Prof.LI, Qingzhong
Shunhua Road 1500, 250101 Jinan, China
lqz@sdu.edu.cn
·09.2000:Prof., Computer Science and Technology, Shandong University, China
·2000:Ph.D., Computer Science and Technology, Shandong University, China
·1994:A/Prof., Computer Science and Technology, Shandong University, China
·1989:M.S., Computer Science and Technology, Shandong University, China
·1986:A.B., Computer Science and Technology, Shandong University, China
Research Interests:
Data Science and Intelligent Data Analysis; Data Computing and Cloud Computing Software Architecture;
Selected Publications
[1]. ECBC: A High Performance Educational Certificate Blockchain with Efficient Query, ICTAC 2017,2017.10.23
[2].Community Outlier based Fraudster Detection,KSEM 2017,2017.8
[3].Empirical Study on Assessment Algorithms with【】in Crowdsourcing,International Conference on Crowd Science and Engineering(ICCSE2017),2017.7
[4]. A Permissioned Trusted Blockchain Protocol: Supporting Instant Transaction and Dynamic Block Size,International Conference on Crowd Science and Engineering(ICCSE2016),2016.7
[5]. Efficient Crowd-Powered Active Learning for Reliable Review Evaluation,International Conference on Crowd Science and Engineering(ICCSE2016),2016.7
[6].E-commerce Blockchain Consensus Mechanism for supporting High-throughput and Real-time Transaction,CollaborateCom2016,2016.11
[7]. Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based Dispatching ,ISPA 2016,2016.8
[8]. Healthcare Fraud Detection Based on Trustworthiness of Doctors, ISPA 2016.2016.8
[9]. A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size, TrustCom 2016,2016.8
[10]. An Effective Hybrid Fraud Detection Method, KSEM 2015.2016.6
[11]. Optimizing Replica Exchange Strategy for Load Balancing in Multitenant Databases,WAIM2016,2015.10
[12]. Associated Index for Big Structured and Unstructured Data ,WAIM 2015,2015.6
[13].A Context-based Autonomous Construction Approach for Procedural Mashups,ICWS 2014,2014.6
[14].Tenant-oriented composite authentication tree for data integrity protection in SaaS,WAIM 2014,2014.6
[15]An Index Model for Multitenant Data Storage in SaaS,WAIM 2013,2013.6