Suivre
Qi Wang (王琦)
Qi Wang (王琦)
Department of Computer Science and Engineering, Southern University of Science and Technology
Adresse e-mail validée de sustech.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
Non-fungible token (NFT): Overview, evaluation, opportunities and challenges
Q Wang, R Li, Q Wang, S Chen
arXiv preprint arXiv:2105.07447, 2021
11302021
An e-voting protocol based on blockchain
Y Liu, Q Wang
Cryptology ePrint Archive, 2017
1452017
Exploring web3 from the view of blockchain
Q Wang, R Li, Q Wang, S Chen, M Ryan, T Hardjono
arXiv preprint arXiv:2206.08821, 2022
822022
An identity-based batch verification scheme for VANETs based on ring signature with efficient revocation
F Liu, Q Wang
arXiv preprint arXiv:2103.07653, 2021
43*2021
Large Language Models can be Guided to Evade AI-Generated Text Detection
N Lu, S Liu, R He, YS Ong, Q Wang, K Tang
Transactions on Machine Learning Research (TMLR), 2024
402024
The linear complexity of binary sequences with optimal autocorrelation
Q Wang, X Du
IEEE Transactions on Information Theory 56 (12), 6388-6397, 2010
382010
Three new families of zero-difference balanced functions with applications
C Ding, Q Wang, M Xiong
IEEE Transactions on Information Theory 60 (4), 2407-2413, 2014
372014
SoK: TEE-assisted Confidential Smart Contract
R Li, Q Wang, Q Wang, D Galindo, M Ryan
22nd Privacy Enhancing Technologies Symposium (PETS 2022), 2022
362022
Placement delivery arrays from combinations of strong edge colorings
J Michel, Q Wang
IEEE Transactions on Communications 68 (10), 5953-5964, 2020
342020
Sets of Zero-Difference Balanced Functions and Their Applications
Q Wang, Y Zhou
Advances in Mathematics of Communications (AMC) 8 (1), 83-101, 2014
332014
Differential spectrum of Kasami power permutations over odd characteristic finite fields
H Yan, Z Zhou, J Weng, J Wen, T Helleseth, Q Wang
IEEE Transactions on Information Theory 65 (10), 6819-6826, 2019
272019
Exploring unfairness on proof of authority: Order manipulation attacks and remedies
Q Wang, R Li, Q Wang, S Chen, Y Xiang
ACM Asia Conference on Computer and Communications Security (AsiaCCS), 123-137, 2022
262022
Constructions of almost difference sets from finite fields
C Ding, A Pott, Q Wang
Designs, codes and cryptography 72, 581-592, 2014
262014
Optimal sets of frequency hopping sequences with large linear spans
Q Wang
IEEE Transactions on Information Theory 56 (4), 1729-1736, 2010
262010
Privacy-preserving protocols for finding the convex hulls
Q Wang, Y Luo, L Huang
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
232008
New construction of optimal Type-II binary Z-complementary pairs
Z Gu, Z Zhou, Q Wang, P Fan
IEEE Transactions on Information Theory 67 (6), 3497-3508, 2021
222021
Infinite families of 2-designs from linear codes
X Du, R Wang, C Tang, Q Wang
Applicable Algebra in Engineering, Communication and Computing, 1-19, 2020
22*2020
Infinite families of -designs from two classes of binary cyclic codes with three nonzeros
X Du, R Wang, C Tang, Q Wang
Advances in Mathematics of Communications (AMC) 16 (1), 157-168, 2022
172022
How do smart contracts benefit security protocols?
R Li, Q Wang, Q Wang, D Galindo
arXiv preprint arXiv:2202.08699, 2022
162022
An offline delegatable cryptocurrency system
R Li, Q Wang, X Zhang, Q Wang, D Galindo, Y Xiang
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021
15*2021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20