default search action
Qiming Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Duohong Xu, Weiru Niu, Qiming Li, Hu Li, Li Cheng:
Enhancing power marketing audit through IoT and multi-sensor information fusion: A substation scenario analysis. Comput. Electr. Eng. 118: 109312 (2024) - [j38]Taiyi Zhao, Yuchun Tang, Qiming Li, Jingquan Wang:
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation. Int. J. Crit. Infrastructure Prot. 45: 100673 (2024) - [j37]Kang Li, Xiaer Xiahou, Zhou Wu, Peng Shi, Lingyi Tang, Qiming Li:
Influencing Factor Identification and Simulation for Urban Metro System Operation Processes - A Resilience Enhancement Perspective. Syst. 12(2): 43 (2024) - [j36]Lingyi Tang, Shiqi Chen, Qiming Li:
Optimizing Maintenance Resource Scheduling and Site Selection for Urban Metro Systems: A Multi-Objective Approach to Enhance System Resilience. Syst. 12(7): 262 (2024) - [j35]Qiming Li, Jinghang Cheng, Yin Gao, Jun Li:
Learning Geometric Information via Transformer Network for Key-Points Based Motion Segmentation. IEEE Trans. Circuits Syst. Video Technol. 34(9): 7856-7869 (2024) - [j34]Jingyi Deng, Chenhao Lin, Pengbin Hu, Chao Shen, Qian Wang, Qi Li, Qiming Li:
Towards Benchmarking and Evaluating Deepfake Detection. IEEE Trans. Dependable Secur. Comput. 21(6): 5112-5127 (2024) - [j33]Zhen Xu, Jinjin Guo, Lang Qin, Yuntao Xie, Yao Xiao, Xinran Lin, Qiming Li, Xinyang Li:
Predicting ICU Interventions: A Transparent Decision Support Model Based on Multivariate Time Series Graph Convolutional Neural Network. IEEE J. Biomed. Health Informatics 28(6): 3709-3720 (2024) - [c34]Weihong Zhong, Xiaocheng Feng, Liang Zhao, Qiming Li, Lei Huang, Yuxuan Gu, Weitao Ma, Yuan Xu, Bing Qin:
Investigating and Mitigating the Multimodal Hallucination Snowballing in Large Vision-Language Models. ACL (1) 2024: 11991-12011 - [i5]Weihong Zhong, Xiaocheng Feng, Liang Zhao, Qiming Li, Lei Huang, Yuxuan Gu, Weitao Ma, Yuan Xu, Bing Qin:
Investigating and Mitigating the Multimodal Hallucination Snowballing in Large Vision-Language Models. CoRR abs/2407.00569 (2024) - [i4]Jun Li, Jinying Wu, Qiming Li, Feifei Guo:
GMFL-Net: A Global Multi-geometric Feature Learning Network for Repetitive Action Counting. CoRR abs/2409.00330 (2024) - 2023
- [j32]Qiming Li, Daizong Wan, Xiaoyan Yang:
A Fast and Accurate Human Pose Estimation Method Based on Multi-Scale Feature Fusion Grid Structure. Int. J. Pattern Recognit. Artif. Intell. 37(1): 2250044:1-2250044:23 (2023) - [j31]Taiyi Zhao, Yuchun Tang, Qiming Li, Jingquan Wang:
Resilience-oriented network reconfiguration strategies for community emergency medical services. Reliab. Eng. Syst. Saf. 231: 109029 (2023) - [j30]Yuhuai Peng, Jing Wang, Chunyang Hu, Yang Song, Qiming Li, Audithan Sivaraman:
Modeling and optimization of collaborative computing in regional multi-energy systems for energy Internet. Sustain. Comput. Informatics Syst. 39: 100877 (2023) - [j29]Jun Li, Yuquan Bi, Sumei Wang, Qiming Li:
CFRLA-Net: A Context-Aware Feature Representation Learning Anchor-Free Network for Pedestrian Detection. IEEE Trans. Circuits Syst. Video Technol. 33(9): 4948-4961 (2023) - [j28]Jun Li, Yuxuan Han, Yin Gao, Qiming Li, Sumei Wang:
An Enhance Relative Total Variation With BF Model for Edge-Preserving Image Smoothing. IEEE Trans. Circuits Syst. Video Technol. 33(10): 5420-5432 (2023) - [j27]Qiming Li, Zhao Zhang, Fuzhen Zhuang, Yongjun Xu, Chao Li:
Topic-aware Intention Network for Explainable Recommendation with Knowledge Enhancement. ACM Trans. Inf. Syst. 41(4): 92:1-92:23 (2023) - [c33]Qiming Li, Xia Yang, Haiyong Sun, Zhe Yan:
Automatic Generation of Formal BIP Models for C Programs. CSAE 2023: 52:1-52:7 - 2022
- [j26]Qiming Li, Yuquan Bi, Rongsheng Cai, Jun Li:
Occluded pedestrian detection through bi-center prediction in anchor-free network. Neurocomputing 507: 199-207 (2022) - [j25]Qiming Li, Lu Xu, Xiaoyan Yang:
2D Multi-Person Pose Estimation Combined with Face Detection. Int. J. Pattern Recognit. Artif. Intell. 36(2): 2256002:1-2256002:23 (2022) - [j24]Yuhuai Peng, Chenlu Wang, Qiming Li, Lei Liu, Keping Yu:
Distributed collaboration and anti-interference optimization in edge computing for IoT. J. Parallel Distributed Comput. 163: 156-165 (2022) - [j23]Zhidong Tang, Weiliang Fan, Qiming Li, Dehe Wang, Miaomiao Wen, Junhao Wang, Xingqiao Li, Yu Zhou:
MVIP: multi-omics portal of viral infection. Nucleic Acids Res. 50(D1): 817-836 (2022) - [j22]Yike Yuan, Xinghe Fu, Gaoang Wang, Qiming Li, Xi Li:
Forgery-Domain-Supervised Deepfake Detection With Non-Negative Constraint. IEEE Signal Process. Lett. 29: 2512-2516 (2022) - [j21]Qiming Li, Yijing Su, Yin Gao, Feng Xie, Jun Li:
OAF-Net: An Occlusion-Aware Anchor-Free Network for Pedestrian Detection in a Crowd. IEEE Trans. Intell. Transp. Syst. 23(11): 21291-21300 (2022) - [c32]Qiming Li, Zhao Zhang, Boyu Diao, Yongjun Xu, Chao Li:
Towards Understanding the Effect of Node Features on the Predictions of Graph Neural Networks. ICANN (2) 2022: 706-718 - [i3]Qiming Li, Sampo Sovio:
A Fast Hash Family for Memory Integrity. IACR Cryptol. ePrint Arch. 2022: 1378 (2022) - 2021
- [j20]Yangyang Li, Zonggui Chen, Hairong Liu, Qiming Li, Xing Lin, Shuhui Ji, Rui Li, Shaopeng Li, Weiliang Fan, Haiping Zhao, Zuoyan Zhu, Wei Hu, Yu Zhou, Daji Luo:
ASER: Animal Sex Reversal Database. Genom. Proteom. Bioinform. 19(6): 873-881 (2021) - [j19]Qiming Li, Hua Qiang, Jun Li:
Conditional random fields as message passing mechanism in anchor-free network for multi-scale pedestrian detection. Inf. Sci. 550: 1-12 (2021) - 2020
- [j18]Xingmei Wang, Qiming Li, Yue Yu, Yichao Xu:
Evaluation criterion of underwater object clustering segmentation with pulse-coupled neural network. IET Image Process. 14(16): 4076-4085 (2020) - [j17]Qiming Li, Xiaodong Lan, Jun Li:
Information fusion on the two-layer network for robust estimation of multiple geometric structures. Inf. Sci. 530: 148-166 (2020) - [j16]Yin Gao, Qiming Li, Jun Li:
Single image dehazing via a dual-fusion method. Image Vis. Comput. 94: 103868 (2020) - [j15]Yin Gao, Yijing Su, Qiming Li, Hongyun Li, Jun Li:
Single image dehazing via self-constructing image fusion. Signal Process. 167 (2020) - [j14]Qiming Li, Haishen Wu, Lu Xu, Likai Wang, Yueqi Lv, Xinjie Kang:
Low-Light Image Enhancement Based on Deep Symmetric Encoder-Decoder Convolutional Networks. Symmetry 12(3): 446 (2020) - [j13]Taotao Lai, Riqing Chen, Changcai Yang, Qiming Li, Hamido Fujita, Alireza Sadri, Hanzi Wang:
Efficient Robust Model Fitting for Multistructure Data Using Global Greedy Search. IEEE Trans. Cybern. 50(7): 3294-3306 (2020)
2010 – 2019
- 2019
- [j12]Xingmei Wang, Qiming Li, Jingwei Yin, Xiao Han, Wenqian Hao:
An Adaptive Denoising and Detection Approach for Underwater Sonar Image. Remote. Sens. 11(4): 396 (2019) - [j11]Taotao Lai, Hamido Fujita, Changcai Yang, Qiming Li, Riqing Chen:
Robust Model Fitting Based on Greedy Search and Specified Inlier Threshold. IEEE Trans. Ind. Electron. 66(10): 7956-7966 (2019) - 2018
- [j10]Yin Gao, Yijing Su, Qiming Li, Jun Li:
Single fog image restoration with multi-focus image fusion. J. Vis. Commun. Image Represent. 55: 586-595 (2018) - [j9]Qiming Li, Wenxiong Lin, Jun Li:
Human activity recognition using dynamic representation and matching of skeleton feature sequences from RGB-D images. Signal Process. Image Commun. 68: 265-272 (2018) - [c31]Xiaodong Lan, Qiming Li, Wei Hu, Mina Chong, Jun Li:
Multi-feature Joint Sparse Representation for RGB-D Object Recognition. ICIA 2018: 450-454 - [c30]Mina Chong, Qiming Li, Taotao Lai, Xiaodong Lan, Xiuzhong Wang, Jun Li:
Outliers Removed via Spectral Clustering for Robust Model Fitting. ISCID (1) 2018: 229-233 - 2017
- [j8]Qiming Li, Chen Huang, Shengqing Lv, Zeyu Li, Yimin Chen, Lizhuang Ma:
An Human-Computer Interactive Augmented Reality System for Coronary Artery Diagnosis Planning and Training. J. Medical Syst. 41(10): 159:1-159:11 (2017) - [j7]Qiming Li, Hanzi Wang, Yan Yan, Bo Li, Chang Wen Chen:
Local Co-Occurrence Selection via Partial Least Squares for Pedestrian Detection. IEEE Trans. Intell. Transp. Syst. 18(6): 1549-1558 (2017) - [c29]Qiming Li, Chen Huang, Zeyu Li, Yimin Chen, Lizhuang Ma:
HCI Based on Gesture Recognition in an Augmented Reality System for Diagnosis Planning and Training. IFIP TC12 ICIS 2017: 113-123 - [c28]Qiming Li, Liqing Hu, Yaping Gao, Yimin Chen, Lizhuang Ma:
A Two-Step Pedestrian Detection Algorithm Based on RGB-D Data. IFIP TC12 ICIS 2017: 288-294 - [c27]Xiaoxing Ou, Qiming Li, Dezhi Li:
Low-Carbon Architectural Design and Data Analysis Based on BIM. LSMS/ICSEE (1) 2017: 390-399 - 2016
- [j6]Qiming Li, Yan Yan, Hanzi Wang:
Discriminative Weighted Sparse Partial Least Squares for Human Detection. IEEE Trans. Intell. Transp. Syst. 17(4): 1062-1071 (2016) - [c26]Fankui Lin, Yongyu Chang, Xizeng Dai, Qiming Li, Anjian Li:
Methods for downlink performance enhancement in HST SFN. PIMRC 2016: 1-6 - 2014
- [j5]Weiwei Wu, Huanjia Yang, David Chew, Yanhong Hou, Qiming Li:
A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings. Sensors 14(5): 8465-8484 (2014) - 2013
- [j4]Yongliang Deng, Qiming Li, Ying Lu, Jingfeng Yuan:
Topology Vulnerability Analysis and Measure of Urban Metro Network: The case of Nanjing. J. Networks 8(6): 1350-1356 (2013) - [p2]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Secure Sketches for Protecting Biometric Templates. Security and Privacy in Biometrics 2013: 69-104 - 2012
- [j3]Qiming Li, John C. S. Lui, Dah-Ming Chiu:
On the Security and Efficiency of Content Distribution via Network Coding. IEEE Trans. Dependable Secur. Comput. 9(2): 211-221 (2012) - [c25]Zhong-Zhu Qiu, Qiming Li, Peng Li, Yi Zhang, Jia He, Wenwen Guo:
Theoretical Investigation of the Closed Type Parabolic Trough. ICDMA 2012: 958-966 - [c24]Zhiru Wang, Jingfeng Yuan, Ruoyu Jia, Qiming Li, Zhipeng Zhou, Ying Lu:
Access and monitor vulnerability of urban metro network system in China. SoSE 2012: 143-148 - 2011
- [c23]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - [c22]Qiming Li, Bilgehan Sahin, Ee-Chien Chang, Vrizlynn L. L. Thing:
Content based JPEG fragmentation point detection. ICME 2011: 1-6 - [p1]Ying Lu, Qiming Li, Jimmie Hinze:
Subway System Safety Risk Analysis Based on Bayesian Network. Modeling Risk Management in Sustainable Construction 2011: 219-227 - 2010
- [j2]Qiming Li, Sujoy Roy:
Secure Robust Hash Functions and Their Applications in Non-interactive Communications. Int. J. Digit. Crime Forensics 2(4): 51-62 (2010) - [c21]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Secure Sketch for Multiple Secrets. ACNS 2010: 367-383 - [c20]Qiming Li, Alvin Ong, Ponnuthurai N. Suganthan, Vrizlynn L. L. Thing:
A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification. SAISMC 2010: 236-247 - [c19]Jianjun Zhu, Qiming Li:
An Empirical Study of Residential Hedonic Prices in Nanjing. ICEE 2010: 2885-2889 - [c18]Qiming Li, Yongdong Wu, Feng Bao:
A Reversible Data Hiding Scheme for JPEG Images. PCM (1) 2010: 653-664
2000 – 2009
- 2008
- [c17]Qiming Li, Muchuan Guo, Ee-Chien Chang:
Fuzzy extractors for asymmetric biometric representations. CVPR Workshops 2008: 1-6 - [c16]Qiming Li, Sujoy Roy:
On the security of non-forgeable robust hash functions. ICIP 2008: 3124-3127 - [c15]Yongdong Wu, Qiming Li, Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208 - 2007
- [j1]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Protecting Biometric Templates With Sketch: Theory and Practice. IEEE Trans. Inf. Forensics Secur. 2(3-2): 503-512 (2007) - [c14]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Secure Biometric Templates from Fingerprint-Face Features. CVPR 2007 - [c13]Qiming Li, Nasir D. Memon:
Practical Security of Non-Invertiblewatermarking Schemes. ICIP (4) 2007: 445-448 - [c12]Qiming Li, Nasir D. Memon:
Security Models of Digital Watermarking. MCAM 2007: 60-64 - [c11]Husrev T. Sencar, Qiming Li, Nasir D. Memon:
A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214 - [c10]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
How to protect biometric templates. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650514 - 2006
- [c9]Qiming Li, Yagiz Sutcu, Nasir D. Memon:
Secure Sketch for Biometric Templates. ASIACRYPT 2006: 99-113 - [c8]Ee-Chien Chang, Qiming Li:
Hiding Secret Points Amidst Chaff. EUROCRYPT 2006: 59-72 - [c7]Qiming Li, Dah-Ming Chiu, John C. S. Lui:
On the Practical and Security Issues of Batch Content Distribution Via Network Coding. ICNP 2006: 158-167 - [c6]Qiming Li, Ee-Chien Chang:
Robust, short and sensitive authentication tags using secure sketch. MM&Sec 2006: 56-61 - [c5]Qiming Li, Ee-Chien Chang:
Zero-knowledge watermark detection resistant to ambiguity attacks. MM&Sec 2006: 158-163 - [i2]Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. IACR Cryptol. ePrint Arch. 2006: 90 (2006) - 2005
- [c4]Qiming Li, Ee-Chien Chang, Mun Choon Chan:
On the effectiveness of DDoS attacks on statistical filtering. INFOCOM 2005: 1373-1383 - [i1]Ee-Chien Chang, Qiming Li:
Small Secure Sketch for Point-Set Difference. IACR Cryptol. ePrint Arch. 2005: 145 (2005) - 2004
- [c3]Qiming Li, Ee-Chien Chang:
On the Possibility of Non-invertible Watermarking Schemes. Information Hiding 2004: 13-24 - 2003
- [c2]Qiming Li, Ee-Chien Chang:
Public Watermark Detection Using Multiple Proxies and Secret Sharing. IWDW 2003: 558-569 - 2002
- [c1]Qiming Li, Ee-Chien Chang:
Security of Public Watermarking Schemes for Binary Sequences. Information Hiding 2002: 119-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint