Dr. Shaojie   Qiao
My Social Links

Dr. Shaojie Qiao

Research Scientist
Southwest Jiaotong University, China


Highest Degree
Ph.D. in Computer Science from Sichuan University, Chengdu, China

Share this Profile

Area of Interest:

Computer Sciences
100%
Artificial Intelligence
62%
Social Network Analysis
90%
Gene Expression
75%
Data Mining
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Zhang, X., H. You, W. Zhu, S. Qiao and J. Li et al., 2015. Overlapping community identification approach in online social networks. Phys. A Stat. Mech. Applic., 421: 233-248.
    CrossRef  |  Direct Link  |  
  2. Qiao, S., H.W. Jin, Y. Gao, L.A. Tang and H. Xing, 2015. Trajectory data mining in distributed sensor networks. Int. J. Distrib. Sens. Netw., Vol. 501. 10.1155/2015/913165.
    CrossRef  |  Direct Link  |  
  3. Qiao, S., D. Shen, X. Wang, N. Han and W. Zhu, 2015. A self-adaptive parameter selection trajectory prediction approach via hidden Markov models. IEEE Trans. Intell. Trans. Syst., 16: 284-296.
    CrossRef  |  Direct Link  |  
  4. Qiao, S., N. Han, W. Zhu and L.A. Gutierrez, 2014. TraPlan: An effective three-in-one trajectory-prediction model in transportation networks. IEEE Trans. Intell. Trans. Syst., 16: 1188-1198.
    CrossRef  |  Direct Link  |  
  5. Horng, S.J., S.F. Tzeng, X. Wang, S. Qiao, X. Gong and M.K. Khan, 2014. Cryptanalysis on a portable privacy-preserving authentication and access control protocol in VANETs. Wireless Pers. Commun., 79: 1445-1454.
    CrossRef  |  Direct Link  |  
  6. Horng, S.J., L.Y. Hsu, T. Li, S. Qiao, X. Gong, H.H. Chou and M.K. Khan, 2013. Using sorted switching median filter to remove high-density impulse noises. J. Visual Commun. Image Represent., 24: 956-967.
    CrossRef  |  Direct Link  |  
  7. Shu, Z., S. Qiao, Q. Deng, Y. Fan and L. Feng, 2012. Importance evaluation of individuals in online social networks based on fuzzy AHP algorithm. Adv. Inf. Sci. Serv. Sci., 4: 84-92.
    Direct Link  |  
  8. Qiao, S., T. Li, Yang and C.C. Yang, 2012. Managing uncertainty in web-based social networks. Int. J. Uncertainty Fuzziness Knowledge Based Syst., 20: 147-158.
    CrossRef  |  Direct Link  |  
  9. Qiao, S., Q. Li, H. Li, J. Peng and H. Chen, 2012. A new blockmodeling based hierarchical clustering algorithm for web social networks. Eng. Appl. Artif. Intell., 25: 640-647.
    CrossRef  |  
  10. Liu, L., S. Qiao, Y. Zhang and J. Hu, 2012. An efficient outlying trajectories mining approach based on relative distance. Int. J. Geog. Inf. Sci., 26: 1789-1810.
    CrossRef  |  Direct Link  |  
  11. Zheng, J., C. Tang, S. Qiao, N. Yang and Y. Wang, 2011. Mining Multi-scale intervention rules from time series and complex network. Int. J. Comput. Intell. Syst., 4: 728-738.
    CrossRef  |  Direct Link  |  
  12. Wang, G., J. Zhou, S. Qiao, C. Wang and W. Bai, 2011. An entity resolution model based on time-sensitive for telecom fraud crime investigation. Adv. Inf. Sci. Serv. Sci., 3: 23-29.
  13. Qiao, S., X. Wang, L. Tang, L. Liu and X. Gong, 2011. Key techniques for predicting uncertain trajectories of moving objects with dynamic environment awareness. J. Mod. Transp., 19: 199-206.
  14. Qiao, S., T. Li, M. Chau, J. Peng, Y. Zhu and H. Li, 2011. WebScore: An effective page scoring approach for uncertain web social networks. Int. J. Comput. Intell. Syst., 4: 1012-1021.
    CrossRef  |  Direct Link  |  
  15. Jiliu, Z., G. Wang, S. Qiao, C. Wang and Y. Lei, 2011. A crime group identification model based on mobile communication vestige records. J. Convergence Inf. Technol., 6: 69-77.
  16. Hu, J., Z. Wang, S. Qiao and J. Gan, 2011. The fitness evaluation strategy in particle swarm optimization. Appl. Math. Comput., 217: 8655-8670.
    CrossRef  |  Direct Link  |  
  17. Qiao, S., T. Li, J. Peng and J. Qiu, 2010. Parallel sequential pattern mining of massive trajectory data. Int. J. Comput. Intell. Syst., 3: 343-356.
    CrossRef  |  Direct Link  |  
  18. Qiao, S., C. Tang, H. Jin, S. Dai, X. Chen, M. Chau and J. Hu, 2010. Processing Constrained k-Closest Pairs Queries in Crime Databases. In: Security Informatics. Yang, C.C., M. Chau, J.H. Wang and H. Chen (Ed.). Springer, USA., pp: 59-75.
    CrossRef  |  Direct Link  |  
  19. Chen, H., T. Li, S. Qiao and D. Ruan, 2010. A rough set based dynamic maintenance approach for approximations in coarsening and refining attribute values. Int. J. Intell. Syst., 25: 1005-1026.
    CrossRef  |  Direct Link  |  
  20. Liang-Xu, L., Q. Shao-Jie, L. Bin, L. Jia-Jin and T. Chang-Jie, 2009. An efficient trajectory outlier detection algorithm based on R-tree. J. Software, 20: 2426-2435.
  21. Jian, H., L. Zhi-Shu, O. Peng, C. Biao and Q. Shao-Jie, 2009. The strategy to evaluate position vector in particle swarm optimization. J. Sichuan Univ., 41: 139-146.
  22. Zhu, M.F., C.J. Tang, S.C. Dai, Y. Chen, S.J. Qiao and C. Li, 2008. Optimization PID controller based on gene expression programming. Acta Scientiarum Naturalium Universitatis Sunyatseni, Vol. 5. .
    Direct Link  |  
  23. Song, M.J., C.J. Tang, S.J. Qiao and H. Su, 2008. A new agorithm for outlier detection in rocketdrome based on local k-distance. J. Sichuan Univ. Nat. Sci. Ed., Vol. 6. .
    Direct Link  |  
  24. Jiangtao, Q., T. Changjie and D. Lei, 2008. Mining text classification rules based on weighted frequent itemsets. J. Sichuan Univ. Eng. Sci. Ed., 40: 110-114.
  25. Xiang, Y., C.J. Tang, T. Zeng, Y.T. Liu and S.J. Qiao, 2007. Multiobjective optimization based on gene expression programming. J. Sichuan Univ. Eng. Sci. Ed., 39: 124-129.
    Direct Link  |  
  26. Su, H., C.J. Tang, S.J. Qiao, K.K. Xu, P.S. Zhang and M.J. Song, 2007. An improved particle swarm optimization based on search space division and sharing function. J. Sichuan Univ. Nat. Sci. Ed., 44: 985-989.
    Direct Link  |  
  27. Shaojie, Q., T. Changjie, C. Yu, P. Jing and W. Fenlian, 2007. A new hierarchical clustering algorithm based. J. Comput. Sci. Front., 1: 282-292.
  28. Qiao, S.J., C.J. Tang, N. Han, J. Peng, X.X. Yin and M. Zhao, 2007. Mining the compatibility law of multidimensional medicines based on dependence mode sets. J. Sichuan Univ. Eng. Sci. Ed., 39: 134-138.
    Direct Link  |  
  29. Peng, J., C.J. Tang, W.Q. Cheng, B.M. Shi and S.J. Qiao, 2007. A hierarchy distance computing based clustering algorithm. Chin. J. Comput. Chin. Ed., 30: 786-795.
    Direct Link  |  
  30. Peng, J., C.J. Tang, C.A. Yuan, M.F. Zhu and S.J. Qiao, 2007. A multi-gene evolutionary algorithm based on overlapped expression. Chin. J. Comput. Chin. Ed., 30: 775-785.
    Direct Link  |  
  31. Ni, S.Q., C.J. Tang, X.S. Zeng, S.J. Qiao and C.Q. Zeng, 2007. E&AMode: A new mode for image romancing based on engine particles system. J. Sichuan Univ. Nat. Sci. Ed., Vol. 6. .
    Direct Link  |  
  32. Liu, W., C.J. Tang, S.J. Qiao, F.L. Wen and J. Zou, 2007. A new method for crime data mining based on conceptual E-mail system. Comput. Sci., 34: 213-215.
  33. Liu Q.H., C.J. Tang, L.C. Zhujun, Q.W. Liu, Q. Shaojie and J. Yongguang, 2007. Knowledge induction by generalization over multi-benchmark attribute. J. Sichuan Univ. Eng. Sci. Ed., 39: 116-120.
  34. Zhi-Qiang, Z., Z. Hong, L. Xu-Wei, Q. Shao-Jie and Z. Ming, 2006. New based-on B-tree P2P system index construction. Acta Scientiarum Natralium Universitatis Sunyatseni, 45: 113-116.
  35. Xu, K.K., C.J. Tang, L. Duan, D.G. Wei, Y.X. Zhong and S.J. Qiao, 2006. Homophonic midiretrievalbased on hidden markov model under normal distribution. J. Sichuan Univ. Nat. Sci. Ed., 43: 538-543.
    Direct Link  |  
  36. Xiao, H., C. Tang and T. Zhang, 2006. The binary traveling coding scheme for XML document. J. Sichuan Univ. Nat. Sci. Ed., 43: 532-537.
  37. Wen, F.L., C.J. Tang, S.J. Qiao, G. Xu, Q.H. Liu and W. Liu, 2006. Mining the core of crime network based on shortest path in social network analysis. Comput. Sci., 33: 266-267.
  38. Tang, C.J., W. Liu, F.L. Wen and S.J. Qiao, 2006. Three probes into the social network analysis and consortium information mining-mining the structure, core and communication behavior of virtual consortium. J. Comput. Appl., 26: 2020-2023.
    Direct Link  |  
  39. Qiao, S.J., C.J. Tang, J. Peng, J. Peng, M.F. Zhu, T. Zeng and N. Han, 2006. MAuct: A mobile auction system based on web services. J. Sichuan Univ. Nat. Sci. Ed., 43: 320-324.
    Direct Link  |  
  40. Yu, X., C.J. Tang, H. Zhang, S.J. Qiao, Y.G. Jiang, J. Liu and P.Y. Han, 2005. Mining formula-syndrome relationship in traditional Chinese medicine with gene expression programming. Comput. Applic., 25: 2679-2880.
  41. Luo, S.T., C.J. Tang, D. Lei, Y.X. Zhong and S.J. Qiao, 2005. Military-history mining based on gene expression programming. Comput. Sci., 32: 413-419.
  42. Huan, Z., T. Changjie,Y. Xuan and Q. Shaojie, 2005. Gene expression programming based on transgenesis technology. Comput. Sci., 32: 278-280.
  43. Chen, Y., C.J. Tang, Y.X. Zhong, L. Duan and S. Qiao, 2005. A novel approaches for time series prediction based on gene expression programming. Comput. Sci., 32: 269-271.
  44. Shaojie, Q., 2004. The performance optimazation ofthe mobile telephone application based on J2ME. Inf. Technol., 10: 11-15.