Dr Man Qi


NameDr Man Qi
Job titleSenior Lecturer
Research instituteSchool Of Engineering, Technology And Design

Research outputs

Hybrid intrusion detection system for smart home applications

Induruwa, A., Qi, M. and Hussain, F. 2020. Hybrid intrusion detection system for smart home applications. in: Mahmood, Z. (ed.) Developing and Monitoring Smart Environments for Intelligent Cities IGI Global.

Temporal sparse feature auto-combination deep network for video action recognition

Wang, Q., Gong, D., Qi, M., Shen, Y. and Lei, Y. 2018. Temporal sparse feature auto-combination deep network for video action recognition. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4487

Soundness analytics of composed logical workflow nets

Liu, W., Wang, L., Feng, X., Qi, M., Yan, C. and Li, M. 2017. Soundness analytics of composed logical workflow nets. International Journal of Parallel Programming. https://doi.org/10.1007/s10766-017-0536-8

Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems

Luo, C., Zhang, B., Xiang, Y. and Qi, M. 2017. Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2017.03.007

Facilitating visual surveillance with motion detections

Qi, M. 2017. Facilitating visual surveillance with motion detections. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3770

AL-DDCNN : a distributed crossing semantic gap learning for person re-identification

Cheng, K., Zhan, Y. and Qi, M. 2017. AL-DDCNN : a distributed crossing semantic gap learning for person re-identification. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3766

Data security of android applications

Obiri-Yeboah, J. and Qi, M. 2016. Data security of android applications. in: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery : ICNC-FSKD 2016 : 13-15 August, Changsha, China IEEE Xplore.

Parallelizing abnormal event detection in crowded scenes with GPU

Yavari, M., Li, M., Li, S. and Qi, M. 2015. Parallelizing abnormal event detection in crowded scenes with GPU.

A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters

Liu, Y., Jing, W., Liu, Y., Lv, L., Qi, M. and Xiang, Y. 2016. A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3763

Integration of link and semantic relations for information recommendation

Zhao, Q., He, Y., Wang, P., Jiang, C. and Qi, M. 2016. Integration of link and semantic relations for information recommendation. Computing and Informatics. 35 (1), pp. 30-54.

A resource aware MapReduce based parallel SVM for large scale image classification

Guo, W., Khalid, N., Liu, Y., Li, M., Qi, M., Guo, W., Khalid, N., Liu, Y., Li, M. and Qi, M. 2015. A resource aware MapReduce based parallel SVM for large scale image classification. Neural Processing Letters. 44 (1), pp. 161-184.

Digital forensics and NoSQL databases

Qi, M. 2014. Digital forensics and NoSQL databases. in: Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014 IEEE. pp. 734-739

Employing neural networks for DDoS detection

Qi, M. 2014. Employing neural networks for DDoS detection.

Clear up grey areas: cybercrime legislation progress in China

Qi, M. 2013. Clear up grey areas: cybercrime legislation progress in China.

Big data management in digital forensics

Qi, M. 2014. Big data management in digital forensics. in: 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE) IEEE. pp. 238-243

A MapReduce based distributed LSI for scalable information retrieval

Liu, Y., Li, M., Khan, M. and Qi, M. 2014. A MapReduce based distributed LSI for scalable information retrieval. Computing and Informatics. 33 (2), pp. 259-280.

A distributed SVM ensemble for large scale image classification and annotation

Alham, K., Li, M., Liu, Y. and Qi, M. 2013. A distributed SVM ensemble for large scale image classification and annotation. Computers and Mathematics with Applications. 66 (10), pp. 1920-1934. https://doi.org/10.1016/j.camwa.2013.07.015

Social media in law enforcement: the role and issues

Qi, M. 2012. Social media in law enforcement: the role and issues.

Cyber safety in schools

Qi, M. 2011. Cyber safety in schools.

Computer forensics in communication networks

Wang, Y. and Qi, M. 2012. Computer forensics in communication networks. in: IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011) Curran.

A distributed storage system for archiving broadcast media content

Cherry, D., Li, M. and Qi, M. 2012. A distributed storage system for archiving broadcast media content. in: Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications IGI Global. pp. 669-679

A distributed SVM ensemble for image classification and annotation

Alham, M., Li, M., Liu, Y., Ponraj, M. and Qi, M. 2012. A distributed SVM ensemble for image classification and annotation. in: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) IEEE. pp. 1581-1584

Fast implementation of cel-based animation

Qi, M. 2008. Fast implementation of cel-based animation.

A case-based reasoning model for digital intrusion forensics

Qi, M., Wang, Y. and Xu, R. 2008. A case-based reasoning model for digital intrusion forensics.

Cybercrime legislation in China

Qi, M., Wang, Y. and Xu, R. 2008. Cybercrime legislation in China.

P2P DDoS: Challenges and Countermeasures

Qi, M. 2009. P2P DDoS: Challenges and Countermeasures.

Distributed indexing for resource discovery in P2P(Peer to Peer) networks

Qi, M., Hentschel, M., Li, M. and Ponraj, M. 2009. Distributed indexing for resource discovery in P2P(Peer to Peer) networks.

P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks)

Qi, M. 2009. P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks).

Spam and social effects

Qi, M., Edgar-Nevill, D. and Mousoli, R. 2009. Spam and social effects.

Footprints of cyber criminals

Qi, M. and Edgar-Nevill, D. 2007. Footprints of cyber criminals.

Tracking email offenders

Edgar-Nevill, D. and Qi, M. 2007. Tracking email offenders.

A MapReduce based parallel SVM for large scale spam filtering

Caruana, G., Li, M. and Qi, M. 2011. A MapReduce based parallel SVM for large scale spam filtering. in: Caruana, G. (ed.) Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011 IEEE.

Protecting intellectual property and computer software: legislation in China

Qi, M. and Wang, Y. 2010. Protecting intellectual property and computer software: legislation in China.

Machine learning based spam filtering: advantages and challenges

Qi, M. 2010. Machine learning based spam filtering: advantages and challenges.

Semantic analysis for spam filtering

Qi, M. and Mousoli, R. 2010. Semantic analysis for spam filtering.

Social networking searching and privacy issues

Qi, M. and Edgar-Nevill, D. 2011. Social networking searching and privacy issues. Information Security Technical Report. 16 (2), pp. 74-78. https://doi.org/10.1016/j.istr.2011.09.005

Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces

Li, M. and Qi, M. 2009. Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces. Peer-to-Peer Networking and Applications. 2 (4), pp. 283-297. https://doi.org/10.1007/s12083-009-0036-8

Optimizing peer selection in BitTorrent networks with genetic algorithms

Wu, T., Li, M. and Qi, M. 2010. Optimizing peer selection in BitTorrent networks with genetic algorithms. Future Generation Computer Systems. 26 (8), pp. 1151-1156. https://doi.org/10.1016/j.future.2010.05.016

OBIRE: ontology based bibliographic information publication and retrieval

Liu, X., Li, M., Liu, Y. and Qi, M. 2010. OBIRE: ontology based bibliographic information publication and retrieval. International Journal of Distributed Systems and Technologies. 1 (4), pp. 58-73.

Cybercrime and relevant legislation in China

Qi, M. and Wang, Y. 2010. Cybercrime and relevant legislation in China. in: Reich, P. (ed.) Cybercrime and Security Oxford Oxford University Press. pp. 1-34

Fighting cybercrime: legislation in China

Qi, M., Wang, Y. and Xu, R. 2009. Fighting cybercrime: legislation in China. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 219-227. https://doi.org/10.1504/IJESDF.2009.024905

Lessons learned from Beijing for the London 2012

Edgar-Nevill, D. and Qi, M. 2009. Lessons learned from Beijing for the London 2012. in: Edgar-Nevill, D. (ed.) Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009 Canterbury, UK Canterbury Christ Church University.

Web services discovery with rough sets

Li, M., Yu, B., Sahota, V. and Qi, M. 2009. Web services discovery with rough sets. International Journal of Web Services Research. 6 (1), pp. 69-86.

Service composition with Al planning

Qi, M. 2009. Service composition with Al planning. in: Li, M. and Yu, B. (ed.) Cyberinfrastructure Technologies and Applications Nova Science Publishers. pp. 179-197

Automatically wrapping legacy software into services: a grid case study

Li, M., Yu, B., Qi, M. and Antonopoulos, N. 2008. Automatically wrapping legacy software into services: a grid case study. Peer-to-Peer Networking and Applications. 1 (2), pp. 139-147. https://doi.org/10.1007/s12083-008-0011-9

The social effects of spam

Mousoli, R., Qi, M. and Edgar-Nevill, D. 2008. The social effects of spam. in: Edgar-Nevill, D. (ed.) Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training Canterbury Canterbury Christ Church University. pp. 71-78

Tracking online trails

Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. in: Jahankhani, H., Revett, K. and Palmer-Brown, D. (ed.) Global E-Security Springer.

Tracking online trails

Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. International Journal of Electronic Security and Digital Forensics. 1 (4), pp. 353-361. https://doi.org/10.1504/IJESDF.2008.021453

PGGA: a predictable and grouped genetic algorithm for job scheduling

Li, M., Yu, B. and Qi, M. 2006. PGGA: a predictable and grouped genetic algorithm for job scheduling. Future Generation Computer Systems. 22 (5), pp. 588-599. https://doi.org/10.1016/j.future.2005.09.001

A WSRF based shopping cart system

Li, M., Qi, M., Rozati, M. and Yu, B. 2005. A WSRF based shopping cart system. Lecture Notes in Computer Science [Advances in Grid Computing (EGC) 2005 European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers]. 3470, pp. 105-137. https://doi.org/10.1007/b137919

Leveraging legacy codes to distributed problem-solving environments: a web services approach

Li, M. and Qi, M. 2004. Leveraging legacy codes to distributed problem-solving environments: a web services approach. Software: Practice and Experience. 34 (13), pp. 1297-1309. https://doi.org/10.1002/spe.614

MAPBOT: A web based map information retrieval system

Li, M. and Qi, M. 2003. MAPBOT: A web based map information retrieval system. Information and Software Technology. 45 (10), pp. 691-698. https://doi.org/10.1016/S0950-5849(03)00082-X
  • 412
    total views of outputs
  • 132
    total downloads of outputs
  • 1
    views of outputs this month
  • 3
    downloads of outputs this month