


default search action
Qiang Tong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Qiang Tong 0001
— Beijing Information Science and Technology University, Laboratory of Data Science and Information Studies, Chang Ping, China (and 1 more) - Qiang Tong 0002
— SONY China Research Laboratories, Research & Development Center China, Beijing, China (and 1 more) - Qiang Tong 0003
— Northeastern University, School of Computer Science and Engineering, College of Software, Shenyang, China - Qiang Tong 0004 — University of International Business and Economics, School of Information Technology and Management, Beijing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j7]Qiang Tong, Long Yin, Yulong Liu, Jian Xu:
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system. Comput. Stand. Interfaces 93: 103978 (2025)
[j6]Chi Lin
, Yingqi Chen
, Jie Xiong
, Yang Chi
, Xin Fan
, Qiang Tong
, Guowei Wu
:
IceSound: Acoustic-based Ice Thickness Sensing with Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 9(3): 109:1-109:25 (2025)- 2024
[j5]Yuxiang Meng
, Yu Jiang
, Yi Li
, Guibing Pang, Qiang Tong
:
Research on Point Cloud Processing and Grinding Trajectory Planning of Steel Helmet Based on 3D Scanner. IEEE Access 12: 3085-3097 (2024)
[j4]Chunyang Yu, Yibo Yong
, Yang Liu, Jian Cheng
, Qiang Tong:
A Multi-Objective Evolutionary Approach: Task Offloading and Resource Allocation Using Enhanced Decomposition-Based Algorithm in Mobile Edge Computing. IEEE Access 12: 123640-123655 (2024)
[c13]Qiang Tong, Long Yin, Yulong Liu, Jian Xu:
Append-Only Authenticated Data Sets Based on RSA Accumulator. DSPP (2) 2024: 140-155
[c12]Junyi Ma, Yunmeng Li, Mingyuan Qin, Qiang Tong:
Research on Fire Detection Algorithm Based on Improved YOLOv5. WI/IAT 2024: 742-747
2010 – 2019
- 2019
[j3]Binlin Cheng
, Qiang Tong, Jianhong Wang, Wenhui Tian:
Malware Clustering Using Family Dependency Graph. IEEE Access 7: 72267-72272 (2019)- 2018
[j2]Qiang Tong, Jianping Qi, Yanling Wang, Likai Liang, Xiangxing Meng, Qiang Zhang:
Power Cable Ampacity and Influential Factors Analysis under Operation. J. Inf. Process. Syst. 14(5): 1136-1149 (2018)
[c11]YoungBae Kim, Qiang Tong, Ken Choi, Eunchong Lee, Sung-Joon Jang, Byeong-Ho Choi:
System Level Power Reduction for YOLO2 Sub-modules for Object Detection of Future Autonomous Vehicles. ISOCC 2018: 151-155- 2017
[j1]Qiang Tong, Haitao Cheng:
RDF(S) extraction from fuzzy entity-relationship models. J. Intell. Fuzzy Syst. 33(5): 2783-2792 (2017)- 2016
[c10]YoungBae Kim, Qiang Tong, Ken Choi, Yunsik Lee:
Novel 8-T CNFET SRAM cell design for the future ultra-low power microelectronics. ISOCC 2016: 243-244
[c9]Rahaprian Mudiarasan Premavathi, Qiang Tong, Ken Choi, Yunsik Lee:
A low power, high speed FinFET based 6T SRAM cell with enhanced write ability and read stability. ISOCC 2016: 311-312- 2012
[c8]Yin Yang, Qingwen Ren, Qiang Tong, Yingbo Liu:
The Preliminary Risk Research of Cascade Reservoirs System. CSO 2012: 737-741
[c7]Yunlong Zhang, Qiang Tong, Li Li, Wei Wang, Ken Choi, JongEun Jang, Hyobin Jung, Si-Young Ahn:
Automatic Register Transfer level CAD tool design for advanced clock gating and low power schemes. ISOCC 2012: 21-24
[c6]Dandan Zhu, Qiang Tong:
A new image watermarking algorithm using CT and normalization. SMC 2012: 3239-3244- 2010
[c5]Yong Cheng, Qiang Tong:
Spectral Clustering on Manifolds with Statistical and Geometrical Similarity. ISNN (1) 2010: 422-429
2000 – 2009
- 2009
[c4]Qiang Tong, Ziyun Wang:
Compensate the Speech Recognition Delays for Accurate Speech-Based Cursor Position Control. HCI (2) 2009: 752-760
[c3]Zhidong Shen, Qiang Tong:
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. HIS (3) 2009: 46-50
[c2]Qiang Tong, Zhidong Shen:
Research of Mobile Agent Technology for GIS Grid. HIS (2) 2009: 190-194- 2005
[c1]Qiang Tong, Baoping Yan, Yuanchun Zhou:
Mining Quantitative Association Rules on Overlapped Intervals. ADMA 2005: 43-50
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-05 23:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







