


default search action
Qiyi Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j8]Qiyi Wang
, Yang Bai
, Li Peng:
Dynamic event-triggered fault detection based on partially observed modes for hidden semi-Markov jump systems. Int. J. Syst. Sci. 57(5): 1446-1458 (2026)
[i2]Chunliang Chen, Ming Guan, Xiao Lin, Jiaxu Li, Luxi Lin, Qiyi Wang, Xiangyu Chen, Jixiang Luo, Changzhi Sun, Dell Zhang, Xuelong Li:
TeleMem: Building Long-Term and Multimodal Memory for Agentic AI. CoRR abs/2601.06037 (2026)- 2025
[j7]Yinning Shao
, Jingwei Wang, Qiyi Wang, Yukai Zhao, Yunlong Ma
, Min Liu, Yufeng Chen:
Assortativity attention based Multi-Dim Graph neural Architecture Search under distribution shifts. Neurocomputing 639: 130256 (2025)
[c4]Qiyi Wang
, Yinning Shao, Yunlong Ma
, Min Liu
:
NodeNAS: Node-Specific Graph Neural Architecture Search for Out-of-Distribution Generalization. DASFAA (3) 2025: 87-102
[i1]Qiyi Wang, Yinning Shao, Yunlong Ma, Min Liu:
NodeNAS: Node-Specific Graph Neural Architecture Search for Out-of-Distribution Generalization. CoRR abs/2503.02448 (2025)- 2024
[j6]Qiyi Wang
, Li Peng, Jiayu Pan:
Event-triggered H ∞ robust filtering for nonlinear semi-Markov switching systems. Int. J. Control 97(6): 1389-1400 (2024)- 2023
[j5]Qiyi Wang
, Li Peng, Huarong Zhao, Shenhao Yang:
Adaptive event-triggered filtering for semi-Markov jump systems under communication constraints. Appl. Math. Comput. 459: 128275 (2023)- 2022
[j4]Qiyi Wang
, Fengzeng Zhu, Li Peng:
Robust H∞ Filtering for Semi-Markov Jump Systems Encountering Denial-of-Service Jamming Attacks. Circuits Syst. Signal Process. 41(3): 1453-1474 (2022)
[c3]Zhiheng Jiang, Jiahao Fan, Qiyi Wang:
Pricing Model of Insurance Product for Autistic Persons. ICoMS 2022: 72-78- 2020
[c2]Qiyi Wang, Hongyan Liu, Jun He, Xiaoyong Du:
A Graph Attentive Network Model for P2P Lending Fraud Detection. KSEM (1) 2020: 316-327
2010 – 2019
- 2019
[j3]Haipeng Yao
, Qiyi Wang, Luyao Wang, Peiying Zhang, Maozhen Li, Yunjie Liu:
An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining. Int. J. Parallel Program. 47(4): 740-758 (2019)
2000 – 2009
- 2001
[j2]Wei Xing, Qingling Zhang, Jianhua Zhang, Qiyi Wang:
Some geometric properties of Lyapunov equation and LTI system. Autom. 37(2): 313-316 (2001)
[c1]Xiaoliu Yu, Mingyang Zhao, Lijin Fang, Honggua Wang, Qiyi Wang:
Measuring Data Based Non-linear Error Modeling for Parallel Machine Tool. ICRA 2001: 3535-3541- 2000
[j1]Wei Xing, Qingling Zhang, Qiyi Wang:
A trace bound for a general square matrix product. IEEE Trans. Autom. Control. 45(8): 1563-1569 (2000)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-31 02:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







