-713 - [c8]Kang Chen, Guoxin Liu, Haiying Shen, Fang Qi:
Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems. P2P 2015: 1-10 - 2014
- [b1]Fang Qi:
Some topics in modeling ranking data. University of Hong Kong, 2014 - [c7]Fang Qi, Weijie Zhang, Guojun Wang, Hui Fang:
Unified Security Architecture Research for 5G Wireless System. IEEE WISA 2014: 91-94 - 2013
- [j3]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
User requirements-aware security ranking in SSL protocol. J. Supercomput. 64(3): 762-776 (2013) - 2011
- [j2]Zhe Tang, Meng Joo Er, Fang Qi:
Dynamic fuzzy neural network for the intelligent control of a humanoid robot. Comput. Syst. Sci. Eng. 26(3) (2011) - [j1]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Secur. Commun. Networks 4(4): 372-383 (2011)
2000 – 2009
- 2009
- [c6]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. MASS 2009: 842-847 - 2008
- [c5]Fang Qi, Zhe Tang, Guojun Wang:
Attacks vs. Countermeasures of SSL Protected Trust Model. ICYCS 2008: 1986-1991 - 2006
- [c4]Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122 - 2005
- [c3]Fang Qi, Jin Zheng, Weijia Jia, Guojun Wang:
Available Bandwidth Measurement Schemes over Networks. ICCNMC 2005: 931-940 - [c2]Fang Qi, Weijia Jia, Jie Wu:
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks. ICDCS Workshops 2005: 656-659 - [c1]Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu:
Batching SSL/TLS Handshake Improved. ICICS 2005: 402-413
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint