


Остановите войну!
for scientists:
Qiushi Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Yunji Liang
, Qiushi Wang
, Kang Xiong, Xiaolong Zheng
, Zhiwen Yu
, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. IEEE Trans. Dependable Secur. Comput. 19(2): 717-730 (2022) - 2021
- [j9]Yingying Zhu, Haiyan Wu, Dawei Zhou, Qiushi Wang, Zhendi Sun, Chuanzhen Niu, Liping Ye, Xinghan Tian, Chunting Wang:
A Multivariate Model for Predicting the Progress of COVID-19 Using Clinical Data besides Chest CT Scan. Sci. Program. 2021: 3432010:1-3432010:8 (2021) - [c22]Qiushi Wang, Hian-Leng Chan:
Generating Pool of Classifiers with Hyper-Parameter Optimization for Ensemble. IECON 2021: 1-6 - [c21]Qiushi Wang, Abhishek Gupta, Hian-Leng Chan:
Accelerating Task Completion in IIoT Based Smart Factory Through Optimal Restart. IECON 2021: 1-6 - 2020
- [c20]Yanhua Cao, Shiyou Qian, Qiushi Wang, Hanwen Hu, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu, Minglu Li:
OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness. WASA (1) 2020: 15-27
2010 – 2019
- 2019
- [j8]Guangqiang Lan, Fang Xia, Qiushi Wang:
Polynomial stability of exact solution and a numerical method for stochastic differential equations with time-dependent delay. J. Comput. Appl. Math. 346: 340-356 (2019) - [j7]Guangqiang Lan, Qiushi Wang:
Strong convergence rates of modified truncated EM methods for neutral stochastic differential delay equations. J. Comput. Appl. Math. 362: 83-98 (2019) - [j6]Tengda Zhao, Xu-Hong Liao, Vladimir S. Fonov
, Qiushi Wang, Weiwei Men, Yanpei Wang, Shaozheng Qin
, Shuping Tan, Jia-Hong Gao, Alan C. Evans
, Sha Tao
, Qi Dong, Yong He:
Unbiased age-specific structural brain atlases for Chinese pediatric population. NeuroImage 189: 55-70 (2019) - [c19]Xiaofeng Li, Qiushi Wang:
Research on Blended Teaching Mode Based on Internet Plus. eLEOT 2019: 19-23 - [c18]Jihoon Hong, Qiushi Wang, Xueheng Qiu, Hian-Leng Chan:
Remaining Useful Life Prediction Using Time-Frequency Feature and Multiple Recurrent Neural Networks. ETFA 2019: 916-923 - [c17]Xiaofeng Li, Qiushi Wang:
Evaluation Model of Teaching Quality Based on Cloud Computing. ICPCSEE (2) 2019: 405-416 - [c16]Pern Hui Chia, Damien Desfontaines, Irippuge Milinda Perera, Daniel Simmons-Marengo, Chao Li, Wei-Yen Day, Qiushi Wang, Miguel Guevara:
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale. IEEE Symposium on Security and Privacy 2019: 350-364 - 2018
- [j5]Chao Qi, Min Li, Qiushi Wang, Huiquan Zhang, Jinling Xing, Zhifan Gao
, Huailing Zhang:
Facial Expressions Recognition Based on Cognition and Mapped Binary Patterns. IEEE Access 6: 18795-18803 (2018) - [j4]Tianhui Meng, Katinka Wolter, Huaming Wu, Qiushi Wang:
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks. Pervasive Mob. Comput. 45: 4-18 (2018) - [j3]Qiushi Wang, Katinka Wolter:
Accelerating task completion in mobile offloading systems through adaptive restart. Softw. Syst. Model. 17(2): 397-413 (2018) - [c15]Qiushi Wang, Kee Jin Lee, Jihoon Hong:
DOSS: Dual Over Sampling Strategy for Imbalanced Data Classification. IECON 2018: 5389-5394 - 2017
- [c14]Qiushi Wang, Ming Ming Tan, Xueyan Tang, Wentong Cai
:
Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation. ICDCS 2017: 1565-1574 - 2016
- [j2]Qiushi Wang, Fabian Reimeier, Katinka Wolter:
Efficient Image Stitching through Mobile Offloading. Electron. Notes Theor. Comput. Sci. 327: 125-146 (2016) - 2015
- [b1]Qiushi Wang:
Restart in Mobile Offloading. Free University of Berlin, 2015 - [c13]Tianhui Meng, Qiushi Wang, Katinka Wolter:
Model-Based Quantitative Security Analysis of Mobile Offloading Systems Under Timing Attacks. ASMTA 2015: 143-157 - [c12]Tianhui Meng, Katinka Wolter, Qiushi Wang:
Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks. EPEW 2015: 32-46 - [c11]Qiushi Wang, Katinka Wolter:
Automated Adaptive Restart for Accelerating Task Completion in Cloud Offloading Systems. ICAC 2015: 157-158 - [c10]Qiushi Wang, Katinka Wolter:
Reducing Task Completion Time in Mobile Offloading Systems through Online Adaptive Local Restart. ICPE 2015: 3-13 - 2014
- [c9]Qiushi Wang, Katinka Wolter:
Detection and Analysis of Performance Deterioration in Mobile Offloading System. ISSRE Workshops 2014: 420-425 - 2013
- [j1]Huaming Wu, Qiushi Wang, Katinka Wolter:
Optimal Cloud-Path Selection in Mobile Cloud Offloading Systems Based on QoS Criteria. Int. J. Grid High Perform. Comput. 5(4): 30-47 (2013) - [c8]Qiushi Wang, Huaming Wu, Katinka Wolter:
Model-based performance analysis of local re-execution scheme in offloading system. DSN 2013: 1-6 - [c7]Huaming Wu, Qiushi Wang, Katinka Wolter:
Tradeoff between performance improvement and energy saving in mobile cloud offloading systems. ICC Workshops 2013: 728-732 - [c6]Qiushi Wang, Xiaodong Lu, Lina Zhang, Hang Lv, Wei Zhang, Yue Wang, Shuxian Lun:
Amorphous silicon-assisted self-catalytic growth of FeSi nanowires in arc plasma. ICVES 2013: 258-262 - [c5]Qiushi Wang, Marti Griera Jorba, Joan Martinez Ripoll, Katinka Wolter:
Analysis of local re-execution in mobile offloading system. ISSRE 2013: 31-40 - [c4]Huaming Wu, Qiushi Wang, Katinka Wolter:
Mobile Healthcare Systems with Multi-cloud Offloading. MDM (2) 2013: 188-193 - 2012
- [c3]Huaming Wu, Qiushi Wang, Katinka Wolter:
Methods of cloud-path selection for offloading in mobile cloud computing systems. CloudCom 2012: 443-448 - 2011
- [c2]Suresh Venkatasubramanian, Qiushi Wang:
The Johnson-Lindenstrauss Transform: An Empirical Study. ALENEX 2011: 164-173
2000 – 2009
- 2009
- [c1]Qiushi Wang, Osamu Shigo:
Web Services Composition by I/O Data Structure Correspondences. APSEC 2009: 135-142
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-04 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint