Qi Wang
YOU?
Author Swipe
View article: AI-enhanced magnetically controlled 4D printing: Reshaping the future of medical robotics
AI-enhanced magnetically controlled 4D printing: Reshaping the future of medical robotics Open
As a frontier interdisciplinary breakthrough, magnetically controlled 4D printing integrates smart materials, additive manufacturing, and magnetic actuation, and is offering more improvements for healthcare practices. By introducing time a…
View article: Causal-Aware Time Series Regression for IoT Energy Consumption Using Structured Attention and LSTM Networks
Causal-Aware Time Series Regression for IoT Energy Consumption Using Structured Attention and LSTM Networks Open
This study focuses on energy consumption modeling for IoT devices and proposes a regression prediction method that integrates causal features with Long Short-Term Memory (LSTM) networks. The method introduces a structured causal attention …
View article: Applying Impact Assessment to Protect Workers' Privacy in Intelligent Monitoring
Applying Impact Assessment to Protect Workers' Privacy in Intelligent Monitoring Open
In the context of the artificial intelligence era, the application of workplace intelligent monitoring technology improves management efficiency while posing a threat to workers' personal information security. This article analyzes the con…
View article: Spectrum Fitting Approach for Passive Wireless SAW Sensor Interrogation Using Software-Defined Radio
Spectrum Fitting Approach for Passive Wireless SAW Sensor Interrogation Using Software-Defined Radio Open
Passive wireless surface acoustic wave (SAW) sensors are widely adopted for monitoring the safety status of industrial equipment due to their compact size and maintenance-free operation. Replacing traditional discrete-component interrogato…
View article: Lhpe-Mpdc: Lightweight Human Pose Estimation Network Based on Multi-Granularity Perceptual Logic with Dual Attention Dynamic Convolution
Lhpe-Mpdc: Lightweight Human Pose Estimation Network Based on Multi-Granularity Perceptual Logic with Dual Attention Dynamic Convolution Open
View article: Assouad and lower dimensions of graph-directed Bedford-McMullen carpets
Assouad and lower dimensions of graph-directed Bedford-McMullen carpets Open
We calculate the Assouad and lower dimensions of graph-directed Bedford-McMullen carpets, which reflect the extreme local scaling laws of the sets, in contrasting with known results on Hausdorff and box dimensions. We also investigate the …
View article: Resource management for multi-user MIMO systems
Resource management for multi-user MIMO systems Open
Multiple-input multiple-output (MIMO) can be used to achieve substantial throughput and reliability via spatial multiplexing and diversity. It can also be used to allow multi-user (MU) scenarios, thereby further boosting throughputs. Howev…
View article: Mean-Field Stochastic Linear Quadratic Optimal Control for Jump-Diffusion Systems with Hybrid Disturbances
Mean-Field Stochastic Linear Quadratic Optimal Control for Jump-Diffusion Systems with Hybrid Disturbances Open
A mean-field linear quadratic stochastic (MF-SLQ for short) optimal control problem with hybrid disturbances and cross terms in a finite horizon is concerned. The state equation is a systems driven by the Wiener process and the Poisson ran…
View article: TECDR: Cross-Domain Recommender System Based on Domain Knowledge Transferor and Latent Preference Extractor
TECDR: Cross-Domain Recommender System Based on Domain Knowledge Transferor and Latent Preference Extractor Open
When new users join a recommender system, traditional approaches encounter challenges in accurately understanding their interests due to the absence of historical user behavior data, thus making it difficult to provide personalized recomme…
View article: Two families of linear codes with desirable properties from some functions over finite fields
Two families of linear codes with desirable properties from some functions over finite fields Open
Linear codes are widely studied in coding theory as they have nice applications in distributed storage, combinatorics, lattices, cryptography and so on. Constructing linear codes with desirable properties is an interesting research topic. …
View article: Revocable-Attribute-Based Encryption with En-DKER from Lattices
Revocable-Attribute-Based Encryption with En-DKER from Lattices Open
Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate protection measures. Revocable-attribute-based encryption (RABE)…
View article: On $τ$-tilting finite Borel-Schur algebras
On $τ$-tilting finite Borel-Schur algebras Open
We completely determine the $τ$-tilting finiteness of Borel-Schur algebras. To achieve this, we use two recently introduced techniques in silting theory: sign decomposition as introduced by Aoki, Higashitani, Iyama, Kase and Mizuno [arXiv:…
View article: Research on Urban Road Traffic Network Pinning Control Based on Feedback Control
Research on Urban Road Traffic Network Pinning Control Based on Feedback Control Open
The development and application of pinning control methods create conditions for traffic area control, and the objective of possessing global control of the road network is achieved by controlling a small number of intersections in the roa…
View article: Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura
Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura Open
As blockchain-based commercial projects and startups flourish, efficiency becomes one of the critical metrics in designing blockchain systems. Due to its high efficiency, Proof of Authority (PoA) Aura has become one of the most widely adop…
View article: A Novel Four-Dimensional Prediction Model of Soil Heavy Metal(Loid) Pollution: Geographical Explanations Beyond Artificial Intelligence "Black Box"
A Novel Four-Dimensional Prediction Model of Soil Heavy Metal(Loid) Pollution: Geographical Explanations Beyond Artificial Intelligence "Black Box" Open
View article: Research on the Construction of Knowledge Graph of Traditional Chinese Pattern Literature
Research on the Construction of Knowledge Graph of Traditional Chinese Pattern Literature Open
This paper aims to show the development and application of pattern design application re-search in the past 30 years, and enable designers to clearly identify and understand the re-search hotspots and new trends in the field of pattern des…
View article: The impact of socioeconomic status and sleep quality on the prevalence of multimorbidity in older adults
The impact of socioeconomic status and sleep quality on the prevalence of multimorbidity in older adults Open
Introduction Multimorbidity has become a global public health concern that can cause serious damage to the health status of older adults. This study aimed to investigate the impact of socioeconomic status (SES) and sleep quality on the pre…
View article: SoK: TEE-Assisted Confidential Smart Contract
SoK: TEE-Assisted Confidential Smart Contract Open
The blockchain-based smart contract lacks privacy, since the contract state and instruction code are exposed to the public. Combining smart-contract execution with Trusted Execution Environments provides an efficient solution, called TEE-a…
View article: Current Situation and Development of College English Teaching
Current Situation and Development of College English Teaching Open
College English teaching reform has been put forward for many years, but at present, English teaching in many schools still stays in the traditional classroom filled with “spoon-feeding”, whether the teaching content or teaching means, are…
View article: Optimization-based Block Coordinate Gradient Coding for Mitigating Partial Stragglers in Distributed Learning
Optimization-based Block Coordinate Gradient Coding for Mitigating Partial Stragglers in Distributed Learning Open
Gradient coding schemes effectively mitigate full stragglers in distributed learning by introducing identical redundancy in coded local partial derivatives corresponding to all model parameters. However, they are no longer effective for pa…
View article: Frontrunning Block Attack in PoA Clique: A Case Study
Frontrunning Block Attack in PoA Clique: A Case Study Open
As a fundamental technology of decentralized finance (DeFi), blockchain's ability to maintain a distributed fair ledger is threatened by manipulation of block/transaction order. In this paper, we propose a frontrunning block attack against…
View article: SoK: TEE-assisted Confidential Smart Contract
SoK: TEE-assisted Confidential Smart Contract Open
The blockchain-based smart contract lacks privacy since the contract state and instruction code are exposed to the public. Combining smart-contract execution with Trusted Execution Environments (TEEs) provides an efficient solution, called…
View article: Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies Open
Proof of Authority (PoA) is a type of permissioned consensus algorithm with a fixed committee. PoA has been widely adopted by communities and industries due to its better performance and faster finality. In this paper, we explore the \text…
View article: How Do Smart Contracts Benefit Security Protocols?
How Do Smart Contracts Benefit Security Protocols? Open
Smart contracts have recently been adopted by many security protocols. However, existing studies lack satisfactory theoretical support on how contracts benefit security protocols. This paper aims to give a systematic analysis of smart cont…
View article: Steiner systems $ S(2,4, 2^m) $ supported by a family of extended cyclic codes
Steiner systems $ S(2,4, 2^m) $ supported by a family of extended cyclic codes Open
In [C. Ding, An infinite family of Steiner systems from cyclic codes, J. Combin. Des. 26 (2018), no.3, 126–144], Ding constructed a family of Steiner systems for all from a family of extended cyclic codes. The objective of this p…
View article: Two classes of LDPC codes from the space of hermitian matrices over finite fields
Two classes of LDPC codes from the space of hermitian matrices over finite fields Open
For a prime power , we construct two classes of LDPC codes and , both with girth , based on the space of Hermitian matrices over the finite field . The minimum distance and the stopping distance are both determined for . Meanwhile, lower…
View article: Preface
Preface Open
View article: An Open Problem on the Bentness of Mesnager's Functions
An Open Problem on the Bentness of Mesnager's Functions Open
Let $n=2m$. In the present paper, we study the binomial Boolean functions of the form $$f_{a,b}(x) = \mathrm{Tr}_1^{n}(a x^{2^m-1 }) +\mathrm{Tr}_1^{2}(bx^{\frac{2^n-1}{3} }), $$ where $m$ is an even positive integer, $a\in \mathbb{F}_{2^n…
View article: Optimization-based Block Coordinate Gradient Coding
Optimization-based Block Coordinate Gradient Coding Open
Existing gradient coding schemes introduce identical redundancy across the coordinates of gradients and hence cannot fully utilize the computation results from partial stragglers. This motivates the introduction of diverse redundancies acr…
View article: $Q$-ary non-overlapping codes: a generating function approach
$Q$-ary non-overlapping codes: a generating function approach Open
Non-overlapping codes are a set of codewords in $\bigcup_{n \ge 2} \mathbb{Z}_q^n$, where $\mathbb{Z}_q = \{0,1,\dots,q-1\}$, such that, the prefix of each codeword is not a suffix of any codeword in the set, including itself; and for vari…