default search action
Qihua Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Huai Lin, Yuande Yang, Leiyu Li, Qihua Wang, Minyi Guo:
Elevation Changes of A'nyemaqen Snow Mountain Revealed with Satellite Remote Sensing. Remote. Sens. 16(13): 2446 (2024) - 2023
- [j39]Ruoyu Wang, Miaomiao Su, Qihua Wang:
Distributed Nonparametric Regression Imputation for Missing Response Problems with Large-scale Data. J. Mach. Learn. Res. 24: 68:1-68:52 (2023) - 2022
- [j38]Miaomiao Su, Qihua Wang:
A convex programming solution based debiased estimator for quantile with missing response and high-dimensional covariables. Comput. Stat. Data Anal. 168: 107371 (2022) - [j37]Jianqiu Deng, Xiaojie Yang, Qihua Wang:
Surrogate space based dimension reduction for nonignorable nonresponse. Comput. Stat. Data Anal. 168: 107374 (2022) - [j36]Miaomiao Su, Ruoyu Wang, Qihua Wang:
A two-stage optimal subsampling estimation for missing data problems with large-scale data. Comput. Stat. Data Anal. 173: 107505 (2022) - [j35]Ziwen Chen, Lijie Cao, Qihua Wang, Yu Cai:
FishNet: Fish visual recognition with one stage multi-task learning. IET Image Process. 16(12): 3237-3246 (2022) - 2021
- [j34]Qihua Wang, Miaomiao Su, Ruoyu Wang:
A beyond multiple robust approach for missing response problem. Comput. Stat. Data Anal. 155: 107111 (2021) - [j33]Yuting Wei, Qihua Wang, Xiaogang Duan, Jing Qin:
Bias-corrected Kullback-Leibler distance criterion based model selection with covariables missing at random. Comput. Stat. Data Anal. 160: 107224 (2021) - [j32]Huaqun Wang, Qihua Wang, Debiao He:
Blockchain-Based Private Provable Data Possession. IEEE Trans. Dependable Secur. Comput. 18(5): 2379-2389 (2021) - [j31]Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang:
Provable Data Possession with Outsourced Data Transfer. IEEE Trans. Serv. Comput. 14(6): 1929-1939 (2021) - 2020
- [j30]Yifan Sun, Qihua Wang:
Function-on-function quadratic regression models. Comput. Stat. Data Anal. 142 (2020) - [j29]Jing Zhang, Qihua Wang, Jian Kang:
Feature screening under missing indicator imputation with non-ignorable missing response. Comput. Stat. Data Anal. 149: 106975 (2020) - [j28]Ying Sheng, Qihua Wang:
Conditional probability estimation based classification with class label missing at random. J. Multivar. Anal. 176 (2020) - [j27]Ying Sheng, Qihua Wang:
Model-free feature screening for ultrahigh dimensional classification. J. Multivar. Anal. 178: 104618 (2020)
2010 – 2019
- 2019
- [j26]Ying Sheng, Qihua Wang:
Simultaneous variable selection and class fusion with penalized distance criterion based classifiers. Comput. Stat. Data Anal. 133: 138-152 (2019) - [j25]Huaqun Wang, Qihua Wang, Debiao He, Qi Li, Zhe Liu:
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks. IEEE Internet Things J. 6(2): 3676-3687 (2019) - [j24]Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. Secur. Commun. Networks 2019: 6782753:1-6782753:10 (2019) - 2018
- [j23]Qihua Wang, Fagen Li, Huaqun Wang:
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption. Wirel. Commun. Mob. Comput. 2018: 5702068:1-5702068:10 (2018) - 2017
- [j22]Bingqing Lin, Qihua Wang, Jun Zhang, Zhen Pang:
Stable prediction in high-dimensional linear models. Stat. Comput. 27(5): 1401-1412 (2017) - [j21]Qihua Wang, Fanzhi Kong, Meng Wang, Huaqun Wang:
Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks. Symmetry 9(11): 285 (2017) - [c21]Hongman Wang, Renfei Xu, Xiong Zijie, Xiaoguang Zhou, Qihua Wang, Qi Duan, Xiaochong Bu:
Research on the Optimized Dispatch and Transportation Scheme for Emergency Logistics. IIKI 2017: 208-214 - 2016
- [j20]Qihua Wang, Chang Wu Yu, Fagen Li, Huaqun Wang, Lijie Cao:
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. Secur. Commun. Networks 9(17): 4138-4150 (2016) - 2015
- [j19]Xuan Wang, Qihua Wang:
Semiparametric linear transformation model with differential measurement error and validation sampling. J. Multivar. Anal. 141: 67-80 (2015) - 2014
- [j18]Tao Zhang, Qingzhao Zhang, Qihua Wang:
Model detection for functional polynomial regression. Comput. Stat. Data Anal. 70: 183-197 (2014) - [j17]Peng Lai, Qihua Wang, Xiao-Hua Zhou:
Variable selection and semiparametric efficient estimation for the heteroscedastic partially linear single-index model. Comput. Stat. Data Anal. 70: 241-256 (2014) - [j16]Peng Lai, Qihua Wang:
Semiparametric efficient estimation for partially linear single-index models with responses missing at random. J. Multivar. Anal. 128: 33-50 (2014) - 2013
- [j15]Xiaolin Chen, Qihua Wang:
Variable selection in the additive rate model for recurrent event data. Comput. Stat. Data Anal. 57(1): 491-503 (2013) - 2012
- [j14]Peng Lai, Qihua Wang, Heng Lian:
Bias-corrected GEE estimation and smooth-threshold GEE variable selection for single-index models with clustered data. J. Multivar. Anal. 105(1): 422-432 (2012) - [j13]Qihua Wang, Xingwei Tong, Liuquan Sun:
Exploring the varying covariate effects in proportional odds models with censored data. J. Multivar. Anal. 109: 168-189 (2012) - [c20]Qihua Wang, Hongxia Jin:
An analytical solution for consent management in patient privacy preservation. IHI 2012: 573-582 - 2011
- [j12]Qihua Wang, Peng Lai:
Empirical likelihood calibration estimation for the median treatment difference in observational studies. Comput. Stat. Data Anal. 55(4): 1596-1609 (2011) - [j11]Qihua Wang, Liugen Xue:
Statistical inference in partially-varying-coefficient single-index model. J. Multivar. Anal. 102(1): 1-19 (2011) - [j10]Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - [c19]Qihua Wang, Hongxia Jin:
Quantified risk-adaptive access control for patient privacy protection in health information systems. AsiaCCS 2011: 406-410 - [c18]Qihua Wang, Hongxia Jin:
Decision Support for Patient Consent Management. HISB 2011: 142-149 - [c17]Qihua Wang, Hongxia Jin:
Data leakage mitigation for discretionary access control in collaboration clouds. SACMAT 2011: 103-112 - [c16]Qihua Wang, Hongxia Jin:
Social Analytics for Personalization in Work Environments. WAIM 2011: 314-326 - 2010
- [j9]Bin Huang, Qihua Wang:
Semiparametric analysis based on weighted estimating equations for transformation models with missing covariates. J. Multivar. Anal. 101(9): 2078-2090 (2010) - [j8]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [j7]Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Authorization Systems. ACM Trans. Inf. Syst. Secur. 13(4): 40:1-40:35 (2010) - [c15]Qihua Wang, Hongxia Jin:
Exploring online social activities for adaptive search personalization. CIKM 2010: 999-1008 - [c14]Qihua Wang, Hongxia Jin, Yan Liu:
Collaboration analytics: mining work patterns from collaboration activities. CIKM 2010: 1861-1864
2000 – 2009
- 2009
- [b1]Qihua Wang:
Access control policy management. Purdue University, USA, 2009 - [j6]Zhihua Sun, Qihua Wang, Pengjie Dai:
Model checking for partially linear models with missing responses at random. J. Multivar. Anal. 100(4): 636-651 (2009) - [j5]Qihua Wang, Wei Liu, Catherine Chunling Liu:
Probability density estimation for survival data with censoring indicators missing at random. J. Multivar. Anal. 100(5): 835-850 (2009) - [j4]Qihua Wang, Riquan Zhang:
Statistical estimation in varying coefficient models with surrogate data and validation sampling. J. Multivar. Anal. 100(10): 2389-2405 (2009) - [j3]Ninghui Li, Qihua Wang, Mahesh V. Tripunitara:
Resiliency Policies in Access Control. ACM Trans. Inf. Syst. Secur. 12(4): 20:1-20:34 (2009) - [c13]Qihua Wang, Hongxia Jin:
Selective message distribution with people-tagging in user-collaborative environments. CHI Extended Abstracts 2009: 4549-4554 - [c12]Qihua Wang, Hongxia Jin, Ninghui Li:
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. ESORICS 2009: 268-284 - [c11]Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo:
Evaluating role mining algorithms. SACMAT 2009: 95-104 - [c10]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - 2008
- [j2]Ninghui Li, Qihua Wang:
Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): 12:1-12:46 (2008) - [j1]Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Secur. Comput. 5(4): 242-255 (2008) - [c9]Qihua Wang, Hongxia Jin, Stefan Nusser:
Automatic Categorization of Tags in Collaborative Environments. CollaborateCom 2008: 649-662 - [c8]Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang:
Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191 - [c7]Qihua Wang, Ninghui Li, Hong Chen:
On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332 - [c6]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - 2007
- [c5]Qihua Wang, Ninghui Li:
Direct static enforcement of high-level security policies. AsiaCCS 2007: 214-225 - [c4]Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105 - [c3]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - 2006
- [c2]Ninghui Li, Mahesh V. Tripunitara, Qihua Wang:
Resiliency policies in access control. CCS 2006: 113-123 - [c1]Ninghui Li, Qihua Wang:
Beyond separation of duty: an algebra for specifying high-level security policies. CCS 2006: 356-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint