default search action
Yue Qin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Yuanchun Shi, Xin Yi, Chen Liang, Yue Qin, Yuntao Wang, Yukang Yan, Zhimin Cheng, Pengye Zhu, Shiyu Zhang, Yongjuan Li, Yanci Liu, Xuesong Wang, Jiawen Chen, Weixuan Zhou, Yifan Wang, Diya Zhao, Feng Du:
HCI Research and Innovation in China: A 10-Year Perspective. Int. J. Hum. Comput. Interact. 40(8): 1799-1831 (2024) - [c28]Zhixin Li, Rui Zhu, Zihao Wang, Jiale Li, Kaiyuan Liu, Yue Qin, Yongming Fan, Mingyu Gu, Zhihui Lu, Jie Wu, Hongfeng Chai, Xiaofeng Wang, Haixu Tang:
FairFix: Enhancing Fairness of Pre-Trained Deep Neural Networks with Scarce Data Resources. IDS 2024: 14-20 - 2023
- [c27]Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. CCS 2023: 756-770 - [c26]Yue Qin, Yue Xiao, Xiaojing Liao:
Vulnerability Intelligence Alignment via Masked Graph Attention Networks. CCS 2023: 2202-2216 - [c25]Zisu Li, Chen Liang, Yuntao Wang, Yue Qin, Chun Yu, Yukang Yan, Mingming Fan, Yuanchun Shi:
Enabling Voice-Accompanying Hand-to-Face Gesture Recognition with Cross-Device Sensing. CHI 2023: 313:1-313:17 - [c24]Yue Qin, Chun Yu, Wentao Yao, Jiachen Yao, Chen Liang, Yueting Weng, Yukang Yan, Yuanchun Shi:
Selecting Real-World Objects via User-Perspective Phone Occlusion. CHI 2023: 531:1-531:13 - [c23]Xurui Li, Yue Qin, Rui Zhu, Tianqianjin Lin, Yongming Fan, Yangyang Kang, Kaisong Song, Fubang Zhao, Changlong Sun, Haixu Tang, Xiaozhong Liu:
STINMatch: Semi-Supervised Semantic-Topological Iteration Network for Financial Risk Detection via News Label Diffusion. EMNLP 2023: 9304-9315 - [c22]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. USENIX Security Symposium 2023: 1091-1108 - [i14]Zisu Li, Chen Liang, Yuntao Wang, Yue Qin, Chun Yu, Yukang Yan, Mingming Fan, Yuanchun Shi:
Enabling Voice-Accompanying Hand-to-Face Gesture Recognition with Cross-Device Sensing. CoRR abs/2303.10441 (2023) - 2022
- [j19]Yue Qin, Xiaoli Li, Jia Wu, Keping Yu:
A management method of chronic diseases in the elderly based on IoT security environment. Comput. Electr. Eng. 102: 108188 (2022) - [j18]Ruoyu Ding, Chi Cheng, Yue Qin:
Further Analysis and Improvements of a Lattice-Based Anonymous PAKE Scheme. IEEE Syst. J. 16(3): 5035-5043 (2022) - [j17]Ruijie Xi, Yue Qin, Weiping Jiang, Xiaohui Zhou, Dongsheng Xu, Xiaochun Fan:
Water Level Retrieval Using a posteriori Residual of GNSS Pseudorange and Carrier-Phase Observations. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [c21]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [c20]Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun:
ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model. NAACL-HLT 2022: 1735-1746 - [c19]Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. RAID 2022: 495-509 - [i13]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. CoRR abs/2206.06274 (2022) - [i12]Yue Qin, Xiaojing Liao:
Cybersecurity Entity Alignment via Masked Graph Attention Networks. CoRR abs/2207.01434 (2022) - [i11]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - 2021
- [j16]Xiao Zhao, Jianhua Yang, Yue Qin:
Optimal Condition-Based Maintenance Strategy via an Availability-Cost Hybrid Factor for a Single-Unit System During a Two-Stage Failure Process. IEEE Access 9: 45968-45977 (2021) - [j15]Jinsong Zhang, Yue Qin, Li Wang:
Parameter Measurement of Live Animals Based on the Mirror of Multiview Point Cloud. Comput. Intell. Neurosci. 2021: 9528787:1-9528787:10 (2021) - [j14]Mao-Xian Zhao, Yue Qin:
Feature Selection on Elite Hybrid Binary Cuckoo Search in Binary Label Classification. Comput. Math. Methods Medicine 2021: 5588385:1-5588385:13 (2021) - [j13]Chen Liang, Chun Yu, Yue Qin, Yuntao Wang, Yuanchun Shi:
DualRing: Enabling Subtle and Expressive Hand Interaction with Dual IMU Rings. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 115:1-115:27 (2021) - [c18]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. ASIACRYPT (4) 2021: 92-121 - [c17]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c16]Yue Qin, Chun Yu, Zhaoheng Li, Mingyuan Zhong, Yukang Yan, Yuanchun Shi:
ProxiMic: Convenient Voice Activation via Close-to-Mic Speech Detected by a Single Microphone. CHI 2021: 8:1-8:12 - [c15]Zeyu Qin, Liuqing Ye, Zhe Wang, Yue Qin, Jiyuan Huang, Xiong Xie, Xiangwei Hu:
A Line Selection Method Based on Transient Phase Current Variation Comparison. ICITEE 2021: 26:1-26:5 - [i10]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - [i9]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2021: 123 (2021) - [i8]Xiaohan Zhang, Chi Cheng, Yue Qin, Ruoyu Ding:
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. IACR Cryptol. ePrint Arch. 2021: 168 (2021) - 2020
- [j12]Yue Qin, Ronglin Li, Yuehui Cui:
Embeddable Structure for Reducing Mutual Coupling in Massive MIMO Antennas. IEEE Access 8: 195102-195112 (2020) - [j11]Biao Zhang, Deyi Xiong, Jinsong Su, Yue Qin:
Alignment-Supervised Bidimensional Attention-Based Recursive Autoencoders for Bilingual Phrase Representation. IEEE Trans. Cybern. 50(2): 503-513 (2020) - [c14]Yue Qin, Jian Peng, Yuan Zhou:
A PTAS for the Bayesian Thresholding Bandit Problem. AISTATS 2020: 2455-2464 - [c13]Yue Qin, Hassan A. Karimi:
Spatial Knowledge Acquisition for Cognitive Maps in Autonomous Vehicles. HCI (7) 2020: 384-397 - [c12]Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. NDSS 2020
2010 – 2019
- 2019
- [j10]Jinsong Su, Xiangwen Zhang, Qian Lin, Yue Qin, Junfeng Yao, Yang Liu:
Exploiting reverse target-side contexts for neural machine translation via asynchronous bidirectional decoding. Artif. Intell. 277 (2019) - [j9]Yue Qin, Shifei Ding, Lijuan Wang, Yanru Wang:
Research Progress on Semi-Supervised Clustering. Cogn. Comput. 11(5): 599-612 (2019) - [j8]Yue Qin, Shifei Ding:
半监督聚类综述 (Survey of Semi-supervised Clustering). 计算机科学 46(9): 15-21 (2019) - [j7]Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi:
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era. IEEE Trans. Smart Grid 10(6): 6386-6395 (2019) - [c11]Chun Yu, Xiaoying Wei, Shubh Vachher, Yue Qin, Chen Liang, Yueting Weng, Yizheng Gu, Yuanchun Shi:
HandSee: Enabling Full Hand Interaction on Smartphone with Front Camera-based Stereo Vision. CHI 2019: 705 - [c10]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. ESORICS (2) 2019: 504-520 - [c9]Shen Chen, Wei Ma, Yue Qin:
CNN-Based Stereoscopic Image Inpainting. ICIG (3) 2019: 95-106 - [c8]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - [i7]Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). IACR Cryptol. ePrint Arch. 2019: 271 (2019) - [i6]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. IACR Cryptol. ePrint Arch. 2019: 435 (2019) - [i5]Yue Qin, Chi Cheng, Jintai Ding:
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. IACR Cryptol. ePrint Arch. 2019: 1343 (2019) - 2018
- [j6]Yangfan Li, Wei Ren, Tianqing Zhu, Yi Ren, Yue Qin, Wei Jie:
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms. Future Gener. Comput. Syst. 87: 259-266 (2018) - [j5]Jinsong Su, Shan Wu, Biao Zhang, Changxing Wu, Yue Qin, Deyi Xiong:
A neural generative autoencoder for bilingual word embeddings. Inf. Sci. 424: 287-300 (2018) - [j4]Wei Ma, Yue Qin, Shibiao Xu, Xiaopeng Zhang:
Interactive stereo image segmentation via adaptive prior selection. Multim. Tools Appl. 77(21): 28709-28724 (2018) - [c7]Xiangwen Zhang, Jinsong Su, Yue Qin, Yang Liu, Rongrong Ji, Hongji Wang:
Asynchronous Bidirectional Decoding for Neural Machine Translation. AAAI 2018: 5698-5705 - [c6]Xueru Zhang, Xiao Jiang, Yue Qin:
Ecological Land Cold Island Effect Evaluation Based on Land Surface Temperature Retrieval. Agro-Geoinformatics 2018: 1-4 - [c5]Xueru Zhang, Qianyuan Liu, Yue Qin:
Research of Land Use Ground Temperature Effect in the Main Districts of Chongqing. Agro-Geoinformatics 2018: 1-4 - [c4]Jing Yang, Biao Zhang, Yue Qin, Xiangwen Zhang, Qian Lin, Jinsong Su:
Otem&Utem: Over- and Under-Translation Evaluation Metric for NMT. NLPCC (1) 2018: 291-302 - [i4]Xiangwen Zhang, Jinsong Su, Yue Qin, Yang Liu, Rongrong Ji, Hongji Wang:
Asynchronous Bidirectional Decoding for Neural Machine Translation. CoRR abs/1801.05122 (2018) - [i3]Rui Xu, Chi Cheng, Yue Qin, Tao Jiang:
Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things. CoRR abs/1805.04880 (2018) - [i2]Jing Yang, Biao Zhang, Yue Qin, Xiangwen Zhang, Qian Lin, Jinsong Su:
Otem&Utem: Over- and Under-Translation Evaluation Metric for NMT. CoRR abs/1807.08945 (2018) - 2017
- [j3]Yue Qin, Long Yu, Shengwei Tian, Jianguo Zhao, Guanjun Feng:
基于深度置信网络的维吾尔语人称代词待消解项识别 (Anaphoricity Determination of Uyghur Personal Pronouns Based on Deep Belief Network). 计算机科学 44(10): 228-233 (2017) - [c3]Bilong Shen, Ying Zhao, Guoliang Li, Weimin Zheng, Yue Qin, Bo Yuan, Yongming Rao:
V-Tree: Efficient kNN Search on Moving Objects with Road-Network Constraints. ICDE 2017: 609-620 - [c2]Yue Qin, Xingliang Zou, Albert M. K. Cheng, Yu Jiang:
Finding a Steady State Point for Fixed Priority Independent Periodic Real-Time Tasks with Arbitrary Given Release Offsets. ISORC 2017: 203-206 - 2016
- [j2]Wei Ma, Yue Qin, Luwei Yang, Shibiao Xu, Xiaopeng Zhang:
Interactive Stereo Image Segmentation With RGB-D Hybrid Constraints. IEEE Signal Process. Lett. 23(11): 1533-1537 (2016) - 2014
- [j1]Suzanne L. West, William Johnson, Wendy Visscher, Marianne Kluckman, Yue Qin, Ann Larsen:
The challenges of linking health insurer claims with electronic medical records. Health Informatics J. 20(1): 22-34 (2014) - 2013
- [c1]Yue Qin, Kede Qin, Changle Xu:
The Viscous Mechanism of Transformation and Upgrading of China's Manufacturing and ITS Path - from the Perspective of the Causes of "Smiling Curve". BIFE 2013: 525-529 - 2011
- [i1]Fang Wei, Yue Qin, Zhenqiang Li, Tony Li, Jie Dong:
Purge Originator Identification TLV for IS-IS. RFC 6232: 1-6 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint