Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Qingan Da
@article{DBLP:journals/entropy/DaZWZLLL23, author = {Qingan Da and Guoyin Zhang and Wenshan Wang and Yingnan Zhao and Dan Lu and Sizhao Li and Dapeng Lang}, title = {Adversarial Defense Method Based on Latent Representation Guidance for Remote Sensing Image Scene Classification}, journal = {Entropy}, volume = {25}, number = {9}, pages = {1306}, year = {2023}, url = {https://doi.org/10.3390/e25091306}, doi = {10.3390/E25091306}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/DaZWZLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbic/DaZLLW23, author = {Qingan Da and Guoyin Zhang and Sizhao Li and Zechao Liu and Wenshan Wang}, title = {Gradient-free adversarial attack algorithm based on differential evolution}, journal = {Int. J. Bio Inspired Comput.}, volume = {22}, number = {4}, pages = {217--226}, year = {2023}, url = {https://doi.org/10.1504/IJBIC.2023.136087}, doi = {10.1504/IJBIC.2023.136087}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbic/DaZLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbic/ZhangDLSWHL22, author = {Guoyin Zhang and Qingan Da and Sizhao Li and Jianguo Sun and Wenshan Wang and Qing Hu and Jiashuai Lu}, title = {Adversarial transformation network with adaptive perturbations for generating adversarial examples}, journal = {Int. J. Bio Inspired Comput.}, volume = {20}, number = {2}, pages = {94--103}, year = {2022}, url = {https://doi.org/10.1504/IJBIC.2022.10048992}, doi = {10.1504/IJBIC.2022.10048992}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbic/ZhangDLSWHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangYYD21, author = {Yan Jiang and Guisheng Yin and Ye Yuan and Qingan Da}, title = {Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6663028:1--6663028:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6663028}, doi = {10.1155/2021/6663028}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangYYD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/SunWKLZDC20, author = {Jianguo Sun and Wenshan Wang and Liang Kou and Yun Lin and Liguo Zhang and Qingan Da and Lei Chen}, title = {A data authentication scheme for {UAV} ad hoc network communication}, journal = {J. Supercomput.}, volume = {76}, number = {6}, pages = {4041--4056}, year = {2020}, url = {https://doi.org/10.1007/s11227-017-2179-3}, doi = {10.1007/S11227-017-2179-3}, timestamp = {Wed, 13 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/SunWKLZDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangKYSLDW19, author = {Guoyin Zhang and Liang Kou and Ye Yuan and Jianguo Sun and Yun Lin and Qingan Da and Wenshan Wang}, title = {An intelligent method of cancer prediction based on mobile cloud computing}, journal = {Clust. Comput.}, volume = {22}, number = {5}, pages = {11527--11535}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1416-0}, doi = {10.1007/S10586-017-1416-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/ZhangKYSLDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SunWZZLHDK19, author = {Jianguo Sun and Wenshan Wang and Kejia Zhang and Liguo Zhang and Yun Lin and Qilong Han and Qingan Da and Liang Kou}, title = {A multi-focus image fusion algorithm in 5G communications}, journal = {Multim. Tools Appl.}, volume = {78}, number = {20}, pages = {28537--28556}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-5790-2}, doi = {10.1007/S11042-018-5790-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SunWZZLHDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/DaSZKWHZ18, author = {Qingan Da and Jianguo Sun and Liguo Zhang and Liang Kou and Wenshan Wang and Qilong Han and Ruolin Zhou}, title = {A Novel Hybrid Information Security Scheme for 2D Vector Map}, journal = {Mob. Networks Appl.}, volume = {23}, number = {4}, pages = {734--742}, year = {2018}, url = {https://doi.org/10.1007/s11036-018-0997-z}, doi = {10.1007/S11036-018-0997-Z}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/DaSZKWHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunZKWDL18, author = {Jianguo Sun and Qi Zhong and Liang Kou and Wenshan Wang and Qingan Da and Yun Lin}, title = {A lightweight multi-factor mobile user authentication scheme}, booktitle = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19, 2018}, pages = {831--836}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFCOMW.2018.8406952}, doi = {10.1109/INFCOMW.2018.8406952}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/SunZKWDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangKZLDS17, author = {Guoyin Zhang and Liang Kou and Liguo Zhang and Chao Liu and Qingan Da and Jianguo Sun}, title = {A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {3126010:1--3126010:12}, year = {2017}, url = {https://doi.org/10.1155/2017/3126010}, doi = {10.1155/2017/3126010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangKZLDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/ZhangDZSHKW17, author = {Guoyin Zhang and Qingan Da and Liguo Zhang and Jianguo Sun and Qilong Han and Liang Kou and Wenshan Wang}, editor = {Bing Zeng and Qingming Huang and Abdulmotaleb El{-}Saddik and Hongliang Li and Shuqiang Jiang and Xiaopeng Fan}, title = {A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10736}, pages = {880--889}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-77383-4\_86}, doi = {10.1007/978-3-319-77383-4\_86}, timestamp = {Tue, 02 Mar 2021 17:33:54 +0100}, biburl = {https://dblp.org/rec/conf/pcm/ZhangDZSHKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.