default search action
Saiyu Qi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Haitao Xu, Saiyu Qi, Junzhe Wei, Chenyang Li, Yong Qi, Wei Wei, Yanan Qiao:
POMF: A Privacy-preserved On-chain Matching Framework. Future Gener. Comput. Syst. 150: 424-435 (2024) - [j31]Jingxian Cheng, Saiyu Qi, Bochao An, Yong Qi, Jianfeng Wang, Yanan Qiao:
Lightweight verifiable blockchain top-k queries. Future Gener. Comput. Syst. 156: 105-115 (2024) - [j30]Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024) - [j29]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. IEEE Trans. Dependable Secur. Comput. 21(3): 1111-1126 (2024) - [j28]Haitao Xu, Saiyu Qi, Yong Qi, Wei Wei, Naixue Xiong:
Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing. ACM Trans. Embed. Comput. Syst. 23(1): 7:1-7:31 (2024) - [j27]Saiyu Qi, Yue Li, Wei Wei, Qian Li, Qiao Ke, Yong Qi:
Truth: A Blockchain-Aided Secure Reputation System With Genuine Feedbacks. IEEE Trans. Engineering Management 71: 12433-12447 (2024) - [j26]Saiyu Qi, Wei Wei, Jianfeng Wang, Shifeng Sun, Leszek Rutkowski, Tingwen Huang, Janusz Kacprzyk, Yong Qi:
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage. IEEE Trans. Mob. Comput. 23(4): 2566-2582 (2024) - [j25]Yue Yang, Yong Qi, Saiyu Qi:
Relation-consistency graph convolutional network for image super-resolution. Vis. Comput. 40(2): 619-635 (2024) - [i6]Qiuhao Wang, Xu Yang, Saiyu Qi, Yong Qi:
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search. CoRR abs/2403.19531 (2024) - [i5]Qi Guo, Minghao Yao, Zhen Tian, Saiyu Qi, Yong Qi, Yun Lin, Jin Song Dong:
Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations. CoRR abs/2407.02073 (2024) - 2023
- [j24]Xu Yang, Jiahe Yu, Saiyu Qi, Qiuhao Wang, Jianfeng Wang, Yanan Qiao, Yong Qi:
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain. Comput. Networks 237: 110108 (2023) - [j23]Qi Guo, Yong Qi, Saiyu Qi, Di Wu, Qian Li:
FedMCSA: Personalized federated learning via model components self-attention. Neurocomputing 560: 126831 (2023) - [j22]Saiyu Qi, Xu Yang, Jiahe Yu, Yong Qi:
Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin. IEEE J. Sel. Areas Commun. 41(11): 3517-3532 (2023) - [j21]Di Wu, Saiyu Qi, Yong Qi, Qian Li, Bowen Cai, Qi Guo, Jingxian Cheng:
Understanding and defending against White-box membership inference attack in deep learning. Knowl. Based Syst. 259: 110014 (2023) - [j20]Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. IEEE Trans. Dependable Secur. Comput. 20(1): 176-192 (2023) - [j19]Youshui Lu, Jingning Zhang, Yong Qi, Saiyu Qi, Yue Li, Hongyu Song, Yuhao Liu:
Safety Warning! Decentralised and Automated Incentives for Disqualified Drivers Auditing in Ride-Hailing Services. IEEE Trans. Mob. Comput. 22(3): 1748-1762 (2023) - [c22]Xu Yang, Ao Wang, Qiuhao Wang, Saiyu Qi, Yong Qi:
A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain. TrustCom 2023: 1300-1305 - [c21]Jingxian Cheng, Saiyu Qi, Yong Qi, Jianfeng Wang, Qin Jiang, Di Wu:
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases. TrustCom 2023: 1306-1311 - 2022
- [j18]Qian Li, Qingyuan Hu, Saiyu Qi, Yong Qi, Di Wu, Yun Lin, Jin Song Dong:
Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label. Knowl. Based Syst. 241: 107936 (2022) - [j17]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Wei Wei:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. IEEE Trans. Dependable Secur. Comput. 19(3): 1505-1517 (2022) - [j16]Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 2122-2137 (2022) - [j15]Qin Jiang, Ee-Chien Chang, Yong Qi, Saiyu Qi, Pengfei Wu, Jianfeng Wang:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. IEEE Trans. Inf. Forensics Secur. 17: 1053-1068 (2022) - [j14]Youshui Lu, Jingning Zhang, Yong Qi, Saiyu Qi, Yuanqing Zheng, Yuhao Liu, Hongyu Song, Wei Wei:
Accelerating at the Edge: A Storage-Elastic Blockchain for Latency-Sensitive Vehicular Edge Computing. IEEE Trans. Intell. Transp. Syst. 23(8): 11862-11876 (2022) - [j13]Youshui Lu, Yong Qi, Saiyu Qi, Yue Li, Hongyu Song, Yuhao Liu:
Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services. IEEE Trans. Mob. Comput. 21(2): 663-680 (2022) - [j12]Saiyu Qi, Wei Wei, Jingxian Cheng, Yuanqing Zheng, Zhou Su, Jingning Zhang, Yong Qi:
Secure and Efficient Item Traceability for Cloud-Aided IIoT. ACM Trans. Sens. Networks 18(4): 54:1-54:24 (2022) - [c20]Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen:
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. CCS 2022: 2825-2839 - [c19]Qi Guo, Di Wu, Yong Qi, Saiyu Qi, Qian Li:
FLMJR: Improving Robustness of Federated Learning via Model Stability. ESORICS (3) 2022: 405-424 - [i4]Qi Guo, Yong Qi, Saiyu Qi, Di Wu, Qian Li:
FedMCSA: Personalized Federated Learning via Model Components Self-Attention. CoRR abs/2208.10731 (2022) - [i3]Qi Guo, Yong Qi, Saiyu Qi, Di Wu:
Dual Class-Aware Contrastive Federated Semi-Supervised Learning. CoRR abs/2211.08914 (2022) - 2021
- [j11]Saiyu Qi, Youshui Lu, Wei Wei, Xiaofeng Chen:
Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT. IEEE Internet Things J. 8(4): 2886-2899 (2021) - [j10]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Xinxing Liu, Pengfei Gao:
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding. Knowl. Based Syst. 218: 106802 (2021) - [j9]Saiyu Qi, Yuanqing Zheng:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(2): 765-779 (2021) - [j8]Qian Li, Yong Qi, Qingyuan Hu, Saiyu Qi, Yun Lin, Jin Song Dong:
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation. IEEE Trans. Inf. Forensics Secur. 16: 2447-2460 (2021) - [j7]Saiyu Qi, Youshui Lu, Yuanqing Zheng, Yumo Li, Xiaofeng Chen:
Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain. IEEE Trans. Ind. Informatics 17(4): 2376-2387 (2021) - [c18]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Efficient Multi-client Order-Revealing Encryption and Its Applications. ESORICS (2) 2021: 44-63 - 2020
- [j6]Qin Jiang, Yong Qi, Saiyu Qi, Wenjia Zhao, Youshui Lu:
Pbsx: A practical private boolean search using Intel SGX. Inf. Sci. 521: 174-194 (2020) - [c17]Chenyu Wu, Feng Yuan, Youshui Lu, Saiyu Qi:
PSM2: A Privacy-Preserving Self-sovereign Match-Making Platform. BlockSys 2020: 126-141 - [c16]Wenjia Zhao, Kangjie Lu, Yong Qi, Saiyu Qi:
MPTEE: bringing flexible and efficient memory protection to Intel SGX. EuroSys 2020: 18:1-18:15 - [c15]Jingxian Cheng, Saiyu Qi, Wenqing Wang, Yuchen Yang, Yong Qi:
Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services. ACM Great Lakes Symposium on VLSI 2020: 381-386 - [c14]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Jie Ma, Jian Zhang:
Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer. IJCAI 2020: 2340-2346 - [i2]Qian Li, Qingyuan Hu, Yong Qi, Saiyu Qi, Jie Ma, Jian Zhang:
Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer. CoRR abs/2006.15284 (2020)
2010 – 2019
- 2019
- [j5]Jinpei Yan, Yong Qi, Qifan Rao, Hui He, Saiyu Qi:
LSTM-Based with Deterministic Negative Sampling for API Suggestion. Int. J. Softw. Eng. Knowl. Eng. 29(7): 1029-1051 (2019) - [c13]Meng Zhang, Saiyu Qi, Meixia Miao, Fuyou Zhang:
Enabling Compressed Encryption for Cloud Based Big Data Stores. CANS 2019: 270-287 - [c12]Fuyou Zhang, Saiyu Qi, Haoran Yuan, Meng Zhang:
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing. ICA3PP (2) 2019: 440-455 - 2018
- [c11]Jinpei Yan, Yong Qi, Qifan Rao, Saiyu Qi:
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones. TrustCom/BigDataSE 2018: 1170-1179 - 2017
- [c10]Xiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang:
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack. COMPSAC (1) 2017: 628-636 - [c9]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. ICDCS 2017: 414-424 - [i1]Saiyu Qi, Yichen Li, Yuanqing Zheng, Yong Qi:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. IACR Cryptol. ePrint Arch. 2017: 90 (2017) - 2016
- [j4]Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu:
Secure and Private RFID-Enabled Third-Party Supply Chain Systems. IEEE Trans. Computers 65(11): 3413-3426 (2016) - [j3]Saiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu:
Scalable Industry Data Access Control in RFID-Enabled Supply Chain. IEEE/ACM Trans. Netw. 24(6): 3551-3564 (2016) - 2015
- [j2]Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li:
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain. Int. J. Ad Hoc Ubiquitous Comput. 18(4): 234-244 (2015) - 2014
- [c8]Saiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu:
Scalable Data Access Control in RFID-Enabled Supply Chain. ICNP 2014: 71-82 - [c7]Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu:
COLLECTOR: A secure RFID-enabled batch recall protocol. INFOCOM 2014: 1510-1518 - 2013
- [j1]Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu, Shan Chang, Jianfeng Ma:
MAP: Towards Authentication for Multiple Tags. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c6]Saiyu Qi, Zhenjiang Li, Yunhao Liu:
Achieving Private, Scalable, and Precise Data Collection in Wireless Sensor Networks. ICPADS 2012: 14-21 - [c5]Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li:
BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain. ICPADS 2012: 424-431 - 2011
- [c4]Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu:
MAP: Authenticating Multiple-Tags. MASS 2011: 332-340
2000 – 2009
- 2007
- [c3]Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao:
A Conflict Resolution Method in Context-Aware Computing. ACIS-ICIS 2007: 135-140 - [c2]Wei Wei, Yong Qi, Saiyu Qi, Di Hou, Wei Wang, Min Xi, Qingsong Yao:
Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment. APSCC 2007: 75-80 - [c1]Yong Qi, Saiyu Qi, Pu Zhu, Lin-feng Shen:
Context-Aware Semantic Web Service Discovery. SKG 2007: 499-502
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint