


default search action
Qingxian Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Qing-Xian Wang 0001 (aka: Qingxian Wang 0001) — University of Electronic Science and Technology of China, School of Information and Software Engineering, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Lin Wei, Runxuan Sha, Yucheng Shi, Qingxian Wang, Lei Shi
, Yufei Gao
:
Dual consistency semi-supervised learning for 3D medical image segmentation. Biomed. Signal Process. Control. 104: 107568 (2025) - [j34]Chiheng Wang
, Jianshan Peng, Junhu Zhu, Qingxian Wang:
AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software. Comput. Secur. 148: 104099 (2025) - 2024
- [j33]Muhammad Arslan Rauf
, Mian Muhammad Yasir Khalil
, Weidong Wang
, Qingxian Wang, Muhammad Ahmad Nawaz Ul Ghani, Junaid Hassan
:
BCE4ZSR: Bi-encoder empowered by teacher cross-encoder for zero-shot cold-start news recommendation. Inf. Process. Manag. 61(2): 103686 (2024) - [j32]Leta Yobsan Bayisa
, Weidong Wang, Qingxian Wang, Chiagoziem Chima Ukwuoma
, Hirpesa Kebede Gutema, Ahmed Endris
, Turi Abu:
Unified deep learning model for multitask representation and transfer learning: image classification, object detection, and image captioning. Int. J. Mach. Learn. Cybern. 15(10): 4617-4637 (2024) - [j31]Muhammad Arslan Rauf, Mian Muhammad Yasir Khalil
, Muhammad Ahmad Nawaz Ul Ghani, Weidong Wang, Qingxian Wang, Junaid Hassan
:
ZS-CEBE: leveraging zero-shot cross and bi-encoder architecture for cold-start news recommendation. Signal Image Video Process. 18(8-9): 6455-6467 (2024) - [c20]Yufei Gao, Zhe Chen, Lei Shi
, Qingxian Wang, Yameng Zhang:
MedMatch: Design of Semi-supervised learning Model with Curriculum Pseudo-Labels for Medical Image Classification. CSCWD 2024: 2034-2039 - [c19]Yulin Chen, Zhongjie Li, Haoyang Jia
, Qingxian Wang, Yan Cao:
A Quantitative Model for Evaluating the Effectiveness of Data Desensitization Based on Information Entropy. EITCE 2024: 996-1001 - [c18]Xiaoguang Yang, Yong Huang, Junli Guo, Dalong Zhang, Qingxian Wang:
Eavesdropping Mobile Apps and Actions Through Wireless Traffic in the Open World. ICIC (10) 2024: 3-15 - [c17]Lin Wei, Runxuan Sha, Yucheng Shi, Qingxian Wang, Lei Shi
, Yufei Gao:
Dual Consistency Regularization for Semi-supervised Medical Image Segmentation. ICIC (5) 2024: 197-206 - [c16]Mian Muhammad Yasir Khalil, Qingxian Wang, Bo Chen, Muhammad Arslan Rauf, Weidong Wang:
MRLKG: Multimodal Representation Learning with Keyword-Based Graph for Hashtag Recommendation. MLNLP 2024: 1-6 - [i3]Xiaoguang Yang, Yong Huang, Junli Guo, Dalong Zhang, Qingxian Wang:
Eavesdropping Mobile Apps and Actions through Wireless Traffic in the Open World. CoRR abs/2408.07263 (2024) - 2023
- [j30]Yangyang Geng
, Yuqi Chen, Rongkuan Ma
, Qiang Wei
, Jie Pan, Jingyi Wang
, Peng Cheng, Qingxian Wang:
Defending Cyber-Physical Systems Through Reverse-Engineering-Based Memory Sanity Check. IEEE Internet Things J. 10(10): 8331-8347 (2023) - [j29]Mian Muhammad Yasir Khalil
, Qingxian Wang, Bo Chen, Weidong Wang:
Cross-modality representation learning from transformer for hashtag prediction. J. Big Data 10(1): 148 (2023) - [j28]Lei Shi
, Zhen Chen, Yucheng Shi, Lin Wei, Yongcai Tao, Mengyang He, Qingxian Wang, Yuan Zhou, Yufei Gao:
MPHM: Model poisoning attacks on federal learning using historical information momentum. Secur. Saf. 2: 2023006 (2023) - [j27]Lin Wei, Zhenyuan Wang, Jing Xu, Yucheng Shi, Qingxian Wang, Lei Shi
, Yongcai Tao, Yufei Gao:
A Lightweight Sentiment Analysis Framework for a Micro-Intelligent Terminal. Sensors 23(2): 741 (2023) - [c15]Zimian Liu, Han Qiu, Rui Wang, Junhu Zhu, Qingxian Wang:
Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems. TrustCom 2023: 404-411 - 2022
- [j26]Xinhui Zhao, Zehui Wu, Xiaobin Song, Qingxian Wang:
Secure analysis on entire software-defined network using coloring distribution model. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j25]Wei Guo, Han Qiu, Zimian Liu, Junhu Zhu, Qingxian Wang:
An integrated model based on feedforward neural network and Taylor expansion for indicator correlation elimination. Intell. Data Anal. 26(3): 751-783 (2022) - [j24]Zimian Liu
, Han Qiu
, Wei Guo, Junhu Zhu, Qingxian Wang:
NIE-GAT: node importance evaluation method for inter-domain routing network based on graph attention network. J. Comput. Sci. 65: 101885 (2022) - [j23]Rongkuan Ma
, Hao Zheng, Jingyi Wang, Mufeng Wang, Qiang Wei
, Qingxian Wang:
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis. Frontiers Inf. Technol. Electron. Eng. 23(3): 351-360 (2022) - [i2]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022) - 2021
- [j22]Xinhui Zhao, Qingxian Wang, Zehui Wu, Rui Guo:
Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation. Wirel. Pers. Commun. 117(4): 3431-3447 (2021) - [c14]Huihu Zhu, Han Qiu, Junhu Zhu, Qingxian Wang:
RSM-PA: Research on Route Selection Method of Inter-domain Routing System Based on Path Availability. HPCC/DSS/SmartCity/DependSys 2021: 384-390 - 2020
- [j21]Di Chen, Yang Ba, Han Qiu, Junhu Zhu, Qingxian Wang:
ISRchain: Achieving efficient interdomain secure routing with blockchain. Comput. Electr. Eng. 83: 106584 (2020) - [j20]Huijie Lian, Qingxian Wang, Guangbo Wang:
Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. Int. Arab J. Inf. Technol. 17(1): 107-117 (2020) - [j19]Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. KSII Trans. Internet Inf. Syst. 14(9): 3885-3906 (2020) - [j18]Rui Qiao
, Yang-Xia Luo, Si-Feng Zhu, Aodi Liu
, Xin-Qing Yan, Qingxian Wang:
Dynamic Autonomous Cross Consortium Chain Mechanism in e-Healthcare. IEEE J. Biomed. Health Informatics 24(8): 2157-2168 (2020)
2010 – 2019
- 2019
- [j17]Yunchao Wang
, Zehui Wu, Qiang Wei, Qingxian Wang:
NeuFuzz: Efficient Fuzzing With Deep Neural Network. IEEE Access 7: 36340-36352 (2019) - [j16]Yichao Zang
, Tianyang Zhou, Ge Xiaoyue, Qingxian Wang:
An Improved Attack Path Discovery Algorithm Through Compact Graph Planning. IEEE Access 7: 59346-59356 (2019) - [j15]Rongkuan Ma
, Peng Cheng
, Zhenyong Zhang
, Wenwen Liu, Qingxian Wang, Qiang Wei
:
Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System. IEEE Internet Things J. 6(6): 9783-9793 (2019) - [j14]Tianyang Zhou, Yichao Zang
, Junhu Zhu, Qingxian Wang:
NIG-AP: a new method for automated penetration testing. Frontiers Inf. Technol. Electron. Eng. 20(9): 1277-1288 (2019) - 2018
- [j13]Rui Qiao
, Sifeng Zhu, Qingxian Wang, Jie Qin:
Optimization of dynamic data traceability mechanism in Internet of Things based on consortium blockchain. Int. J. Distributed Sens. Networks 14(12) (2018) - [j12]Rui Qiao, Shi Dong, Qiang Wei, Qingxian Wang:
基于区块链技术的动态数据存储安全机制研究 (Blockchain Based Secure Storage Scheme of Dynamic Data). 计算机科学 45(2): 57-62 (2018) - [j11]Xiaolong Liu
, Qiang Wei
, Qingxian Wang, Zheng Zhao
, Zhongxu Yin:
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement. Secur. Commun. Networks 2018: 9071065:1-9071065:13 (2018) - [c13]Huijie Lian, Guangbo Wang, Qingxian Wang:
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method. SSIC 2018: 1-8 - [i1]Wenxia Guo, Jin Wang, Majun He, Xiaoqin Ren, Wenhong Tian, Qingxian Wang:
An Efficient Method to Transform SAT problems to Binary Integer Linear Programming Problem. CoRR abs/1803.09963 (2018) - 2017
- [j10]Zehui Wu, Qiang Wei, Kailei Ren, Qingxian Wang:
A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks. KSII Trans. Internet Inf. Syst. 11(2): 846-864 (2017) - [j9]Zehui Wu, Qiang Wei, Qingxian Wang:
基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network). 计算机科学 44(6): 121-132 (2017) - [j8]Yajing Sun, Xu Zhao, Xuexiong Yan, Qingxian Wang:
面向数据泄漏的Web沙箱测试方法 (Data Leakage Oriented Testing Method for Web Sandbox). 计算机科学 44(Z11): 322-328 (2017) - 2016
- [j7]Heshuai Li, Junhu Zhu, Qingxian Wang, Tianyang Zhou, Han Qiu, Hang Li:
LAAEM: A Method to Enhance LDoS Attack. IEEE Commun. Lett. 20(4): 708-711 (2016) - [j6]Qiang Wei, Zehui Wu, Kalei Ren, Qingxian Wang:
An OpenFlow User-Switch Remapping Approach for DDoS Defense. KSII Trans. Internet Inf. Syst. 10(9): 4529-4548 (2016) - [j5]Jianshan Peng, Mi Zhang, Qingxian Wang:
Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering. KSII Trans. Internet Inf. Syst. 10(10): 4933-4956 (2016) - [j4]Heshuai Li, Junhu Zhu, Qingxian Wang, Han Qiu, Tianyang Zhou:
Internet建模的关键: 研究AS间路由器级连接 (Key of Internet Modeling-Looking Inside Inter-AS Router-level Connection). 计算机科学 43(9): 135-139 (2016) - [j3]Shukai Liu, Xuexiong Yan, Qingxian Wang, Qi Xi:
A systematic study of content security policy in web applications. Secur. Commun. Networks 9(16): 3570-3584 (2016) - [c12]Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang:
SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. SecureComm 2016: 762-765 - 2015
- [j2]Heshuai Li, Junhu Zhu, Han Qiu, Qingxian Wang, Tianyang Zhou, Hang Li:
The new threat to internet: DNP attack with the attacking flows strategizing technology. Int. J. Commun. Syst. 28(6): 1126-1139 (2015) - [c11]Hang Li, Tianyang Zhou, Qingxian Wang:
The study of dynamic topology remapping in virtual network embedding. ICTC 2015: 95-98 - 2014
- [c10]Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang:
Improving guide-based vulnerability detection with hybrid symbolic execution. ICSAI 2014: 1038-1043 - 2012
- [c9]Yan Cao, Qiang Wei, Qingxian Wang:
The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution. CIS 2012: 661-665 - [c8]Yan Cao, Qiang Wei, Qingxian Wang:
Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance. ICICS 2012: 392-399 - [c7]Zhen Tang, Qingxian Wang, Shimin Cai:
Network-Based Inference Algorithm on Hadoop. ISMIS 2012: 367-376 - 2011
- [c6]Chufeng Zeng, Qingxian Wang:
Systematical Vulnerability Detection in Browser Validation Mechanism. CIS 2011: 831-836 - 2010
- [j1]Hongguang Fu, Ying Wang, Shizhong Zhao, Qingxian Wang:
A recursive algorithm for constructing complicated Dixon matrices. Appl. Math. Comput. 217(6): 2595-2601 (2010)
2000 – 2009
- 2009
- [c5]Changzheng Xu, Yaqi Wang, Qiang Wei, Qingxian Wang:
A Novel Trust Model Based on Temporal Historical Data for Access Control. CIS (2) 2009: 446-449 - [c4]Xiangdong Li, Qingxian Wang, Xiaoyan Jin:
Improvement of BW Multi-party Contract Signing Protocol: Model and Formal Analysis. CSIE (1) 2009: 512-515 - 2008
- [c3]Xiangdong Li, Qingpu Guo, Qingxian Wang:
Analysis of Offline Fair Exchange Protocols in Strand Spaces. CIS (1) 2008: 272-276 - [c2]Xiangdong Li, Qingxian Wang, Li Chen:
Analysis on Cyclic Multi-party Fair Exchange Protocols. CSSE (3) 2008: 601-604 - [c1]Weiming Zhang, Qingxian Wang:
A Hierarchical Method for Estimating Relative Importance in Complex Networks. ISCSCT (1) 2008: 63-65
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-02 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint