default search action
Qiao Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Haobo Feng, Qiao Hu, Zhenyi Zhao, Xinglong Feng:
Smooth path planning under maximum curvature constraints for autonomous underwater vehicles based on rapidly-exploring random tree star with B-spline curves. Eng. Appl. Artif. Intell. 133: 108583 (2024) - [j29]Yingcong Hong, Junyi Li, Yaping Lin, Qiao Hu, Xiehua Li:
Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing. EURASIP J. Inf. Secur. 2024(1): 28 (2024) - [j28]Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. J. Comput. Secur. 32(3): 291-317 (2024) - [j27]Qiao Hu, Ligang Zhang, Jeff Drahota, Wayne Woldt, Dana Varner, Andy Bishop, Ted LaGrange, Christopher M. U. Neale, Zhenghong Tang:
Combining Multi-View UAV Photogrammetry, Thermal Imaging, and Computer Vision Can Derive Cost-Effective Ecological Indicators for Habitat Assessment. Remote. Sens. 16(6): 1081 (2024) - [j26]Nan Wang, Qingxi Wu, Yuanyuan Gui, Qiao Hu, Wei Li:
Cross-Modal Segmentation Network for Winter Wheat Mapping in Complex Terrain Using Remote-Sensing Multi-Temporal Images and DEM Data. Remote. Sens. 16(10): 1775 (2024) - [j25]Min Wu, Chengpeng Hao, Qiao Hu, Danilo Orlando:
Sparsity-Based Processing to Enhance the Reverberation Suppression for FDA-MIMO Sonars. IEEE Trans. Aerosp. Electron. Syst. 60(2): 1556-1569 (2024) - [j24]Bihui Liu, Zhenyu Ye, Qiao Hu, Yupeng Hu, Yuchong Hu, Yang Xu, Keqin Li:
HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput. IEEE Trans. Computers 73(6): 1575-1587 (2024) - [j23]Xingju Xie, Xiaojun Wu, Qiao Hu, Sheng Yuan:
Multi-Container Migration Strategy Optimization for Industrial Robotics Workflow Based on Hybrid Tabu-Evolutionary Algorithm. IEEE Trans. Serv. Comput. 17(5): 2640-2653 (2024) - 2023
- [j22]Yulin Zhao, Yuan Wang, Donglin Zhang, Zhongze Han, Qiao Hu, Xuanzhi Liu, Qingting Ding, Jinhui Cheng, Wenjun Zhang, Yue Cao, Ruixi Zhou, Qing Luo, Jianguo Yang, Hangbing Lv:
A Hf0.5Zr0.5O2 ferroelectric capacitor-based half-destructive read scheme for computing-in-memory. Sci. China Inf. Sci. 66(5) (2023) - [j21]Yaguang Zhu, Poramate Manoonpong, Qiao Hu:
Editorial: Multimodal behavior from animals to bio-inspired robots. Frontiers Neurorobotics 17 (2023) - [c25]Lantao Zheng, Wenxin Kuang, Qizhuang Liang, Wei Liang, Qiao Hu, Wei Fu, Xiashu Ding, Bijiang Xu, Yupeng Hu:
Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training. CSCloud/EdgeCom 2023: 186-191 - 2022
- [j20]Sheng Liu, Chengqing Li, Qiao Hu:
Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System. IEEE Multim. 29(1): 74-84 (2022) - [j19]Guanlin Chen, Qiao Hu, Qi Lu, Kaimin Li, Bangjie Zhu:
A hazardous chemical knowledge base construction method based on knowledge graph. Int. J. Reason. based Intell. Syst. 14(4): 184-193 (2022) - [j18]Qiao Hu, Jingyi Zhang, Gerhard P. Hancke, Yupeng Hu, Wenjia Li, Hongbo Jiang, Zheng Qin:
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices. IEEE Internet Things J. 9(2): 1326-1338 (2022) - [j17]Ligang Zhang, Qiao Hu, Zhenghong Tang:
Using Sentinel-2 Imagery and Machine Learning Algorithms to Assess the Inundation Status of Nebraska Conservation Easements during 2018-2021. Remote. Sens. 14(17): 4382 (2022) - [j16]Xiaojun Wu, Zhiyuan Gao, Sheng Yuan, Qiao Hu, Zerui Dang:
A Dynamic Task Allocation Algorithm for Heterogeneous UUV Swarms. Sensors 22(6): 2122 (2022) - [j15]Yulin Zhao, Jie Yu, Donglin Zhang, Qiao Hu, Xuanzhi Liu, Haijun Jiang, Qingting Ding, Zhongze Han, Jinhui Cheng, Wenjun Zhang, Yue Cao, Ruixi Zhou, Hongfei Lu, Xiaoxin Xu, Jianguo Yang:
A 0.02% Accuracy Loss Voltage-Mode Parallel Sensing Scheme for RRAM-Based XNOR-Net Application. IEEE Trans. Circuits Syst. II Express Briefs 69(6): 2697-2701 (2022) - [j14]Jingyi Zhang, Anjia Yang, Qiao Hu, Gerhard Petrus Hancke, Zhe Liu:
Revisiting Error-Correction in Precommitment Distance-Bounding Protocols. IEEE Trans. Ind. Informatics 18(10): 7097-7106 (2022) - [c24]Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen:
SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector. DSN 2022: 150-162 - 2021
- [j13]Weilong Chen, Xiaohang Wang, Ye Sun, Qiao Hu, Letian Huang, Yingtao Jiang, Amit Kumar Singh, Terrence S. T. Mak, Mei Yang:
Evolution of Publications, Subjects, and Co-Authorships in Network-on-Chip Research From a Complex Network Perspective. IEEE Access 9: 149399-149422 (2021) - [j12]Guanlin Chen, Qiao Hu, Kaimin Li, Wenyong Weng, Yubo Peng:
A novel security management system for hazardous chemicals. Int. J. Secur. Networks 16(3): 135-140 (2021) - [j11]Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [j10]Lin Wang, Yuzhen Zhou, Qiao Hu, Zhenghong Tang, Yufeng Ge, Adam Smith, Tala Awada, Yeyin Shi:
Early Detection of Encroaching Woody Juniperus virginiana and Its Classification in Multi-Species Forest Using UAS Imagery and Semantic Segmentation Algorithms. Remote. Sens. 13(10): 1975 (2021) - [j9]Qiao Hu, Yuanzhen Liu, Anjia Yang, Gerhard P. Hancke:
Preventing Overshadowing Attacks in Self-Jamming Audio Channels. IEEE Trans. Dependable Secur. Comput. 18(1): 45-57 (2021) - [c23]Yongkang Han, Yulin Zhao, Qiao Hu, Xuanzhi Liu, Bo Peng, Haijun Jiang, Jianguo Yang, Xiaoyong Xue:
Novel 15T SRAM Cell for Low Voltage High Reliability Application. ASICON 2021: 1-4 - [c22]Jing Li, Yulin Zhao, Bo Peng, Xuanzhi Liu, Qiao Hu, Sheng Dai, Jianguo Yang, Yuejun Zhang:
A HfO2 Ferroelectric Capacitor based 10T2C High Reliability Non-Volatile SRAM for Low Power IoT Applications. ASICON 2021: 1-4 - [c21]Zixuan Fang, Qiao Hu, Hairong Sun, Genxin Chen, Jin Qi:
Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning. ICAIS (1) 2021: 155-166 - [c20]Tongqiang Fu, Qiao Hu, Huiwen Zheng, Yu Liu:
A binary variational mode decomposition algorithm based on similarity matching. ICDSP 2021: 296-301 - [c19]Zhenhan Chen, Qiao Hu, Yingliang Chen, Chang Wei, Shenglin Yin:
Water Surface Stability Prediction of Amphibious Bio-Inspired Undulatory Fin Robot. IROS 2021: 7365-7371 - [c18]Shenglin Yin, Qiao Hu, Yangbin Zeng, Chang Wei, Zhenhan Chen:
Kinetic Analysis and Design of a Bio-Inspired Amphibious Robot with Two Undulatory Fins. RCAR 2021: 1368-1373 - [c17]Yangbin Zeng, Qiao Hu, Shenglin Yin, Baocheng Tong, Tangjia Zhang:
The Ground Motion Dynamics Analysis of a Bionic Amphibious Robot with Undulatory Fins. RCAR 2021: 1385-1390 - [c16]Haoran Peng, Qiao Hu, Guangyu Jiang, Dan Xu, Tongqiang Fu:
Direction Identification of Underwater Moving Target with Active Electrosense and CNN. ROBIO 2021: 732-737 - [c15]Guangyu Jiang, Qiao Hu, Haoran Peng, Yu Liu, Sihu Li, Tongqiang Fu:
Underwater Moving Object Localisation Based on Weak Electric Fish Bionic Sensing Principle and LSTM. ROBIO 2021: 744-749 - [i2]Sheng Liu, Chengqing Li, Qiao Hu:
Cryptanalyzing two image encryption algorithms based on a first-order time-delay system. CoRR abs/2109.11718 (2021) - 2020
- [j8]Bin Wang, Qiao Hu, Zhiyu Wang:
Improving Power Output of Battery and Mode Switching Frequency Based on Real-Time Average Power Method for Multi-Mode Hybrid Energy Storage System in Electric Vehicles. IEEE Access 8: 34654-34663 (2020) - [j7]Baolin Yang, Shixin Wang, Yi Zhou, Futao Wang, Qiao Hu, Ying Chang, Qing Zhao:
Extraction of road blockage information for the Jiuzhaigou earthquake based on a convolution neural network and very-high-resolution satellite images. Earth Sci. Informatics 13(1): 115-127 (2020) - [j6]Qiao Hu, Bianxia Du, Konstantinos Markantonakis, Gerhard P. Hancke:
A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement. IEEE Trans. Ind. Informatics 16(1): 691-702 (2020) - [c14]Shurui Zhang, Ji'an Tang, Qiao Hu, Feng Liu:
Research on Blockchain Financial Derivatives Cluster. ICBTA 2020: 40-46 - [c13]Dan Xu, Huiwen Zheng, Qiao Hu:
A Novel Feature Extraction Method for Underwater Acoustic Target Based on Parameter Optimized VMD and 1(1/2)-D Spectrum. ICDSP 2020: 86-91 - [i1]Mengyuan Chen, Jiang Zhang, Zhang Zhang, Lun Du, Qiao Hu, Shuo Wang, Jiaqi Zhu:
Inference for Network Structure and Dynamics from Time Series Data via Graph Neural Network. CoRR abs/2001.06576 (2020)
2010 – 2019
- 2019
- [j5]Zhufeng Lei, Wenbin Su, Qiao Hu:
Multimode Decomposition and Wavelet Threshold Denoising of Mold Level Based on Mutual Information Entropy. Entropy 21(2): 202 (2019) - [j4]Qiao Hu, Yi Zhou, Shixing Wang, Futao Wang, Hongjie Wang:
Improving the Accuracy of Landslide Detection in "Off-site" Area by Machine Learning Model Portability Comparison: A Case Study of Jiuzhaigou Earthquake, China. Remote. Sens. 11(21): 2530 (2019) - [c12]Jingyi Zhang, Anjia Yang, Qiao Hu, Gerhard P. Hancke:
Security Implications of Implementing Multistate Distance-Bounding Protocols. CPS-SPC@CCS 2019: 99-108 - [c11]Jingyi Zhang, Qiao Hu, Gerhard Petrus Hancke:
Correlation-Based Search against Friendly Jamming Data Exchange Schemes. DSC 2019: 1-8 - [c10]Qiao Hu, Chang Wei, Yu Liu, Zhen Yi Zhao:
A Review of Biomimetic Artificial Lateral Line Detection Technology for Unmanned Underwater Vehicles. ICIRA (2) 2019: 501-516 - 2018
- [j3]Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa, Gerhard P. Hancke:
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. Comput. Secur. 78: 281-300 (2018) - [j2]Elena Pagnin, Anjia Yang, Qiao Hu, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB: Distance bounding meets human based authentication. Future Gener. Comput. Syst. 80: 627-639 (2018) - [c9]Qiao Hu, Yu Liu, Zhen Yi Zhao, Zhufeng Lei:
Intelligent Detection for Artificial Lateral Line of Bio-Inspired Robotic Fish Using EMD and SVMs. ROBIO 2018: 106-111 - [c8]Zhufeng Lei, Wenbin Su, Yu Liu, Qi Gao, Ladao Yang, Qiao Hu:
Research on Fuzzy Rule-Based Reasoning System for CC Quality Assurance. ROBIO 2018: 1900-1908 - 2017
- [c7]Qiao Hu, Gerhard Petrus Hancke:
A session hijacking attack on physical layer key generation agreement. ICIT 2017: 1418-1423 - 2016
- [j1]Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard P. Hancke:
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization. Comput. Networks 105: 224-236 (2016) - [c6]Qiao Hu, Gerhard P. Hancke:
Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks. RFIDSec 2016: 188-203 - 2015
- [c5]Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke:
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. WISTP 2015: 219-234 - 2013
- [c4]Qiao Hu, Michael D. Abràmoff, Mona Kathryn Garvin:
Automated Separation of Binary Overlapping Trees in Low-Contrast Color Retinal Images. MICCAI (2) 2013: 436-443 - [c3]Qiao Hu, Mona Kathryn Garvin, Mark A. Christopher, Xiayu Xu, Todd E. Scheetz, Michael D. Abràmoff:
Optimal filter approach for the detection of vessel bifurcations in color fundus images. Image Processing 2013: 866920
2000 – 2009
- 2005
- [c2]Zhengjia He, Qiao Hu, Yanyang Zi, Zhousuo Zhang, Xuefeng Chen:
Hybrid Intelligent Forecasting Model Based on Empirical Mode Decomposition, Support Vector Regression and Adaptive Linear Neural Network. ICNC (2) 2005: 324-327 - [c1]Zhousuo Zhang, Qiao Hu, Zhengjia He:
Fuzzy Support Vector Machine and Its Application to Mechanical Condition Monitoring. ISNN (1) 2005: 937-942
Coauthor Index
aka: Gerhard Petrus Hancke
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint