default search action
Qiuyu Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j89]Yi-Bo Huang, De-Huai Chen, Bo-Run Hua, Qiu-Yu Zhang:
A high-performance speech BioHashing retrieval algorithm based on audio segmentation. Comput. Speech Lang. 83: 101551 (2024) - [j88]Qiuyu Zhang, Lipeng Wang, Hao Meng, Wen Zhang, Genghua Huang:
A LiDAR Point Clouds Dataset of Ships in a Maritime Environment. IEEE CAA J. Autom. Sinica 11(7): 1681-1694 (2024) - [j87]Yingjie Hu, Qiuyu Zhang, Qiwen Zhang, Yugui Jia:
A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches. Multim. Syst. 30(1): 22 (2024) - [j86]Zhe Li, Qiuyu Zhang, Xiaopeng Li:
A novel large capacity coverless image steganography method based on hybrid framework of image generation-mapping. Multim. Syst. 30(6): 345 (2024) - [j85]Yingjie Hu, Qiuyu Zhang, Qiwen Zhang, Yujiao Ba:
An intelligent homomorphic audio signal encryption algorithm for secure interacting. Multim. Tools Appl. 83(9): 25675-25693 (2024) - [j84]Qiu-yu Zhang, Yong-wang Wen, Yi-Bo Huang, Fang-peng Li:
Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption. Multim. Tools Appl. 83(26): 67469-67500 (2024) - [j83]Qiu-yu Zhang, Guo-rui Wu, Rui Yang, Jia-yan Chen:
Digital image copyright protection method based on blockchain and zero trust mechanism. Multim. Tools Appl. 83(32): 77267-77302 (2024) - [j82]Qiuyu Zhang, Lipeng Wang, Hao Meng, Zhi Zhang, Chunsheng Yang:
Ship Detection in Maritime Scenes under Adverse Weather Conditions. Remote. Sens. 16(9): 1567 (2024) - [j81]Xiaopeng Li, Qiuyu Zhang, Zhe Li:
Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism. Signal Image Video Process. 18(11): 8251-8266 (2024) - [j80]Lingtao Meng, Qiuyu Zhang, Rui Yang, Yi-Bo Huang:
Unsupervised Deep Hashing with Dynamic Pseudo-Multi-Labels for Image Retrieval. IEEE Signal Process. Lett. 31: 909-913 (2024) - [j79]Lingtao Meng, Qiuyu Zhang, Rui Yang, Yi-Bo Huang:
Unsupervised Deep Triplet Hashing for Image Retrieval. IEEE Signal Process. Lett. 31: 1489-1493 (2024) - [j78]Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. J. Supercomput. 80(5): 6661-6698 (2024) - 2023
- [j77]Linyu Luo, Yijie Li, Fei Guo, Zugui Huang, Shuang Wang, Qiuyu Zhang, Zhitao Zhang, Yifei Yao:
Research on robust inversion model of soil moisture content based on GF-1 satellite remote sensing. Comput. Electron. Agric. 213: 108272 (2023) - [j76]Yi-Bo Huang, Peng-Wei Xie, Jun-Bin Gao, Qiu-Yu Zhang:
A Robust Chaotic Map and Its Application to Speech Encryption in Dual Frequency Domain. Int. J. Bifurc. Chaos 33(8): 2350096:1-2350096:18 (2023) - [j75]Qiuyu Zhang, Minrui Fu, Zhenyu Zhao, Yibo Huang:
Searchable encryption over encrypted speech retrieval scheme in cloud storage. J. Inf. Secur. Appl. 76: 103542 (2023) - [j74]Li An, Yi-Bo Huang, Qiu-yu Zhang:
Verifiable speech retrieval algorithm based on KNN secure hashing. Multim. Tools Appl. 82(5): 7803-7824 (2023) - [j73]Tengfei Chen, Yi-Bo Huang, Xiang-rong Pu, Shaohui Yan, Qiu-yu Zhang:
Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion. Multim. Tools Appl. 82(11): 16767-16792 (2023) - [j72]Yuan Zhang, Yi-Bo Huang, De-Huai Chen, Qiu-yu Zhang:
Verifiable speech retrieval algorithm based on diversity security template and biohashing. Multim. Tools Appl. 82(24): 36973-37002 (2023) - [j71]Qiuyu Zhang, Lipeng Wang, Wanyi Li, Hao Meng, Wen Zhang, Zhi Zhang, Peng Wang:
OS-DS tracker: Orientation-variant Siamese 3D tracking with Detection based Sampling. Pattern Recognit. Lett. 174: 57-63 (2023) - [j70]Xiaotao Li, Shengjiang Wang, Xiangyou Peng, Guan Xu, Jingshi Dong, Fengjun Tian, Qiuyu Zhang:
The Frequency-Variable Rotor-Blade-Based Two-Degree-of-Freedom Actuation Principle for Linear and Rotary Motion. Sensors 23(19): 8314 (2023) - [j69]Xingyu Li, Dingquan Liu, Junli Su, Leihao Sun, Haihan Luo, Gang Chen, Chong Ma, Qiuyu Zhang:
Enhanced Near-Infrared Ultra-Narrow Absorber Based on a Dielectric Nano-Resonant Ring for Refractive Index Sensing. Sensors 23(20): 8402 (2023) - [j68]Qiu-yu Zhang, Fu-jiu Xu:
Encrypted speech authentication and recovery scheme based on fragile watermarking. Telecommun. Syst. 82(1): 125-140 (2023) - [j67]Qiuyu Zhang, Zhenyu Zhao:
Distributed storage scheme for encryption speech data based on blockchain and IPFS. J. Supercomput. 79(1): 897-923 (2023) - 2022
- [j66]Jing-Tao Sun, Qiu-Yu Zhang:
Product typicality attribute mining method based on a topic clustering ensemble. Artif. Intell. Rev. 55(8): 6629-6654 (2022) - [j65]Huoyuan Duan, Qiuyu Zhang:
Residual-Based a Posteriori Error Estimates for the Time-Dependent Ginzburg-Landau Equations of Superconductivity. J. Sci. Comput. 93(2): 79 (2022) - [j64]Yibo Huang, Hexiang Hou, Tengfei Chen, Hao Li, Qiu-yu Zhang:
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values. Multim. Tools Appl. 81(2): 2873-2899 (2022) - [j63]Qiu-Yu Zhang, Xuejiao Zhao, Qiwen Zhang, Yuzhou Li:
Content-based encrypted speech retrieval scheme with deep hashing. Multim. Tools Appl. 81(7): 10221-10242 (2022) - [j62]Yibo Huang, Yong Wang, Hao Li, Yuan Zhang, Qiu-yu Zhang:
Encrypted speech retrieval based on long sequence Biohashing. Multim. Tools Appl. 81(9): 13065-13085 (2022) - [j61]Qiu-yu Zhang, Jian Bai, Fu-jiu Xu:
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing. Multim. Tools Appl. 81(11): 15127-15151 (2022) - [j60]Yibo Huang, Tengfei Chen, Qiu-yu Zhang, Yuan Zhang, Shaohui Yan:
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum. Multim. Tools Appl. 81(18): 25829-25852 (2022) - [j59]Yibo Huang, Yuan-Zhang, Tengfei Chen, Shaohui Yan, Qiu-yu Zhang:
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map. Multim. Tools Appl. 81(26): 37953-37979 (2022) - [j58]Yongbing Zhang, Qiuyu Zhang, Yilong Jiang, Yan Yan:
A location privacy protection method based on cipher-text retrieval in cloud environment. Secur. Priv. 5(5) (2022) - [j57]Jinjun Rao, Kai Xu, Jinbo Chen, Jingtao Lei, Zhen Zhang, Qiuyu Zhang, Wojciech Giernacki, Mei Liu:
Sea-Surface Target Visual Tracking with a Multi-Camera Cooperation Approach. Sensors 22(2): 693 (2022) - 2021
- [j56]Qiuyu Zhang, Jitian Han, Yutong Ye:
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding. IET Image Process. 15(4): 885-896 (2021) - [j55]Qiu-yu Zhang, Fu-jiu Xu, Jian Bai:
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination. KSII Trans. Internet Inf. Syst. 15(2): 522-539 (2021) - [j54]Qiu-yu Zhang, Yu-zhou Li, Yingjie Hu:
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing. Multim. Tools Appl. 80(1): 1201-1221 (2021) - [j53]Yong Wang, Yibo Huang, Ran Zhang, Qiu-yu Zhang:
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion. Multim. Tools Appl. 80(7): 10013-10036 (2021) - [j52]Qiuyu Zhang, Jitian Han:
A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multim. Tools Appl. 80(9): 13841-13864 (2021) - [j51]Qiu-yu Zhang, Deng-hai Zhang, Fu-jiu Xu:
An encrypted speech authentication and tampering recovery method based on perceptual hashing. Multim. Tools Appl. 80(16): 24925-24948 (2021) - [j50]Yibo Huang, Hao Li, Yong Wang, Yi-rong Xie, Qiu-yu Zhang:
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion. Multim. Tools Appl. 80(25): 33615-33640 (2021) - [j49]Qiuyu Zhang, Jian Li, Pengzhan Huang:
Recovery type a posteriori error estimates for the conduction convection problem. Numer. Algorithms 86(1): 425-441 (2021) - [j48]Hailin Xiao, Qiuyu Zhang, Shan Ouyang, Anthony Theodore Chronopoulos:
Connectivity Probability Analysis for VANET Freeway Traffic Using a Cell Transmission Model. IEEE Syst. J. 15(2): 1815-1824 (2021) - [j47]Hailin Xiao, Xiaolan Liu, Qiuyu Zhang, Anthony Theodore Chronopoulos:
Connectivity probability analysis for freeway vehicle scenarios in vehicular networks. Wirel. Networks 27(1): 465-474 (2021) - 2020
- [j46]Qiu-yu Zhang, Yuzhou Li, Yingjie Hu, Xuejiao Zhao:
An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM. IEEE Access 8: 148556-148569 (2020) - [j45]Qiu-yu Zhang, Xuejiao Zhao, Yingjie Hu:
A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing. IEEE Access 8: 202469-202482 (2020) - [j44]Jing-Tao Sun, Qiu-Yu Zhang:
Completion of multiview missing data based on multi-manifold regularised non-negative matrix factorisation. Artif. Intell. Rev. 53(7): 5411-5428 (2020) - [j43]Qiuyu Zhang, Deng-hai Zhang, Liang Zhou:
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing. Turkish J. Electr. Eng. Comput. Sci. 28(5): 2467-2482 (2020) - [j42]Rui-Hong Dong, Xue-Yong Li, Qiu-Yu Zhang, Hui Yuan:
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network. IET Inf. Secur. 14(2): 166-174 (2020) - [j41]Rui-Hong Dong, Hou-Hua Yan, Qiu-Yu Zhang:
An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm. Int. J. Netw. Secur. 22(2): 218-230 (2020) - [j40]Emmanuel Mugabo, Qiu-Yu Zhang:
Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. Int. J. Netw. Secur. 22(2): 231-241 (2020) - [j39]Qiu-yu Zhang, Yu-zhou Li, Yingjie Hu:
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing. KSII Trans. Internet Inf. Syst. 14(6): 2612-2633 (2020) - [j38]Qiu-yu Zhang, Zi-xian Ge, Yingjie Hu, Jian Bai, Yi-Bo Huang:
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction. Multim. Tools Appl. 79(9-10): 6337-6361 (2020) - [j37]Yi-Bo Huang, Yong Wang, Qiu-yu Zhang, Wei-zhao Zhang, Manhong Fan:
Multi-format speech BioHashing based on spectrogram. Multim. Tools Appl. 79(33-34): 24889-24909 (2020) - [j36]Qiu-yu Zhang, Gai-li Li, Yi-Bo Huang:
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multim. Tools Appl. 79(39-40): 29775-29798 (2020) - [c26]Walid R. Ghanem, Vahid Jamali, Qiuyu Zhang, Robert Schober:
Joint Uplink-Downlink Resource Allocation for OFDMA-URLLC MEC Systems. GLOBECOM 2020: 1-7 - [i1]Walid R. Ghanem, Vahid Jamali, Qiuyu Zhang, Robert Schober:
Joint Uplink-Downlink Resource Allocation for OFDMA-URLLC MEC Systems. CoRR abs/2005.04707 (2020)
2010 – 2019
- 2019
- [j35]Qiuyu Zhang, Zixian Ge, Liang Zhou, Yongbing Zhang:
An efficient retrieval algorithm of encrypted speech based on inverse fast Fouriertransform and measurement matrix. Turkish J. Electr. Eng. Comput. Sci. 27(3): 1719-1736 (2019) - [j34]Qiuyu Zhang, Jitian Han, Yutong Ye:
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding. IET Image Process. 13(14): 2905-2915 (2019) - [j33]Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, Dong-Fang Wu:
Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification. Int. J. Netw. Secur. 21(2): 259-268 (2019) - [j32]Yong-bing Zhang, Qiu-Yu Zhang, Zongyi Li, Yan Yan, Mo-yi Zhang:
A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics. Int. J. Netw. Secur. 21(6): 937-946 (2019) - [j31]Xing-Rong Fan, Jinsha Huang, Rui Zhang, Fei Wang, Qiuyu Zhang, Guanlin Li, Jinyong Yan, Houjin Zhang, Yunjun Yan, Li Xu:
Convolution Neural Network-Based Prediction of Protein Thermostability. J. Chem. Inf. Model. 59(11): 4833-4843 (2019) - [j30]Qiu-yu Zhang, Liang Zhou, Tao Zhang, Deng-hai Zhang:
A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multim. Tools Appl. 78(13): 17825-17846 (2019) - [j29]Hailin Xiao, Yuhong Chen, Qiuyu Zhang, Anthony Theodore Chronopoulos, Zhongshan Zhang, Shan Ouyang:
Joint Clustering and Power Allocation for the Cross Roads Congestion Scenarios in Cooperative Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 20(6): 2267-2277 (2019) - [c25]Ya Wang, Qiuyu Zhang, Lizhi Zhang, Yunyan Hu:
A Method to Automatic Measuring Riding Comfort of Autonomous Vehicles: Based on Passenger Subjective Rating and Vehicle Parameters. HCI (20) 2019: 130-145 - 2018
- [j28]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string. Int. J. Inf. Commun. Technol. 12(1/2): 31-50 (2018) - [j27]Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Hong-xiang Duan:
Mutual Information-based Intrusion Detection Model for Industrial Internet. Int. J. Netw. Secur. 20(1): 131-140 (2018) - [j26]Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu:
Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor. Int. J. Netw. Secur. 20(2): 206-216 (2018) - [j25]Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Tao Zhang:
Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet. Int. J. Netw. Secur. 20(2): 359-370 (2018) - [j24]Qiu-Yu Zhang, Qi-Yan Dou, Yan Yan, Wen-Jin Hu:
High Capacity Reversible Data Hiding Algorithm for Color Image Based on Bicubic Interpolation Extension. J. Inf. Hiding Multim. Signal Process. 9(1): 61-74 (2018) - [j23]Mo-yi Zhang, Qiu-yu Zhang, Hong-xiang Duan, Hai-yan Chen:
Self-Calibration Based View-Invariant Hand Gesture Trajectory Analysis. J. Inf. Hiding Multim. Signal Process. 9(5): 1114-1127 (2018) - [j22]Qiu-Yu Zhang, Zi-xian Ge, Si-Bin Qiao:
An Efficient Retrieval Method of Encrypted Speech Based on Frequency Band Variance. J. Inf. Hiding Multim. Signal Process. 9(6): 1452-1463 (2018) - [j21]Jing-Tao Sun, Qiu-Yu Zhang:
A Game Theory based Feature Word Selection Model for Chinese Texts. J. Inf. Sci. Eng. 34(2): 535-550 (2018) - [j20]Qiu-yu Zhang, Wen-Jin Hu, Yi-Bo Huang, Si-Bin Qiao:
An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multim. Tools Appl. 77(2): 1555-1581 (2018) - [j19]Qiu-yu Zhang, Si-Bin Qiao, Yi-Bo Huang, Tao Zhang:
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multim. Tools Appl. 77(16): 21653-21669 (2018) - 2017
- [j18]Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, Yi-Bo Huang:
Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio. Int. J. Netw. Secur. 19(5): 752-760 (2017) - [j17]Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang:
The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set. Int. J. Netw. Secur. 19(6): 880-888 (2017) - [j16]Mo-yi Zhang, Qiu-yu Zhang, Hong-xiang Duan, Hui-yi Wei:
View-Invariant Hand Gesture Planar Trajectory Recognition on Monocular Vision. J. Inf. Hiding Multim. Signal Process. 8(1): 76-85 (2017) - [j15]Qiu-Yu Zhang, Qi-Yan Dou, Rui-Hong Dong, Yan Yan:
Robust Reversible Data Hiding Algorithm for Color Image Based on 2D-DCT. J. Inf. Hiding Multim. Signal Process. 8(2): 392-403 (2017) - [j14]Qiu-Yu Zhang, Qi-Yan Dou, Zi Yang, Yan Yan:
Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization. J. Inf. Hiding Multim. Signal Process. 8(3): 525-535 (2017) - [j13]Qiu-Yu Zhang, Zi Yang, Qi-Yan Dou, Yan Yan:
Robust Hashing for Color Image Authentication Using Non-Subsampled Contourlet Transform Features and Salient Features. J. Inf. Hiding Multim. Signal Process. 8(5): 1029-1042 (2017) - [c24]Qiu-Yu Zhang, Sibin Qiao, Tao Zhang, Yi-Bo Huang:
A fast speech feature extraction method based on perceptual hashing. ICNC-FSKD 2017: 1295-1300 - 2016
- [j12]Qiu-Yu Zhang, Shuang Yu, Ning Chen, Wen-Jin Hu, Si-Bin Qiao:
An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream. J. Inf. Hiding Multim. Signal Process. 7(5): 1031-1040 (2016) - [j11]Qiu-Yu Zhang, Shuang Yu, Wen-Jin Hu, Si-Bin Qiao, Tao Zhang:
An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System. J. Inf. Hiding Multim. Signal Process. 7(5): 1126-1135 (2016) - [c23]Qiu-Yu Zhang, Wen-Jin Hu, Yi-Bo Huang, Si-Bin Qiao:
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment. ICIC (1) 2016: 99-111 - 2015
- [j10]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition. J. Inf. Hiding Multim. Signal Process. 6(2): 311-322 (2015) - [j9]Qiu-Yu Zhang, Shuang Yu, Peng-Fei Xing, Yi-Bo Huang, Zhan-Wei Ren:
An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication. J. Inf. Hiding Multim. Signal Process. 6(6): 1231-1241 (2015) - 2014
- [j8]Qiu-yu Zhang, Hui-yi Wei, Mo-yi Zhang, Zhi-gang Xu, Hong-xiang Duan, Lu Lv:
Research on Hand Gesture Recognition Based on Inner-Distance Contour Point Distribution Features and Histogram Matching. J. Comput. 9(10): 2455-2460 (2014) - [c22]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform. 3PGCIC 2014: 622-627 - 2013
- [j7]Xiao Zou, Heng Wang, Qiuyu Zhang:
Hand Gesture Target Model Updating and Result Forecasting Algorithm based on Mean Shift. J. Multim. 8(1): 1-7 (2013) - [c21]Xiao Zou, Heng Wang, HongXiang Duan, Qiuyu Zhang:
A Hand Model Updating Algorithm Based on Mean Shift. ICICA (1) 2013: 651-660 - 2012
- [j6]Qiu-yu Zhang, Peng Wang, Hui-juan Yang:
Applications of Text Clustering Based on Semantic Body for Chinese Spam Filtering. J. Comput. 7(11): 2612-2616 (2012) - [j5]Fuqing Zhao, XinYing Li, Qiuyu Zhang, Jonrinaldi:
Polar-Radius-Invariant-Moment Based on Key-Points for Hand Gesture Shape Recognition. J. Softw. 7(1): 88-94 (2012) - 2010
- [j4]Fuqing Zhao, Yi Hong, Dongmei Yu, Yahong Yang, Qiuyu Zhang:
A hybrid particle swarm optimisation algorithm and fuzzy logic for process planning and production scheduling integration in holonic manufacturing systems. Int. J. Comput. Integr. Manuf. 23(1): 20-39 (2010) - [c20]Shuxia Pang, Rui Li, Zhanting Yuan, Qiuyu Zhang:
Subsequence kernel-based Chinese recommender system. ICNC 2010: 3652-3655
2000 – 2009
- 2009
- [j3]Jingtao Sun, Qiuyu Zhang, Zhanting Yuan:
Application of Refined LSA and MD5 Algorithms in Spam Filtering. J. Comput. 4(3): 245-250 (2009) - [j2]Qiu-yu Zhang, Mo-yi Zhang, Jian-Qiang Hu:
Hand Gesture Contour Tracking Based on Skin Color Probability and State Estimation Model. J. Multim. 4(6): 349-355 (2009) - [j1]Jingtao Sun, Qiuyu Zhang, Zhanting Yuan:
Fuzzy Clustering Algorithm based on Factor Analysis and its Application to Mail Filtering. J. Softw. 4(1): 58-64 (2009) - [c19]Jianbin Xue, Aihua Zhang, Zhanting Yuan, Jie Cao, Qiuyu Zhang:
A Cross-Layer Design-Based Power-Saving Mechanism for IEEE 802.16e. CSIE (1) 2009: 520-523 - [c18]Qiuyu Zhang, Zan Qiao, Zhanting Yuan:
Grid Resource Discovery Model Based on Improved Architecture and Multicast. GCC 2009: 427-429 - 2008
- [c17]Qiuyu Zhang, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan:
Construction of a Dynamic Trust Ontology Model. CIS (1) 2008: 394-398 - [c16]Qiuyu Zhang, Zhi Fan, Sanjun Sui, Fengman Miao:
A consistency maintenance algorithm with cursor position maintenance in real-time cooperative editing systems based on GOT algorithm. CSCWD 2008: 41-46 - [c15]Jingtao Sun, Qiuyu Zhang, Zhanting Yuan, Wenhan Huang, Xiaowen Yan, Jianshe Dong:
A Junk Mail Filtering Method Based on LSA and FSVM. FSKD (3) 2008: 111-115 - [c14]Qiuyu Zhang, Fan Chen, Xinwen Liu:
Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background. ICESS 2008: 338-343 - [c13]Jingtao Sun, Qiuyu Zhang, Zhanting Yuan, Wenhan Huang, Xiaowen Yan, Jianshe Dong:
Calculation of Latent Semantic Weight Based on Fuzzy Membership. ISNN (2) 2008: 91-99 - [c12]Jingtao Sun, Qiuyu Zhang, Zhanting Yuan, Wenhan Huang, Xiaowen Yan, Jianshe Dong:
Research of Spam Filtering System Based on LSA and SHA. ISNN (2) 2008: 331-340 - [c11]Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu:
Network Security Situation Assessment Based on Data Fusion. WKDD 2008: 542-545 - 2007
- [c10]Fuqing Zhao, Qiuyu Zhang, Aihong Zhu:
Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization. CIS 2007: 536-539 - [c9]Qiuyu Zhang, Sanjun Sui, Jingrong Li:
Research and Realization of Transaction Concurrency Control in Grid Database. GCC 2007: 168-172 - [c8]Qiuyu Zhang, Lei Sun, Yanfeng Jin:
Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensor. SNPD (1) 2007: 350-354 - 2006
- [c7]Qiuyu Zhang, Peng Huang, Yue Yang:
A Design Method of Distributed Workflow Engine. CSCWD 2006: 494-498 - [c6]Fuqing Zhao, Qiuyu Zhang, Yahong Yang:
A Scheduling Holon Modeling Method with Petri Net and its Optimization with a Novel PSO-GA Algorithm. CSCWD 2006: 1302-1307 - [c5]Fuqing Zhao, Qiuyu Zhang, Yahong Yang:
A Novel Task Allocation Problem Solution with PSO Algorithm for Holonic Manufacturing System. CSCWD 2006: 1308-1313 - [c4]Fuqing Zhao, Yahong Yang, Qiuyu Zhang, Huawei Yi:
Timed Petri-Net(TPN) Based Scheduling Holon and Its Solution with a Hybrid PSO-GA Based Evolutionary Algorithm(HPGA). PRICAI 2006: 880-884 - 2005
- [c3]Mixia Liu, Qiuyu Zhang, Dongmei Yu, Zhao Hong:
Formal security model research based on Petri-net. GrC 2005: 575-578 - [c2]Fuqing Zhao, Qiuyu Zhang, Dongmei Yu, Xuhui Chen, Yahong Yang:
A Hybrid Algorithm Based on PSO and Simulated Annealing and Its Applications for Partner Selection in Virtual Enterprise. ICIC (1) 2005: 380-389 - [c1]Pengshou Xie, Yongping Kang, Qiuyu Zhang:
Research on Application of Development Method of Knowledge Base in the Integrated System for ICAD. PDCAT 2005: 1017-1020
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint