default search action
Qiushi Yang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Wuyang Li, Xinyu Liu, Qiushi Yang, Yixuan Yuan:
From Static to Dynamic Diagnostics: Boosting Medical Image Analysis via Motion-Informed Generative Videos. MICCAI (3) 2024: 195-205 - [c12]Meilu Zhu, Qiushi Yang, Zhifan Gao, Jun Liu, Yixuan Yuan:
Stealing Knowledge from Pre-trained Language Models for Federated Classifier Debiasing. MICCAI (10) 2024: 685-695 - [i7]Yupei Zhang, Li Pan, Qiushi Yang, Tan Li, Zhen Chen:
Unified Multi-modal Diagnostic Framework with Reconstruction Pre-training and Heterogeneity-combat Tuning. CoRR abs/2404.06057 (2024) - [i6]Li Pan, Yupei Zhang, Qiushi Yang, Tan Li, Xiaohan Xing, Maximus C. F. Yeung, Zhen Chen:
Focus on Focus: Focus-oriented Representation Learning and Multi-view Cross-modal Alignment for Glioma Grading. CoRR abs/2408.08527 (2024) - 2023
- [j3]Qiushi Yang, Zhen Chen, Yixuan Yuan:
Hierarchical Bias Mitigation for Semi-Supervised Medical Image Classification. IEEE Trans. Medical Imaging 42(8): 2200-2210 (2023) - [c11]Qiushi Yang, Wuyang Li, Baopu Li, Yixuan Yuan:
MRM: Masked Relation Modeling for Medical Image Pre-Training with Genetics. ICCV 2023: 21395-21405 - [c10]Li Pan, Yupei Zhang, Qiushi Yang, Tan Li, Zhen Chen:
Combat Long-Tails in Medical Classification with Relation-Aware Consistency and Virtual Features Compensation. MICCAI (6) 2023: 14-23 - [i5]Jiaqi Wang, Enze Shi, Sigang Yu, Zihao Wu, Chong Ma, Haixing Dai, Qiushi Yang, Yanqing Kang, Jinru Wu, Huawen Hu, Chenxi Yue, Haiyang Zhang, Yiheng Liu, Xiang Li, Bao Ge, Dajiang Zhu, Yixuan Yuan, Dinggang Shen, Tianming Liu, Shu Zhang:
Prompt Engineering for Healthcare: Methodologies and Applications. CoRR abs/2304.14670 (2023) - [i4]Jiaqi Wang, Zhengliang Liu, Lin Zhao, Zihao Wu, Chong Ma, Sigang Yu, Haixing Dai, Qiushi Yang, Yiheng Liu, Songyao Zhang, Enze Shi, Yi Pan, Tuo Zhang, Dajiang Zhu, Xiang Li, Xi Jiang, Bao Ge, Yixuan Yuan, Dinggang Shen, Tianming Liu, Shu Zhang:
Review of Large Vision Models and Visual Prompt Engineering. CoRR abs/2307.00855 (2023) - 2022
- [j2]Qiushi Yang, Xiaoqing Guo, Zhen Chen, Yat Ming Peter Woo, Yixuan Yuan:
D2-Net: Dual Disentanglement Network for Brain Tumor Segmentation With Missing Modalities. IEEE Trans. Medical Imaging 41(10): 2953-2964 (2022) - [c9]Xinyu Liu, Wuyang Li, Qiushi Yang, Baopu Li, Yixuan Yuan:
Towards Robust Adaptive Object Detection under Noisy Annotations. CVPR 2022: 14187-14196 - [c8]Qiushi Yang, Xinyu Liu, Zhen Chen, Bulat Ibragimov, Yixuan Yuan:
Semi-supervised Medical Image Classification with Temporal Knowledge-Aware Regularization. MICCAI (8) 2022: 119-129 - [c7]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [i3]Xinyu Liu, Wuyang Li, Qiushi Yang, Baopu Li, Yixuan Yuan:
Towards Robust Adaptive Object Detection under Noisy Annotations. CoRR abs/2204.02620 (2022) - 2020
- [c6]Qiushi Yang, Yixuan Yuan:
Learning Dynamic Convolutions for Multi-modal 3D MRI Brain Tumor Segmentation. BrainLes@MICCAI (2) 2020: 441-451 - [c5]Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. USENIX Security Symposium 2020: 577-593
2010 – 2019
- 2018
- [c4]Lidan Shang, Qiushi Yang, Jianing Wang, Shubin Li, Weimin Lei:
Detection of rail surface defects based on CNN image recognition and classification. ICACT 2018: 45-51 - 2013
- [j1]Margaret Tan, Xiaoai Deng, Qiushi Yang, Chen Cheng:
An Investigation of e-Government Services in China. Electron. J. Inf. Syst. Dev. Ctries. 57(1): 1-20 (2013) - 2011
- [b1]Qiushi Yang:
Secure message transmission in the general adversary model. University College London, UK, 2011 - [c3]Qiushi Yang, Yvo Desmedt:
Secure Communication in Multicast Graphs. ASIACRYPT 2011: 538-555 - [r1]Yvo Desmedt, Qiushi Yang:
Perfectly Secure Message Transmission. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 922-924 - [i2]Qiushi Yang, Yvo Desmedt:
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol. IACR Cryptol. ePrint Arch. 2011: 265 (2011) - 2010
- [c2]Qiushi Yang, Yvo Desmedt:
General Perfectly Secure Message Transmission Using Linear Codes. ASIACRYPT 2010: 448-465
2000 – 2009
- 2009
- [c1]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. ICITS 2009: 159-176 - [i1]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. IACR Cryptol. ePrint Arch. 2009: 632 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint