default search action
Xiaoying Qiu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]ZhiGuo Du, Xingyu Chen, Minghao Jia, Xiaoying Qiu, Zelong Chen, Kaiming Zhu:
Spatial-Spectral Total Variation-Regularized Low-Rank Tensor Representation for Hyperspectral Anomaly Detection. J. Circuits Syst. Comput. 33(12): 2450216:1-2450216:21 (2024) - 2023
- [j6]Xiaoying Qiu, Jinwei Yu, Wenying Zhuang, Guangda Li, Xuan Sun:
Channel Prediction-Based Security Authentication for Artificial Intelligence of Things. Sensors 23(15): 6711 (2023) - 2021
- [j5]Xiaoying Qiu, Xuan Sun, Monson Hayes:
Enhanced Security Authentication Based on Convolutional-LSTM Networks. Sensors 21(16): 5379 (2021) - 2020
- [j4]Xiaoying Qiu, Jianmei Dai, Monson Hayes:
A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network. IEEE Access 8: 26139-26149 (2020) - [c8]Xiaoying Qiu, Zhidu Li, Xuan Sun, Tongyang Xu:
A Lightweight Intelligent Authentication Approach for Intrusion Detection. PIMRC 2020: 1-6 - [c7]Xiaoying Qiu, Xuan Sun, Xiameng Si:
Machine Learning-Based Security Authentication for IoT Networks. SGIoT 2020: 106-115 - [c6]Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du:
Exploiting User Selection Algorithm for Securing Wireless Communication Networks. TrustCom 2020: 1552-1555
2010 – 2019
- 2019
- [j3]Xiaoying Qiu, Zhiguo Du, Xuan Sun:
Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks. IEEE Access 7: 172004-172011 (2019) - [c5]Xiaoying Qiu, Ting Jiang, Sheng Wu, Chunxiao Jiang, Haipeng Yao, Monson H. Hayes, Abderrahim Benslimane:
Wireless User Authentication Based on KLT and Gaussian Mixture Model. WCNC 2019: 1-5 - 2018
- [j2]Xiaoying Qiu, Ting Jiang, Sheng Wu, Monson Hayes:
Physical Layer Authentication Enhancement Using a Gaussian Mixture Model. IEEE Access 6: 53583-53592 (2018) - [j1]Xiaoying Qiu, Ting Jiang, Ning Wang:
Safeguarding multiuser communication using full-duplex jamming and Q-learning algorithm. IET Commun. 12(15): 1805-1811 (2018) - [c4]Jian Jia, Ting Jiang, Wei Guo, Xiaoying Qiu:
Physical Layer Security of a Buffer-Aided Relay Selection for Underlay Cognitive Radio Network. CSPS (3) 2018: 999-1006 - 2017
- [c3]Xiaoying Qiu, Ting Jiang, Weixia Zou:
Physical layer security in simultaneous wireless information and power transfer networks. ISCIT 2017: 1-4 - [c2]Xiaoying Qiu, Ting Jiang:
Safeguarding multiuser communication using full-duplex jamming receivers. PIMRC 2017: 1-5 - 2015
- [c1]Xiaoying Qiu, Leilei Miao, Runbin Shi, Zhiwei Wang, Liang Liu, Di Wu:
A programmable baseband processor for massive MIMO uplink multi-user detection. ASICON 2015: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint