default search action
Qingyi Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Chenquan Gan, Xiaopeng Cao, Qingyi Zhu, Deepak Kumar Jain, Salvador García:
Enhancing microblog sentiment analysis through multi-level feature interaction fusion with social relationship guidance. Appl. Intell. 54(11-12): 443-459 (2024) - [j44]Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan, Yu Wu, Lu-Xing Yang:
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model. Comput. Commun. 220: 1-11 (2024) - [j43]Chenquan Gan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu, Liang Tian, Deepak Kumar Jain:
Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things. Expert Syst. Appl. 236: 121255 (2024) - [j42]Chenquan Gan, Xiang Fu, Qingdong Feng, Qingyi Zhu, Yang Cao, Ye Zhu:
A multimodal fusion network with attention mechanisms for visual-textual sentiment analysis. Expert Syst. Appl. 242: 122731 (2024) - [j41]Chenquan Gan, Jiahao Zheng, Qingyi Zhu, Deepak Kumar Jain, Vitomir Struc:
A graph neural network with context filtering and feature correction for conversational emotion recognition. Inf. Sci. 658: 120017 (2024) - [j40]Chenquan Gan, Yu Tang, Xiang Fu, Qingyi Zhu, Deepak Kumar Jain, Salvador García:
Video multimodal sentiment analysis using cross-modal feature translation and dynamical propagation. Knowl. Based Syst. 299: 111982 (2024) - [j39]Chenquan Gan, Jiahao Zheng, Qingyi Zhu, Yang Cao, Ye Zhu:
A survey of dialogic emotion analysis: Developments, approaches and perspectives. Pattern Recognit. 156: 110794 (2024) - [j38]Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li, Qingyi Zhu, Chenquan Gan:
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach. IEEE Trans. Inf. Forensics Secur. 19: 9682-9697 (2024) - [j37]Xiaojuan Cheng, Lu-Xing Yang, Qingyi Zhu, Chenquan Gan, Xiaofan Yang, Gang Li:
Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game. IEEE Trans. Inf. Forensics Secur. 19: 9789-9802 (2024) - 2023
- [j36]Junhao Xiao, Chenquan Gan, Qingyi Zhu, Ye Zhu, Gang Liu:
CFNet: Facial expression recognition via constraint fusion under multi-task joint learning network. Appl. Soft Comput. 141: 110312 (2023) - [j35]Chenquan Gan, Anqi Liu, Qingyi Zhu, Ye Zhu, Yong Xiang, Jun Liu:
Social tie-driven coupling propagation of user awareness and information in Device-to-Device communications. Comput. Networks 237: 110087 (2023) - [j34]Menghan Hu, Qingyi Zhu, Lingjun Zhu:
What are the actual needs of visually impaired people? Displays 78: 102411 (2023) - [j33]Chenquan Gan, Kexin Wang, Qingyi Zhu, Yong Xiang, Deepak Kumar Jain, Salvador García:
Speech emotion recognition via multiple fusion under spatial-temporal parallel network. Neurocomputing 555: 126623 (2023) - [j32]Chenquan Gan, Hongpeng Yang, Qingyi Zhu, Yiye Zhang, Akanksha Saini:
An encrypted medical blockchain data search method with access control mechanism. Inf. Process. Manag. 60(6): 103499 (2023) - [j31]Qingyi Zhu, Gang Zhang, Xuhang Luo, Chenquan Gan:
An industrial virus propagation model based on SCADA system. Inf. Sci. 630: 546-566 (2023) - [j30]Chenquan Gan, Xiaopeng Cao, Qingyi Zhu:
Microblog sentiment analysis via user representative relationship under multi-interaction hybrid neural networks. Multim. Syst. 29(3): 1161-1172 (2023) - [j29]Qingyi Zhu, Ankui Jing, Chenquan Gan, Xinwei Guan, Yuze Qin:
HCSC: A Hierarchical Certificate Service Chain Based on Reputation for VANETs. IEEE Trans. Intell. Transp. Syst. 24(6): 6123-6145 (2023) - [c1]Yuhang Liu, Yi Zhang, Yang Cao, Ye Zhu, Nayyar Zaidi, Chathu Ranaweera, Gang Li, Qingyi Zhu:
Kernel-Based Feature Extraction for Time Series Clustering. KSEM (1) 2023: 276-283 - 2022
- [j28]Qingyi Zhu, Yuhang Liu, Xuhang Luo, Kefei Cheng:
A Malware Propagation Model Considering Conformity Psychology in Social Networks. Axioms 11(11): 632 (2022) - [j27]Chenquan Gan, Yi Qian, Anqi Liu, Qingyi Zhu:
Search-driven virus spreading on Social Internet of Things: A dynamical perspective. Commun. Nonlinear Sci. Numer. Simul. 114: 106624 (2022) - [j26]Anping Xiong, Guihua Liu, Qingyi Zhu, Ankui Jing, Seng W. Loke:
A notary group-based cross-chain mechanism. Digit. Commun. Networks 8(6): 1059-1067 (2022) - [j25]Chenquan Gan, Yucheng Yang, Qingyi Zhu, Deepak Kumar Jain, Vitomir Struc:
DHF-Net: A hierarchical feature interactive fusion network for dialogue emotion recognition. Expert Syst. Appl. 210: 118525 (2022) - [j24]Qingyi Zhu, Mingtao Tan:
A novel activation function based recurrent neural networks and their applications on sentiment classification and dynamic problems solving. Frontiers Neurorobotics 16 (2022) - [j23]Chenquan Gan, Junhao Xiao, Zhangyi Wang, Zufan Zhang, Qingyi Zhu:
Facial expression recognition using densely connected convolutional neural network and hierarchical spatial attention. Image Vis. Comput. 117: 104342 (2022) - [j22]Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan:
Dynamical Behavior of Hybrid Propagation of Computer Viruses. Secur. Commun. Networks 2022: 2576685:1-2576685:15 (2022) - 2021
- [j21]Qingyi Zhu, Xuhang Luo, Yuhang Liu:
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness. Complex. 2021: 6639632:1-6639632:9 (2021) - [j20]Zufan Zhang, Di Zhang, Xiaoqin Yan, Chenquan Gan, Qingyi Zhu:
An iterative MPD-CNN structure for massive MIMO detection under correlated noise channels. IET Commun. 15(12): 1632-1641 (2021) - [j19]Akanksha Saini, Qingyi Zhu, Navneet Singh, Yong Xiang, Longxiang Gao, Yushu Zhang:
A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System. IEEE Internet Things J. 8(7): 5914-5925 (2021) - [j18]Zufan Zhang, Yucheng Yang, Zongming Lv, Chenquan Gan, Qingyi Zhu:
LMFNet: Human Activity Recognition Using Attentive 3-D Residual Network and Multistage Fusion Strategy. IEEE Internet Things J. 8(7): 6012-6023 (2021) - [j17]Chenquan Gan, Akanksha Saini, Qingyi Zhu, Yong Xiang, Zufan Zhang:
Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor. Multim. Tools Appl. 80(20): 30605-30621 (2021) - [j16]Yong Wei, Hongru Zhu, Peng Chen, Wenren Zuo, Wenhui Qian, Qingyi Zhu:
Minimum Variance Algorithm-Based Correlation Analysis between Body Mass Index and the Malignant Degree of Prostate Cancer Mediated under Ultrasound Images. Sci. Program. 2021: 4990942:1-4990942:8 (2021) - 2020
- [j15]Chenquan Gan, Qingdong Feng, Xulong Zhang, Zufan Zhang, Qingyi Zhu:
Dynamical Propagation Model of Malware for Cloud Computing Security. IEEE Access 8: 20325-20333 (2020) - [j14]Qingyi Zhu, Seng W. Loke, Rolando Trujillo-Rasua, Frank Jiang, Yong Xiang:
Applications of Distributed Ledger Technologies to the Internet of Things: A Survey. ACM Comput. Surv. 52(6): 120:1-120:34 (2020) - [j13]Zufan Zhang, Yue Zheng, Chenquan Gan, Qingyi Zhu:
Massive MIMO CSI reconstruction using CNN-LSTM and attention mechanism. IET Commun. 14(18): 3089-3094 (2020) - [j12]Chenquan Gan, Junwei Mao, Zufan Zhang, Qingyi Zhu:
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction. Int. J. Distributed Sens. Networks 16(4) (2020) - [j11]Zufan Zhang, Zongming Lv, Chenquan Gan, Qingyi Zhu:
Human action recognition using convolutional LSTM and fully-connected LSTM with different attentions. Neurocomputing 410: 304-316 (2020) - [j10]Yi Jiang, Yong Shen, Qingyi Zhu:
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes. Sensors 20(5): 1357 (2020)
2010 – 2019
- 2019
- [j9]Yousheng Zhou, Chujun Wu, Qingyi Zhu, Yong Xiang, Seng W. Loke:
Rumor Source Detection in Networks Based on the SEIR Model. IEEE Access 7: 45240-45258 (2019) - [j8]Zufan Zhang, Yunfeng Wu, Chenquan Gan, Qingyi Zhu:
The optimally designed autoencoder network for compressed sensing. EURASIP J. Image Video Process. 2019: 56 (2019) - 2018
- [j7]Qingyi Zhu, Seng W. Loke, Ye Zhang:
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking. Secur. Commun. Networks 2018: 4982523:1-4982523:10 (2018) - 2014
- [j6]Chenquan Gan, Xiaofan Yang, Wanping Liu, Qingyi Zhu:
A propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Numer. Simul. 19(1): 92-100 (2014) - [j5]Chenquan Gan, Xiaofan Yang, Wanping Liu, Qingyi Zhu, Jian Jin, Li He:
Propagation of computer virus both across the Internet and external computers: A complex-network approach. Commun. Nonlinear Sci. Numer. Simul. 19(8): 2785-2792 (2014) - [j4]Chenquan Gan, Xiaofan Yang, Qingyi Zhu, Jian Jin:
The combined impact of external computers and network topology on the spread of computer viruses. Int. J. Comput. Math. 91(12): 2491-2506 (2014) - 2013
- [j3]Luxing Yang, Xiaofan Yang, Jiming Liu, Qingyi Zhu, Chenquan Gan:
Epidemics of computer viruses: A complex-network approach. Appl. Math. Comput. 219(16): 8705-8717 (2013) - [j2]Chenquan Gan, Xiaofan Yang, Wanping Liu, Qingyi Zhu, Xulong Zhang:
An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate. Appl. Math. Comput. 222: 265-274 (2013) - 2012
- [j1]Qingyi Zhu, Xiaofan Yang, Luxing Yang, Chunming Zhang:
Optimal control of computer virus under a delayed model. Appl. Math. Comput. 218(23): 11613-11619 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint