default search action
Xiaofeng Qiu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Mi Yang, Xiaoyan Kang, Xiaofeng Qiu, Lulu Ma, Hong Ren, Changping Huang, Ze Zhang, Xin Lv:
Method for early diagnosis of verticillium wilt in cotton based on chlorophyll fluorescence and hyperspectral technology. Comput. Electron. Agric. 216: 108497 (2024) - 2022
- [c42]Xiaofeng Qiu:
Irony Recognition in Chinese Text Based on Linguistic Features and Attention Mechanism. CLSW (2) 2022: 351-363 - [c41]Xinran Wang, Xiaofeng Qiu:
A Novel Semi-supervised Anomaly Detection Method for Network Intrusion Detection. ICCT 2022: 1276-1280 - 2021
- [c40]Xiaofeng Qiu, Huaqun Liu, Ke Ren, Mingyu Zhang, Huimin Yan, Yang Lu:
Design and Implementation of "Winning Luding Bridge" Immersion FPS Game Based on Unity3D Technology. AIVR 2021: 65-71 - [c39]Ke Ren, Huaqun Liu, Mingyu Zhang, Xiaofeng Qiu, Huimin Yan, Jinbo Zhang:
Design and Implementation of Immersive and Interactive System Based on Unreal Engine. AIVR 2021: 77-82 - [c38]Mingyu Zhang, Huaqun Liu, Xiaofeng Qiu, Ke Ren, Huimin Yan, Yang Lu:
Design and Implementation of "The Belt and Road Initiative" Immersive Interaction System Based on UE4+GIS Platform. AIVR 2021: 89-97 - [c37]Huimin Yan, Huaqun Liu, Yang Lu, Tong Li, Xiaofeng Qiu:
"Dawn of South Lake" - - Design and Implementation of Immersive Interactive System Based on Virtual Reality Technology. BDET 2021: 88-93 - 2020
- [j5]Xiaofeng Qiu, Shuya Zhou:
Generating adversarial examples with input significance indicator. Neurocomputing 394: 1-12 (2020) - [j4]Huan Liang, Youdong Ding, Fei Wang, Yuzhen Gao, Xiaofeng Qiu:
Super Resolution with Kernel Estimation and Dual Attention Mechanism. Inf. 11(11): 508 (2020)
2010 – 2019
- 2019
- [c36]Yinjin Fu, Xiaofeng Qiu, Jian Wang:
F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid Computing. IPCCC 2019: 1-6 - 2018
- [c35]Feixia Min, Xiaofeng Qiu, Fan Wu:
Adversarial Attack? Don't Panic. BigCom 2018: 90-95 - [c34]Dongdi Wei, Xiaofeng Qiu:
Status-based Detection of malicious code in Internet of Things (IoT) devices. CNS 2018: 1-7 - [c33]Kai Zhang, Xiaofeng Qiu:
CMD: A convincing mechanism for MITM detection in SDN. ICCE 2018: 1-6 - [c32]Tianyue Zhao, Xiaofeng Qiu:
Detection of IP Gangs: Strategically Organized Bots. ICDM 2018: 254-265 - [c31]Yangjun Qiu, Xiaofeng Qiu, Yibin Cai:
Service function chaining policy compliance checking. NOMS 2018: 1-4 - [c30]Zhenyu Wu, Hao Luo, Yunong Yang, Xinning Zhu, Xiaofeng Qiu:
An unsupervised degradation estimation framework for diagnostics and prognostics in cyber-physical system. WF-IoT 2018: 784-789 - 2017
- [j3]Xiaofeng Qiu, Kai Zhang, Qiuzheng Ren:
Global Flow Table: A convincing mechanism for security operations in SDN. Comput. Networks 120: 56-70 (2017) - [c29]Shengzhe Li, Chunhong Zhang, Xuan Zhang, Hang Li, Yang Ji, Xiaofeng Qiu:
Chinese Character Embedding Based Semantic Query Algorithm for Semi-structured Corpora. BigCom 2017: 77-86 - [c28]Weiming Zhang, Chunhong Zhang, Pei Liu, Zhiqiang Zhan, Xiaofeng Qiu:
Two-Step Joint Attention Network for Visual Question Answering. BigCom 2017: 136-143 - [c27]Wenliang Shao, Chunhong Zhang, Tingting Sun, Hang Li, Yang Ji, Xiaofeng Qiu:
Hierarchical Bidirectional Long Short-Term Memory Networks for Chinese Messaging Spam Filtering. BigCom 2017: 158-164 - [c26]Chen He, Xiaofeng Qiu:
SEA: SDN-Based Evolution Architecture for 5G Network. ChinaCom (1) 2017: 264-273 - [c25]Gang Zhang, Xiaofeng Qiu, Wei Chang:
Scheduling of Security Resources in Software Defined Security Architecture. CyberC 2017: 494-503 - [c24]Xiaofeng Qiu, Fangyuan Cheng, Weijia Wang, Gang Zhang, Yangjun Qiu:
A security controller-based software defined security architecture. ICIN 2017: 191-195 - 2016
- [c23]Miao Zhou, Chunhong Zhang, Xiao Han, Yang Ji, Zheng Hu, Xiaofeng Qiu:
Knowledge Graph Completion for Hyper-relational Data. BigCom 2016: 236-246 - [c22]Yu Zhao, Chunhong Zhang, Tingting Sun, Yang Ji, Zheng Hu, Xiaofeng Qiu:
Approximate Subgraph Matching Query over Large Graph. BigCom 2016: 247-256 - [c21]Qiang Gu, Chunhong Zhang, Tingting Sun, Yang Ji, Zheng Hu, Xiaofeng Qiu:
Path Sampling Based Relevance Search in Heterogeneous Networks. BigCom 2016: 453-463 - [c20]Fangyuan Cheng, Xiaofeng Qiu:
Network anomaly detection based on frequent sub-graph mining approach and association analysis. IC-NIDC 2016: 12-16 - [c19]Xiaodong Liang, Xiaofeng Qiu:
A software defined security architecture for SDN-based 5G network. IC-NIDC 2016: 17-21 - [c18]Weijia Wang, Xiaofeng Qiu, Li Sun, Rui Zhao:
A data driven orchestration framework in software defined security. IC-NIDC 2016: 34-39 - 2015
- [c17]Xingfeng Pan, Jin Yang, Xiaofeng Qiu:
A multi-label model to predict undisclosed attributes in microblogging. BESC 2015: 6-12 - [c16]Meng Huang, Xiaofeng Qiu, Shufang Li, Daowei Liu:
Research on Light-Weight Compression Schemes Based on Simulative Column-Store. BigCom 2015: 55-68 - [c15]Jing Su, Ying Long, Xiaofeng Qiu, Shufang Li, Daowei Liu:
Anomaly Detection of Single Sensors Using OCSVM_KNN. BigCom 2015: 217-230 - [c14]Zhong Zhou, Tao Yu, Xiaofeng Qiu, Ruigang Yang, Qinping Zhao:
Light field projection for lighting reproduction. VR 2015: 135-142 - 2014
- [j2]Cheng Cheng, Chunhong Zhang, Xiaofeng Qiu, Yang Ji:
The Social Web of Things (SWoT)- Structuring an Integrated Social Network for Human, Things and Services. J. Comput. 9(2): 345-352 (2014) - [c13]Weibo Li, Chunhong Zhang, Xiaofeng Qiu, Yang Ji:
Identifying Relevant Messages for Social TV. CIS 2014: 288-292 - 2013
- [j1]Gang Wang, Chunhong Zhang, Xiaofeng Qiu, Zhimin Zeng:
An efficient relay node selection scheme to improve the performance of P2P-based VoIP applications in Chinese internet. Multim. Tools Appl. 64(3): 599-625 (2013) - [c12]Lijuan He, Xiaofeng Qiu, Teng Gao:
A Device-Centric Policy Conflict in IoT. GreenCom/iThings/CPScom 2013: 438-444 - [c11]Teng Gao, Xiaofeng Qiu, Lijuan He:
Improved RETE Algorithm in Context Reasoning for Web of Things Environments. GreenCom/iThings/CPScom 2013: 1044-1049 - [c10]Xiaofeng Qiu, Lei Cao, Pengfei Li, Liang Zhao:
Architecture approach for ICT supply chain integrity. ICT 2013: 1-5 - [c9]Lei Cao, Xiaofeng Qiu:
Defence against Botnets: A Formal Definition and a General Framework. NAS 2013: 237-241 - [c8]Xiaofeng Qiu, Lei Cao, Pengfei Li, Liang Zhao:
A Trust Evaluation Method for Supplier Selection. TrustCom/ISPA/IUCC 2013: 1498-1503 - [c7]Lijuan He, Xiaofeng Qiu, Yi Wang, Teng Gao:
Design of policy language expression in SIoT. WOCC 2013: 321-326 - [c6]Lei Cao, Xiaofeng Qiu:
ASP2P: An advanced botnet based on social networks over hybrid P2P. WOCC 2013: 677-682 - [i1]Gang Wang, Chunhong Zhang, Xiaofeng Qiu, Zhimin Zeng:
Replacing Network Coordinate System with Internet Delay Matrix Service (IDMS): A Case Study in Chinese Internet. CoRR abs/1307.0349 (2013) - 2012
- [c5]Jindou Jia, Xiaofeng Qiu, Cheng Cheng:
Access Control Method for Web of Things Based on Role and SNS. CIT 2012: 316-321 - 2011
- [c4]Wei Mi, Xiaofeng Qiu, Chunhong Zhang:
The analysis of security threats in structured P2P load balancing schemes. CDC 2011: 296-301
2000 – 2009
- 2009
- [c3]Lichun Li, Chunhong Zhang, Wei Mi, Yonghui Zhang, Ma Tao, Yang Ji, Xiaofeng Qiu:
SFDHT: A DHT Designed for Server Farm. GLOBECOM 2009: 1-8 - 2008
- [c2]Guomin Zhang, Na Wang, Ming Chen, Xiaofeng Qiu:
Modal Policy Management Framework for Management of Distributed Systems. ICNSC 2008: 1753-1757 - 2007
- [c1]Xiaofeng Qiu, Ning Zhi, Xinxin Niu:
A Quantitative Security Model of IMS System. CIS 2007: 829-832
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-04 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint