BibTeX records: Li Gong

download as .bib file

@article{DBLP:journals/ress/TianDGW24,
  author       = {Meng Tian and
                  Zhengcheng Dong and
                  Li Gong and
                  Xianpei Wang},
  title        = {Line hardening strategies for resilient power systems considering
                  cyber-topology interdependence},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {241},
  pages        = {109644},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ress.2023.109644},
  doi          = {10.1016/J.RESS.2023.109644},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/TianDGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WangGZLT23,
  author       = {Xianpei Wang and
                  Li Gong and
                  Haocheng Zhao and
                  Bowen Li and
                  Meng Tian},
  title        = {A 3D Offline Packing Algorithm considering Cargo Orientation and Stability},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2023},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/5299891},
  doi          = {10.1155/2023/5299891},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WangGZLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuangPLG23,
  author       = {Lin Huang and
                  Xin Pan and
                  Yajie Liu and
                  Li Gong},
  title        = {An Unsupervised Machine Learning Approach for Monitoring Data Fusion
                  and Health Indicator Construction},
  journal      = {Sensors},
  volume       = {23},
  number       = {16},
  pages        = {7239},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23167239},
  doi          = {10.3390/S23167239},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HuangPLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/GongXXDZZ23,
  author       = {Li Gong and
                  Zhiqing Xiao and
                  Lihua Xu and
                  Yan Ding and
                  Zhuo Zou and
                  Lirong Zheng},
  title        = {An IoT-Based Wearable Labor Progress Monitoring System for Remote
                  Evaluation of Admission Time to Hospital},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {27},
  number       = {6},
  pages        = {3037--3048},
  year         = {2023},
  url          = {https://doi.org/10.1109/JBHI.2023.3264251},
  doi          = {10.1109/JBHI.2023.3264251},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/GongXXDZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/TianDGW23,
  author       = {Meng Tian and
                  Zhengcheng Dong and
                  Li Gong and
                  Xianpei Wang},
  title        = {Coordinated Repair Crew Dispatch Problem for Cyber-Physical Distribution
                  System},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {14},
  number       = {3},
  pages        = {2288--2300},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSG.2022.3209533},
  doi          = {10.1109/TSG.2022.3209533},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/TianDGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecoi/YinGCNPKG22,
  author       = {Chengjie Yin and
                  Li Gong and
                  Yushun Chen and
                  Leyi Ni and
                  Tony J. Pitcher and
                  Bin Kang and
                  Longgen Guo},
  title        = {Modeling ecosystem impacts of the invasive Japanese smelt \emph{Hypomesus
                  nipponensis} in Lake Erhai, southwestern China},
  journal      = {Ecol. Informatics},
  volume       = {67},
  pages        = {101488},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ecoinf.2021.101488},
  doi          = {10.1016/J.ECOINF.2021.101488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ecoi/YinGCNPKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiii/GongYCAHZZ22,
  author       = {Li Gong and
                  Jinlong Yan and
                  Yiqiao Chen and
                  Jinjing An and
                  Lei He and
                  Lirong Zheng and
                  Zhuo Zou},
  title        = {An IoT-based intelligent irrigation system with data fusion and a
                  self-powered wide-area network},
  journal      = {J. Ind. Inf. Integr.},
  volume       = {29},
  pages        = {100367},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jii.2022.100367},
  doi          = {10.1016/J.JII.2022.100367},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiii/GongYCAHZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/GongGLZY22,
  author       = {Li Gong and
                  Xuelei Gong and
                  Ying Liang and
                  Bingzong Zhang and
                  Yiqun Yang},
  title        = {Life Prediction of Hydraulic Concrete Based on Grey Residual Markov
                  Model},
  journal      = {J. Inf. Process. Syst.},
  volume       = {18},
  number       = {4},
  pages        = {457--469},
  year         = {2022},
  url          = {https://doi.org/10.3745/JIPS.04.0247},
  doi          = {10.3745/JIPS.04.0247},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/GongGLZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/YaoWZTGL22,
  author       = {Hongtai Yao and
                  Xianpei Wang and
                  Le Zhao and
                  Meng Tian and
                  Li Gong and
                  Bowen Li},
  title        = {Semantic Segmentation for Remote Sensing Images Using Pyramid Object-Based
                  Markov Random Field With Dual-Track Information Transmission},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {19},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.1109/LGRS.2021.3121065},
  doi          = {10.1109/LGRS.2021.3121065},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lgrs/YaoWZTGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GongCXCY22,
  author       = {Li Gong and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Yan Chang and
                  Yi{-}Xian Yang},
  title        = {Multi-party controlled cyclic hybrid quantum communication protocol
                  in noisy environment},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {11},
  pages        = {375},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03725-0},
  doi          = {10.1007/S11128-022-03725-0},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/GongCXCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/YaoWZTJGL22,
  author       = {Hongtai Yao and
                  Xianpei Wang and
                  Le Zhao and
                  Meng Tian and
                  Zini Jian and
                  Li Gong and
                  Bowen Li},
  title        = {An Object-Based Markov Random Field with Partition-Global Alternately
                  Updated for Semantic Segmentation of High Spatial Resolution Remote
                  Sensing Image},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {1},
  pages        = {127},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14010127},
  doi          = {10.3390/RS14010127},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/YaoWZTJGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LuoXGLLZ22,
  author       = {Chengcheng Luo and
                  Feng Xiao and
                  Li Gong and
                  Jintao Lei and
                  Wenhao Li and
                  Shengkai Zhang},
  title        = {Comparison of Weighted Mean Temperature in Greenland Calculated by
                  Four Reanalysis Data},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {21},
  pages        = {5431},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14215431},
  doi          = {10.3390/RS14215431},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LuoXGLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GongWTYL22,
  author       = {Li Gong and
                  Xianpei Wang and
                  Meng Tian and
                  Hongtai Yao and
                  Jiachuan Long},
  title        = {Multi-Objective Optimal Planning for Distribution Network Considering
                  the Uncertainty of {PV} Power and Line-Switch State},
  journal      = {Sensors},
  volume       = {22},
  number       = {13},
  pages        = {4927},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22134927},
  doi          = {10.3390/S22134927},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GongWTYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/ZhangGZLXL21,
  author       = {Shengkai Zhang and
                  Li Gong and
                  Qi Zeng and
                  Wenhao Li and
                  Feng Xiao and
                  Jintao Lei},
  title        = {Imputation of {GPS} Coordinate Time Series Using missForest},
  journal      = {Remote. Sens.},
  volume       = {13},
  number       = {12},
  pages        = {2312},
  year         = {2021},
  url          = {https://doi.org/10.3390/rs13122312},
  doi          = {10.3390/RS13122312},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/ZhangGZLXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ChenGWYXZZ21,
  author       = {Xiaoshi Chen and
                  Li Gong and
                  Liang Wei and
                  Shih{-}Ching Yeh and
                  Li Da Xu and
                  Lirong Zheng and
                  Zhuo Zou},
  title        = {A Wearable Hand Rehabilitation System With Soft Gloves},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {2},
  pages        = {943--952},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3010369},
  doi          = {10.1109/TII.2020.3010369},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ChenGWYXZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IdreesGSLGZZ20,
  author       = {Zeba Idrees and
                  Jose Granados and
                  Yang Sun and
                  Shahid Latif and
                  Li Gong and
                  Zhuo Zou and
                  Lirong Zheng},
  title        = {{IEEE} 1588 for Clock Synchronization in Industrial IoT and Related
                  Applications: {A} Review on Contributing Technologies, Protocols and
                  Enhancement Methodologies},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {155660--155678},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3013669},
  doi          = {10.1109/ACCESS.2020.3013669},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IdreesGSLGZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/ZhangRGCG20,
  author       = {Qianyun Zhang and
                  Xiaoqian Ren and
                  Li Gong and
                  Lei Cheng and
                  Yue Gao},
  title        = {An unmanned aerial vehicle flight formation for enhanced emergency
                  communication based on conformal antenna design},
  journal      = {J. Commun. Inf. Networks},
  volume       = {5},
  number       = {3},
  pages        = {294--301},
  year         = {2020},
  url          = {https://doi.org/10.23919/JCIN.2020.9200892},
  doi          = {10.23919/JCIN.2020.9200892},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcin/ZhangRGCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/GongWJLM20,
  author       = {Li Gong and
                  Hong Wang and
                  Chunling Jin and
                  Lili Lu and
                  Menghan Ma},
  title        = {Type Drive Analysis of Urban Water Security Factors},
  journal      = {J. Inf. Process. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {784--794},
  year         = {2020},
  url          = {https://doi.org/10.3745/JIPS.04.0180},
  doi          = {10.3745/JIPS.04.0180},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/GongWJLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/MaG20,
  author       = {Songya Ma and
                  Li Gong},
  title        = {Deterministic bidirectional controlled remote preparation without
                  information splitting},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {8},
  pages        = {255},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02760-z},
  doi          = {10.1007/S11128-020-02760-Z},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/MaG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichms/ChenG0Z20,
  author       = {Xiaoshi Chen and
                  Li Gong and
                  Lirong Zheng and
                  Zhuo Zou},
  title        = {Soft Exoskeleton Glove for Hand Assistance Based on Human-machine
                  Interaction and Machine Learning},
  booktitle    = {{IEEE} International Conference on Human-Machine Systems, {ICHMS}
                  2020, Rome, Italy, September 7-9, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICHMS49158.2020.9209381},
  doi          = {10.1109/ICHMS49158.2020.9209381},
  timestamp    = {Fri, 23 Oct 2020 11:12:23 +0200},
  biburl       = {https://dblp.org/rec/conf/ichms/ChenG0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psb/LeverBGHSWCWKA20,
  author       = {Jake Lever and
                  Julia M. Barbarino and
                  Li Gong and
                  Rachel Huddart and
                  Katrin Sangkuhl and
                  Ryan Whaley and
                  Michelle Whirl Carrillo and
                  Mark Woon and
                  Teri E. Klein and
                  Russ B. Altman},
  title        = {PGxMine: Text Mining for Curation of PharmGKB},
  booktitle    = {Pacific Symposium on Biocomputing 2020, Fairmont Orchid, Hawaii, USA,
                  January 3-7, 2020},
  pages        = {611--622},
  year         = {2020},
  url          = {https://psb.stanford.edu/psb-online/proceedings/psb20/Lever.pdf},
  timestamp    = {Fri, 13 Aug 2021 16:31:26 +0200},
  biburl       = {https://dblp.org/rec/conf/psb/LeverBGHSWCWKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/JiangLGYL20,
  author       = {Wenbo Jiang and
                  Hongwei Li and
                  Li Gong and
                  Haomiao Yang and
                  Rongxing Lu},
  title        = {Accelerating Poisoning Attack Through Momentum and Adam Algorithms},
  booktitle    = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria,
                  BC, Canada, November 18 - December 16, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348449},
  doi          = {10.1109/VTC2020-FALL49728.2020.9348449},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/JiangLGYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cars/GongJYZW19,
  author       = {Li Gong and
                  Shan Jiang and
                  Zhiyong Yang and
                  Guobin Zhang and
                  Lu Wang},
  title        = {Automated pulmonary nodule detection in {CT} images using 3D deep
                  squeeze-and-excitation networks},
  journal      = {Int. J. Comput. Assist. Radiol. Surg.},
  volume       = {14},
  number       = {11},
  pages        = {1969--1979},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11548-019-01979-1},
  doi          = {10.1007/S11548-019-01979-1},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cars/GongJYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/GongWLJW19,
  author       = {Li Gong and
                  Zhonghui Wang and
                  Yaxian Li and
                  Chunling Jin and
                  Jing Wang},
  title        = {Damage Mechanism of Drift Ice Impact},
  journal      = {J. Inf. Process. Syst.},
  volume       = {15},
  number       = {6},
  pages        = {1350--1364},
  year         = {2019},
  url          = {https://doi.org/10.3745/JIPS.04.0147},
  doi          = {10.3745/JIPS.04.0147},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/GongWLJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ZhangYGJWCWZL19,
  author       = {Guobin Zhang and
                  Zhiyong Yang and
                  Li Gong and
                  Shan Jiang and
                  Lu Wang and
                  Xi Cao and
                  Lin Wei and
                  Hongyun Zhang and
                  Ziqi Liu},
  title        = {An Appraisal of Nodule Diagnosis for Lung Cancer in {CT} Images},
  journal      = {J. Medical Syst.},
  volume       = {43},
  number       = {7},
  pages        = {181:1--181:18},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10916-019-1327-0},
  doi          = {10.1007/S10916-019-1327-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/ZhangYGJWCWZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/GongCS19,
  author       = {Li Gong and
                  Josep Maria Crego and
                  Jean Senellart},
  editor       = {Alexandra Birch and
                  Andrew M. Finch and
                  Hiroaki Hayashi and
                  Ioannis Konstas and
                  Thang Luong and
                  Graham Neubig and
                  Yusuke Oda and
                  Katsuhito Sudoh},
  title        = {Enhanced Transformer Model for Data-to-Text Generation},
  booktitle    = {Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP
                  2019, Hong Kong, November 4, 2019},
  pages        = {148--156},
  publisher    = {Association for Computational Linguistics},
  year         = {2019},
  url          = {https://doi.org/10.18653/v1/D19-5615},
  doi          = {10.18653/V1/D19-5615},
  timestamp    = {Thu, 05 Aug 2021 17:36:17 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/GongCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/GongCS19a,
  author       = {Li Gong and
                  Josep Maria Crego and
                  Jean Senellart},
  editor       = {Alexandra Birch and
                  Andrew M. Finch and
                  Hiroaki Hayashi and
                  Ioannis Konstas and
                  Thang Luong and
                  Graham Neubig and
                  Yusuke Oda and
                  Katsuhito Sudoh},
  title        = {{SYSTRAN} @ {WNGT} 2019: {DGT} Task},
  booktitle    = {Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP
                  2019, Hong Kong, November 4, 2019},
  pages        = {262--267},
  publisher    = {Association for Computational Linguistics},
  year         = {2019},
  url          = {https://doi.org/10.18653/v1/D19-5629},
  doi          = {10.18653/V1/D19-5629},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/GongCS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GongLXLW19,
  author       = {Li Gong and
                  Hongwei Li and
                  Guowen Xu and
                  Xizhao Luo and
                  Mi Wen},
  title        = {Multi-Keyword Search Guaranteeing Forward and Backward Privacy over
                  Large-Scale Cloud Data},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014190},
  doi          = {10.1109/GLOBECOM38437.2019.9014190},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/GongLXLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/ZhangJYGMZBL18,
  author       = {Guobin Zhang and
                  Shan Jiang and
                  Zhiyong Yang and
                  Li Gong and
                  Xiaodong Ma and
                  Zeyang Zhou and
                  Chao Bao and
                  Qi Liu},
  title        = {Automatic nodule detection for lung cancer in {CT} images: {A} review},
  journal      = {Comput. Biol. Medicine},
  volume       = {103},
  pages        = {287--300},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compbiomed.2018.10.033},
  doi          = {10.1016/J.COMPBIOMED.2018.10.033},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cbm/ZhangJYGMZBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmt/WangGZXB18,
  author       = {Mingxuan Wang and
                  Li Gong and
                  Wenhuan Zhu and
                  Jun Xie and
                  Chao Bian},
  editor       = {Ondrej Bojar and
                  Rajen Chatterjee and
                  Christian Federmann and
                  Mark Fishel and
                  Yvette Graham and
                  Barry Haddow and
                  Matthias Huck and
                  Antonio Jimeno{-}Yepes and
                  Philipp Koehn and
                  Christof Monz and
                  Matteo Negri and
                  Aur{\'{e}}lie N{\'{e}}v{\'{e}}ol and
                  Mariana L. Neves and
                  Matt Post and
                  Lucia Specia and
                  Marco Turchi and
                  Karin Verspoor},
  title        = {Tencent Neural Machine Translation Systems for {WMT18}},
  booktitle    = {Proceedings of the Third Conference on Machine Translation: Shared
                  Task Papers, {WMT} 2018, Belgium, Brussels, October 31 - November
                  1, 2018},
  pages        = {522--527},
  publisher    = {Association for Computational Linguistics},
  year         = {2018},
  url          = {https://doi.org/10.18653/v1/w18-6429},
  doi          = {10.18653/V1/W18-6429},
  timestamp    = {Thu, 17 Feb 2022 16:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/wmt/WangGZXB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gis/0001JMHYMJGAY17,
  author       = {Song Gao and
                  Krzysztof Janowicz and
                  Daniel R. Montello and
                  Yingjie Hu and
                  Jiue{-}An Yang and
                  Grant McKenzie and
                  Yiting Ju and
                  Li Gong and
                  Benjamin Adams and
                  Bo Yan},
  title        = {A data-synthesis-driven method for detecting and extracting vague
                  cognitive regions},
  journal      = {Int. J. Geogr. Inf. Sci.},
  volume       = {31},
  number       = {6},
  pages        = {1245--1271},
  year         = {2017},
  url          = {https://doi.org/10.1080/13658816.2016.1273357},
  doi          = {10.1080/13658816.2016.1273357},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gis/0001JMHYMJGAY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/XuZSCZYYWSCZWGW17,
  author       = {Ziqian Xu and
                  Wen Zeng and
                  Jiayu Sun and
                  Wei Chen and
                  Ruzhi Zhang and
                  Zunyuan Yang and
                  Zunwei Yao and
                  Lei Wang and
                  Li Song and
                  Yushu Chen and
                  Yu Zhang and
                  Chunhua Wang and
                  Li Gong and
                  Bing Wu and
                  Tinghua Wang and
                  Jie Zheng and
                  Fabao Gao},
  title        = {The quantification of blood-brain barrier disruption using dynamic
                  contrast-enhanced magnetic resonance imaging in aging rhesus monkeys
                  with spontaneous type 2 diabetes mellitus},
  journal      = {NeuroImage},
  volume       = {158},
  pages        = {480--487},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neuroimage.2016.07.017},
  doi          = {10.1016/J.NEUROIMAGE.2016.07.017},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/neuroimage/XuZSCZYYWSCZWGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/GongSQLY17,
  author       = {Li Gong and
                  Guofeng Shen and
                  Shan Qiao and
                  Wenjie Liu and
                  Yuchi Yi},
  editor       = {Qingli Li and
                  Lipo Wang and
                  Mei Zhou and
                  Li Sun and
                  Song Qiu and
                  Hongying Liu},
  title        = {A miniaturized phased high intensity focused ultrasound transducer-driven
                  system with {MR} compatibility},
  booktitle    = {10th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2017, Shanghai, China, October
                  14-16, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISP-BMEI.2017.8302248},
  doi          = {10.1109/CISP-BMEI.2017.8302248},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/GongSQLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZengGLZCX17,
  author       = {Fanqi Zeng and
                  Li Gong and
                  Jing Liu and
                  Jiang Zhang and
                  Qinghua Chen and
                  Ruyue Xin},
  title        = {Interactive Levy Flight in Interest Space},
  journal      = {CoRR},
  volume       = {abs/1705.09462},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.09462},
  eprinttype    = {arXiv},
  eprint       = {1705.09462},
  timestamp    = {Mon, 28 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZengGLZCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gis/LiuKGL16,
  author       = {Xi Liu and
                  Chaogui Kang and
                  Li Gong and
                  Yu Liu},
  title        = {Incorporating spatial interaction patterns in classifying and understanding
                  urban land use},
  journal      = {Int. J. Geogr. Inf. Sci.},
  volume       = {30},
  number       = {2},
  pages        = {334--350},
  year         = {2016},
  url          = {https://doi.org/10.1080/13658816.2015.1086923},
  doi          = {10.1080/13658816.2015.1086923},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gis/LiuKGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/urban/McKenzieJGG15,
  author       = {Grant McKenzie and
                  Krzysztof Janowicz and
                  Song Gao and
                  Li Gong},
  title        = {How where is when? On the regional variability and resolution of geosocial
                  temporal signatures for points of interest},
  journal      = {Comput. Environ. Urban Syst.},
  volume       = {54},
  pages        = {336--346},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.compenvurbsys.2015.10.002},
  doi          = {10.1016/J.COMPENVURBSYS.2015.10.002},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/urban/McKenzieJGG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semeval/ApidianakiG15,
  author       = {Marianna Apidianaki and
                  Li Gong},
  editor       = {Daniel M. Cer and
                  David Jurgens and
                  Preslav Nakov and
                  Torsten Zesch},
  title        = {{LIMSI:} Translations as Source of Indirect Supervision for Multilingual
                  All-Words Sense Disambiguation and Entity Linking},
  booktitle    = {Proceedings of the 9th International Workshop on Semantic Evaluation,
                  SemEval@NAACL-HLT 2015, Denver, Colorado, USA, June 4-5, 2015},
  pages        = {298--302},
  publisher    = {The Association for Computer Linguistics},
  year         = {2015},
  url          = {https://doi.org/10.18653/v1/s15-2050},
  doi          = {10.18653/V1/S15-2050},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/semeval/ApidianakiG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Gong14,
  author       = {Li Gong},
  title        = {On-demand Development of Statistical Machine Translation Systems.
                  (D{\'{e}}veloppement {\`{a}} la demande des syst{\`{e}}mes de
                  traduction automatique statistiques)},
  school       = {University of Paris-Sud, Orsay, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01144656},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Gong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/TianWZG14,
  author       = {Jin Tian and
                  Fei Wu and
                  Guohui Zeng and
                  Li Gong},
  editor       = {Lean Yu and
                  Qing Zhu and
                  Jian Chai and
                  Shouyang Wang},
  title        = {A Modified Storage Format for Accelerating {SPMV}},
  booktitle    = {Seventh International Joint Conference on Computational Sciences and
                  Optimization, {CSO} 2014, Beijing, China, July 4-6, 2014},
  pages        = {547--550},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSO.2014.106},
  doi          = {10.1109/CSO.2014.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/TianWZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/TianGSG14,
  author       = {Jin Tian and
                  Fei Gao and
                  Xiankun Sun and
                  Li Gong},
  editor       = {Lean Yu and
                  Qing Zhu and
                  Jian Chai and
                  Shouyang Wang},
  title        = {An Efficient Column-Major Ordering Format for Finite Element Analysis},
  booktitle    = {Seventh International Joint Conference on Computational Sciences and
                  Optimization, {CSO} 2014, Beijing, China, July 4-6, 2014},
  pages        = {562--565},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSO.2014.110},
  doi          = {10.1109/CSO.2014.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/TianGSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwslt/GongMY14,
  author       = {Li Gong and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {Incremental development of statistical machine translation systems},
  booktitle    = {Proceedings of the 11th International Workshop on Spoken Language
                  Translation: Papers, {IWSLT} 2014, Lake Tahoe, CA, USA, December 4-5,
                  2014},
  year         = {2014},
  url          = {https://aclanthology.org/2014.iwslt-papers.9},
  timestamp    = {Thu, 23 Sep 2021 17:37:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iwslt/GongMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taln/GongMY14a,
  author       = {Li Gong and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {(Much) Faster Construction of {SMT} Phrase Tables from Large-scale
                  Parallel Corpora (Construction (tr{\`{e}}s) rapide de tables de traduction
                  {\`{a}} partir de grands bi-textes) [in French]},
  booktitle    = {Traitement Automatique des Langues Naturelles, {TALN} 2014, Marseille,
                  France, 1-4 Juillet 2014, D{\'{e}}monstrations},
  pages        = {26--27},
  publisher    = {The Association for Computer Linguistics},
  year         = {2014},
  url          = {https://aclanthology.org/F14-3011/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/taln/GongMY14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taln/GongMY14,
  author       = {Li Gong and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {Towards a More Efficient Development of Statistical Machine Translation
                  Systems (Vers un d{\'{e}}veloppement plus efficace des syst{\`{e}}mes
                  de traduction statistique : un peu de vert dans un monde de {BLEU)}
                  [in French]},
  booktitle    = {Traitement Automatique des Langues Naturelles, {TALN} 2014, Marseille,
                  France, 1-4 Juillet 2014, articles courts},
  pages        = {395--400},
  publisher    = {The Association for Computer Linguistics},
  year         = {2014},
  url          = {https://aclanthology.org/F14-2002/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/taln/GongMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmt/PecheuxGDMIALNM14,
  author       = {Nicolas P{\'{e}}cheux and
                  Li Gong and
                  Quoc{-}Khanh Do and
                  Benjamin Marie and
                  Yulia Ivanishcheva and
                  Alexandre Allauzen and
                  Thomas Lavergne and
                  Jan Niehues and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {{LIMSI} {\textdollar}@{\textdollar} WMT'14 Medical Translation Task},
  booktitle    = {Proceedings of the Ninth Workshop on Statistical Machine Translation,
                  WMT@ACL 2014, June 26-27, 2014, Baltimore, Maryland, {USA}},
  pages        = {246--253},
  publisher    = {The Association for Computer Linguistics},
  year         = {2014},
  url          = {https://doi.org/10.3115/v1/w14-3330},
  doi          = {10.3115/V1/W14-3330},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wmt/PecheuxGDMIALNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bife/TianWZZG13,
  author       = {Jin Tian and
                  Fei Wu and
                  Rui Zou and
                  Guohui Zeng and
                  Li Gong},
  editor       = {Lean Yu and
                  Rongda Chen and
                  Shouyang Wang},
  title        = {The Storage Formats for Accelerating {SMVP} on a {GPU}},
  booktitle    = {Sixth International Conference on Business Intelligence and Financial
                  Engineering, {BIFE} 2013, Hangzhou, China, November 14-16, 2013},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BIFE.2013.107},
  doi          = {10.1109/BIFE.2013.107},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bife/TianWZZG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bife/TianZFRG13,
  author       = {Jin Tian and
                  Guohui Zeng and
                  Fei Wu and
                  Rui Zou and
                  Li Gong},
  editor       = {Lean Yu and
                  Rongda Chen and
                  Shouyang Wang},
  title        = {The Creation of Knowledge Innovation System},
  booktitle    = {Sixth International Conference on Business Intelligence and Financial
                  Engineering, {BIFE} 2013, Hangzhou, China, November 14-16, 2013},
  pages        = {542--544},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BIFE.2013.146},
  doi          = {10.1109/BIFE.2013.146},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bife/TianZFRG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwslt/GongMY13,
  author       = {Li Gong and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {Improving bilingual sub-sentential alignment by sampling-based transpotting},
  booktitle    = {Proceedings of the 10th International Workshop on Spoken Language
                  Translation: Papers, Heidelberg, Germany, December 5-6, 2013},
  year         = {2013},
  url          = {https://aclanthology.org/2013.iwslt-papers.7},
  timestamp    = {Thu, 23 Sep 2021 18:00:06 +0200},
  biburl       = {https://dblp.org/rec/conf/iwslt/GongMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiuGGL13,
  author       = {Xi Liu and
                  Li Gong and
                  Yongxi Gong and
                  Yu Liu},
  title        = {Revealing daily travel patterns and city structure with taxi trip
                  data},
  journal      = {CoRR},
  volume       = {abs/1310.6592},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.6592},
  eprinttype    = {arXiv},
  eprint       = {1310.6592},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiuGGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/biodb/RinaldiCGCGHSTKA12,
  author       = {Fabio Rinaldi and
                  Simon Clematide and
                  Yael Garten and
                  Michelle Whirl Carrillo and
                  Li Gong and
                  Joan M. Hebert and
                  Katrin Sangkuhl and
                  Caroline F. Thorn and
                  Teri E. Klein and
                  Russ B. Altman},
  title        = {Using {ODIN} for a PharmGKB revalidation experiment},
  journal      = {Database J. Biol. Databases Curation},
  volume       = {2012},
  year         = {2012},
  url          = {https://doi.org/10.1093/database/bas021},
  doi          = {10.1093/DATABASE/BAS021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/biodb/RinaldiCGCGHSTKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bife/GongT12,
  author       = {Li Gong and
                  Jin Tian},
  editor       = {Lean Yu and
                  Guoxing Zhang and
                  Shouyang Wang},
  title        = {Model for Renegotiation in Infrastructure Projects with Government
                  Guarantee},
  booktitle    = {Fifth International Conference on Business Intelligence and Financial
                  Engineering, {BIFE} 2012, Lanzhou, Gansu, China, August 18-21, 2012},
  pages        = {646--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/BIFE.2012.140},
  doi          = {10.1109/BIFE.2012.140},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bife/GongT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/TianG12,
  author       = {Jin Tian and
                  Li Gong},
  editor       = {Yanling Hao and
                  Lean Yu},
  title        = {Novel Pre-treatment for Inhomogeneous Dielectric Media in Finite Element
                  Analysis},
  booktitle    = {Fifth International Joint Conference on Computational Sciences and
                  Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26,
                  2012},
  pages        = {699--701},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSO.2012.160},
  doi          = {10.1109/CSO.2012.160},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/TianG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwslt/GongMY12,
  author       = {Li Gong and
                  Aur{\'{e}}lien Max and
                  Fran{\c{c}}ois Yvon},
  title        = {Towards contextual adaptation for any-text translation},
  booktitle    = {2012 International Workshop on Spoken Language Translation, {IWSLT}
                  2012, Hong Kong, December 6-7, 2012},
  pages        = {292--299},
  publisher    = {{ISCA}},
  year         = {2012},
  url          = {http://www.isca-speech.org/archive/iwslt\_12/sltc\_292.html},
  timestamp    = {Tue, 16 Nov 2021 11:36:33 +0100},
  biburl       = {https://dblp.org/rec/conf/iwslt/GongMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmt/LeLAAGMSWY12,
  author       = {Hai Son Le and
                  Thomas Lavergne and
                  Alexandre Allauzen and
                  Marianna Apidianaki and
                  Li Gong and
                  Aur{\'{e}}lien Max and
                  Artem Sokolov and
                  Guillaume Wisniewski and
                  Fran{\c{c}}ois Yvon},
  editor       = {Chris Callison{-}Burch and
                  Philipp Koehn and
                  Christof Monz and
                  Matt Post and
                  Radu Soricut and
                  Lucia Specia},
  title        = {{LIMSI} @ {WMT12}},
  booktitle    = {Proceedings of the Seventh Workshop on Statistical Machine Translation,
                  WMT@NAACL-HLT 2012, June 7-8, 2012, Montr{\'{e}}al, Canada},
  pages        = {330--337},
  publisher    = {The Association for Computer Linguistics},
  year         = {2012},
  url          = {https://aclanthology.org/W12-3141/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wmt/LeLAAGMSWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Gong11,
  author       = {Li Gong},
  title        = {Java security architecture revisited},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {11},
  pages        = {48--52},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018396.2018411},
  doi          = {10.1145/2018396.2018411},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Gong11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhr/KimGSNCL11,
  author       = {Min{-}Sun Kim and
                  Li Gong and
                  Nicole Saito and
                  Kimberly Nishigaya and
                  Marjorie Cabico and
                  Pascale Lafontaine},
  title        = {The Role of Self-Construal on Preferred Communication Styles with
                  Humanoid Robots},
  journal      = {Int. J. Humanoid Robotics},
  volume       = {8},
  number       = {2},
  pages        = {359--374},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0219843611002472},
  doi          = {10.1142/S0219843611002472},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhr/KimGSNCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Gong11,
  author       = {Li Gong},
  title        = {Java Security Architecture Revisited},
  journal      = {{ACM} Queue},
  volume       = {9},
  number       = {9},
  pages        = {30},
  year         = {2011},
  url          = {https://doi.org/10.1145/2030256.2034639},
  doi          = {10.1145/2030256.2034639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Gong11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csee2/MaGCB11,
  author       = {Guang Ma and
                  Li Gong and
                  Kuikui Chen and
                  Wanbei Bai},
  editor       = {Song Lin and
                  Xiong Huang},
  title        = {One Kind of Brand-New Experimental Teaching Idea and Assessment Methods
                  on Basic Geology in Network Environment},
  booktitle    = {Advances in Computer Science, Environment, Ecoinformatics, and Education
                  - International Conference, {CSEE} 2011, Wuhan, China, August 21-22,
                  2011, Proceedings, Part {III}},
  series       = {Communications in Computer and Information Science},
  volume       = {216},
  pages        = {202--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23345-6\_39},
  doi          = {10.1007/978-3-642-23345-6\_39},
  timestamp    = {Wed, 17 May 2017 14:24:31 +0200},
  biburl       = {https://dblp.org/rec/conf/csee2/MaGCB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dictap/JinGF11,
  author       = {Guangri Jin and
                  Li Gong and
                  Hiroshi Furukawa},
  editor       = {Hocine Cherifi and
                  Jasni Mohamad Zain and
                  Eyas El{-}Qawasmeh},
  title        = {Automatic Transmission Period Setting for Intermittent Periodic Transmission
                  in Wireless Backhaul},
  booktitle    = {Digital Information and Communication Technology and Its Applications
                  - International Conference, {DICTAP} 2011, Dijon, France, June 21-23,
                  2011. Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {166},
  pages        = {577--592},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21984-9\_48},
  doi          = {10.1007/978-3-642-21984-9\_48},
  timestamp    = {Fri, 02 Nov 2018 09:47:45 +0100},
  biburl       = {https://dblp.org/rec/conf/dictap/JinGF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangGCGW10,
  author       = {Guoxing Zhang and
                  Ju'e Guo and
                  Guorong Chai and
                  Li Gong and
                  Xuejun Wang},
  title        = {Using jump-diffusion modeling for valuing real options in infrastructure
                  projects},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {4},
  number       = {2},
  pages        = {263--270},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11704-010-0509-1},
  doi          = {10.1007/S11704-010-0509-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangGCGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ais/KimSG09,
  author       = {Min{-}Sun Kim and
                  Jennifer Sur and
                  Li Gong},
  title        = {Humans and humanoid social robots in communication contexts},
  journal      = {{AI} Soc.},
  volume       = {24},
  number       = {4},
  pages        = {317--325},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00146-009-0224-3},
  doi          = {10.1007/S00146-009-0224-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ais/KimSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Gong09,
  author       = {Li Gong},
  title        = {Java Security: {A} Ten Year Retrospective},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {395--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.44},
  doi          = {10.1109/ACSAC.2009.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Gong09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/Gong08,
  author       = {Li Gong},
  title        = {How social is social responses to computers? The function of the degree
                  of anthropomorphism in computer representations},
  journal      = {Comput. Hum. Behav.},
  volume       = {24},
  number       = {4},
  pages        = {1494--1509},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.chb.2007.05.007},
  doi          = {10.1016/J.CHB.2007.05.007},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/Gong08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/Gong08a,
  author       = {Li Gong},
  title        = {The boundary of racial prejudice: Comparing preferences for computer-synthesized
                  White, Black, and robot characters},
  journal      = {Comput. Hum. Behav.},
  volume       = {24},
  number       = {5},
  pages        = {2074--2093},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.chb.2007.09.008},
  doi          = {10.1016/J.CHB.2007.09.008},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/Gong08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nar/Hernandez-BoussardCHGOGGLTWWZAK08,
  author       = {Tina Hernandez{-}Boussard and
                  Michelle Whirl Carrillo and
                  Joan M. Hebert and
                  Li Gong and
                  Ryan Owen and
                  Mei Gong and
                  Winston Gor and
                  Feng Liu and
                  Chuong Truong and
                  Ryan Whaley and
                  Mark Woon and
                  Tina Zhou and
                  Russ B. Altman and
                  Teri E. Klein},
  title        = {The pharmacogenetics and pharmacogenomics knowledge base: accentuating
                  the knowledge},
  journal      = {Nucleic Acids Res.},
  volume       = {36},
  number       = {Database-Issue},
  pages        = {913--918},
  year         = {2008},
  url          = {https://doi.org/10.1093/nar/gkm1009},
  doi          = {10.1093/NAR/GKM1009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nar/Hernandez-BoussardCHGOGGLTWWZAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/WuCZHWG08,
  author       = {Jiayu Wu and
                  Hongguang Cheng and
                  Ayan Zeng and
                  Fanghua Hao and
                  Dan Wang and
                  Li Gong},
  title        = {Landscape Change and its Simulation using GIS, Landscape Ecology and
                  the Markov Model},
  booktitle    = {{IEEE} International Geoscience {\&} Remote Sensing Symposium,
                  {IGARSS} 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings},
  pages        = {197--200},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IGARSS.2008.4779691},
  doi          = {10.1109/IGARSS.2008.4779691},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/WuCZHWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/WangCHZWG08,
  author       = {Dan Wang and
                  Hongguang Cheng and
                  Fanghua Hao and
                  Ayan Zeng and
                  Jiayu Wu and
                  Li Gong},
  title        = {Dynamic Simulation on the Spatio-Temporal Patterns of Land use in
                  the Area of Continued Hydropower Station Construction in the Upper
                  Reach of Yellow River},
  booktitle    = {{IEEE} International Geoscience {\&} Remote Sensing Symposium,
                  {IGARSS} 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings},
  pages        = {711--714},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IGARSS.2008.4779821},
  doi          = {10.1109/IGARSS.2008.4779821},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/WangCHZWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/Gong07,
  author       = {Li Gong},
  title        = {Is happy better than sad even if they are both non-adaptive? Effects
                  of emotional expressions of talking-head interface agents},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {65},
  number       = {3},
  pages        = {183--191},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ijhcs.2006.09.005},
  doi          = {10.1016/J.IJHCS.2006.09.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/Gong07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShimGRG04,
  author       = {Simon S. Y. Shim and
                  Li Gong and
                  Aviel D. Rubin and
                  Linley Gwennap},
  title        = {Guest Editors' Introduction: Securing the High-Speed Internet},
  journal      = {Computer},
  volume       = {37},
  number       = {6},
  pages        = {33--35},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.25},
  doi          = {10.1109/MC.2004.25},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShimGRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong04,
  author       = {Li Gong},
  title        = {It's China(town)},
  journal      = {{IEEE} Internet Comput.},
  volume       = {8},
  number       = {5},
  pages        = {103--104},
  year         = {2004},
  url          = {https://doi.org/10.1109/MIC.2004.43},
  doi          = {10.1109/MIC.2004.43},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijst/GongL03,
  author       = {Li Gong and
                  Jennifer Lai},
  title        = {To Mix or Not to Mix Synthetic Speech and Human Speech? Contrasting
                  Impact on Judge-Rated Task Performance versus Self-Rated Performance
                  and Attitudinal Responses},
  journal      = {Int. J. Speech Technol.},
  volume       = {6},
  number       = {2},
  pages        = {123--131},
  year         = {2003},
  url          = {https://doi.org/10.1023/A\%3A1022382413579},
  doi          = {10.1023/A\%3A1022382413579},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijst/GongL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong03,
  author       = {Li Gong},
  title        = {A New Column for a New Year},
  journal      = {{IEEE} Internet Comput.},
  volume       = {7},
  number       = {1},
  pages        = {96},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MIC.2003.10003},
  doi          = {10.1109/MIC.2003.10003},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong03a,
  author       = {Li Gong},
  title        = {Why Cross-Platform Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {7},
  number       = {3},
  pages        = {95--96},
  year         = {2003},
  url          = {https://doi.org/10.1109/MIC.2003.1200308},
  doi          = {10.1109/MIC.2003.1200308},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongGRS03,
  author       = {Li Gong and
                  Joshua D. Guttman and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest editorial overview},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {1--4},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806120},
  doi          = {10.1109/JSAC.2002.806120},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GongGRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Gong03,
  author       = {Li Gong},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Is Cross-Platform Security Possible?},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {402},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_34},
  doi          = {10.1007/3-540-45067-X\_34},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Gong03,
  author       = {Li Gong},
  editor       = {Constantine Stephanidis},
  title        = {Multimodal Interactions on Mobile Devices and Users' Behavioral and
                  Attitudinal Preferences},
  booktitle    = {Human-Computer Interaction: Universal Access in {HCI:} Inclusive Design
                  in the Information Society, Proceedings of {HCI} International 2003
                  (the 10th International Conference on Human-Computer Interaction),
                  {HCI} 2003, Crete, Greece, June 22-27, 2003, Volume 4},
  pages        = {1402--1406},
  publisher    = {Lawrence Erlbaum},
  year         = {2003},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interact/Gong03,
  author       = {Li Gong},
  editor       = {Matthias Rauterberg and
                  Marino Menozzi and
                  Janet Wesson},
  title        = {Human and Humanoid Don't Match: Consistency Preference and Impact
                  on Users' Trust},
  booktitle    = {Human-Computer Interaction {INTERACT} '03: {IFIP} {TC13} International
                  Conference on Human-Computer Interaction, 1st-5th September 2003,
                  Zurich, Switzerland},
  publisher    = {{IOS} Press},
  year         = {2003},
  timestamp    = {Mon, 30 May 2005 14:02:24 +0200},
  biburl       = {https://dblp.org/rec/conf/interact/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0007182,
  author       = {Scott Oaks and
                  Bernard Traversat and
                  Li Gong},
  title        = {{JXTA} in a nutshell - a desktop quick reference},
  publisher    = {O'Reilly},
  year         = {2002},
  url          = {http://www.oreilly.de/catalog/jxtaian/index.html},
  isbn         = {978-0-596-00236-7},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0007182.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsonline/Gong02,
  author       = {Li Gong},
  title        = {Tutorial: Peer to Peer Networks in Action},
  journal      = {{IEEE} Distributed Syst. Online},
  volume       = {3},
  number       = {1},
  year         = {2002},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsonline/Gong02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong02,
  author       = {Li Gong},
  title        = {Guest Editor's Introduction: Peer-to-Peer Networks in Action},
  journal      = {{IEEE} Internet Comput.},
  volume       = {6},
  number       = {1},
  pages        = {37--39},
  year         = {2002},
  url          = {https://doi.org/10.1109/MIC.2002.978367},
  doi          = {10.1109/MIC.2002.978367},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong01,
  author       = {Li Gong},
  title        = {A Software Architecture for Open Service Gateways},
  journal      = {{IEEE} Internet Comput.},
  volume       = {5},
  number       = {1},
  pages        = {64--70},
  year         = {2001},
  url          = {https://doi.org/10.1109/4236.895144},
  doi          = {10.1109/4236.895144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/Gong01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong01a,
  author       = {Li Gong},
  title        = {Industry Report: {JXTA:} {A} Network Programming Environment},
  journal      = {{IEEE} Internet Comput.},
  volume       = {5},
  number       = {3},
  pages        = {88--95},
  year         = {2001},
  url          = {https://doi.org/10.1109/4236.935182},
  doi          = {10.1109/4236.935182},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/GongL01,
  author       = {Li Gong and
                  Jennifer Lai},
  editor       = {Julie A. Jacko and
                  Andrew Sears},
  title        = {Shall we mix synthetic speech and human speech?: impact on users'
                  performance, perception, and attitude},
  booktitle    = {Proceedings of the {CHI} 2001 Conference on Human Factors in Computing
                  Systems, Seattle, WA, USA, March 31 - April 5, 2001},
  pages        = {158--165},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/365024.365090},
  doi          = {10.1145/365024.365090},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/GongL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/NassG00,
  author       = {Clifford Nass and
                  Li Gong},
  title        = {Speech interfaces from an evolutionary perspective},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {9},
  pages        = {36--43},
  year         = {2000},
  url          = {https://doi.org/10.1145/348941.348976},
  doi          = {10.1145/348941.348976},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/NassG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/GongS00,
  author       = {Li Gong and
                  Ravi S. Sandhu},
  title        = {Guest Editors' Introduction: What Makes Security Technologies Relevant?},
  journal      = {{IEEE} Internet Comput.},
  volume       = {4},
  number       = {6},
  pages        = {38--41},
  year         = {2000},
  url          = {https://doi.org/10.1109/MIC.2000.895014},
  doi          = {10.1109/MIC.2000.895014},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/GongS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/Gong00,
  author       = {Li Gong},
  editor       = {Elisa Bertino},
  title        = {Developing Security Systems in the Real World},
  booktitle    = {{ECOOP} 2000 - Object-Oriented Programming, 14th European Conference,
                  Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1850},
  pages        = {251},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45102-1\_12},
  doi          = {10.1007/3-540-45102-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/Gong00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LaiGKNS99,
  author       = {Charlie Lai and
                  Li Gong and
                  Larry Koved and
                  Anthony J. Nadalin and
                  Roland Schemers},
  title        = {User Authentication and Authorization in the Java(tm) Platform},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {285--290},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816038},
  doi          = {10.1109/CSAC.1999.816038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LaiGKNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/avsp/NassG99,
  author       = {Clifford Nass and
                  Li Gong},
  editor       = {Dominic W. Massaro},
  title        = {Maximized Modality or constrained consistency?},
  booktitle    = {Auditory-Visual Speech Processing, {AVSP} '99, Santa Cruz, CA, USA,
                  August 7-10, 1999},
  pages        = {1},
  publisher    = {{ISCA}},
  year         = {1999},
  url          = {http://www.isca-speech.org/archive\_open/avsp99/av99\_001.html},
  timestamp    = {Wed, 10 Feb 2021 22:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/avsp/NassG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/GongD99,
  author       = {Li Gong and
                  Satya Dodda},
  title        = {Security Assurance Efforts in Engineering Java 2 {SE} {(JDK} 1.2)},
  booktitle    = {4th {IEEE} International Symposium on High-Assurance Systems Engineering
                  {(HASE} '99), 17-19 November 1999, Washington, D.C, USA, Proceedings},
  pages        = {89--96},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/HASE.1999.809479},
  doi          = {10.1109/HASE.1999.809479},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/GongD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Gong98,
  author       = {Li Gong},
  title        = {Secure Java Class Loading},
  journal      = {{IEEE} Internet Comput.},
  volume       = {2},
  number       = {6},
  pages        = {56--61},
  year         = {1998},
  url          = {https://doi.org/10.1109/4236.735987},
  doi          = {10.1109/4236.735987},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Gong98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanGGKM98,
  author       = {Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Li Gong and
                  G{\"{u}}nter Karjoth and
                  Chris J. Mitchell},
  title        = {Panel Introduction: The Security Impact of Distributed Computing Technologies},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {164--166},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683166},
  doi          = {10.1109/CSFW.1998.683166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BalfanzG98,
  author       = {Dirk Balfanz and
                  Li Gong},
  title        = {Experience with Secure Multi-Processing in Java},
  booktitle    = {Proceedings of the 18th International Conference on Distributed Computing
                  Systems, Amsterdam, The Netherlands, May 26-29, 1998},
  pages        = {398--405},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICDCS.1998.679754},
  doi          = {10.1109/ICDCS.1998.679754},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/BalfanzG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/GongS98,
  author       = {Li Gong and
                  Roland Schemers},
  editor       = {Giovanni Vigna},
  title        = {Signing, Sealing, and Guarding Java Objects},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_11},
  doi          = {10.1007/3-540-68671-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/GongS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GongS98,
  author       = {Li Gong and
                  Roland Schemers},
  title        = {Implementing Protection Domains in the Java\({}^{\mbox{TM}}\) Development
                  Kit 1.2},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1998, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1998},
  url          = {https://www.ndss-symposium.org/ndss1998/implementing-protection-domains-java-development-kit-12/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GongS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1998,
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {http://dl.acm.org/citation.cfm?id=288090},
  isbn         = {1-58113-007-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Gong97,
  author       = {Li Gong},
  title        = {Enclaves: Enabling Secure Collaboration Over the Internet},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {15},
  number       = {3},
  pages        = {567--575},
  year         = {1997},
  url          = {https://doi.org/10.1109/49.564150},
  doi          = {10.1109/49.564150},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Gong97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/Gong97,
  author       = {Li Gong},
  title        = {Java security: present and near future},
  journal      = {{IEEE} Micro},
  volume       = {17},
  number       = {3},
  pages        = {14--19},
  year         = {1997},
  url          = {https://doi.org/10.1109/40.591650},
  doi          = {10.1109/40.591650},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/Gong97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/AndersonBGHLLNNORSS97,
  author       = {James P. Anderson and
                  Sheila Brand and
                  Li Gong and
                  Thomas Haigh and
                  Steven B. Lipner and
                  Teresa F. Lunt and
                  Ruth Nelson and
                  William Neugent and
                  Hilarie K. Orman and
                  Marcus J. Ranum and
                  Roger R. Schell and
                  Eugene H. Spafford},
  title        = {Firewalls: An Expert Roundtable},
  journal      = {{IEEE} Softw.},
  volume       = {14},
  number       = {5},
  pages        = {60--66},
  year         = {1997},
  url          = {https://doi.org/10.1109/52.605932},
  doi          = {10.1109/52.605932},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/AndersonBGHLLNNORSS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/Gong97,
  author       = {Li Gong},
  title        = {New security architectural directions for Java},
  booktitle    = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February
                  23-26, 1997, Digest of Papers},
  pages        = {97--102},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CMPCON.1997.584679},
  doi          = {10.1109/CMPCON.1997.584679},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/Gong97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoriconiQRG97,
  author       = {Mark Moriconi and
                  Xiaolei Qian and
                  Robert A. Riemenschneider and
                  Li Gong},
  title        = {Secure Software Architectures},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {84--93},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601320},
  doi          = {10.1109/SECPRI.1997.601320},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MoriconiQRG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchaeferPDGRF97,
  author       = {Marvin Schaefer and
                  Sylvan Pinsky and
                  Drew Dean and
                  Li Gong and
                  Jim Roskind and
                  Barbara Fox},
  title        = {Ensuring Assurance in Mobile Computing},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {114--118},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601326},
  doi          = {10.1109/SECPRI.1997.601326},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchaeferPDGRF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usits/GongMPS97,
  author       = {Li Gong and
                  Marianne Mueller and
                  Hemma Prafullchandra and
                  Roland Schemers},
  title        = {Going Beyond the Sandbox: An Overview of the New Security Architecture
                  in the Java Development Kit 1.2},
  booktitle    = {1st {USENIX} Symposium on Internet Technologies and Systems, USITS'97,
                  Monterey, California, USA, December 8-11, 1997},
  publisher    = {{USENIX}},
  year         = {1997},
  url          = {http://www.usenix.org/publications/library/proceedings/usits97/gong.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usits/GongMPS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1997,
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {http://dl.acm.org/citation.cfm?id=266420},
  isbn         = {0-89791-912-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/DengGLW96,
  author       = {Robert H. Deng and
                  Li Gong and
                  Aurel A. Lazar and
                  Weiguo Wang},
  title        = {Practical Protocols for Certified Electronic Mail},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {4},
  number       = {3},
  pages        = {279--297},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF02139147},
  doi          = {10.1007/BF02139147},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/DengGLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/GongQ96,
  author       = {Li Gong and
                  Xiaolei Qian},
  title        = {Computational Issues in Secure Interoperation},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {1},
  pages        = {43--52},
  year         = {1996},
  url          = {https://doi.org/10.1109/32.481533},
  doi          = {10.1109/32.481533},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/GongQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AgiG96,
  author       = {Iskender Agi and
                  Li Gong},
  editor       = {James T. Ellis and
                  B. Clifford Neuman and
                  David M. Balenson},
  title        = {An Empirical Study of Secure {MPEG} Video Transmissions},
  booktitle    = {1996 Symposium on Network and Distributed System Security, {(S)NDSS}
                  '96, San Diego, CA, USA, February 22-23, 1996},
  pages        = {137--144},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/NDSS.1996.492420},
  doi          = {10.1109/NDSS.1996.492420},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AgiG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FoleyGQ96,
  author       = {Simon N. Foley and
                  Li Gong and
                  Xiaolei Qian},
  title        = {A Security Model of Dynamic Labeling Providing a Tiered Approach to
                  Verification},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {142--153},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502677},
  doi          = {10.1109/SECPRI.1996.502677},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FoleyGQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1996,
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {http://dl.acm.org/citation.cfm?id=238168},
  isbn         = {0-89791-829-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ReiterG95,
  author       = {Michael K. Reiter and
                  Li Gong},
  title        = {Securing Causal Relationships in Distributed Systems},
  journal      = {Comput. J.},
  volume       = {38},
  number       = {8},
  pages        = {633--642},
  year         = {1995},
  url          = {https://doi.org/10.1093/comjnl/38.8.633},
  doi          = {10.1093/COMJNL/38.8.633},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ReiterG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/Gong95,
  author       = {Li Gong},
  title        = {Efficient Network Authentication Protocols: Lower Bounds and Optimal
                  Implementations},
  journal      = {Distributed Comput.},
  volume       = {9},
  number       = {3},
  pages        = {131--145},
  year         = {1995},
  url          = {https://doi.org/10.1007/s004460050015},
  doi          = {10.1007/S004460050015},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/Gong95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Gong95,
  author       = {Li Gong},
  title        = {Collisionful Keyed Hash Functions with Selectable Collisions},
  journal      = {Inf. Process. Lett.},
  volume       = {55},
  number       = {3},
  pages        = {167--170},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00085-Q},
  doi          = {10.1016/0020-0190(95)00085-Q},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Gong95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/GongQ95,
  author       = {Li Gong and
                  Xiaolei Qian},
  title        = {Enriching the Expressive Power of Security Labels},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {7},
  number       = {5},
  pages        = {839--841},
  year         = {1995},
  url          = {https://doi.org/10.1109/69.469837},
  doi          = {10.1109/69.469837},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/GongQ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/GongS95,
  author       = {Li Gong and
                  Nachum Shacham},
  title        = {Multicast security and its extension to a mobile environment},
  journal      = {Wirel. Networks},
  volume       = {1},
  number       = {3},
  pages        = {281--295},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01200847},
  doi          = {10.1007/BF01200847},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/GongS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Gong95,
  author       = {Li Gong},
  title        = {Optimal authentication protocols resistant to password guessing attacks},
  booktitle    = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95),
                  March 13-15, 1995, Kenmare, County Kerry, Ireland},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/CSFW.1995.518549},
  doi          = {10.1109/CSFW.1995.518549},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Gong95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gong94,
  author       = {Li Gong},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {New Protocols for Third-Party-Based Authentication and Secure Broadcast},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {176--183},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191218},
  doi          = {10.1145/191177.191218},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gong94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/GongS94,
  author       = {Li Gong and
                  Nachum Shacham},
  title        = {Elements of trusted multicasting},
  booktitle    = {1994 International Conference on Network Protocols, {ICNP} 1994, Boston,
                  MA, USA, October 25-28, 1994, Proceedings},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICNP.1994.344380},
  doi          = {10.1109/ICNP.1994.344380},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/GongS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GongQ94,
  author       = {Li Gong and
                  Xiaolei Qian},
  title        = {The complexity and composability of secure interoperation},
  booktitle    = {1994 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages        = {190--200},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/RISP.1994.296581},
  doi          = {10.1109/RISP.1994.296581},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GongQ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongLNS93,
  author       = {Li Gong and
                  T. Mark A. Lomas and
                  Roger M. Needham and
                  Jerome H. Saltzer},
  title        = {Protecting Poorly Chosen Secrets from Guessing Attacks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {648--656},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223865},
  doi          = {10.1109/49.223865},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GongLNS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Gong93,
  author       = {Li Gong},
  title        = {Increasing Availability and Security of an Authentication Service},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {657--662},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223866},
  doi          = {10.1109/49.223866},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Gong93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gong93,
  author       = {Li Gong},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Lower Bounds on Messages and Rounds for Network Authentication Protocols},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {26--37},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168592},
  doi          = {10.1145/168588.168592},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gong93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Gong93,
  author       = {Li Gong},
  title        = {A Variation on the Themes of Message Freshness and Replay or, the
                  Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols},
  booktitle    = {6th {IEEE} Computer Security Foundations Workshop - CSFW'93, Franconia,
                  New Hampshire, USA, June 15-17, 1993, Proceedings},
  pages        = {131--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSFW.1993.246633},
  doi          = {10.1109/CSFW.1993.246633},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Gong93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterG93,
  author       = {Michael K. Reiter and
                  Li Gong},
  title        = {Preventing denial and forgery of causal relationships in distributed
                  systems},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {30--40},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287645},
  doi          = {10.1109/RISP.1993.287645},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ReiterG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Gong92,
  author       = {Li Gong},
  title        = {A Security Risk of Depending on Synchronized Clocks},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {26},
  number       = {1},
  pages        = {49--53},
  year         = {1992},
  url          = {https://doi.org/10.1145/130704.130709},
  doi          = {10.1145/130704.130709},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Gong92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BullGS92,
  author       = {John A. Bull and
                  Li Gong and
                  Karen R. Sollins},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Security in an Open Systems Federation},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013889},
  doi          = {10.1007/BFB0013889},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BullGS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterBG92,
  author       = {Michael K. Reiter and
                  Kenneth P. Birman and
                  Li Gong},
  title        = {Integrating security in a group oriented distributed system},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213273},
  doi          = {10.1109/RISP.1992.213273},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ReiterBG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Gong91,
  author       = {Li Gong},
  title        = {Handling Infeasible Specifications fo Cryptographic Protocols},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {99--102},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151575},
  doi          = {10.1109/CSFW.1991.151575},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Gong91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GligorKSG91,
  author       = {Virgil D. Gligor and
                  Rajashekar Kailar and
                  Stuart G. Stubblebine and
                  Li Gong},
  title        = {Logics for Cryptographic Protocols - Virtues and Limitations},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {219--226},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151591},
  doi          = {10.1109/CSFW.1991.151591},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GligorKSG91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Gong90,
  author       = {Li Gong},
  title        = {A note on redundancy in encrypted messages},
  journal      = {Comput. Commun. Rev.},
  volume       = {20},
  number       = {5},
  pages        = {18--22},
  year         = {1990},
  url          = {https://doi.org/10.1145/381906.381918},
  doi          = {10.1145/381906.381918},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Gong90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GongW90,
  author       = {Li Gong and
                  David J. Wheeler},
  title        = {A Matrix Key-Distribution Scheme},
  journal      = {J. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {51--59},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF02252869},
  doi          = {10.1007/BF02252869},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GongW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Gong90,
  author       = {Li Gong},
  title        = {Verifiable-Text Attacks in Cryptographic Protocols},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '90, The Conference on Computer Communications,
                  Ninth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, The Multiple Facets of Integration, San Francisco, CA,
                  USA, June 3-7, 1990},
  pages        = {686--693},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/INFCOM.1990.91310},
  doi          = {10.1109/INFCOM.1990.91310},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/Gong90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GongNY90,
  author       = {Li Gong and
                  Roger M. Needham and
                  Raphael Yahalom},
  title        = {Reasoning about Belief in Cryptographic Protocols},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {234--248},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63854},
  doi          = {10.1109/RISP.1990.63854},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GongNY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Gong89,
  author       = {Li Gong},
  title        = {Using one-way functions for authentication},
  journal      = {Comput. Commun. Rev.},
  volume       = {19},
  number       = {5},
  pages        = {8--11},
  year         = {1989},
  url          = {https://doi.org/10.1145/74681.74682},
  doi          = {10.1145/74681.74682},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Gong89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Gong89,
  author       = {Li Gong},
  title        = {On Security in Capability-Based Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {56--60},
  year         = {1989},
  url          = {https://doi.org/10.1145/858344.858349},
  doi          = {10.1145/858344.858349},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Gong89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Gong89,
  author       = {Li Gong},
  title        = {Securely Replicating Authentication Services},
  booktitle    = {9th International Conference on Distributed Computing Systems, {ICDCS}
                  1989, Newport Beach, CA, USA, June 5-9, 1989},
  pages        = {85--93},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/ICDCS.1989.37934},
  doi          = {10.1109/ICDCS.1989.37934},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Gong89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LomasGSN89,
  author       = {T. Mark A. Lomas and
                  Li Gong and
                  Jerome H. Saltzer and
                  Roger M. Needham},
  editor       = {Gregory R. Andrews},
  title        = {Reducing Risks from Poorly Chosen Keys},
  booktitle    = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
                  1989},
  pages        = {14--18},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/74850.74853},
  doi          = {10.1145/74850.74853},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/LomasGSN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Gong89,
  author       = {Li Gong},
  title        = {A Secure Identity-Based Capability System},
  booktitle    = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 1-3, 1989},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SECPRI.1989.36277},
  doi          = {10.1109/SECPRI.1989.36277},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Gong89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics