


default search action
Kai Qian
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Guilin Zhan, Kai Qian, Wenyang Chen, Dandan Xue, Mengdi Li, Jun Zhang, Yonghang Tai:
EAswin-unet: Segmenting CT images of COVID-19 with edge-fusion attention. Biomed. Signal Process. Control. 89: 105759 (2024) - [j34]Yanwei Wang, Qingxu Zhao
, Kai Qian, Zifa Wang, Zhenzhong Cao, Jianming Wang:
Cumulative absolute velocity prediction for earthquake early warning with deep learning. Comput. Aided Civ. Infrastructure Eng. 39(11): 1724-1740 (2024) - [j33]Zhibao Qin
, Kai Qian, Shaojun Liang, Qinhong Zheng, Jun Peng, Yonghang Tai:
Neural radiance fields-based multi-view endoscopic scene reconstruction for surgical simulation. Int. J. Comput. Assist. Radiol. Surg. 19(5): 951-960 (2024) - [j32]Kai Qian:
Optimization Algorithm for Green Environment Design Based on Artificial Intelligence. Scalable Comput. Pract. Exp. 25(5): 3547-3553 (2024) - [j31]Fan Wu
, Feng Lyu
, Ju Ren
, Peng Yang
, Kai Qian, Shijie Gao, Yaoxue Zhang:
Characterizing Internet Card User Portraits for Efficient Churn Prediction Model Design. IEEE Trans. Mob. Comput. 23(2): 1735-1752 (2024) - [j30]Fei Li, Zhibao Qin, Kai Qian, Shaojun Liang, Chengli Li, Yonghang Tai:
Personalized assessment and training of neurosurgical skills in virtual reality: An interpretable machine learning approach. Virtual Real. Intell. Hardw. 6(1): 17-29 (2024) - [c137]Kai Qian
, Zheng Liu
, Yinqiu Liu
, Haodong Lu
, Zexu Zhang
, Ruiqiu Chen
, Kun Wang
:
AutoHammer: Breaking the Compilation Wall Between Deep Neural Network and Overlay-based FPGA Accelerator. FPGA 2024: 185 - 2023
- [j29]Jun Liu
, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri
, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. Digit. Commun. Networks 9(2): 347-357 (2023) - [j28]Changlu Qi, Yiting Cai, Kai Qian, Xuefeng Li, Jialiang Ren, Ping Wang
, Tongze Fu, Tianyi Zhao
, Liang Cheng
, Lei Shi, Xue Zhang
:
gutMDisorder v2.0: a comprehensive database for dysbiosis of gut microbiota in phenotypes and interventions. Nucleic Acids Res. 51(D1): 717-722 (2023) - [j27]Kai Qian
, Yinqiu Liu
, Chaoran Shu, Yanfei Sun
, Kun Wang
:
Fine-Grained Benchmarking and Targeted Optimization: Enabling Green IoT-Oriented Blockchain in the 6G Era. IEEE Trans. Green Commun. Netw. 7(2): 1036-1051 (2023) - [j26]Kai Qian
, Yinqiu Liu
, Xiaoming He
, Miao Du
, Suofei Zhang
, Kun Wang
:
HPCchain: A Consortium Blockchain System Based on CPU-FPGA Hybrid-PUF for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 11205-11215 (2023) - [c136]Tarun Potluri, Yong Shi, Hossain Shahriar, Dan Chia-Tien Lo, Reza M. Parizi, Hongmei Chi
, Kai Qian:
Secure Software Development in Google Colab. AIIoT 2023: 398-402 - [c135]Dhanunjai Bandi, Yong Shi, Hossain Shahriar, Dan C. Lo, Kun Suo, Hongmei Chi
, Kai Qian:
Quantum Machine Learning for Security Data Analysis. AIIoT 2023: 460-465 - [c134]Yong Shi, Nazmus Sakib, Hossain Shahriar, Dan Lo, Hongmei Chi, Kai Qian:
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future. COMPSAC 2023: 991-992 - [c133]Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. COMPSAC 2023: 1010-1012 - [c132]Zheng Liu, Wei Chen, Kai Qian, Haodong Lu, Yinqiu Liu, Siguang Chen, Kun Wang:
microGEMM: An Effective CNN-Based Inference Acceleration for Edge Computing. ICC 2023: 2474-2479 - [c131]Shijie Gao, Fan Wu, Kai Qian, Shixu Chen, Jinbao Ren, Feng Lyu:
Ranking Cellular Internet Card User VIP Values Based on Graph Clustering with Usage Data. ICCC 2023: 1-6 - [c130]Kai Qian, Yinqiu Liu, Zexu Zhang, Kun Wang:
Efficient Implementation of Activation Function on FPGA for Accelerating Neural Networks. ISCAS 2023: 1-5 - [c129]Dan C. Lo
, Hossain Shahriar
, Kai Qian
, Michael E. Whitman
, Fan Wu
, Cassandra Thomas
:
Authentic Learning on Machine Learning for Cybersecurity. SIGCSE (2) 2023: 1299 - [c128]Yong Shi, Hossain Shahriar, Dan C. Lo, Kai Qian, Hongmei Chi:
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development. SIGCSE (2) 2023: 1307 - [i3]Ling Chen, Yiyi Peng, Kai Qian, Hongyu Shi, Xiaofan Zhang:
SHA-SCP: A UI Element Spatial Hierarchy Aware Smartphone User Click Behavior Prediction Method. CoRR abs/2310.11915 (2023) - 2022
- [j25]Yinqiu Liu
, Kai Qian
, Kun Wang
, Lei He
:
BCmaster: A Compatible Framework for Comprehensively Analyzing and Monitoring Blockchain Systems in IoT. IEEE Internet Things J. 9(22): 22529-22546 (2022) - [j24]Jubao Han, Chao Xu, Ziheng An, Kai Qian, Wei Tan, Dou Wang, Qianqian Fang:
PRAPNet: A Parallel Residual Atrous Pyramid Network for Polyp Segmentation. Sensors 22(13): 4658 (2022) - [j23]Ziheng An, Chao Xu, Kai Qian, Jubao Han, Wei Tan, Dou Wang, Qianqian Fang:
EIEN: Endoscopic Image Enhancement Network Based on Retinex Theory. Sensors 22(14): 5464 (2022) - [j22]Yinqiu Liu
, Kai Qian, Kun Wang
, Lei He
:
Effective Scaling of Blockchain Beyond Consensus Innovations and Moore's Law: Challenges and Opportunities. IEEE Syst. J. 16(1): 1424-1435 (2022) - [c127]Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Michael E. Whitman, Alfredo Cuzzocrea, Fan Wu, Victor Clincy:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection. IEEE Big Data 2022: 5715-5720 - [c126]Mohammad Masum, Md. Jobair Hossain Faruk
, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CCWC 2022: 316-322 - [c125]Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. COMPSAC 2022: 424-425 - [c124]Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. COMPSAC 2022: 428-429 - [c123]Md. Jobair Hossain Faruk
, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. COMPSAC 2022: 442-443 - [c122]Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. COMPSAC 2022: 454-455 - [c121]Kai Qian, Yinqiu Liu, Yamin Han, Kun Wang:
BCadvisor: Enabling Green Blockchain Systems Through Resource-Oriented Benchmarking. ICC 2022: 4031-4036 - [c120]Kai Qian, Jing Wang, Wenjing Yang, Miao Liu:
Binaural Sound Source Localization based on Neural Networks in Mismatched HRTF Condition. ICCAI 2022: 62-67 - [c119]Jie Zhang, Yin Zhao, Kai Qian:
Enlarging the Long-time Dependencies via RL-based Memory Network in Movie Affective Analysis. ACM Multimedia 2022: 5739-5750 - [c118]Dan Chia-Tien Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware. SIGCSE (2) 2022: 1153 - [i2]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan C. Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CoRR abs/2207.00894 (2022) - 2021
- [j21]Kai Qian
, Hao Luo, Da Qiu, Shengli Pu
, Wencai Yao:
Broadband and Tunable 920-nm Femtosecond Pulse Generated by an All-Fiber Er: Fiber Laser System. IEEE Access 9: 29660-29664 (2021) - [j20]Wenjun Li
, Siyi Cheng
, Kai Qian
, Keqiang Yue
, Hao Liu
:
Automatic Recognition and Classification System of Thyroid Nodules in CT Images Based on CNN. Comput. Intell. Neurosci. 2021: 5540186:1-5540186:11 (2021) - [j19]Kai Qian, Jie Jiang
, Yulong Ding, Shuang-Hua Yang:
DLGEA: a deep learning guided evolutionary algorithm for water contamination source identification. Neural Comput. Appl. 33(18): 11889-11903 (2021) - [j18]Haodong Lu, Miao Du, Xiaoming He, Kai Qian, Jianli Chen, Yanfei Sun, Kun Wang:
An Adaptive Neural Architecture Search Design for Collaborative Edge-Cloud Computing. IEEE Netw. 35(5): 83-89 (2021) - [j17]Yonghang Tai
, Kai Qian, Xiaoqiao Huang
, Jun Zhang
, Mian Ahmad Jan
, Zhengtao Yu
:
Intelligent Intraoperative Haptic-AR Navigation for COVID-19 Lung Biopsy Using Deep Hybrid Model. IEEE Trans. Ind. Informatics 17(9): 6519-6527 (2021) - [c117]Wenjing Yang, Jing Wang, Hongfeng Li, Na Xu, Fei Xiang, Kai Qian, Shenghua Hu:
A Target Speaker Separation Neural Network with Joint-Training. APSIPA ASC 2021: 614-618 - [c116]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu:
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity. IEEE BigData 2021: 3311-3315 - 2020
- [j16]Jing Wang, Jin Wang, Kai Qian, Xiang Xie, Jingming Kuang:
Binaural sound localization based on deep neural network and affinity propagation clustering in mismatched HRTF condition. EURASIP J. Audio Speech Music. Process. 2020(1): 4 (2020) - [j15]Yinqiu Liu
, Kun Wang
, Kai Qian, Miao Du, Song Guo
:
Tornado: Enabling Blockchain in Heterogeneous Internet of Things Through a Space-Structured Approach. IEEE Internet Things J. 7(2): 1273-1286 (2020) - [j14]Miao Du, Kun Wang, Yinqiu Liu, Kai Qian, Yanfei Sun, Wenyao Xu, Song Guo:
Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security. IEEE Wirel. Commun. 27(3): 38-45 (2020) - [c115]Xiaohong Zhang, Nanqun He, Kai Qian, Wanquan Yang, Jianji Ren:
An Improved Linear Threshold Model. 6GN 2020: 333-344 - [c114]Hossain Shahriar
, Kai Qian, Atef Shalan, Fan Wu:
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. COMPSAC 2020: 1095-1096 - [c113]Hossain Shahriar
, Kai Qian, Hao Zhang:
Learning Environment Containerization of Machine Leaning for Cybersecurity. COMPSAC 2020: 1131-1132 - [c112]Zhuolin Li, Hao Zhang, Hossain Shahriar
, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. DASC/PiCom/CBDCom/CyberSciTech 2020: 469-474 - [c111]Kai Qian, Jie Jiang, Yulong Ding, Shuanghua Yang:
Deep Learning Based Anomaly Detection in Water Distribution Systems. ICNSC 2020: 1-6 - [c110]Dan C. Lo, Kai Qian, Hossain Shahriar
, Fan Wu, Johng-Chern Chern, Pascal Paschos, Chung Ng:
Information Assurance and Security Education on Undergraduate Computing Degree Programs. SIGCSE 2020: 1274 - [c109]Kai Qian, Yinqiu Liu, Yamin Han, Kun Wang:
Performance Benchmarking and Optimization for IIoT-oriented Blockchain. SpaCCS Workshops 2020: 395-406 - [i1]Yinqiu Liu, Kai Qian, Jinlong Yu, Kun Wang, Lei He:
Effective scaling of blockchain beyond consensus innovations and Moore's law. CoRR abs/2001.01865 (2020)
2010 – 2019
- 2019
- [j13]Xiao-hong Zhang
, Kai Qian, Jianji Ren, Zong-pu Jia, Tianpeng Jiang, Quan Zhang:
Measurement and analysis of content diffusion characteristics in opportunity environmentswith Spark. Frontiers Inf. Technol. Electron. Eng. 20(10): 1404-1414 (2019) - [c108]Md Arabin Islam Talukder
, Hossain Shahriar
, Kai Qian, Mohammad Ashiqur Rahman
, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. COMPSAC (1) 2019: 565-569 - [c107]Chao Gao, Junfeng Yao, Kaini Huang, Kai Qian:
Application and Research of Image-Based Modeling and 3D Printing Technology in Intangible Cultural Heritage Quanzhou Marionette Protection. COMPSAC (1) 2019: 914-915 - [c106]Hossain Shahriar, Kai Qian, Md Arabin Islam Talukder
, Reza M. Parizi:
Data Protection with SMSD Labware. SIGCSE 2019: 1262 - 2018
- [c105]Reza M. Parizi, Kai Qian, Hossain Shahriar
, Fan Wu, Lixin Tao:
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools. COMPSAC (1) 2018: 825-826 - [c104]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar
, Md Arabin Islam Talukder
, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. COMPSAC (1) 2018: 829-830 - [c103]Kai Qian, Reza M. Parizi, Dan Chia-Tien Lo:
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development. DSC 2018: 1-2 - [c102]Kai Qian, Dan Chia-Tien Lo, Reza M. Parizi, Fan Wu, Emmanuel Agu, Bei-Tseng Chu:
Authentic Learning Secure Software Development (SSD) in Computing Education. FIE 2018: 1-9 - [c101]Ying Qian, Prabir Bhattacharya, Wanqing You, Kai Qian:
Security Threat Analysis of SDN Switch Flow Table. ICCCN 2018: 1-2 - [c100]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya:
Detectors for Intent ICC Security Vulnerability with Android IDE. ICUFN 2018: 355-357 - [c99]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya, Fan Wu:
Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis. ISNCC 2018: 1-4 - [c98]Hossain Shahriar
, Kai Qian, Md Arabin Islam Talukder
, Dan Chia-Tien Lo, Nidhibahen Patel:
Mobile Software Security with Dynamic Analysis. PRDC 2018: 223-224 - 2017
- [c97]Boyu Hou, Yong Shi, Kai Qian, Lixin Tao:
Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution. BigDataSecurity/HPSC/IDS 2017: 90-95 - [c96]Priyanga Chandrasekar, Kai Qian, Hossain Shahriar
, Prabir Bhattacharya:
Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing. COMPSAC (2) 2017: 481-484 - [c95]Kai Qian, Luiz Antonio dos Anjos, Karthikeyan Balasubramanian, Kelsey Stilson, Carrie Balcer, Nicholas G. Hatsopoulos, Derek G. Kamper:
Using monkey hand exoskeleton to explore finger passive joint movement response in primary motor cortex. EMBC 2017: 3624-3627 - [c94]Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar
, Lei Li, Fan Wu, Prabir Bhattacharya:
Learning database security with hands-on mobile labs. FIE 2017: 1-6 - [c93]Kai Qian, Yong Shi, Lixin Tao, Ying Qian:
Hands-On Learning for Computer Network Security with Mobile Devices. ICCCN 2017: 1-6 - [c92]Ying Qian, Wanqing You, Kai Qian:
FlowVisor vulnerability analysis. IM 2017: 867-868 - [c91]Milton H. Luoma, Jigang Liu, Kai Qian:
Designing an Undergraduate Minor Program in E-Discovery. ITiCSE 2017: 361 - [c90]Kai Qian, Hossain Shahriar
, Fan Wu, Lixin Tao, Prabir Bhattacharya:
Labware for Secure Mobile Software Development (SMSD) Education. ITiCSE 2017: 375 - [c89]Anthony I. Wasserman, Xianzheng Guo, Blake McMillian, Kai Qian, Ming-Yu Wei, Qian Xu:
OSSpal: Finding and Evaluating Open Source Software. OSS 2017: 193-203 - [c88]Kai Qian, Hossain Shahriar, Fan Wu, Cassandra Thomas, Emmanuel Agu:
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only). SIGCSE 2017: 715 - 2016
- [j12]Furui Wang, Christopher L. Jones, Milind Shastri, Kai Qian, Derek G. Kamper, Nilanjan Sarkar:
Design and evaluation of an actuated exoskeleton for examining motor control in stroke thumb. Adv. Robotics 30(3): 165-177 (2016) - [j11]Delong Su, Shengli Pu
, Lianmin Mao, Zhaofang Wang, Kai Qian:
A Photonic Crystal Magnetic Field Sensor Using a Shoulder-Coupled Resonant Cavity Infiltrated with Magnetic Fluid. Sensors 16(12): 2157 (2016) - [c87]Tianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao:
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining. BigDataSecurity/HPSC/IDS 2016: 129-133 - [c86]Yong Shi, Dan Chia-Tien Lo, Kai Qian:
Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. COMPSAC Workshops 2016: 247-252 - [c85]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Hardware Attacks and Security Education. COMPSAC Workshops 2016: 253-257 - [c84]Minzhe Guo, Kai Qian, Li Yang:
Hands-On Labs for Learning Mobile and NoSQL Database Security. COMPSAC Workshops 2016: 606-607 - [c83]Lei Li, Kai Qian:
Using Real-Time Fear Appeals to Improve Social Media Security. COMPSAC Workshops 2016: 610-611 - [c82]Priyanga Chandrasekar, Kai Qian:
The Impact of Data Preprocessing on the Performance of a Naive Bayes Classifier. COMPSAC Workshops 2016: 618-619 - [c81]Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu:
MongoDB NoSQL Injection Analysis and Detection. CSCloud 2016: 75-78 - [c80]Ying Qian, Wanqing You, Kai Qian:
OpenFlow flow table overflow attacks and countermeasures. EuCNC 2016: 205-209 - [c79]Ying Xie, Kai Qian, Jing He:
Multi-dimensional and customizable open-source labware for promoting big data analytical skills in STEM education. FIE 2016: 1-5 - [c78]Kai Qian, Dan Lo, Wei Chen, Ying Qian:
Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only). SIGCSE 2016: 691 - [c77]Lei Li, Kai Qian, Qian Chen, Ragib Hasan
, Guifeng Shao:
Developing Hands-on Labware for Emerging Database Security. SIGITE 2016: 60-64 - [c76]Lei Li, Kai Qian, Ragib Hasan
, Qian Chen, Dalei Wu
, Yong Shi:
An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing. SIGITE 2016: 108 - [c75]Tianda Yang, Kai Qian, Lei Li, Dan Chia-Tien Lo, Lixin Tao:
Static Mining and Dynamic Taint for Mobile Security Threats Analysis. SmartCloud 2016: 234-240 - [c74]Yong Shi, Wanqing You, Kai Qian, Prabir Bhattacharya, Ying Qian:
A hybrid analysis for mobile security threat detection. UEMCON 2016: 1-7 - 2015
- [c73]Wanqing You, Kai Qian, Chia-Tien Dan Lo, Prabir Bhattacharya, Minzhe Guo, Ying Qian:
Web Service-Enabled Spam Filtering with Naïve Bayes Classification. BigDataService 2015: 99-104 - [c72]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers, Kuosheng Ma:
Learning Hands-on Information Assurance and Security on Mobile Devices. COMPSAC 2015: 874-879 - [c71]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Mobile security education on portable labs. FIE 2015: 1-4 - [c70]Kuosheng Ma, Yingnan Ma, Yanchen Wang, Kai Qian, Qichang Zheng, Liang Hong:
Innovative mobile tool for engineering embedded design and security educations. FIE 2015: 1-4 - [c69]Teng Zhao, Dan Chia-Tien Lo, Kai Qian:
A Neural-Network Based DDoS Detection System Using Hadoop and HBase. HPCC/CSS/ICESS 2015: 1326-1331 - [c68]Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, Lixin Tao:
Automated Detection and Analysis for Android Ransomware. HPCC/CSS/ICESS 2015: 1338-1343 - [c67]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers:
A Low Cost, Portable Platform for Information Assurance and Security Education. ICALT 2015: 111-113 - [c66]Kuosheng Ma, Q. C. Zheng, Y. N. Ma, Kai Qian, Liang Hong:
Work in progress: Using mobile technology to enhance self-efficacy in underrepresented students for engineering education. TALE 2015: 145-148 - [c65]Wanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao:
A hybrid approach for mobile security threat analysis. WISEC 2015: 28:1-28:2 - 2014
- [j10]Prabir Bhattacharya, Li Yang, Minzhe Guo, Kai Qian, Ming Yang:
Learning Mobile Security with Labware. IEEE Secur. Priv. 12(1): 69-72 (2014) - [c64]Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar
, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. ACM Southeast Regional Conference 2014: 13:1-13:6 - [c63]Chia-Tien Dan Lo, Kai Qian, Kuosheng Ma:
A multidisciplinary project for undergraduate summer research in computer systems. ACM Southeast Regional Conference 2014: 32:1-32:2 - [c62]Dan Chia-Tien Lo, Kai Qian, Wei Chen, Hossain Shahriar
, Victor Clincy:
Authentic learning in network and security with portable labs. FIE 2014: 1-5 - [c61]Ming Yang, Becky Rutherfoord, Kai Qian:
Learning cloud computing and security through CloudSim simulation. InfoSecCD 2014: 6:1 - [c60]Minzhe Guo, Prabir Bhattacharya, Kai Qian, Chia-Tien Dan Lo, Xi He:
Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs. ITiCSE 2014: 343 - 2013
- [c59]Karthikeyan Balasubramanian, Joshua Southerland, Mukta Vaidya, Kai Qian, Ahmed Eleryan, Andrew H. Fagg
, Marc W. Slutzky, Karim G. Oweiss, Nicholas G. Hatsopoulos:
Operant conditioning of a multiple degree-of-freedom brain-machine interface in a primate model of amputation. EMBC 2013: 303-306 - [c58]Liang Hong, Kai Qian, Gang Quan
, Kuosheng Ma:
Low-cost and portable labware for computing curriculum using scalable mobile sensory platform. FIE 2013: 200-202 - [c57]Minzhe Guo, Prabir Bhattacharya, Kai Qian, Li Yang:
Authentic learning of mobile security with case studies. FIE 2013: 1519-1521 - [c56]Minzhe Guo, Kai Qian, Ming Yang, Chia-Tien Dan Lo, Kuosheng Ma, Liang Hong, Li Yang:
Android-Based Mobile Sensory System Labware for Embedded System Education. ICALT 2013: 118-119 - [c55]Kuosheng Ma, Ming Yang, Kai Qian:
Contradistinction and Relevant Learning for Transform Processing with Smartphones in Engineering Education. ICALT 2013: 455-456 - [c54]Kai Qian, Ming Yang, Minzhe Guo, Prabir Bhattacharya, Lixin Tao:
Mobile device based authentic learning for computer network and security. ITiCSE 2013: 335 - [c53]Kai Qian, Kuosheng Ma:
A fostering embedded system educationwith android sensory embedded system labware. ITiCSE 2013: 336 - [c52]Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, Li Yang:
Learning mobile security with android security labware. SIGCSE 2013: 675-680 - [c51]Ming Yang, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Guillermo A. Francia III, Li Yang:
Enhance computer networks learning with hands-on mobile device based labware (abstract only). SIGCSE 2013: 732 - 2012
- [c50]Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, Li Yang:
Work in progress: Real world relevant security labware for mobile threat analysis and protection experience. FIE 2012: 1-2 - [c49]Liang Hong, Kai Qian, Chih-Cheng Hung:
Work in progress: Multi-faceted penetration of fast fourier transform by interactively analyzing real-world objects via mobile technology. FIE 2012: 1-2 - [c48]Dan Chia-Tien Lo, Kai Qian, Gang Quan
, Liang Hong:
Work in progress: Enhance CS/CE student learning in computer architecture and organization through a remote instrument control lab with mixed reality. FIE 2012: 1-2 - [c47]Kai Qian, Chia-Tien Dan Lo, Yi Pan
, Yanqing Zhang, Xiaolin Hu, Liang Hong:
Real-World Relevant Learning with Android Smartphones. ICALT 2012: 476-477 - [c46]Kai Qian, Chia-Tien Dan Lo, Yi Pan, Yanqing Zhang, Xiaolin Hu, Liang Hong:
The cross-curriculum mobile computing labware for CS (abstract only). SIGCSE 2012: 664 - 2011
- [c45]Chia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang:
Teaching operating systems with simple low-cost portable energy efficient devices. ACM Southeast Regional Conference 2011: 25-30 - [c44]Dandan Huang, Kai Qian, Simon Oxenham, Ding-Yu Fei, Ou Bai
:
Event-related desynchronization/ synchronization-based brain-computer interface towards volitional cursor control in a 2D center-out paradigm. CCMB 2011: 151-158 - [c43]Kai Qian, Lixin Tao, Wanjun Hu, Richard Kline:
Work in progress - Live programming learning objects repository. FIE 2011: 3 - [c42]Prabir Bhattacharya, Minzhe Guo, Lixin Tao, Bin Wu, Kai Qian, E. Kent Palmer:
A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education. ICALT 2011: 12-13 - [c41]Prabir Bhattacharya, Minzhe Guo, Lixin Tao, Yujian Fu, Kai Qian:
A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning. ICALT 2011: 14-16 - [c40]Chia-Tien Dan Lo, Kai Qian, Yanqing Zhang:
A Simple Low-Cost Portable Energy Efficient Device to Supplement Operating System Curriculum. ICALT 2011: 76-77 - [c39]Bin Wu, Kai Qian, Prabir Bhattacharya, Minzhe Guo, Wanjun Hu:
Live Programming Learning Objects on Cloud. ICALT 2011: 362-363 - [c38]Kai Qian, Letian Yi, Jiwu Shu:
ThinStore: Out-of-Band Virtualization with Thin Provisioning. NAS 2011: 1-10 - 2010
- [c37]Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. ACM Southeast Regional Conference 2010: 53 - [c36]Shangrong Deng, Chih-Cheng Hung, Kai Qian:
Using the online webwork for student's homework practice in education. ACM Southeast Regional Conference 2010: 83 - [c35]Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. ACM Southeast Regional Conference 2010: 84 - [c34]Chia-Tien Dan Lo, Kai Qian:
Green Computing Methodology for Next Generation Computing Scientists. COMPSAC 2010: 250-251 - [c33]Chia-Tien Dan Lo, Kai Qian, Li Yang:
Innovative CS capstone projects on green energy applications with WSN in a box. ITiCSE 2010: 307 - [c32]Kai Qian, Chia-Tien Dan Lo, Li Yang, Jigang Liu:
Inquiry-based active learning in introductory programming courses. ITiCSE 2010: 312 - [c31]Kai Qian, Chia-Tien Dan Lo, Xiaolin Hu:
Portable labs in a box for embedded system education. ITiCSE 2010: 318 - [c30]Song Tan, Kai Qian, Xiang Fu
, Prabir Bhattacharya:
BAUT: A Bayesian Driven Tutoring System. ITNG 2010: 476-481 - [c29]Minzhe Guo, Taolun Chai, Kai Qian:
Design of Online Runtime and Testing Environment for Instant Java Programming Assessment. ITNG 2010: 1102-1106 - [c28]Junfeng Yao, Chengpeng Wu, Xiaobiao Xie, Kai Qian, Guoli Ji, Prabir Bhattacharya:
A new method of information decision-making based on D-S evidence theory. SMC 2010: 1804-1811
2000 – 2009
- 2009
- [j9]Frank Tsui, Andy Ju An Wang, Kai Qian:
A discussion on security typing and measurement for SOA. ACM SIGSOFT Softw. Eng. Notes 34(3): 1-5 (2009) - [c27]Kai Qian, Jigang Liu, Lixin Tao:
Teach real-time embedded system online with real hands-on labs. ITiCSE 2009: 367 - 2008
- [j8]Zhengjie Liu, Zhiwei Guo, Kai Qian, Huiling Wei, Ning Zhang:
Under Development - UCD in Chinese IT enterprises. Interactions 15(3): 68-70 (2008) - [c26]Mate' Sztipanovits, Kai Qian, Xiang Fu
:
The automated web application testing (AWAT) system. ACM Southeast Regional Conference 2008: 88-93 - [c25]Therese J. Albert, Kai Qian, Xiang Fu
:
Race condition in Ajax-based web application. ACM Southeast Regional Conference 2008: 390-393 - [c24]Xiang Fu
, Kai Qian:
SAFELI: SQL injection scanner using symbolic execution. TAV-WEB 2008: 34-39 - [c23]Artur Tomusiak, Kai Qian, Taixi Xu:
Dynamical Proxy for Dynamic Services. Software Engineering Research and Practice 2008: 634-638 - [c22]Xiang Fu
, Boris Peltsverger, Kai Qian, Lixin Tao, Jigang Liu:
APOGEE: automated project grading and instant feedback system for web based computing. SIGCSE 2008: 77-81 - 2007
- [c21]Kai Qian, Jigang Liu, Shangrong Deng:
Recursion detection testing on software components. ACM Southeast Regional Conference 2007: 523-524 - [c20]Xiang Fu
, Xin Lu, Boris Peltsverger, Shijun Chen, Kai Qian, Lixin Tao:
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities. COMPSAC (1) 2007: 87-96 - [c19]Dan Guo, Zhengjie Liu, Zhiwei Guo, Kai Qian:
A User Experience Study on C2C E-Commerce Localization in China. HCI (11) 2007: 363-371 - 2006
- [c18]Kai Qian, Jigang Liu, Frank Tsui:
Decoupling Metrics for Services Composition. ACIS-ICIS 2006: 44-47 - [c17]Kai Qian, Jigang Liu:
An Incremental, Spiral, Topic-Driven Approach -- Designing labs and projects for a Web technology course. FECS 2006: 67-74 - [c16]Kai Qian, Jigang Liu:
Recursion Detection Testing on Software Components. IMECS 2006: 828-832 - [c15]Kai Qian, Larry Wang, Subramanian Ananthram:
Adapter Pattern in Component and Service Levels vs. Class and Object Levels. Software Engineering Research and Practice 2006: 226-232 - [c14]Kai Qian, Jigang Liu, Lixin Tao:
Asynchronous Callback in Web Services. SNPD 2006: 375-380 - [c13]Taixi Xu, Kai Qian, Xi He:
Service Oriented Dynamic Decoupling Metrics. SWWS 2006: 170-176 - 2005
- [c12]Shangrong Deng, Kai Qian, Chih-Cheng Hung:
Enhanced water level model in image classification. Visual Information Processing 2005: 296-303 - 2004
- [c11]Kai Qian, Orlando Karam, Jorge Diaz, Jigang Liu:
Design Patterns for Web Services. SNPD 2004: 342-348 - [c10]Shangrong Deng, Kai Qian, Chih-Cheng Hung:
Water-level model in density-based unsupervised classification. Visual Information Processing 2004: 206-213 - 2003
- [c9]Chih-Cheng Hung, Tommy L. Coleman, Kai Qian:
Some Experiments on Peer Group Pixels Based Spatial Classifier. CATA 2003: 351-354 - 2002
- [c8]Chih-Cheng Hung, Yiwen He, Tommy L. Coleman, Kai Qian:
A spatial classification algorithm using peer group pixels. IGARSS 2002: 3405-3407 - [c7]Xiaobing Liu, Kai Qian, Andy Ju An Wang, Hongwei Tao:
Component based development of UDBC. OOPSLA Companion 2002: 80-81 - [c6]Jigang Liu, Fenglien Lee, Kai Qian:
A Parallel Prefix Convex Hill Algorithm Using MasPar. PDPTA 2002: 1089-1095 - 2000
- [c5]Kai Qian, Chih-Cheng Hung, Prabir Bhattacharya:
Polynomial morphological approach in pattern recognition. Visual Information Processing 2000: 146-153
1990 – 1999
- 1999
- [j7]Kai Qian, Siqi Cao, Prabir Bhattacharya:
Gray Image Skeletonization with Hollow Preprocessing Using Distance Transformation. Int. J. Pattern Recognit. Artif. Intell. 13(6): 881-892 (1999) - 1998
- [c4]Kai Qian, Siqi Cao, Prabir Bhattacharya:
Three-dimensional skeletonization using distance transform. Visual Information Processing 1998: 261-265 - 1997
- [c3]Kai Qian, Siqi Cao, Prabir Bhattacharya:
Skeletonization of gray-scale images by gray weighted distance transform. Visual Information Processing 1997: 224-228 - 1993
- [j6]Prabir Bhattacharya, Kai Qian, Xun Lu:
An algebraic approach for morphological operations on 2D and 3D images. Pattern Recognit. 26(12): 1785-1796 (1993) - 1992
- [j5]Kai Qian, Prabir Bhattacharya:
Determining holes and connectivity in binary images. Comput. Graph. 16(3): 283-288 (1992) - [j4]Kai Qian, Prabir Bhattacharya:
A template polynomial approach for image processing and visual recognition. Pattern Recognit. 25(12): 1505-1515 (1992) - [j3]Kai Qian, Xun Lu, Prabir Bhattacharya:
A 3D object recognition system using voxel representation. Pattern Recognit. Lett. 13(10): 725-733 (1992) - 1991
- [j2]Kai Qian, Prabir Bhattacharya:
An algebraic method for processing colored images. Pattern Recognit. Lett. 12(12): 805-811 (1991) - [c2]Kai Qian, Prabir Bhattacharya:
3-D vision algorithms based on polynomial representation(abstract and references only). ACM Conference on Computer Science 1991: 636 - 1990
- [j1]Kai Qian, Prabir Bhattacharya:
Binary image processing by polynomial approach. Pattern Recognit. Lett. 11(6): 395-403 (1990) - [c1]Prabir Bhattacharya, Kai Qian:
Software Development: Image Processing by Template Polynomials. ACM Conference on Computer Science 1990: 281-287
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-14 01:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint