BibTeX records: Qingan Da

download as .bib file

@article{DBLP:journals/entropy/DaZWZLLL23,
  author       = {Qingan Da and
                  Guoyin Zhang and
                  Wenshan Wang and
                  Yingnan Zhao and
                  Dan Lu and
                  Sizhao Li and
                  Dapeng Lang},
  title        = {Adversarial Defense Method Based on Latent Representation Guidance
                  for Remote Sensing Image Scene Classification},
  journal      = {Entropy},
  volume       = {25},
  number       = {9},
  pages        = {1306},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25091306},
  doi          = {10.3390/E25091306},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/DaZWZLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbic/DaZLLW23,
  author       = {Qingan Da and
                  Guoyin Zhang and
                  Sizhao Li and
                  Zechao Liu and
                  Wenshan Wang},
  title        = {Gradient-free adversarial attack algorithm based on differential evolution},
  journal      = {Int. J. Bio Inspired Comput.},
  volume       = {22},
  number       = {4},
  pages        = {217--226},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJBIC.2023.136087},
  doi          = {10.1504/IJBIC.2023.136087},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbic/DaZLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbic/ZhangDLSWHL22,
  author       = {Guoyin Zhang and
                  Qingan Da and
                  Sizhao Li and
                  Jianguo Sun and
                  Wenshan Wang and
                  Qing Hu and
                  Jiashuai Lu},
  title        = {Adversarial transformation network with adaptive perturbations for
                  generating adversarial examples},
  journal      = {Int. J. Bio Inspired Comput.},
  volume       = {20},
  number       = {2},
  pages        = {94--103},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJBIC.2022.10048992},
  doi          = {10.1504/IJBIC.2022.10048992},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbic/ZhangDLSWHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangYYD21,
  author       = {Yan Jiang and
                  Guisheng Yin and
                  Ye Yuan and
                  Qingan Da},
  title        = {Project Gradient Descent Adversarial Attack against Multisource Remote
                  Sensing Image Scene Classification},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6663028:1--6663028:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6663028},
  doi          = {10.1155/2021/6663028},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangYYD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/SunWKLZDC20,
  author       = {Jianguo Sun and
                  Wenshan Wang and
                  Liang Kou and
                  Yun Lin and
                  Liguo Zhang and
                  Qingan Da and
                  Lei Chen},
  title        = {A data authentication scheme for {UAV} ad hoc network communication},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {6},
  pages        = {4041--4056},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11227-017-2179-3},
  doi          = {10.1007/S11227-017-2179-3},
  timestamp    = {Wed, 13 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/SunWKLZDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangKYSLDW19,
  author       = {Guoyin Zhang and
                  Liang Kou and
                  Ye Yuan and
                  Jianguo Sun and
                  Yun Lin and
                  Qingan Da and
                  Wenshan Wang},
  title        = {An intelligent method of cancer prediction based on mobile cloud computing},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {5},
  pages        = {11527--11535},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1416-0},
  doi          = {10.1007/S10586-017-1416-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangKYSLDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SunWZZLHDK19,
  author       = {Jianguo Sun and
                  Wenshan Wang and
                  Kejia Zhang and
                  Liguo Zhang and
                  Yun Lin and
                  Qilong Han and
                  Qingan Da and
                  Liang Kou},
  title        = {A multi-focus image fusion algorithm in 5G communications},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {20},
  pages        = {28537--28556},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-5790-2},
  doi          = {10.1007/S11042-018-5790-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SunWZZLHDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/DaSZKWHZ18,
  author       = {Qingan Da and
                  Jianguo Sun and
                  Liguo Zhang and
                  Liang Kou and
                  Wenshan Wang and
                  Qilong Han and
                  Ruolin Zhou},
  title        = {A Novel Hybrid Information Security Scheme for 2D Vector Map},
  journal      = {Mob. Networks Appl.},
  volume       = {23},
  number       = {4},
  pages        = {734--742},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11036-018-0997-z},
  doi          = {10.1007/S11036-018-0997-Z},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/DaSZKWHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunZKWDL18,
  author       = {Jianguo Sun and
                  Qi Zhong and
                  Liang Kou and
                  Wenshan Wang and
                  Qingan Da and
                  Yun Lin},
  title        = {A lightweight multi-factor mobile user authentication scheme},
  booktitle    = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19,
                  2018},
  pages        = {831--836},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFCOMW.2018.8406952},
  doi          = {10.1109/INFCOMW.2018.8406952},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/SunZKWDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangKZLDS17,
  author       = {Guoyin Zhang and
                  Liang Kou and
                  Liguo Zhang and
                  Chao Liu and
                  Qingan Da and
                  Jianguo Sun},
  title        = {A New Digital Watermarking Method for Data Integrity Protection in
                  the Perception Layer of IoT},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {3126010:1--3126010:12},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/3126010},
  doi          = {10.1155/2017/3126010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangKZLDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/ZhangDZSHKW17,
  author       = {Guoyin Zhang and
                  Qingan Da and
                  Liguo Zhang and
                  Jianguo Sun and
                  Qilong Han and
                  Liang Kou and
                  Wenshan Wang},
  editor       = {Bing Zeng and
                  Qingming Huang and
                  Abdulmotaleb El{-}Saddik and
                  Hongliang Li and
                  Shuqiang Jiang and
                  Xiaopeng Fan},
  title        = {A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2017 - 18th
                  Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29,
                  2017, Revised Selected Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10736},
  pages        = {880--889},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-77383-4\_86},
  doi          = {10.1007/978-3-319-77383-4\_86},
  timestamp    = {Tue, 02 Mar 2021 17:33:54 +0100},
  biburl       = {https://dblp.org/rec/conf/pcm/ZhangDZSHKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics