default search action
Qiwen Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Bing Li, Rongqian Zhou, Lu Yang, Qiwen Wang, Huang Cheng:
MilDetr: Detection Transformer for Military Camouflaged Target Detection. IEEE Access 12: 26163-26174 (2024) - [c31]Qiwen Wang, Tie Liu, Ruyan Zhao, Guibao Song:
Enhanced Weapon Target Allocation through Integration of Stochastic Dynamic Programming and Machine Learning. DSAI 2024: 148-152 - [c30]Qiwen Wang, Chen Lin, Wei Su, Liang Xiao, Xiangxiang Zeng:
Compound-Protein Interaction Prediction with Sparse Perturbation-Aware Attention. ICIC (LNBI 2) 2024: 72-83 - [c29]Huanxin Yang, Qiwen Wang:
MFH: Marrying Frequency Domain with Handwritten Mathematical Expression Recognition. PRCV (7) 2024: 173-186 - 2023
- [j19]Ying Shao, Qiwen Wang, Xingjian Lu, Zhanquan Wang, E. Zhao, Shuang Fang, Jianxiong Chen, Linghe Kong, Kayhan Zrar Ghafoor:
AutoBar: Automatic Barrier Coverage Formation for Danger Keep Out Applications in Smart City. Sensors 23(18): 7787 (2023) - [j18]Qing Gao, Zhaojie Ju, Yongquan Chen, Qiwen Wang, Chuliang Chi:
An Efficient RGB-D Hand Gesture Detection Framework for Dexterous Robot Hand-Arm Teleoperation System. IEEE Trans. Hum. Mach. Syst. 53(1): 13-23 (2023) - [j17]Qing Gao, Zhaojie Ju, Yongquan Chen, Qiwen Wang, Yinan Zhao, Shiwu Lai:
Parallel Dual-Hand Detection by Using Hand and Body Features for Robot Teleoperation. IEEE Trans. Hum. Mach. Syst. 53(2): 417-426 (2023) - [c28]Qiwen Wang, Zhe Wang, Linghe Kong, Yutong Liu, Ying Shao, Shahid Mumtaz:
OrthZig: Concurrent Transmissions Based on Waveform Orthogonality in ZigBee. GLOBECOM 2023: 1950-1955 - [c27]Qiwen Wang, Guibao Song:
Optimization Study on Weapon-Target Assignment in Problem Based on Intuitionistic Fuzzy Marine Predator Algorithm. MLNLP 2023: 62-65 - [i11]Yuting Wu, Qiwen Wang, Ziyu Wang, Xinxin Wang, Buvna Ayyagari, Siddarth A. Krishnan, Michael Chudzik, Wei D. Lu:
Bulk-Switching Memristor-based Compute-In-Memory Module for Deep Neural Network Training. CoRR abs/2305.14547 (2023) - 2022
- [j16]Qiwen Wang, Yongmo Park, Wei D. Lu:
Device Variation Effects on Neural Network Inference Accuracy in Analog In-Memory Computing Systems. Adv. Intell. Syst. 4(8) (2022) - [j15]Yingbai Hu, Jian Li, Yongquan Chen, Qiwen Wang, Chuliang Chi, Heng Zhang, Qing Gao, Yuanmin Lan, Zheng Li, Zonggao Mu, Zhenglong Sun, Alois C. Knoll:
Design and Control of a Highly Redundant Rigid-flexible Coupling Robot to Assist the COVID-19 Oropharyngeal-Swab Sampling. IEEE Robotics Autom. Lett. 7(2): 1856-1863 (2022) - [j14]Yongquan Chen, Qiwen Wang, Chuliang Chi, Chengjiang Wang, Qing Gao, Heng Zhang, Zheng Li, Zonggao Mu, Ruihuan Xu, Zhenglong Sun, Huihuan Qian:
A collaborative robot for COVID-19 oropharyngeal swabbing. Robotics Auton. Syst. 148: 103917 (2022) - 2021
- [c26]Qiwen Wang, Yan Zhang, Yunfei Chen:
Quantitative Evaluation Method of Color Matching Design for Public Self-service Equipment Based on the Color System of the Forbidden City. AHFE (3) 2021: 940-948 - [c25]Heng Zhang, Qiwen Wang, Chuliang Chi, Yongquan Chen, Zonggao Mu, Zheng Li, Yuanmin Lan, Aidong Zhang:
Design and Implementation of a Novel, Intrinsically Safe Rigid-Flexible Coupling Manipulator for COVID-19 Oropharyngeal Swab Sampling. ICRA 2021: 12282-12288 - [c24]Chenyu You, Qiwen Wang, Chao Sun:
sBiLSAN: Stacked Bidirectional Self-attention LSTM Network for Anomaly Detection and Diagnosis from System Logs. IntelliSys (3) 2021: 777-793 - [c23]Qiwen Wang, Yongmo Park, Wei D. Lu:
Device Non-Ideality Effects and Architecture-Aware Training in RRAM In-Memory Computing Modules. ISCAS 2021: 1-5 - [i10]Yingbai Hu, Jian Li, Yongquan Chen, Qiwen Wang, Chuliang Chi, Heng Zhang, Qing Gao, Yuanmin Lan, Zheng Li, Zonggao Mu, Zhenglong Sun, Alois C. Knoll:
Design and Control of a Highly Redundant Rigid-Flexible Coupling Robot to Assist the COVID-19 Oropharyngeal-Swab Sampling. CoRR abs/2102.12726 (2021) - 2020
- [j13]Heng Zhang, Yingbai Hu, Jianghua Duan, Qing Gao, Langcheng Huo, Qiwen Wang, Yongquan Chen:
Multisensor-Based Autonomous Grasp Planning for Mobile Manipulator Navigation System with a Novel Soft Gripper. Complex. 2020: 5497241:1-5497241:18 (2020) - [c22]Xinxin Wang, Qiwen Wang, Fan-Hsuan Meng, Seung Hwan Lee, Wei D. Lu:
Deep Neural Network Mapping and Performance Analysis on Tiled RRAM Architecture. AICAS 2020: 141-144 - [c21]Yanliang Zhou, Qiwen Wang, Hua Sun, Shengli Fu:
The Minimum Upload Cost of Symmetric Private Information Retrieval. ISIT 2020: 1030-1034
2010 – 2019
- 2019
- [j12]Qiwen Wang, Mikael Skoglund:
On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers. IEEE Trans. Inf. Theory 65(5): 3183-3197 (2019) - [j11]Qiwen Wang, Hua Sun, Mikael Skoglund:
The Capacity of Private Information Retrieval With Eavesdroppers. IEEE Trans. Inf. Theory 65(5): 3198-3214 (2019) - [j10]Qiwen Wang, Mikael Skoglund:
Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers. IEEE Trans. Inf. Theory 65(8): 5160-5175 (2019) - [c20]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. CF 2019: 24-31 - [c19]Jianguo Jiang, Qilei Yin, Zhixin Shi, Qiwen Wang, Wei Zhou:
A New Hybrid Approach for C&C Channel Detection. HPCC/SmartCity/DSS 2019: 583-590 - [c18]Qiwen Wang, Hua Sun, Mikael Skoglund:
Symmetric Private Information Retrieval with Mismatched Coded Messages and Randomness. ISIT 2019: 365-369 - 2018
- [j9]Qiwen Wang, Sidharth Jaggi:
End-to-End Error-Correcting Codes on Networks With Worst-Case Bit Errors. IEEE Trans. Inf. Theory 64(6): 4467-4479 (2018) - [c17]Qiwen Wang, Hua Sun, Mikael Skoglund:
The Capacity of Private Information Retrieval with Eavesdroppers. ACSSC 2018: 1679-1683 - [c16]Hanwei Wu, Qiwen Wang, Markus Flierl:
Identification Rates for Block-correlated Gaussian Sources. ACSSC 2018: 2114-2118 - [c15]Hanwei Wu, Qiwen Wang, Markus Flierl:
Prediction-Based Similarity Identification for Autoregressive Processes. GlobalSIP 2018: 266-270 - [c14]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi:
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. ICCSP 2018: 77-81 - [c13]Qiwen Wang, Mikael Skoglund:
Secure Private Information Retrieval from Colluding Databases with Eavesdroppers. ISIT 2018: 2456-2460 - [c12]Qiwen Wang, Hua Sun, Mikael Skoglund:
The ϵ-error Capacity of Symmetric PIR with Byzantine Adversaries. ITW 2018: 1-5 - [c11]Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. TrustCom/BigDataSE 2018: 727-736 - [c10]Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. TrustCom/BigDataSE 2018: 754-762 - [i9]Qiwen Wang, Hua Sun, Mikael Skoglund:
The Capacity of Private Information Retrieval with Eavesdroppers. CoRR abs/1804.10189 (2018) - [i8]Qiwen Wang, Hua Sun, Mikael Skoglund:
The ε-error Capacity of Symmetric PIR with Byzantine Adversaries. CoRR abs/1809.03988 (2018) - 2017
- [j8]Qian Zhang, Yang Cao, Qiwen Wang, Duc Vu, Priyaa Thavasimani, Timothy M. McPhillips, Paolo Missier, Peter Slaughter, Christopher Jones, Matthew B. Jones, Bertram Ludäscher:
Revealing the Detailed Lineage of Script Outputs Using Hybrid Provenance. Int. J. Digit. Curation 12(2): 390-408 (2017) - [j7]Qiwen Wang, Sidharth Jaggi, Muriel Médard, Viveck R. Cadambe, Moshe Schwartz:
File Updates Under Random/Arbitrary Insertions and Deletions. IEEE Trans. Inf. Theory 63(10): 6487-6513 (2017) - [c9]Qiwen Wang, Mikael Skoglund:
Secure symmetric private information retrieval from colluding databases with adversaries. Allerton 2017: 1083-1090 - [c8]Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. Inscrypt 2017: 383-403 - [c7]Hanwei Wu, Qiwen Wang, Markus Flierl:
Tree-Structured Vector Quantization for Similarity Queries. DCC 2017: 467 - [c6]Qiwen Wang, Mikael Skoglund:
Symmetric private information retrieval for MDS coded distributed storage. ICC 2017: 1-6 - [c5]Qiwen Wang, Mikael Skoglund:
Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers. ITW 2017: 71-75 - [i7]Qiwen Wang, Mikael Skoglund:
Secure Symmetric Private Information Retrieval from Colluding Databases with Adversaries. CoRR abs/1707.02152 (2017) - [i6]Qiwen Wang, Mikael Skoglund:
Linear Symmetric Private Information Retrieval for MDS Coded Distributed Storage with Colluding Servers. CoRR abs/1708.05673 (2017) - [i5]Qiwen Wang, Mikael Skoglund:
Secure Private Information Retrieval from Colluding Databases with Eavesdroppers. CoRR abs/1710.01190 (2017) - 2016
- [c4]Qiwen Wang, Muriel Médard, Mikael Skoglund:
Efficient compression algorithm for file updates under random insertions and deletions. ITW 2016: 434-438 - [i4]Qiwen Wang, Mikael Skoglund:
Symmetric Private Information Retrieval For MDS Coded Distributed Storage. CoRR abs/1610.04530 (2016) - 2015
- [c3]Qiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard:
File updates under random/arbitrary insertions and deletions. ITW 2015: 1-5 - [i3]Qiwen Wang, Viveck R. Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard:
File Updates Under Random/Arbitrary Insertions And Deletions. CoRR abs/1502.07830 (2015) - [i2]Qiwen Wang, Sidharth Jaggi:
End-to-End Error-Correcting Codes on Networks with Worst-Case Symbol Errors. CoRR abs/1510.03060 (2015) - 2011
- [j6]Qiwen Wang, Xiting Gong, Honghui Deng, G. Keong Leong:
The Use of Switching Point and Protection Levels to Improve Revenue Performance in Order-Driven Production Systems. Decis. Sci. 42(2): 495-509 (2011) - [c2]Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li:
Binary error correcting network codes. ITW 2011: 498-502 - [i1]Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li:
Binary Error Correcting Network Codes. CoRR abs/1108.2393 (2011) - 2010
- [j5]Jinsong Wang, Xiting Gong, Qiwen Wang, Qingjiu Tao:
The impact of market demand, government intervention and environment changes on the output of healthcare research in China. Int. J. Inf. Syst. Chang. Manag. 4(3): 258-271 (2010)
2000 – 2009
- 2008
- [j4]Honghui Deng, Qiwen Wang, G. Keong Leong, Sherry X. Sun:
The Usage of Opportunity Cost to Maximize Performance in Revenue Management. Decis. Sci. 39(4): 737-758 (2008) - 2005
- [c1]Lihua Chen, Qiwen Wang:
Majority Equilibrium of Distribution Centers Allocation in Supply Chain Management. WINE 2005: 793-800
1990 – 1999
- 1995
- [j3]Qiwen Wang, Xiaoyun Sun, Bruce L. Golden, Jiyou Jia:
Using artificial neural networks to solve the orienteering problem. Ann. Oper. Res. 61(1): 111-120 (1995) - 1993
- [j2]Qiwen Wang, Xiaoyun Sun, Bruce L. Golden, Lenore Desilets, Edward A. Wasil, Scott Luco, Adam Peck:
A neural network model for the wire bonding process. Comput. Oper. Res. 20(8): 879-888 (1993) - 1992
- [j1]Lenore Desilets, Bruce L. Golden, Qiwen Wang, Ram Kumar:
Predicting salinity in the chesapeake bay using backpropagation. Comput. Oper. Res. 19(3-4): 277-285 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint