Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Mengbo Qian"
@article{DBLP:journals/cea/WangWZYQ23, author = {Yongshang Wang and Haoyu Wu and Zekai Zhu and Yukai Ye and Mengbo Qian}, title = {Continuous picking of yellow peaches with recognition and collision-free path}, journal = {Comput. Electron. Agric.}, volume = {214}, pages = {108273}, year = {2023}, url = {https://doi.org/10.1016/j.compag.2023.108273}, doi = {10.1016/J.COMPAG.2023.108273}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cea/WangWZYQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/TongLSYHBZ21, author = {Chao Tong and Baoyu Liang and Qiang Su and Mengbo Yu and Jiexuan Hu and Ali Kashif Bashir and Zhigao Zheng}, title = {Pulmonary Nodule Classification Based on Heterogeneous Features Learning}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {39}, number = {2}, pages = {574--581}, year = {2021}, url = {https://doi.org/10.1109/JSAC.2020.3020657}, doi = {10.1109/JSAC.2020.3020657}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/TongLSYHBZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/NiXQ17, author = {Sang Ni and Mengbo Xie and Quan Qian}, title = {Clustering Based K-anonymity Algorithm for Privacy Preservation}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1062--1071}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1062-1071.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/NiXQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/QianXXZ16, author = {Quan Qian and Mengbo Xie and Chao{-}Jie Xiao and Rui Zhang}, title = {Grid-based high performance ensemble classification for evolving data stream}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {16}, pages = {4339--4351}, year = {2016}, url = {https://doi.org/10.1002/cpe.3898}, doi = {10.1002/CPE.3898}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/QianXXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/QianCXZ16, author = {Quan Qian and Jing Cai and Mengbo Xie and Rui Zhang}, title = {Malicious Behavior Monitoring for Android Applications}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {1}, pages = {182--192}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p182-192.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/QianCXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/XieQ16, author = {Mengbo Xie and Quan Qian}, editor = {Yihai Chen}, title = {Fuzzy set based data publishing for privacy preservation}, booktitle = {17th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016}, pages = {569--574}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SNPD.2016.7515960}, doi = {10.1109/SNPD.2016.7515960}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/XieQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.