default search action
Qian Mao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Zheng Zhao, Xiaoya Fan, Qian Mao, Haixiao Xue, Qi Zhao:
AP-EH: An Encryption Hopping Method Based on Action Program Enabled SDN. IEEE Access 12: 148868-148879 (2024) - [j29]Da Tao, Xinyuan Ren, Kaifeng Liu, Qian Mao, Jian Cai, Hailiang Wang:
Effects of color scheme and visual fatigue on visual search performance and perceptions under vibration conditions. Displays 82: 102667 (2024) - [j28]Xiaomei Yu, Qian Mao, Xinhua Wang, Qiang Yin, Xueyu Che, Xiangwei Zheng:
CR-LCRP: Course recommendation based on Learner-Course Relation Prediction with data augmentation in a heterogeneous view. Expert Syst. Appl. 249: 123777 (2024) - [j27]Qian Mao, Wei Zheng, Menghan Shi, Fan Yang:
Scientometric Research and Critical Analysis of Gait and Balance in Older Adults. Sensors 24(10): 3199 (2024) - [j26]Jie Zhou, Qian Mao, Fan Yang, Jun Zhang, Menghan Shi, Zilin Hu:
Development and Assessment of Artificial Intelligence-Empowered Gait Monitoring System Using Single Inertial Sensor. Sensors 24(18): 5998 (2024) - 2023
- [j25]Fan Yang, Dongliang Shi, Long-Yin Lo, Qian Mao, Jiaming Zhang, Kwok-Ho Lam:
Auto-Diagnosis of Time-of-Flight for Ultrasonic Signal Based on Defect Peaks Tracking Model. Remote. Sens. 15(3): 599 (2023) - 2022
- [j24]Xiaomei Yu, Xueyu Che, Qian Mao, Zhaokun Gong, Wenxiang Fu, Xiangwei Zheng:
PF-ITS: Intelligent traffic service recommendation based on DeepAFM model. Int. J. Intell. Syst. 37(10): 7638-7664 (2022) - 2021
- [j23]Qian Mao, Lin Zhang, Fei Hu, Elizabeth Serena Bentley, Sunil Kumar:
Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks. Comput. Networks 201: 108511 (2021) - [j22]Qi Zhao, Zheng Zhao, Xiaoya Fan, Zhengwei Yuan, Qian Mao, Yudong Yao:
Review of machine learning methods for RNA secondary structure prediction. PLoS Comput. Biol. 17(8) (2021) - [c5]Zhaokun Gong, Xiaomei Yu, Wenxiang Fu, Xueyu Che, Qian Mao, Xiangwei Zheng:
The Construction of Knowledge Graph for Personalized Online Teaching. DMBD (2) 2021: 98-107 - 2020
- [i1]Qi Zhao, Zheng Zhao, Xiaoya Fan, Zhengwei Yuan, Qian Mao, Yudong Yao:
Review of Machine-Learning Methods for RNA Secondary Structure Prediction. CoRR abs/2009.08868 (2020)
2010 – 2019
- 2018
- [j21]Qian Mao, Fei Hu, Qi Hao:
Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 20(4): 2595-2621 (2018) - [j20]Fan Li, Qian Mao, Chin-Chen Chang:
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multim. Tools Appl. 77(5): 5149-5168 (2018) - [j19]Qian Mao, Fei Hu, Sunil Kumar:
Simulation methodology and performance analysis of network coding based transport protocol in wireless big data networks. Simul. Model. Pract. Theory 84: 38-49 (2018) - [j18]Qian Mao, Fei Hu, Ke Bao, Sunil Kumar:
Adaptive Batch Coding: A Balanced Congestion Control Strategy for Multi-Beam Antenna Networks. IEEE Trans. Veh. Technol. 67(4): 3575-3585 (2018) - 2017
- [j17]Qian Mao, Chin-Chen Chang:
Turbo Unequal Error Protection Codes with Multiple Protection Levels. Int. J. Netw. Secur. 19(2): 205-216 (2017) - [c4]Qian Mao, Peng Yue, Menghao Xu, Yao Ji, Zongmin Cui:
OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs. CITS 2017: 234-238 - [c3]Qian Mao, Fei Hu, Ji Qi:
Dynamic centered group key management for unmanned aerial vehicle networks with multibeam concurrent transmissions. PIMRC 2017: 1-6 - 2016
- [j16]Fan Li, Qian Mao, Chin-Chen Chang:
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. Int. J. Netw. Secur. 18(3): 410-419 (2016) - [j15]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. J. Inf. Hiding Multim. Signal Process. 7(6): 1168-1184 (2016) - [j14]Fan Li, K. Bharanitharan, Chin-Chen Chang, Qian Mao:
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 75(23): 16153-16171 (2016) - 2015
- [j13]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. Comput. J. 58(7): 1573-1584 (2015) - [j12]Qian Mao, Karunanithi Bharanitharan, Chin-Chen Chang:
Multi-round dynamic swap optimisation for table-based steganography. IET Image Process. 9(12): 1073-1082 (2015) - [j11]Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. Int. J. Netw. Secur. 17(5): 643-649 (2015) - [j10]Qian Mao, Fan Li, Chin-Chen Chang:
Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf. Sci. 317: 170-180 (2015) - [j9]Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang:
An image-based key agreement protocol using the morphing technique. Multim. Tools Appl. 74(9): 3207-3229 (2015) - 2014
- [j8]Qian Mao:
A fast algorithm for matrix embedding steganography. Digit. Signal Process. 25: 248-254 (2014) - [j7]Qian Mao, Chin-Chen Chang, Ting-Feng Chung:
A Reversible Steganography Suitable for Embedding Small Amounts of Data. Int. J. Netw. Secur. 16(4): 295-303 (2014) - [c2]Qian Mao, Peigang Deng:
Study of micro-channel shape and material property on cooling performance of high power LED chips. NEMS 2014: 498-501 - 2013
- [j6]Qian Mao, Chuan Qin:
A Novel Turbo Unequal Error Protection Scheme for Image Steganography. Informatica 24(4): 561-576 (2013) - [j5]Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:
An Image Encryption Scheme Based on Concatenated Torus Automorphisms. KSII Trans. Internet Inf. Syst. 7(6): 1492-1511 (2013) - [j4]Chin-Chen Chang, Hsiao-Ling Wu, Zhi-Hui Wang, Qian Mao:
An Efficient Smart Card Based Authentication Scheme Using Image Encryption. J. Inf. Sci. Eng. 29(6): 1135-1150 (2013) - 2012
- [j3]Qian Mao, Chuan Qin:
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism. J. Networks 7(2): 236-242 (2012) - [j2]Haiping Huang, Hao Chen, Ruchuan Wang, Qian Mao, Renyuan Cheng:
(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks. J. Networks 7(7): 1009-1016 (2012) - 2011
- [c1]Qian Mao, Boqing Xu, Yanping Qin:
A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes. IIH-MSP 2011: 226-229 - 2010
- [j1]Chuan Qin, Qian Mao, Xinpeng Zhang:
Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes. J. Multim. 5(5): 427-433 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint