​
Login / Signup
Qian Kong
ORCID
Publication Activity (10 Years)
Years Active: 2010-2023
Publications (10 Years): 11
Top Topics
Visual Cryptography Scheme
Secret Sharing
Boolean Operations
Emergency Response
Top Venues
J. Vis. Commun. Image Represent.
Entropy
J. Inf. Hiding Multim. Signal Process.
IET Commun.
</>
Publications
</>
Lanlan Ma
,
Qian Kong
Optimal Shortcuts to Adiabatic Control by Lagrange Mechanics.
Entropy
25 (5) (2023)
Limengnan Zhou
,
Qian Kong
,
Hongyu Han
,
Xing Liu
,
Hanzhou Wu
Low-Hit-Zone Frequency-Hopping Sequence Sets with Wide-Gap and Optimal Hamming Correlation Properties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(2) (2022)
Qian Kong
,
Genshan Jiang
,
Yuechao Liu
,
Jianhao Sun
Location of the Leakage From a Simulated Water-Cooling Wall Tube Based on Acoustic Method and an Artificial Neural Network.
IEEE Trans. Instrum. Meas.
70 (2021)
Huan Wang
,
Min Ouyang
,
Qingyuan Meng
,
Qian Kong
A traffic data collection and analysis method based on wireless sensor network.
EURASIP J. Wirel. Commun. Netw.
2020 (1) (2020)
Qian Kong
,
Huimin Ying
,
Xi Chen
Shortcuts to Adiabaticity for Optical Beam Propagation in Nonlinear Gradient Refractive-Index Media.
Entropy
22 (6) (2020)
Qian Kong
,
Yan-Fei Jing
,
Ting-Zhu Huang
,
Hengbin An
Acceleration of the Scheduled Relaxation Jacobi method: Promising strategies for solving large, sparse linear systems.
J. Comput. Phys.
397 (2019)
Chence Zhang
,
Yi Shen
,
Qian Kong
,
Yucheng Wei
,
Bingsen Zhang
,
Chongfeng Duan
,
Nan Li
A Novel Algorithm for Segmentation of Solitary Pulmonary Nodules in Chest Computed Tomography Based on Three-Dimensional Connected Voxels.
J. Medical Imaging Health Informatics
9 (8) (2019)
Qian Kong
,
Yafeng Zhan
,
Chaowei Duan
Optical comb enabled flexible-bandwidth single-carrier frequency-division-multiplexed-based intra-data centre interconnect.
IET Commun.
12 (20) (2018)
Peng Li
,
Ching-Nung Yang
,
Qian Kong
A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real Time Image Process.
14 (1) (2018)
Min Feng
,
Qian Kong
On the fractional metric dimension of corona product graphs and lexicographic product graphs.
Ars Comb.
138 (2018)
Jiangnan Qiu
,
Wenjing Gu
,
Qian Kong
,
Qiuyan Zhong
,
Jilei Hu
The emergency response management based on Bayesian decision network.
SSCI
(2016)
Peng Li
,
Qian Kong
,
Yanpeng Ma
Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation.
J. Inf. Hiding Multim. Signal Process.
5 (3) (2014)
Yao Liu
,
Gang Lu
,
Wei Zhang
,
Fengling Cai
,
Qian Kong
A DSCP-Based Method of QoS Class Mapping between WLAN and EPS Network.
ICA3PP (1)
(2014)
Shanguo Huang
,
Yu Zhou
,
Shan Yin
,
Qian Kong
,
Min Zhang
,
Yongli Zhao
,
Jie Zhang
,
Wanyi Gu
Fragmentation assessment based on-line routing and spectrum allocation for intra-data-center networks with centralized control.
Opt. Switch. Netw.
14 (2014)
Peng Li
,
Ching-Nung Yang
,
Qian Kong
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations.
IWDW
(2014)
Peng Li
,
Qian Kong
,
Yanpeng Ma
Probabilistic Visual Secret Sharing Scheme Based on Random Grids.
IIH-MSP
(2013)
Peng Li
,
Ching-Nung Yang
,
Chih-Cheng Wu
,
Qian Kong
,
Yanpeng Ma
Essential secret image sharing scheme with different importance of shadows.
J. Vis. Commun. Image Represent.
24 (7) (2013)
Qian Kong
,
Benjian Lv
,
Kaishun Wang
The Terwilliger Algebra of the Incidence Graphs of Johnson Geometry.
Electron. J. Comb.
20 (4) (2013)
Qian Kong
,
Peng Li
,
Yanpeng Ma
On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters.
J. Inf. Hiding Multim. Signal Process.
4 (4) (2013)
Qian Kong
,
Benjian Lv
,
Kaishun Wang
The Terwilliger algebra of Odd graphs.
Discret. Math.
313 (5) (2013)
Peng Li
,
Ching-Nung Yang
,
Qian Kong
,
Yanpeng Ma
,
Zheng Liu
Sharing more information in gray visual cryptography scheme.
J. Vis. Commun. Image Represent.
24 (8) (2013)
Qian Kong
,
Kaishun Wang
On bipartite distance-regular graphs with a strongly closed subgraph of diameter three.
Discret. Math.
310 (24) (2010)