default search action
Qinghua Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Qinghua Li, Xuyang Wang, Kun Zhang, Yiran Yang, Chao Feng:
Double-attention mechanism-based segmentation grasping detection network. J. Electronic Imaging 33(2) (2024) - [j68]Qinghua Li, Bao Yan, Delin Luo:
Infrared and visible image fusion method based on hierarchical attention mechanism. J. Electronic Imaging 33(2) (2024) - [j67]Bao Yan, Longjie Zhao, Kehua Miao, Song Wang, Qinghua Li, Delin Luo:
TGLFusion: A Temperature-Guided Lightweight Fusion Method for Infrared and Visible Images. Sensors 24(6): 1735 (2024) - [j66]Xiaofeng Huo, Yuanjian Jiang, Wenpeng Wei, Xianyang Qiu, Zhi Yu, Junnian Nong, Qinghua Li:
Three-dimensional finite element simulation and reconstruction of jointed rock masses for bench blasting. Simul. Model. Pract. Theory 135: 102975 (2024) - [j65]Xinyang Zhao, Qinghua Li, Changhong Wang, Hexuan Dou, Bo Liu:
Robust Depth-Aided Visual-Inertial-Wheel Odometry for Mobile Robots. IEEE Trans. Ind. Electron. 71(8): 9161-9171 (2024) - [j64]Xinnian Li, Qinghua Li, Qianxi Yu, Changhong Wang, Boning He, Yuanxun Zheng:
A Rotating Permanent Magnets Positioning System for Laying Underground Pipelines. IEEE Trans. Instrum. Meas. 73: 1-9 (2024) - [j63]Zhongxu Hu, Yuxin Cai, Qinghua Li, Kui Su, Chen Lv:
Context-Aware Driver Attention Estimation Using Multi-Hierarchy Saliency Fusion With Gaze Tracking. IEEE Trans. Intell. Transp. Syst. 25(8): 8602-8614 (2024) - [c91]Kylie McClanahan, Qinghua Li:
Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor Matching. ICNC 2024: 233-238 - [c90]Kylie McClanahan, Sky Elder, Marie Louise Uwibambe, Yaling Liu, Rithyka Heng, Qinghua Li:
When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly. ICNC 2024: 664-670 - 2023
- [j62]Qinghua Li, Lei Zhang, Mengyao Zhang, Yuanshuai Du, Kaiyue Liu, Chao Feng:
Robust Human Upper-Limbs Trajectory Prediction Based on Gaussian Mixture Prediction. IEEE Access 11: 8172-8184 (2023) - [j61]Fengli Zhang, Yatish Dubasi, Wei Bao, Qinghua Li:
Detection and Localization of Data Forgery Attacks in Automatic Generation Control. IEEE Access 11: 95999-96013 (2023) - [j60]Jun Wang, Qian Zhang, Pengwen Hou, Qinghua Li:
Effects of platform's blockchain strategy on brand manufacturer's distribution strategy in the presence of counterfeits. Comput. Ind. Eng. 177: 109028 (2023) - [j59]Cheng Chen, Hao Song, Qinghua Li, Francesca Meneghello, Francesco Restuccia, Carlos Cordeiro:
Wi-Fi Sensing Based on IEEE 802.11bf. IEEE Commun. Mag. 61(1): 121-127 (2023) - [j58]Yizhi Liu, Rutian Qing, Yijiang Zhao, Xuesong Wang, Zhuhua Liao, Qinghua Li, Buqing Cao:
Fusing Spatio-Temporal Contexts into DeepFM for Taxi Pick-Up Area Recommendation. Comput. Syst. Sci. Eng. 45(3): 2505-2519 (2023) - [j57]Wei Du, Ang Li, Qinghua Li, Pan Zhou:
Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming. IEEE Trans. Cloud Comput. 11(1): 484-498 (2023) - [j56]Xue Zhang, Qinghua Li, Cuiping Li, Hong Chen:
ConPhrase: Enhancing Context-Aware Phrase Mining From Text Corpora. IEEE Trans. Knowl. Data Eng. 35(7): 6767-6783 (2023) - [c89]Kylie McClanahan, Jingyao Fan, Qinghua Li, Guohong Cao:
Protecting Control Commands Using Low-Cost EM Sensors in the Smart Grid. CNS 2023: 1-9 - [c88]Dakota S. Dale, Kylie McClanahan, Qinghua Li:
AI-based Cyber Event OSINT via Twitter Data. ICNC 2023: 436-442 - [c87]Yanjiao Gao, Yanjing Ding, Qinghua Li:
DCCARES-Net: A Deep Learning Method for Overlapping Cervical Cell Segmentation. ICDIP 2023: 24:1-24:9 - 2022
- [j55]Qinghua Li, Limin Zhang, Feng Zeng, Yong Pan, Junjie Yang:
Community Clustering Routing Algorithm Based on Information Entropy in Mobile Opportunity Network. IEEE Access 10: 25755-25766 (2022) - [j54]Zhongxu Hu, Yiran Zhang, Qinghua Li, Chen Lv:
Human-Machine Telecollaboration Accelerates the Safe Deployment of Large-Scale Autonomous Robots During the COVID-19 Pandemic. Frontiers Robotics AI 9: 853828 (2022) - [j53]Xuguo Zhang, Jie Xu, Zixin Chen, Qiuhui Wang, Weijing Liu, Qinghua Li, Wei Bai, Xiadong Tang:
Investigation and optimization of electro-thermal performance of Double Gate-All-Around MOSFET. Microelectron. J. 129: 105540 (2022) - [j52]Zhongxu Hu, Yiran Zhang, Yang Xing, Qinghua Li, Chen Lv:
An Integrated Framework for Multi-State Driver Monitoring Using Heterogeneous Loss and Attention-Based Feature Decoupling. Sensors 22(19): 7415 (2022) - [j51]Qinghua Li, Xinnian Li, Changhong Wang, Zhenhuan Wang, Fan Wen, Zehui Zhao:
An Inertial Magneto-Inductive Positioning System Based on GWO-PF Algorithm. IEEE Trans. Instrum. Meas. 71: 1-10 (2022) - [j50]Zhongxu Hu, Yiran Zhang, Qinghua Li, Chen Lv:
A Novel Heterogeneous Network for Modeling Driver Attention With Multi-Level Visual Content. IEEE Trans. Intell. Transp. Syst. 23(12): 24343-24354 (2022) - [j49]Ben Niu, Qinghua Li, Hanyi Wang, Guohong Cao, Fenghua Li, Hui Li:
A Framework for Personalized Location Privacy. IEEE Trans. Mob. Comput. 21(9): 3071-3083 (2022) - [c86]Lewis CL Brown, Qinghua Li:
Privacy-Preserving and Secure Divide-and-Conquer Learning. SEC 2022: 510-515 - [c85]David Darling, Yaling Liu, Qinghua Li:
Privacy Protection Against Shoulder Surfing in Mobile Environments. MobiQuitous 2022: 133-152 - 2021
- [j48]Zilei Liu, Feng Li, Gaoxiang Huang, Jiahu Wei, Guangyu Jiang, Yan Huang, Xiao Jin, Qinghua Li:
Spectral Design of Light-Emitting Diodes for Plant Photosynthesis Based on Quantum Dots. IEEE Access 9: 156229-156238 (2021) - [j47]Feng Jiang, Qinghua Li, Xiaogang Chen:
Channel Smoothing for 802.11ax Beamformed MIMO-OFDM. IEEE Commun. Lett. 25(10): 3413-3417 (2021) - [j46]Qinghua Li, Yisong Li:
User logistics profiling for terminal distribution based on adaptive large adjacent search. J. Intell. Fuzzy Syst. 41(4): 4759-4771 (2021) - [j45]Jianjun Zou, Zhenxin Zhang, Dong Chen, Qinghua Li, Lan Sun, Ruofei Zhong, Liqiang Zhang, Jinghan Sha:
GACM: A Graph Attention Capsule Model for the Registration of TLS Point Clouds in the Urban Scene. Remote. Sens. 13(22): 4497 (2021) - [j44]Philip Dale Huff, Qinghua Li:
Towards Automating the Assessment of Software Vulnerability Risk. EAI Endorsed Trans. Security Safety 8(27): e3 (2021) - [j43]Qinghua Li, Junqing Li, Xinjie Zhang, Biao Zhang:
A wale optimization algorithm for distributed flow shop with batch delivery. Soft Comput. 25(21): 13181-13194 (2021) - [c84]Philip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li:
A Recommender System for Tracking Vulnerabilities. ARES 2021: 114:1-114:7 - [c83]Xue Zhang, Qinghua Li, Cuiping Li, Hong Chen:
Automated Context-Aware Phrase Mining from Text Corpora. DASFAA (2) 2021: 20-36 - [c82]Qinghua Li, Xue Zhang, Cuiping Li, Hong Chen:
A Unified-Model via Block Coordinate Descent for Learning the Importance of Filter. ICMR 2021: 192-200 - [c81]Philip Dale Huff, Qinghua Li:
Towards Automated Assessment of Vulnerability Exposures in Security Operations. SecureComm (1) 2021: 62-81 - [c80]Philip Dale Huff, Qinghua Li:
A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange. SecureComm (1) 2021: 164-184 - [c79]Qinghua Li, Cuiping Li, Hong Chen:
Filter Pruning via Probabilistic Model-based Optimization for Accelerating Deep Convolutional Neural Networks. WSDM 2021: 653-661 - 2020
- [j42]Yuan Zheng, Qinghua Li, Changhong Wang, Xinnian Li, Yuan Huang:
Magnetic-Based Positioning System for Moving Target With Feature Vector. IEEE Access 8: 105472-105483 (2020) - [j41]Qinghua Li, Zhao Zhang, Yue You, Yaqi Mu, Chao Feng:
Data Driven Models for Human Motion Prediction in Human-Robot Collaboration. IEEE Access 8: 227690-227702 (2020) - [j40]Qinghua Li, Feng Zeng, Qing Wu, Junjie Yang:
An Incentive Mechanism Based on Bertrand Game for Opportunistic Edge Computing. IEEE Access 8: 229173-229183 (2020) - [j39]Yunfei Li, Jiang Xu, Qinghua Li, Guang Chen:
Analysis of Source Influence on Guided Wave Excitation in Cylindrical Structures Using Spatial Fourier Transform Method. J. Sensors 2020: 5267318:1-5267318:11 (2020) - [j38]Ning Huang, Weijing Liu, Qinghua Li, Wei Bai, Xiadong Tang, Ting Yang:
Investigation and optimization of electrical and thermal performance for 5-nm GAA vertically stacked nanowire FETs. Microelectron. J. 95 (2020) - [j37]Ning Huang, Weijing Liu, Qinghua Li, Wei Bai, Xiadong Tang, Ting Yang:
Thermal and electrical performance investigation of FinFET with encased air-gap gate sidewalls from spacer encapsulation layer material and structure parameter perspectives. Microelectron. J. 103: 104846 (2020) - [c78]Qinghua Li, Hailong Ma, Zhao Zhang, Chao Feng:
An Effective Nuclear Extraction Mask Method for SVM Classification. ICCCS 2020: 104-108 - [c77]Fengli Zhang, Philip Dale Huff, Kylie McClanahan, Qinghua Li:
A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis. CNS 2020: 1-9 - [c76]Fengli Zhang, Qinghua Li:
Dynamic Risk-Aware Patch Scheduling. CNS 2020: 1-9 - [c75]David Darling, Ang Li, Qinghua Li:
Automated Bystander Detection and Anonymization in Mobile Photography. SecureComm (1) 2020: 402-424 - [c74]Kylie McClanahan, Qinghua Li:
Automatically Locating Mitigation Information for Security Vulnerabilities. SmartGridComm 2020: 1-7 - [c73]Qinghua Li, Cuiping Li, Hong Chen:
Incremental Filter Pruning via Random Walk for Accelerating Deep Convolutional Neural Networks. WSDM 2020: 358-366 - [i5]Ang Li, Wei Du, Qinghua Li:
PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing. CoRR abs/2005.11634 (2020)
2010 – 2019
- 2019
- [j36]Qinghua Li, Cuiping Li, Jing Zhang, Hong Chen, Shaoqing Wang:
深度神经网络压缩综述 (Survey of Compressed Deep Neural Network). 计算机科学 46(9): 1-14 (2019) - [j35]Qinghua Li, Yuchi Ma, John Anderson, James Curry, Jie Shan:
Towards Uniform Point Density: Evaluation of an Adaptive Terrestrial Laser Scanner. Remote. Sens. 11(7): 880 (2019) - [c72]Shuhan Yuan, Panpan Zheng, Xintao Wu, Qinghua Li:
Insider Threat Detection via Hierarchical Neural Temporal Point Processes. IEEE BigData 2019: 1343-1350 - [c71]Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. CSS (1) 2019: 274-278 - [c70]Jun Du, Xueyu Li, Qinghua Li:
Detection and Classification of Cervical Exfoliated Cells Based on Faster R-CNN. ICAIT 2019: 52-57 - [c69]Difan Mu, Pan Zhou, Qinghua Li, Ruixuan Li, Jie Xu:
Privacy-Preserving MEC-Enabled Contextual Online Learning via SDN for Service Selection in IoT. MASS 2019: 290-298 - [c68]Tao Sun, Zhe Wang, Qinghua Li:
A medical garbage bin recycling system based on AGV. RICAI 2019: 220-225 - [i4]Shuhan Yuan, Panpan Zheng, Xintao Wu, Qinghua Li:
Insider Threat Detection via Hierarchical Neural Temporal Point Processes. CoRR abs/1910.03171 (2019) - 2018
- [j34]Qinghua Li, Feng Pan, Zhong-Gai Zhao, Junzhi Yu:
Process Modeling and Monitoring With Incomplete Data Based on Robust Probabilistic Partial Least Square Method. IEEE Access 6: 10160-10168 (2018) - [j33]Guohao Wang, Qinghua Li, Anfeng Liu:
多目标最优化云工作流调度进化遗传算法 (Evoluation Genetic Algorithm of Multi-objective Optimization Scheduling on Cloud Workflow). 计算机科学 45(5): 31-37 (2018) - [c67]Wei Bao, Qinghua Li:
Hiding Critical Targets in Smart Grid Networks. ICNC 2018: 632-636 - [c66]Qinghua Li, Zhicong Chen, Lijun Wu, Shuying Cheng, Peijie Lin:
Optimal Data Collection of MP-MR-MC Wireless Sensors Network for Structural Monitoring. MIWAI 2018: 92-103 - [c65]Ang Li, David Darling, Qinghua Li:
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones. PAC 2018: 10-18 - [c64]Wei Bao, Qinghua Li:
Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming. PAC 2018: 55-63 - [c63]Ang Li, Wei Du, Qinghua Li:
PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing. SecureComm (1) 2018: 227-247 - [c62]Wei Du, Ang Li, Qinghua Li:
Privacy-Preserving Multiparty Learning for Logistic Regression. SecureComm (1) 2018: 549-568 - [c61]Ang Li, Wei Du, Qinghua Li:
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud. SecureComm (1) 2018: 569-587 - [i3]Ang Li, David Darling, Qinghua Li:
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones. CoRR abs/1810.01046 (2018) - [i2]Ang Li, Wei Du, Qinghua Li:
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud. CoRR abs/1810.01048 (2018) - [i1]Wei Du, Ang Li, Qinghua Li:
Privacy-Preserving Multiparty Learning For Logistic Regression. CoRR abs/1810.02400 (2018) - 2017
- [j32]Qinghua Li, Shenshen Chen, Xinmei Luo:
Steady heat conduction analyses using an interpolating element-free Galerkin scaled boundary method. Appl. Math. Comput. 300: 103-115 (2017) - [j31]Qinghua Li, Bo Li, Ping Chen, Pengwen Hou:
Dual-channel supply chain decisions under asymmetric information with a risk-averse retailer. Ann. Oper. Res. 257(1-2): 423-447 (2017) - [j30]Yue Li, Qinghua Li, Jie Shan:
Discover Patterns and Mobility of Twitter Users - A Study of Four US College Cities. ISPRS Int. J. Geo Inf. 6(2): 42 (2017) - [c60]Wei Du, Qinghua Li:
Secure and efficient outsourcing of large-scale nonlinear programming. CNS 2017: 1-9 - [c59]Fengli Zhang, Qinghua Li:
Deep learning-based data forgery detection in automatic generation control. CNS 2017: 400-404 - [c58]Ang Li, Qinghua Li, Vincent C. Hu:
Access Control for Distributed Processing Systems: Use Cases and General Considerations. CIC 2017: 117-125 - [c57]Jingyao Fan, Qinghua Li, Guohong Cao:
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense. DSN 2017: 13-24 - [c56]Amin R. S. Nugroho, Qinghua Li:
Inferring Mobile Apps from Resource Usage Patterns. MobileCloud 2017: 82-87 - [c55]Michael A. Mahler, Qinghua Li, Ang Li:
SecureHouse: A home security system based on smartphone sensors. PerCom 2017: 11-20 - [c54]Fengli Zhang, Michael A. Mahler, Qinghua Li:
Flooding attacks against secure time-critical communications in the power grid. SmartGridComm 2017: 449-454 - 2016
- [j29]Jinming Fang, Kai Wang, Qinghua Li:
Note on stratified L-ordered convergence structures. Fuzzy Sets Syst. 300: 147-151 (2016) - [j28]Qingqi Pei, Pin-Han Ho, Yao Liu, Qinghua Li, Lin Chen:
Cognitive Networking for Next-G Wireless Communications. Int. J. Distributed Sens. Networks 12(2): 9172605:1-9172605:2 (2016) - [j27]Qinghua Li, Serkan Ural, John Anderson, Jie Shan:
A Fuzzy Mean-Shift Approach to Lidar Waveform Decomposition. IEEE Trans. Geosci. Remote. Sens. 54(12): 7112-7121 (2016) - [j26]Song Han, Shuai Zhao, Qinghua Li, Chun-Hua Ju, Wanlei Zhou:
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance. IEEE Trans. Inf. Forensics Secur. 11(9): 1940-1955 (2016) - [j25]Jing Zhao, Xuejun Zhuo, Qinghua Li, Wei Gao, Guohong Cao:
Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum. IEEE Trans. Mob. Comput. 15(4): 803-816 (2016) - [j24]Qinghua Li, Guohong Cao:
Providing Privacy-Aware Incentives in Mobile Sensing Systems. IEEE Trans. Mob. Comput. 15(6): 1485-1498 (2016) - [c53]John Calvin Alumbaugh, Qinghua Li, Vincent C. Hu:
Differentiating Non-Isomorphic Graphlets for Graph Analytics. CIC 2016: 349-356 - [c52]Qinghua Li, Serkan Ural, Jie Shan:
Decomposing LiDAR waveforms with nonparametric classification methods. IGARSS 2016: 5573-5576 - [c51]Ang Li, Qinghua Li, Wei Gao:
PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones. SECON 2016: 1-9 - 2015
- [j23]Qinghua Li, Guohong Cao:
Privacy-preserving participatory sensing. IEEE Commun. Mag. 53(8): 68-74 (2015) - [j22]Ben Niu, Xiaoyan Zhu, Qinghua Li, Jie Chen, Hui Li:
A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49: 125-132 (2015) - [j21]Wei Gao, Qinghua Li, Guohong Cao:
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation. IEEE Trans. Mob. Comput. 14(4): 714-727 (2015) - [c50]Hyejung Jung, Qinghua Li, Pingping Zong:
Cell detection in high frequency band small cell networks. ACSSC 2015: 1762-1766 - [c49]Jingyao Fan, Qinghua Li, Guohong Cao:
Privacy-aware and trustworthy data aggregation in mobile sensing. CNS 2015: 31-39 - [c48]Qinghua Li, Jilong Qin, Xu Ding, Endong Wang, Weifeng Gong:
An On-chip Interconnection QoS Verification Platform of Processor of Large Data for Architectural Modeling Analysis. ICYCSEE 2015: 439-447 - [c47]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. INFOCOM 2015: 1017-1025 - [c46]Qinghua Li, Chase Ross, Jing Yang, Jia Di, Juan Carlos Balda, H. Alan Mantooth:
The effects of flooding attacks on time-critical communications in the smart grid. ISGT 2015: 1-5 - [c45]Ang Li, Qinghua Li, Vincent C. Hu, Jia Di:
Evaluating the capability and performance of access control policy verification tools. MILCOM 2015: 366-371 - 2014
- [j20]Qinghua Li, Uros Kalabic, Ilya V. Kolmanovsky:
Fast reference governors for second-order linear systems with constraints and an input time-delay. Autom. 50(2): 641-645 (2014) - [j19]Zhong-Gai Zhao, Qinghua Li, Min Huang, Fei Liu:
Concurrent PLS-based process monitoring with incomplete input and quality measurements. Comput. Chem. Eng. 67: 69-82 (2014) - [j18]Qinghua Li, Guohong Cao, Thomas F. La Porta:
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. IEEE Trans. Dependable Secur. Comput. 11(2): 115-129 (2014) - [c44]Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. ICCCN 2014: 1-8 - [c43]Qinghua Li, Guohong Cao:
Providing Efficient Privacy-Aware Incentives for Mobile Sensing. ICDCS 2014: 208-217 - [c42]Qinghua Li, Serkan Ural, John Anderson, Jie Shan:
Minimum description length constrained LiDAR waveform decomposition. IGARSS 2014: 165-168 - [c41]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Achieving k-anonymity in privacy-aware location-based services. INFOCOM 2014: 754-762 - [c40]Wei Gao, Qinghua Li, Guohong Cao:
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination. INFOCOM 2014: 2301-2309 - 2013
- [j17]Yuan Xu, Xiyuan Chen, Qinghua Li:
Autonomous Integrated Navigation for Indoor Robots Utilizing On-Line Iterated Extended Rauch-Tung-Striebel Smoothing. Sensors 13(12): 15937-15953 (2013) - [j16]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 10(3): 168-182 (2013) - [c39]Hooman Shirani-Mehr, Masoud Sajadieh, Qinghua Li:
Practical downlink transmission schemes for future LTE systems with many base-station antennas. GLOBECOM 2013: 4141-4145 - [c38]Wei Gao, Qinghua Li:
Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. INFOCOM 2013: 2058-2066 - [c37]Qinghua Li, Guohong Cao:
Providing privacy-aware incentives for mobile sensing. PerCom 2013: 76-84 - [c36]Qinghua Li, Guohong Cao:
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error. Privacy Enhancing Technologies 2013: 60-81 - 2012
- [j15]Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10(8): 1619-1632 (2012) - [j14]Qinghua Li:
A Fully-Integrated Buck Converter Design and Implementation for On-Chip Power Supplies. J. Comput. 7(5): 1270-1277 (2012) - [j13]Qinghua Li, Guohong Cao:
Mitigating Routing Misbehavior in Disruption Tolerant Networks. IEEE Trans. Inf. Forensics Secur. 7(2): 664-675 (2012) - [j12]Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao:
Social-Aware Multicast in Disruption-Tolerant Networks. IEEE/ACM Trans. Netw. 20(5): 1553-1566 (2012) - [c35]Qinghua Li, Guohong Cao:
Efficient and privacy-preserving data aggregation in mobile sensing. ICNP 2012: 1-10 - [c34]Jianqing Zhang, Qinghua Li, Eve M. Schooler:
iHEMS: An information-centric approach to secure home energy management. SmartGridComm 2012: 217-222 - 2011
- [j11]Qinghua Li, Guohong Cao:
Multicast Authentication in the Smart Grid With One-Time Signature. IEEE Trans. Smart Grid 2(4): 686-696 (2011) - [c33]Qinghua Li, Chunshan He, Shiqiang Ma:
Research of Fault Diagnosis on Numerically-Controlled System. CSISE (3) 2011: 127-131 - [c32]Zhanguo Li, Qinghua Li, Yueguang Li, Jie Li:
The Testing Technology Research of Automotive Fastener Comprehensive Performance. CSISE (2) 2011: 603-607 - [c31]Xuejun Zhuo, Qinghua Li, Wei Gao, Guohong Cao, Yiqi Dai:
Contact duration aware data replication in Delay Tolerant Networks. ICNP 2011: 236-245 - [c30]Qingli Luo, Daniele Perissin, Qinghua Li, Hui Lin, Ralf Duering:
Tianjin INSAR time series analysis with L- and X-band. IGARSS 2011: 1477-1480 - [c29]Qinghua Li, Daniele Perissin, Qingli Luo, Hui Lin, Matthew Yick Cheung Pang:
High resolution SAR change detection in Hong Kong. IGARSS 2011: 1630-1633 - [c28]Xuejun Zhuo, Qinghua Li, Guohong Cao, Yiqi Dai, Boleslaw K. Szymanski, Tom La Porta:
Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach. MASS 2011: 92-101 - 2010
- [j10]Qinghua Li, Guangjie Li, Wookbong Lee, Moon-il Lee, David Mazzarese, Bruno Clerckx, Zexian Li:
MIMO techniques in WiMAX and LTE: a feature overview. IEEE Commun. Mag. 48(5): 86-92 (2010) - [j9]Wendy C. Wong, Qinghua Li, Shilpa Talwar:
A Transmit Beamforming and Nulling Approach with Distributed Scheduling to Improve Cell Edge Throughput. Int. J. Digit. Multim. Broadcast. 2010: 956847:1-956847:9 (2010) - [c27]Qinghua Li, Sencun Zhu, Guohong Cao:
Routing in Socially Selfish Delay Tolerant Networks. INFOCOM 2010: 857-865
2000 – 2009
- 2009
- [j8]Qinghua Li, Xintian Eddie Lin, Jianzhong Zhang, Wonil Roh:
Advancement of MIMO technology in WiMAX: from IEEE 802.16d/e/j to 802.16m. IEEE Commun. Mag. 47(6): 100-107 (2009) - [c26]Jun Pan, Fengjuan Yao, Qinghua Li:
An O(1.414n) Volume Molecular Solutions for the Subset-Product Problem on DNA-Based Supercomputing. BMEI 2009: 1-5 - [c25]Xiaoqin Du, Qinghua Li, Jianjun Han:
An Analysis and Hierarchical Decomposition for HAMs. CSE (2) 2009: 1050-1054 - [c24]Clark Chen, Yang-Seok Choi, Nageen Himayat, Minnie Ho, Vladimir Kravtsov, Guangjie Li, Qinghua Li, Yuval Lomnitz, Hongmei Sun, Hua Yang, Shilpa Talwar, Hujun Yin, Hongming Zheng, Shanshan Zheng:
Multi-user MIMO and adaptive frequency reuse for next-generation mobile broadband networks. ICASSP 2009: 3617-3620 - [c23]Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao:
Multicasting in delay tolerant networks: a social network perspective. MobiHoc 2009: 299-308 - [c22]Bernd Bandemer, Qinghua Li, Xintian Eddie Lin, Arogyaswami Paulraj:
Overhearing-based Interference Cancellation for Relay Networks. VTC Fall 2009 - 2008
- [j7]Qiang Li, Jing Zhu, Qinghua Li, Costas N. Georghiades:
Efficient spatial covariance estimation for asynchronous co-channel interference suppression in MIMO-OFDM systems. IEEE Trans. Wirel. Commun. 7(12-1): 4849-4853 (2008) - [c21]Mingwei Xu, Qinghua Li, Xue Zhi Jiang, Yong Cui:
Evading User-Specific Offensive Web Pages via Large-Scale Collaborations. ICC 2008: 5721-5725 - [c20]Qinghua Li, Hongjun Wang, Hua Li, Xuezhen Liu, Fei Lin:
Centralized Hinfinity Fusion Filter Design in Multi-Sensor Data Fusion System. RAM 2008: 603-607 - [c19]Qinghua Li, Hongjun Wang, Jun Du, Xuezhen Liu, Fei Lin:
Centralized Hinfinity Fusion Filter Design in Multi-sensor Nonlinear Fusion System. RAM 2008: 608-612 - 2007
- [j6]Qinghua Li, Xintian Eddie Lin, Jianzhong (Charlie) Zhang:
MIMO precoding in 802.16e WiMAX. J. Commun. Networks 9(2): 141-149 (2007) - [c18]Youlin Ruan, Gan Liu, Jianjun Han, Qinghua Li:
Communication-Aware Scheduling Algorithm Based on Heterogeneous Computing Systems. International Conference on Computational Science (1) 2007: 426-429 - [c17]Youlin Ruan, Gan Liu, Jianjun Han, Qinghua Li:
An Energy-Efficient Scheduling Algorithm for Real-Time Tasks. International Conference on Computational Science (4) 2007: 965-968 - [c16]Xiaoqin Du, Qinghua Li, Jianjun Han:
A unifying framework for HAMs-family HRL methods. ROBIO 2007: 1978-1982 - 2006
- [c15]Jianjun Zhang, Qinghua Li, Yexin Song, Yong Qu:
A New Efficient Parallel Revised Relaxation Algorithm. ICIC (1) 2006: 812-821 - 2005
- [c14]Chuanxiang Ma, Qinghua Li:
Parallel Algorithm for Mining Frequent Closed Sequences. AIS-ADM 2005: 184-192 - 2004
- [j5]Qinghua Li, Costas N. Georghiades, Xiaodong Wang:
Blind multiuser detection in uplink CDMA with multipath fading: a sequential EM approach. IEEE Trans. Commun. 52(1): 71-81 (2004) - [c13]Youlin Ruan, Gan Liu, Qinghua Li, Tingyao Jiang:
An Efficient Scheduling Algorithm for Dependent Tasks. CIT 2004: 456-461 - [c12]Dan Ma, Wei Zhang, Qinghua Li:
Dynamic Scheduling Algorithm for Parallel Real-Time Jobs in Heterogeneous System. CIT 2004: 462-466 - [c11]Tingyao Jiang, Qinghua Li:
A Self-Stabilizing Distributed Multicast Algorithm for Mobile Ad-Hoc Networks. CIT 2004: 499-502 - [c10]Tingyao Jiang, Qinghua Li, Youlin Ruan:
Secure Dynamic Source Routing Protocol. CIT 2004: 528-533 - [c9]Weihai Zhang, Bor-Sen Chen, Qinghua Li:
Feedback stabilization of nonlinear stochastic time-delay systems with state and control-dependent noise. ACC 2004: 3689-3692 - [c8]Shengyi Jiang, Qinghua Li, Hui Wang:
A Novel Intrusion Detection Method. NPC 2004: 459-462 - 2003
- [c7]Zhixiang Zhang, Qinghua Li:
Automated Detection of Design Patterns. GCC (2) 2003: 694-697 - [c6]Hui Wang, Qinghua Li, Chuanxiang Ma, Kenli Li:
A Maximal Frequent Itemset Algorithm. RSFDGrC 2003: 484-490 - 2002
- [j4]Qinghua Li, Leslie A. Rusch:
Multiuser detection for DS-CDMA UWB in the home environment. IEEE J. Sel. Areas Commun. 20(9): 1701-1711 (2002) - [j3]Qinghua Li, Xiaodong Wang, Costas N. Georghiades:
Turbo multiuser detection for turbo-coded CDMA in multipath fading channels. IEEE Trans. Veh. Technol. 51(5): 1096-1108 (2002) - 2001
- [j2]Qinghua Li, Costas N. Georghiades, Xiaodong Wang:
An iterative receiver for turbo-coded pilot-assisted modulation in fading channels. IEEE Commun. Lett. 5(4): 145-147 (2001) - 2000
- [j1]Qinghua Li, Costas N. Georghiades:
On a geometric view of multiuser detection for synchronous DS/CDMA channels. IEEE Trans. Inf. Theory 46(7): 2723-2731 (2000) - [c5]Qinghua Li, Costas N. Georghiades, Xiaodong Wang:
An iterative decoding scheme for pilot-assisted modulation in fading channels. GLOBECOM 2000: 807-811 - [c4]Qinghua Li, Xiaodong Wang, Costas N. Georghiades:
An Iterative Multiuser Detector for Turbo-Coed CDMA in Multipath Fading Channels. ICC (2) 2000: 904-908
1990 – 1999
- 1993
- [c3]Qinghua Li, Atsuo Takanishi, Ichiro Kato:
Learning control for a biped walking robot with a trunk. IROS 1993: 1771-1777 - 1992
- [c2]Qinghua Li, Atsuo Takanishi, Ichiro Kato:
Learning Control Of Compensative Trunk Motion For Biped Walking Robot Based On ZMP Stability Criterion. IROS 1992: 597-603 - 1991
- [c1]Qinghua Li, Atsuo Takanishi, Ichiro Kato:
A biped walking robot having a ZMP measurement system using universal force-moment sensors. IROS 1991: 1568-1573
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint