Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Li Gong
@article{DBLP:journals/ress/TianDGW24, author = {Meng Tian and Zhengcheng Dong and Li Gong and Xianpei Wang}, title = {Line hardening strategies for resilient power systems considering cyber-topology interdependence}, journal = {Reliab. Eng. Syst. Saf.}, volume = {241}, pages = {109644}, year = {2024}, url = {https://doi.org/10.1016/j.ress.2023.109644}, doi = {10.1016/J.RESS.2023.109644}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/TianDGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WangGZLT23, author = {Xianpei Wang and Li Gong and Haocheng Zhao and Bowen Li and Meng Tian}, title = {A 3D Offline Packing Algorithm considering Cargo Orientation and Stability}, journal = {Int. J. Distributed Sens. Networks}, volume = {2023}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.1155/2023/5299891}, doi = {10.1155/2023/5299891}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/WangGZLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuangPLG23, author = {Lin Huang and Xin Pan and Yajie Liu and Li Gong}, title = {An Unsupervised Machine Learning Approach for Monitoring Data Fusion and Health Indicator Construction}, journal = {Sensors}, volume = {23}, number = {16}, pages = {7239}, year = {2023}, url = {https://doi.org/10.3390/s23167239}, doi = {10.3390/S23167239}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HuangPLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/GongXXDZZ23, author = {Li Gong and Zhiqing Xiao and Lihua Xu and Yan Ding and Zhuo Zou and Lirong Zheng}, title = {An IoT-Based Wearable Labor Progress Monitoring System for Remote Evaluation of Admission Time to Hospital}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {27}, number = {6}, pages = {3037--3048}, year = {2023}, url = {https://doi.org/10.1109/JBHI.2023.3264251}, doi = {10.1109/JBHI.2023.3264251}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/GongXXDZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/TianDGW23, author = {Meng Tian and Zhengcheng Dong and Li Gong and Xianpei Wang}, title = {Coordinated Repair Crew Dispatch Problem for Cyber-Physical Distribution System}, journal = {{IEEE} Trans. Smart Grid}, volume = {14}, number = {3}, pages = {2288--2300}, year = {2023}, url = {https://doi.org/10.1109/TSG.2022.3209533}, doi = {10.1109/TSG.2022.3209533}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/TianDGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecoi/YinGCNPKG22, author = {Chengjie Yin and Li Gong and Yushun Chen and Leyi Ni and Tony J. Pitcher and Bin Kang and Longgen Guo}, title = {Modeling ecosystem impacts of the invasive Japanese smelt \emph{Hypomesus nipponensis} in Lake Erhai, southwestern China}, journal = {Ecol. Informatics}, volume = {67}, pages = {101488}, year = {2022}, url = {https://doi.org/10.1016/j.ecoinf.2021.101488}, doi = {10.1016/J.ECOINF.2021.101488}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ecoi/YinGCNPKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiii/GongYCAHZZ22, author = {Li Gong and Jinlong Yan and Yiqiao Chen and Jinjing An and Lei He and Lirong Zheng and Zhuo Zou}, title = {An IoT-based intelligent irrigation system with data fusion and a self-powered wide-area network}, journal = {J. Ind. Inf. Integr.}, volume = {29}, pages = {100367}, year = {2022}, url = {https://doi.org/10.1016/j.jii.2022.100367}, doi = {10.1016/J.JII.2022.100367}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiii/GongYCAHZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/GongGLZY22, author = {Li Gong and Xuelei Gong and Ying Liang and Bingzong Zhang and Yiqun Yang}, title = {Life Prediction of Hydraulic Concrete Based on Grey Residual Markov Model}, journal = {J. Inf. Process. Syst.}, volume = {18}, number = {4}, pages = {457--469}, year = {2022}, url = {https://doi.org/10.3745/JIPS.04.0247}, doi = {10.3745/JIPS.04.0247}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/GongGLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lgrs/YaoWZTGL22, author = {Hongtai Yao and Xianpei Wang and Le Zhao and Meng Tian and Li Gong and Bowen Li}, title = {Semantic Segmentation for Remote Sensing Images Using Pyramid Object-Based Markov Random Field With Dual-Track Information Transmission}, journal = {{IEEE} Geosci. Remote. Sens. Lett.}, volume = {19}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.1109/LGRS.2021.3121065}, doi = {10.1109/LGRS.2021.3121065}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lgrs/YaoWZTGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GongCXCY22, author = {Li Gong and Xiu{-}Bo Chen and Gang Xu and Yan Chang and Yi{-}Xian Yang}, title = {Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment}, journal = {Quantum Inf. Process.}, volume = {21}, number = {11}, pages = {375}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03725-0}, doi = {10.1007/S11128-022-03725-0}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/GongCXCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/YaoWZTJGL22, author = {Hongtai Yao and Xianpei Wang and Le Zhao and Meng Tian and Zini Jian and Li Gong and Bowen Li}, title = {An Object-Based Markov Random Field with Partition-Global Alternately Updated for Semantic Segmentation of High Spatial Resolution Remote Sensing Image}, journal = {Remote. Sens.}, volume = {14}, number = {1}, pages = {127}, year = {2022}, url = {https://doi.org/10.3390/rs14010127}, doi = {10.3390/RS14010127}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/YaoWZTJGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/LuoXGLLZ22, author = {Chengcheng Luo and Feng Xiao and Li Gong and Jintao Lei and Wenhao Li and Shengkai Zhang}, title = {Comparison of Weighted Mean Temperature in Greenland Calculated by Four Reanalysis Data}, journal = {Remote. Sens.}, volume = {14}, number = {21}, pages = {5431}, year = {2022}, url = {https://doi.org/10.3390/rs14215431}, doi = {10.3390/RS14215431}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/LuoXGLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GongWTYL22, author = {Li Gong and Xianpei Wang and Meng Tian and Hongtai Yao and Jiachuan Long}, title = {Multi-Objective Optimal Planning for Distribution Network Considering the Uncertainty of {PV} Power and Line-Switch State}, journal = {Sensors}, volume = {22}, number = {13}, pages = {4927}, year = {2022}, url = {https://doi.org/10.3390/s22134927}, doi = {10.3390/S22134927}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GongWTYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhangGZLXL21, author = {Shengkai Zhang and Li Gong and Qi Zeng and Wenhao Li and Feng Xiao and Jintao Lei}, title = {Imputation of {GPS} Coordinate Time Series Using missForest}, journal = {Remote. Sens.}, volume = {13}, number = {12}, pages = {2312}, year = {2021}, url = {https://doi.org/10.3390/rs13122312}, doi = {10.3390/RS13122312}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhangGZLXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ChenGWYXZZ21, author = {Xiaoshi Chen and Li Gong and Liang Wei and Shih{-}Ching Yeh and Li Da Xu and Lirong Zheng and Zhuo Zou}, title = {A Wearable Hand Rehabilitation System With Soft Gloves}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {2}, pages = {943--952}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3010369}, doi = {10.1109/TII.2020.3010369}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/ChenGWYXZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IdreesGSLGZZ20, author = {Zeba Idrees and Jose Granados and Yang Sun and Shahid Latif and Li Gong and Zhuo Zou and Lirong Zheng}, title = {{IEEE} 1588 for Clock Synchronization in Industrial IoT and Related Applications: {A} Review on Contributing Technologies, Protocols and Enhancement Methodologies}, journal = {{IEEE} Access}, volume = {8}, pages = {155660--155678}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3013669}, doi = {10.1109/ACCESS.2020.3013669}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IdreesGSLGZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/ZhangRGCG20, author = {Qianyun Zhang and Xiaoqian Ren and Li Gong and Lei Cheng and Yue Gao}, title = {An unmanned aerial vehicle flight formation for enhanced emergency communication based on conformal antenna design}, journal = {J. Commun. Inf. Networks}, volume = {5}, number = {3}, pages = {294--301}, year = {2020}, url = {https://doi.org/10.23919/JCIN.2020.9200892}, doi = {10.23919/JCIN.2020.9200892}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcin/ZhangRGCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/GongWJLM20, author = {Li Gong and Hong Wang and Chunling Jin and Lili Lu and Menghan Ma}, title = {Type Drive Analysis of Urban Water Security Factors}, journal = {J. Inf. Process. Syst.}, volume = {16}, number = {4}, pages = {784--794}, year = {2020}, url = {https://doi.org/10.3745/JIPS.04.0180}, doi = {10.3745/JIPS.04.0180}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/GongWJLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/MaG20, author = {Songya Ma and Li Gong}, title = {Deterministic bidirectional controlled remote preparation without information splitting}, journal = {Quantum Inf. Process.}, volume = {19}, number = {8}, pages = {255}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02760-z}, doi = {10.1007/S11128-020-02760-Z}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/MaG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichms/ChenG0Z20, author = {Xiaoshi Chen and Li Gong and Lirong Zheng and Zhuo Zou}, title = {Soft Exoskeleton Glove for Hand Assistance Based on Human-machine Interaction and Machine Learning}, booktitle = {{IEEE} International Conference on Human-Machine Systems, {ICHMS} 2020, Rome, Italy, September 7-9, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICHMS49158.2020.9209381}, doi = {10.1109/ICHMS49158.2020.9209381}, timestamp = {Fri, 23 Oct 2020 11:12:23 +0200}, biburl = {https://dblp.org/rec/conf/ichms/ChenG0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psb/LeverBGHSWCWKA20, author = {Jake Lever and Julia M. Barbarino and Li Gong and Rachel Huddart and Katrin Sangkuhl and Ryan Whaley and Michelle Whirl Carrillo and Mark Woon and Teri E. Klein and Russ B. Altman}, title = {PGxMine: Text Mining for Curation of PharmGKB}, booktitle = {Pacific Symposium on Biocomputing 2020, Fairmont Orchid, Hawaii, USA, January 3-7, 2020}, pages = {611--622}, year = {2020}, url = {https://psb.stanford.edu/psb-online/proceedings/psb20/Lever.pdf}, timestamp = {Fri, 13 Aug 2021 16:31:26 +0200}, biburl = {https://dblp.org/rec/conf/psb/LeverBGHSWCWKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/JiangLGYL20, author = {Wenbo Jiang and Hongwei Li and Li Gong and Haomiao Yang and Rongxing Lu}, title = {Accelerating Poisoning Attack Through Momentum and Adam Algorithms}, booktitle = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria, BC, Canada, November 18 - December 16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348449}, doi = {10.1109/VTC2020-FALL49728.2020.9348449}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/JiangLGYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cars/GongJYZW19, author = {Li Gong and Shan Jiang and Zhiyong Yang and Guobin Zhang and Lu Wang}, title = {Automated pulmonary nodule detection in {CT} images using 3D deep squeeze-and-excitation networks}, journal = {Int. J. Comput. Assist. Radiol. Surg.}, volume = {14}, number = {11}, pages = {1969--1979}, year = {2019}, url = {https://doi.org/10.1007/s11548-019-01979-1}, doi = {10.1007/S11548-019-01979-1}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cars/GongJYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/GongWLJW19, author = {Li Gong and Zhonghui Wang and Yaxian Li and Chunling Jin and Jing Wang}, title = {Damage Mechanism of Drift Ice Impact}, journal = {J. Inf. Process. Syst.}, volume = {15}, number = {6}, pages = {1350--1364}, year = {2019}, url = {https://doi.org/10.3745/JIPS.04.0147}, doi = {10.3745/JIPS.04.0147}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/GongWLJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ZhangYGJWCWZL19, author = {Guobin Zhang and Zhiyong Yang and Li Gong and Shan Jiang and Lu Wang and Xi Cao and Lin Wei and Hongyun Zhang and Ziqi Liu}, title = {An Appraisal of Nodule Diagnosis for Lung Cancer in {CT} Images}, journal = {J. Medical Syst.}, volume = {43}, number = {7}, pages = {181:1--181:18}, year = {2019}, url = {https://doi.org/10.1007/s10916-019-1327-0}, doi = {10.1007/S10916-019-1327-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/ZhangYGJWCWZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/GongCS19, author = {Li Gong and Josep Maria Crego and Jean Senellart}, editor = {Alexandra Birch and Andrew M. Finch and Hiroaki Hayashi and Ioannis Konstas and Thang Luong and Graham Neubig and Yusuke Oda and Katsuhito Sudoh}, title = {Enhanced Transformer Model for Data-to-Text Generation}, booktitle = {Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP 2019, Hong Kong, November 4, 2019}, pages = {148--156}, publisher = {Association for Computational Linguistics}, year = {2019}, url = {https://doi.org/10.18653/v1/D19-5615}, doi = {10.18653/V1/D19-5615}, timestamp = {Thu, 05 Aug 2021 17:36:17 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/GongCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/GongCS19a, author = {Li Gong and Josep Maria Crego and Jean Senellart}, editor = {Alexandra Birch and Andrew M. Finch and Hiroaki Hayashi and Ioannis Konstas and Thang Luong and Graham Neubig and Yusuke Oda and Katsuhito Sudoh}, title = {{SYSTRAN} @ {WNGT} 2019: {DGT} Task}, booktitle = {Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP 2019, Hong Kong, November 4, 2019}, pages = {262--267}, publisher = {Association for Computational Linguistics}, year = {2019}, url = {https://doi.org/10.18653/v1/D19-5629}, doi = {10.18653/V1/D19-5629}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/GongCS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GongLXLW19, author = {Li Gong and Hongwei Li and Guowen Xu and Xizhao Luo and Mi Wen}, title = {Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014190}, doi = {10.1109/GLOBECOM38437.2019.9014190}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/GongLXLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/ZhangJYGMZBL18, author = {Guobin Zhang and Shan Jiang and Zhiyong Yang and Li Gong and Xiaodong Ma and Zeyang Zhou and Chao Bao and Qi Liu}, title = {Automatic nodule detection for lung cancer in {CT} images: {A} review}, journal = {Comput. Biol. Medicine}, volume = {103}, pages = {287--300}, year = {2018}, url = {https://doi.org/10.1016/j.compbiomed.2018.10.033}, doi = {10.1016/J.COMPBIOMED.2018.10.033}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cbm/ZhangJYGMZBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmt/WangGZXB18, author = {Mingxuan Wang and Li Gong and Wenhuan Zhu and Jun Xie and Chao Bian}, editor = {Ondrej Bojar and Rajen Chatterjee and Christian Federmann and Mark Fishel and Yvette Graham and Barry Haddow and Matthias Huck and Antonio Jimeno{-}Yepes and Philipp Koehn and Christof Monz and Matteo Negri and Aur{\'{e}}lie N{\'{e}}v{\'{e}}ol and Mariana L. Neves and Matt Post and Lucia Specia and Marco Turchi and Karin Verspoor}, title = {Tencent Neural Machine Translation Systems for {WMT18}}, booktitle = {Proceedings of the Third Conference on Machine Translation: Shared Task Papers, {WMT} 2018, Belgium, Brussels, October 31 - November 1, 2018}, pages = {522--527}, publisher = {Association for Computational Linguistics}, year = {2018}, url = {https://doi.org/10.18653/v1/w18-6429}, doi = {10.18653/V1/W18-6429}, timestamp = {Thu, 17 Feb 2022 16:43:16 +0100}, biburl = {https://dblp.org/rec/conf/wmt/WangGZXB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gis/0001JMHYMJGAY17, author = {Song Gao and Krzysztof Janowicz and Daniel R. Montello and Yingjie Hu and Jiue{-}An Yang and Grant McKenzie and Yiting Ju and Li Gong and Benjamin Adams and Bo Yan}, title = {A data-synthesis-driven method for detecting and extracting vague cognitive regions}, journal = {Int. J. Geogr. Inf. Sci.}, volume = {31}, number = {6}, pages = {1245--1271}, year = {2017}, url = {https://doi.org/10.1080/13658816.2016.1273357}, doi = {10.1080/13658816.2016.1273357}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gis/0001JMHYMJGAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/XuZSCZYYWSCZWGW17, author = {Ziqian Xu and Wen Zeng and Jiayu Sun and Wei Chen and Ruzhi Zhang and Zunyuan Yang and Zunwei Yao and Lei Wang and Li Song and Yushu Chen and Yu Zhang and Chunhua Wang and Li Gong and Bing Wu and Tinghua Wang and Jie Zheng and Fabao Gao}, title = {The quantification of blood-brain barrier disruption using dynamic contrast-enhanced magnetic resonance imaging in aging rhesus monkeys with spontaneous type 2 diabetes mellitus}, journal = {NeuroImage}, volume = {158}, pages = {480--487}, year = {2017}, url = {https://doi.org/10.1016/j.neuroimage.2016.07.017}, doi = {10.1016/J.NEUROIMAGE.2016.07.017}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neuroimage/XuZSCZYYWSCZWGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/GongSQLY17, author = {Li Gong and Guofeng Shen and Shan Qiao and Wenjie Liu and Yuchi Yi}, editor = {Qingli Li and Lipo Wang and Mei Zhou and Li Sun and Song Qiu and Hongying Liu}, title = {A miniaturized phased high intensity focused ultrasound transducer-driven system with {MR} compatibility}, booktitle = {10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2017, Shanghai, China, October 14-16, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISP-BMEI.2017.8302248}, doi = {10.1109/CISP-BMEI.2017.8302248}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/GongSQLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZengGLZCX17, author = {Fanqi Zeng and Li Gong and Jing Liu and Jiang Zhang and Qinghua Chen and Ruyue Xin}, title = {Interactive Levy Flight in Interest Space}, journal = {CoRR}, volume = {abs/1705.09462}, year = {2017}, url = {http://arxiv.org/abs/1705.09462}, eprinttype = {arXiv}, eprint = {1705.09462}, timestamp = {Mon, 28 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZengGLZCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gis/LiuKGL16, author = {Xi Liu and Chaogui Kang and Li Gong and Yu Liu}, title = {Incorporating spatial interaction patterns in classifying and understanding urban land use}, journal = {Int. J. Geogr. Inf. Sci.}, volume = {30}, number = {2}, pages = {334--350}, year = {2016}, url = {https://doi.org/10.1080/13658816.2015.1086923}, doi = {10.1080/13658816.2015.1086923}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gis/LiuKGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/urban/McKenzieJGG15, author = {Grant McKenzie and Krzysztof Janowicz and Song Gao and Li Gong}, title = {How where is when? On the regional variability and resolution of geosocial temporal signatures for points of interest}, journal = {Comput. Environ. Urban Syst.}, volume = {54}, pages = {336--346}, year = {2015}, url = {https://doi.org/10.1016/j.compenvurbsys.2015.10.002}, doi = {10.1016/J.COMPENVURBSYS.2015.10.002}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/urban/McKenzieJGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semeval/ApidianakiG15, author = {Marianna Apidianaki and Li Gong}, editor = {Daniel M. Cer and David Jurgens and Preslav Nakov and Torsten Zesch}, title = {{LIMSI:} Translations as Source of Indirect Supervision for Multilingual All-Words Sense Disambiguation and Entity Linking}, booktitle = {Proceedings of the 9th International Workshop on Semantic Evaluation, SemEval@NAACL-HLT 2015, Denver, Colorado, USA, June 4-5, 2015}, pages = {298--302}, publisher = {The Association for Computer Linguistics}, year = {2015}, url = {https://doi.org/10.18653/v1/s15-2050}, doi = {10.18653/V1/S15-2050}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/semeval/ApidianakiG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Gong14, author = {Li Gong}, title = {On-demand Development of Statistical Machine Translation Systems. (D{\'{e}}veloppement {\`{a}} la demande des syst{\`{e}}mes de traduction automatique statistiques)}, school = {University of Paris-Sud, Orsay, France}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-01144656}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Gong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/TianWZG14, author = {Jin Tian and Fei Wu and Guohui Zeng and Li Gong}, editor = {Lean Yu and Qing Zhu and Jian Chai and Shouyang Wang}, title = {A Modified Storage Format for Accelerating {SPMV}}, booktitle = {Seventh International Joint Conference on Computational Sciences and Optimization, {CSO} 2014, Beijing, China, July 4-6, 2014}, pages = {547--550}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSO.2014.106}, doi = {10.1109/CSO.2014.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/TianWZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/TianGSG14, author = {Jin Tian and Fei Gao and Xiankun Sun and Li Gong}, editor = {Lean Yu and Qing Zhu and Jian Chai and Shouyang Wang}, title = {An Efficient Column-Major Ordering Format for Finite Element Analysis}, booktitle = {Seventh International Joint Conference on Computational Sciences and Optimization, {CSO} 2014, Beijing, China, July 4-6, 2014}, pages = {562--565}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSO.2014.110}, doi = {10.1109/CSO.2014.110}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/TianGSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwslt/GongMY14, author = {Li Gong and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {Incremental development of statistical machine translation systems}, booktitle = {Proceedings of the 11th International Workshop on Spoken Language Translation: Papers, {IWSLT} 2014, Lake Tahoe, CA, USA, December 4-5, 2014}, year = {2014}, url = {https://aclanthology.org/2014.iwslt-papers.9}, timestamp = {Thu, 23 Sep 2021 17:37:48 +0200}, biburl = {https://dblp.org/rec/conf/iwslt/GongMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/taln/GongMY14a, author = {Li Gong and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {(Much) Faster Construction of {SMT} Phrase Tables from Large-scale Parallel Corpora (Construction (tr{\`{e}}s) rapide de tables de traduction {\`{a}} partir de grands bi-textes) [in French]}, booktitle = {Traitement Automatique des Langues Naturelles, {TALN} 2014, Marseille, France, 1-4 Juillet 2014, D{\'{e}}monstrations}, pages = {26--27}, publisher = {The Association for Computer Linguistics}, year = {2014}, url = {https://aclanthology.org/F14-3011/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/taln/GongMY14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/taln/GongMY14, author = {Li Gong and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {Towards a More Efficient Development of Statistical Machine Translation Systems (Vers un d{\'{e}}veloppement plus efficace des syst{\`{e}}mes de traduction statistique : un peu de vert dans un monde de {BLEU)} [in French]}, booktitle = {Traitement Automatique des Langues Naturelles, {TALN} 2014, Marseille, France, 1-4 Juillet 2014, articles courts}, pages = {395--400}, publisher = {The Association for Computer Linguistics}, year = {2014}, url = {https://aclanthology.org/F14-2002/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/taln/GongMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmt/PecheuxGDMIALNM14, author = {Nicolas P{\'{e}}cheux and Li Gong and Quoc{-}Khanh Do and Benjamin Marie and Yulia Ivanishcheva and Alexandre Allauzen and Thomas Lavergne and Jan Niehues and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {{LIMSI} {\textdollar}@{\textdollar} WMT'14 Medical Translation Task}, booktitle = {Proceedings of the Ninth Workshop on Statistical Machine Translation, WMT@ACL 2014, June 26-27, 2014, Baltimore, Maryland, {USA}}, pages = {246--253}, publisher = {The Association for Computer Linguistics}, year = {2014}, url = {https://doi.org/10.3115/v1/w14-3330}, doi = {10.3115/V1/W14-3330}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmt/PecheuxGDMIALNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bife/TianWZZG13, author = {Jin Tian and Fei Wu and Rui Zou and Guohui Zeng and Li Gong}, editor = {Lean Yu and Rongda Chen and Shouyang Wang}, title = {The Storage Formats for Accelerating {SMVP} on a {GPU}}, booktitle = {Sixth International Conference on Business Intelligence and Financial Engineering, {BIFE} 2013, Hangzhou, China, November 14-16, 2013}, pages = {513--516}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BIFE.2013.107}, doi = {10.1109/BIFE.2013.107}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bife/TianWZZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bife/TianZFRG13, author = {Jin Tian and Guohui Zeng and Fei Wu and Rui Zou and Li Gong}, editor = {Lean Yu and Rongda Chen and Shouyang Wang}, title = {The Creation of Knowledge Innovation System}, booktitle = {Sixth International Conference on Business Intelligence and Financial Engineering, {BIFE} 2013, Hangzhou, China, November 14-16, 2013}, pages = {542--544}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BIFE.2013.146}, doi = {10.1109/BIFE.2013.146}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bife/TianZFRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwslt/GongMY13, author = {Li Gong and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {Improving bilingual sub-sentential alignment by sampling-based transpotting}, booktitle = {Proceedings of the 10th International Workshop on Spoken Language Translation: Papers, Heidelberg, Germany, December 5-6, 2013}, year = {2013}, url = {https://aclanthology.org/2013.iwslt-papers.7}, timestamp = {Thu, 23 Sep 2021 18:00:06 +0200}, biburl = {https://dblp.org/rec/conf/iwslt/GongMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiuGGL13, author = {Xi Liu and Li Gong and Yongxi Gong and Yu Liu}, title = {Revealing daily travel patterns and city structure with taxi trip data}, journal = {CoRR}, volume = {abs/1310.6592}, year = {2013}, url = {http://arxiv.org/abs/1310.6592}, eprinttype = {arXiv}, eprint = {1310.6592}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiuGGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/biodb/RinaldiCGCGHSTKA12, author = {Fabio Rinaldi and Simon Clematide and Yael Garten and Michelle Whirl Carrillo and Li Gong and Joan M. Hebert and Katrin Sangkuhl and Caroline F. Thorn and Teri E. Klein and Russ B. Altman}, title = {Using {ODIN} for a PharmGKB revalidation experiment}, journal = {Database J. Biol. Databases Curation}, volume = {2012}, year = {2012}, url = {https://doi.org/10.1093/database/bas021}, doi = {10.1093/DATABASE/BAS021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/biodb/RinaldiCGCGHSTKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bife/GongT12, author = {Li Gong and Jin Tian}, editor = {Lean Yu and Guoxing Zhang and Shouyang Wang}, title = {Model for Renegotiation in Infrastructure Projects with Government Guarantee}, booktitle = {Fifth International Conference on Business Intelligence and Financial Engineering, {BIFE} 2012, Lanzhou, Gansu, China, August 18-21, 2012}, pages = {646--648}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/BIFE.2012.140}, doi = {10.1109/BIFE.2012.140}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bife/GongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/TianG12, author = {Jin Tian and Li Gong}, editor = {Yanling Hao and Lean Yu}, title = {Novel Pre-treatment for Inhomogeneous Dielectric Media in Finite Element Analysis}, booktitle = {Fifth International Joint Conference on Computational Sciences and Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26, 2012}, pages = {699--701}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSO.2012.160}, doi = {10.1109/CSO.2012.160}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/TianG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwslt/GongMY12, author = {Li Gong and Aur{\'{e}}lien Max and Fran{\c{c}}ois Yvon}, title = {Towards contextual adaptation for any-text translation}, booktitle = {2012 International Workshop on Spoken Language Translation, {IWSLT} 2012, Hong Kong, December 6-7, 2012}, pages = {292--299}, publisher = {{ISCA}}, year = {2012}, url = {http://www.isca-speech.org/archive/iwslt\_12/sltc\_292.html}, timestamp = {Tue, 16 Nov 2021 11:36:33 +0100}, biburl = {https://dblp.org/rec/conf/iwslt/GongMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmt/LeLAAGMSWY12, author = {Hai Son Le and Thomas Lavergne and Alexandre Allauzen and Marianna Apidianaki and Li Gong and Aur{\'{e}}lien Max and Artem Sokolov and Guillaume Wisniewski and Fran{\c{c}}ois Yvon}, editor = {Chris Callison{-}Burch and Philipp Koehn and Christof Monz and Matt Post and Radu Soricut and Lucia Specia}, title = {{LIMSI} @ {WMT12}}, booktitle = {Proceedings of the Seventh Workshop on Statistical Machine Translation, WMT@NAACL-HLT 2012, June 7-8, 2012, Montr{\'{e}}al, Canada}, pages = {330--337}, publisher = {The Association for Computer Linguistics}, year = {2012}, url = {https://aclanthology.org/W12-3141/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmt/LeLAAGMSWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Gong11, author = {Li Gong}, title = {Java security architecture revisited}, journal = {Commun. {ACM}}, volume = {54}, number = {11}, pages = {48--52}, year = {2011}, url = {https://doi.org/10.1145/2018396.2018411}, doi = {10.1145/2018396.2018411}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Gong11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhr/KimGSNCL11, author = {Min{-}Sun Kim and Li Gong and Nicole Saito and Kimberly Nishigaya and Marjorie Cabico and Pascale Lafontaine}, title = {The Role of Self-Construal on Preferred Communication Styles with Humanoid Robots}, journal = {Int. J. Humanoid Robotics}, volume = {8}, number = {2}, pages = {359--374}, year = {2011}, url = {https://doi.org/10.1142/S0219843611002472}, doi = {10.1142/S0219843611002472}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhr/KimGSNCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Gong11, author = {Li Gong}, title = {Java Security Architecture Revisited}, journal = {{ACM} Queue}, volume = {9}, number = {9}, pages = {30}, year = {2011}, url = {https://doi.org/10.1145/2030256.2034639}, doi = {10.1145/2030256.2034639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Gong11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csee2/MaGCB11, author = {Guang Ma and Li Gong and Kuikui Chen and Wanbei Bai}, editor = {Song Lin and Xiong Huang}, title = {One Kind of Brand-New Experimental Teaching Idea and Assessment Methods on Basic Geology in Network Environment}, booktitle = {Advances in Computer Science, Environment, Ecoinformatics, and Education - International Conference, {CSEE} 2011, Wuhan, China, August 21-22, 2011, Proceedings, Part {III}}, series = {Communications in Computer and Information Science}, volume = {216}, pages = {202--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23345-6\_39}, doi = {10.1007/978-3-642-23345-6\_39}, timestamp = {Wed, 17 May 2017 14:24:31 +0200}, biburl = {https://dblp.org/rec/conf/csee2/MaGCB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dictap/JinGF11, author = {Guangri Jin and Li Gong and Hiroshi Furukawa}, editor = {Hocine Cherifi and Jasni Mohamad Zain and Eyas El{-}Qawasmeh}, title = {Automatic Transmission Period Setting for Intermittent Periodic Transmission in Wireless Backhaul}, booktitle = {Digital Information and Communication Technology and Its Applications - International Conference, {DICTAP} 2011, Dijon, France, June 21-23, 2011. Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {166}, pages = {577--592}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21984-9\_48}, doi = {10.1007/978-3-642-21984-9\_48}, timestamp = {Fri, 02 Nov 2018 09:47:45 +0100}, biburl = {https://dblp.org/rec/conf/dictap/JinGF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangGCGW10, author = {Guoxing Zhang and Ju'e Guo and Guorong Chai and Li Gong and Xuejun Wang}, title = {Using jump-diffusion modeling for valuing real options in infrastructure projects}, journal = {Frontiers Comput. Sci. China}, volume = {4}, number = {2}, pages = {263--270}, year = {2010}, url = {https://doi.org/10.1007/s11704-010-0509-1}, doi = {10.1007/S11704-010-0509-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangGCGW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ais/KimSG09, author = {Min{-}Sun Kim and Jennifer Sur and Li Gong}, title = {Humans and humanoid social robots in communication contexts}, journal = {{AI} Soc.}, volume = {24}, number = {4}, pages = {317--325}, year = {2009}, url = {https://doi.org/10.1007/s00146-009-0224-3}, doi = {10.1007/S00146-009-0224-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ais/KimSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Gong09, author = {Li Gong}, title = {Java Security: {A} Ten Year Retrospective}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {395--405}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.44}, doi = {10.1109/ACSAC.2009.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Gong09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/Gong08, author = {Li Gong}, title = {How social is social responses to computers? The function of the degree of anthropomorphism in computer representations}, journal = {Comput. Hum. Behav.}, volume = {24}, number = {4}, pages = {1494--1509}, year = {2008}, url = {https://doi.org/10.1016/j.chb.2007.05.007}, doi = {10.1016/J.CHB.2007.05.007}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/Gong08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/Gong08a, author = {Li Gong}, title = {The boundary of racial prejudice: Comparing preferences for computer-synthesized White, Black, and robot characters}, journal = {Comput. Hum. Behav.}, volume = {24}, number = {5}, pages = {2074--2093}, year = {2008}, url = {https://doi.org/10.1016/j.chb.2007.09.008}, doi = {10.1016/J.CHB.2007.09.008}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/Gong08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/Hernandez-BoussardCHGOGGLTWWZAK08, author = {Tina Hernandez{-}Boussard and Michelle Whirl Carrillo and Joan M. Hebert and Li Gong and Ryan Owen and Mei Gong and Winston Gor and Feng Liu and Chuong Truong and Ryan Whaley and Mark Woon and Tina Zhou and Russ B. Altman and Teri E. Klein}, title = {The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge}, journal = {Nucleic Acids Res.}, volume = {36}, number = {Database-Issue}, pages = {913--918}, year = {2008}, url = {https://doi.org/10.1093/nar/gkm1009}, doi = {10.1093/NAR/GKM1009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/Hernandez-BoussardCHGOGGLTWWZAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/WuCZHWG08, author = {Jiayu Wu and Hongguang Cheng and Ayan Zeng and Fanghua Hao and Dan Wang and Li Gong}, title = {Landscape Change and its Simulation using GIS, Landscape Ecology and the Markov Model}, booktitle = {{IEEE} International Geoscience {\&} Remote Sensing Symposium, {IGARSS} 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings}, pages = {197--200}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IGARSS.2008.4779691}, doi = {10.1109/IGARSS.2008.4779691}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/igarss/WuCZHWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/WangCHZWG08, author = {Dan Wang and Hongguang Cheng and Fanghua Hao and Ayan Zeng and Jiayu Wu and Li Gong}, title = {Dynamic Simulation on the Spatio-Temporal Patterns of Land use in the Area of Continued Hydropower Station Construction in the Upper Reach of Yellow River}, booktitle = {{IEEE} International Geoscience {\&} Remote Sensing Symposium, {IGARSS} 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings}, pages = {711--714}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IGARSS.2008.4779821}, doi = {10.1109/IGARSS.2008.4779821}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/WangCHZWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/Gong07, author = {Li Gong}, title = {Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents}, journal = {Int. J. Hum. Comput. Stud.}, volume = {65}, number = {3}, pages = {183--191}, year = {2007}, url = {https://doi.org/10.1016/j.ijhcs.2006.09.005}, doi = {10.1016/J.IJHCS.2006.09.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/Gong07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShimGRG04, author = {Simon S. Y. Shim and Li Gong and Aviel D. Rubin and Linley Gwennap}, title = {Guest Editors' Introduction: Securing the High-Speed Internet}, journal = {Computer}, volume = {37}, number = {6}, pages = {33--35}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.25}, doi = {10.1109/MC.2004.25}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShimGRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong04, author = {Li Gong}, title = {It's China(town)}, journal = {{IEEE} Internet Comput.}, volume = {8}, number = {5}, pages = {103--104}, year = {2004}, url = {https://doi.org/10.1109/MIC.2004.43}, doi = {10.1109/MIC.2004.43}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijst/GongL03, author = {Li Gong and Jennifer Lai}, title = {To Mix or Not to Mix Synthetic Speech and Human Speech? Contrasting Impact on Judge-Rated Task Performance versus Self-Rated Performance and Attitudinal Responses}, journal = {Int. J. Speech Technol.}, volume = {6}, number = {2}, pages = {123--131}, year = {2003}, url = {https://doi.org/10.1023/A\%3A1022382413579}, doi = {10.1023/A\%3A1022382413579}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijst/GongL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong03, author = {Li Gong}, title = {A New Column for a New Year}, journal = {{IEEE} Internet Comput.}, volume = {7}, number = {1}, pages = {96}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MIC.2003.10003}, doi = {10.1109/MIC.2003.10003}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong03a, author = {Li Gong}, title = {Why Cross-Platform Security}, journal = {{IEEE} Internet Comput.}, volume = {7}, number = {3}, pages = {95--96}, year = {2003}, url = {https://doi.org/10.1109/MIC.2003.1200308}, doi = {10.1109/MIC.2003.1200308}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongGRS03, author = {Li Gong and Joshua D. Guttman and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest editorial overview}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {1--4}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806120}, doi = {10.1109/JSAC.2002.806120}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongGRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Gong03, author = {Li Gong}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Is Cross-Platform Security Possible?}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {402}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_34}, doi = {10.1007/3-540-45067-X\_34}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Gong03, author = {Li Gong}, editor = {Constantine Stephanidis}, title = {Multimodal Interactions on Mobile Devices and Users' Behavioral and Attitudinal Preferences}, booktitle = {Human-Computer Interaction: Universal Access in {HCI:} Inclusive Design in the Information Society, Proceedings of {HCI} International 2003 (the 10th International Conference on Human-Computer Interaction), {HCI} 2003, Crete, Greece, June 22-27, 2003, Volume 4}, pages = {1402--1406}, publisher = {Lawrence Erlbaum}, year = {2003}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/Gong03, author = {Li Gong}, editor = {Matthias Rauterberg and Marino Menozzi and Janet Wesson}, title = {Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust}, booktitle = {Human-Computer Interaction {INTERACT} '03: {IFIP} {TC13} International Conference on Human-Computer Interaction, 1st-5th September 2003, Zurich, Switzerland}, publisher = {{IOS} Press}, year = {2003}, timestamp = {Mon, 30 May 2005 14:02:24 +0200}, biburl = {https://dblp.org/rec/conf/interact/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0007182, author = {Scott Oaks and Bernard Traversat and Li Gong}, title = {{JXTA} in a nutshell - a desktop quick reference}, publisher = {O'Reilly}, year = {2002}, url = {http://www.oreilly.de/catalog/jxtaian/index.html}, isbn = {978-0-596-00236-7}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0007182.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsonline/Gong02, author = {Li Gong}, title = {Tutorial: Peer to Peer Networks in Action}, journal = {{IEEE} Distributed Syst. Online}, volume = {3}, number = {1}, year = {2002}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsonline/Gong02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong02, author = {Li Gong}, title = {Guest Editor's Introduction: Peer-to-Peer Networks in Action}, journal = {{IEEE} Internet Comput.}, volume = {6}, number = {1}, pages = {37--39}, year = {2002}, url = {https://doi.org/10.1109/MIC.2002.978367}, doi = {10.1109/MIC.2002.978367}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong01, author = {Li Gong}, title = {A Software Architecture for Open Service Gateways}, journal = {{IEEE} Internet Comput.}, volume = {5}, number = {1}, pages = {64--70}, year = {2001}, url = {https://doi.org/10.1109/4236.895144}, doi = {10.1109/4236.895144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/Gong01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong01a, author = {Li Gong}, title = {Industry Report: {JXTA:} {A} Network Programming Environment}, journal = {{IEEE} Internet Comput.}, volume = {5}, number = {3}, pages = {88--95}, year = {2001}, url = {https://doi.org/10.1109/4236.935182}, doi = {10.1109/4236.935182}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/GongL01, author = {Li Gong and Jennifer Lai}, editor = {Julie A. Jacko and Andrew Sears}, title = {Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude}, booktitle = {Proceedings of the {CHI} 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31 - April 5, 2001}, pages = {158--165}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/365024.365090}, doi = {10.1145/365024.365090}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/GongL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/NassG00, author = {Clifford Nass and Li Gong}, title = {Speech interfaces from an evolutionary perspective}, journal = {Commun. {ACM}}, volume = {43}, number = {9}, pages = {36--43}, year = {2000}, url = {https://doi.org/10.1145/348941.348976}, doi = {10.1145/348941.348976}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/NassG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/GongS00, author = {Li Gong and Ravi S. Sandhu}, title = {Guest Editors' Introduction: What Makes Security Technologies Relevant?}, journal = {{IEEE} Internet Comput.}, volume = {4}, number = {6}, pages = {38--41}, year = {2000}, url = {https://doi.org/10.1109/MIC.2000.895014}, doi = {10.1109/MIC.2000.895014}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/GongS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Gong00, author = {Li Gong}, editor = {Elisa Bertino}, title = {Developing Security Systems in the Real World}, booktitle = {{ECOOP} 2000 - Object-Oriented Programming, 14th European Conference, Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1850}, pages = {251}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45102-1\_12}, doi = {10.1007/3-540-45102-1\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/Gong00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LaiGKNS99, author = {Charlie Lai and Li Gong and Larry Koved and Anthony J. Nadalin and Roland Schemers}, title = {User Authentication and Authorization in the Java(tm) Platform}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {285--290}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816038}, doi = {10.1109/CSAC.1999.816038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LaiGKNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/avsp/NassG99, author = {Clifford Nass and Li Gong}, editor = {Dominic W. Massaro}, title = {Maximized Modality or constrained consistency?}, booktitle = {Auditory-Visual Speech Processing, {AVSP} '99, Santa Cruz, CA, USA, August 7-10, 1999}, pages = {1}, publisher = {{ISCA}}, year = {1999}, url = {http://www.isca-speech.org/archive\_open/avsp99/av99\_001.html}, timestamp = {Wed, 10 Feb 2021 22:00:51 +0100}, biburl = {https://dblp.org/rec/conf/avsp/NassG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/GongD99, author = {Li Gong and Satya Dodda}, title = {Security Assurance Efforts in Engineering Java 2 {SE} {(JDK} 1.2)}, booktitle = {4th {IEEE} International Symposium on High-Assurance Systems Engineering {(HASE} '99), 17-19 November 1999, Washington, D.C, USA, Proceedings}, pages = {89--96}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/HASE.1999.809479}, doi = {10.1109/HASE.1999.809479}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/GongD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Gong98, author = {Li Gong}, title = {Secure Java Class Loading}, journal = {{IEEE} Internet Comput.}, volume = {2}, number = {6}, pages = {56--61}, year = {1998}, url = {https://doi.org/10.1109/4236.735987}, doi = {10.1109/4236.735987}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Gong98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanGGKM98, author = {Peter Y. A. Ryan and Dieter Gollmann and Li Gong and G{\"{u}}nter Karjoth and Chris J. Mitchell}, title = {Panel Introduction: The Security Impact of Distributed Computing Technologies}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {164--166}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683166}, doi = {10.1109/CSFW.1998.683166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BalfanzG98, author = {Dirk Balfanz and Li Gong}, title = {Experience with Secure Multi-Processing in Java}, booktitle = {Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, The Netherlands, May 26-29, 1998}, pages = {398--405}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICDCS.1998.679754}, doi = {10.1109/ICDCS.1998.679754}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/BalfanzG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/GongS98, author = {Li Gong and Roland Schemers}, editor = {Giovanni Vigna}, title = {Signing, Sealing, and Guarding Java Objects}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {206--216}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_11}, doi = {10.1007/3-540-68671-1\_11}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mas/GongS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GongS98, author = {Li Gong and Roland Schemers}, title = {Implementing Protection Domains in the Java\({}^{\mbox{TM}}\) Development Kit 1.2}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1998, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1998}, url = {https://www.ndss-symposium.org/ndss1998/implementing-protection-domains-java-development-kit-12/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GongS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1998, editor = {Li Gong and Michael K. Reiter}, title = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, publisher = {{ACM}}, year = {1998}, url = {http://dl.acm.org/citation.cfm?id=288090}, isbn = {1-58113-007-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Gong97, author = {Li Gong}, title = {Enclaves: Enabling Secure Collaboration Over the Internet}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {15}, number = {3}, pages = {567--575}, year = {1997}, url = {https://doi.org/10.1109/49.564150}, doi = {10.1109/49.564150}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Gong97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/Gong97, author = {Li Gong}, title = {Java security: present and near future}, journal = {{IEEE} Micro}, volume = {17}, number = {3}, pages = {14--19}, year = {1997}, url = {https://doi.org/10.1109/40.591650}, doi = {10.1109/40.591650}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/Gong97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/AndersonBGHLLNNORSS97, author = {James P. Anderson and Sheila Brand and Li Gong and Thomas Haigh and Steven B. Lipner and Teresa F. Lunt and Ruth Nelson and William Neugent and Hilarie K. Orman and Marcus J. Ranum and Roger R. Schell and Eugene H. Spafford}, title = {Firewalls: An Expert Roundtable}, journal = {{IEEE} Softw.}, volume = {14}, number = {5}, pages = {60--66}, year = {1997}, url = {https://doi.org/10.1109/52.605932}, doi = {10.1109/52.605932}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/AndersonBGHLLNNORSS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/Gong97, author = {Li Gong}, title = {New security architectural directions for Java}, booktitle = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers}, pages = {97--102}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CMPCON.1997.584679}, doi = {10.1109/CMPCON.1997.584679}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/Gong97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MoriconiQRG97, author = {Mark Moriconi and Xiaolei Qian and Robert A. Riemenschneider and Li Gong}, title = {Secure Software Architectures}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {84--93}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601320}, doi = {10.1109/SECPRI.1997.601320}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/MoriconiQRG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchaeferPDGRF97, author = {Marvin Schaefer and Sylvan Pinsky and Drew Dean and Li Gong and Jim Roskind and Barbara Fox}, title = {Ensuring Assurance in Mobile Computing}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {114--118}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601326}, doi = {10.1109/SECPRI.1997.601326}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchaeferPDGRF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usits/GongMPS97, author = {Li Gong and Marianne Mueller and Hemma Prafullchandra and Roland Schemers}, title = {Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2}, booktitle = {1st {USENIX} Symposium on Internet Technologies and Systems, USITS'97, Monterey, California, USA, December 8-11, 1997}, publisher = {{USENIX}}, year = {1997}, url = {http://www.usenix.org/publications/library/proceedings/usits97/gong.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usits/GongMPS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1997, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, publisher = {{ACM}}, year = {1997}, url = {http://dl.acm.org/citation.cfm?id=266420}, isbn = {0-89791-912-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/DengGLW96, author = {Robert H. Deng and Li Gong and Aurel A. Lazar and Weiguo Wang}, title = {Practical Protocols for Certified Electronic Mail}, journal = {J. Netw. Syst. Manag.}, volume = {4}, number = {3}, pages = {279--297}, year = {1996}, url = {https://doi.org/10.1007/BF02139147}, doi = {10.1007/BF02139147}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/DengGLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/GongQ96, author = {Li Gong and Xiaolei Qian}, title = {Computational Issues in Secure Interoperation}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {1}, pages = {43--52}, year = {1996}, url = {https://doi.org/10.1109/32.481533}, doi = {10.1109/32.481533}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/GongQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AgiG96, author = {Iskender Agi and Li Gong}, editor = {James T. Ellis and B. Clifford Neuman and David M. Balenson}, title = {An Empirical Study of Secure {MPEG} Video Transmissions}, booktitle = {1996 Symposium on Network and Distributed System Security, {(S)NDSS} '96, San Diego, CA, USA, February 22-23, 1996}, pages = {137--144}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/NDSS.1996.492420}, doi = {10.1109/NDSS.1996.492420}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AgiG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FoleyGQ96, author = {Simon N. Foley and Li Gong and Xiaolei Qian}, title = {A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {142--153}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502677}, doi = {10.1109/SECPRI.1996.502677}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/FoleyGQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1996, editor = {Li Gong and Jacques Stearn}, title = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, publisher = {{ACM}}, year = {1996}, url = {http://dl.acm.org/citation.cfm?id=238168}, isbn = {0-89791-829-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ReiterG95, author = {Michael K. Reiter and Li Gong}, title = {Securing Causal Relationships in Distributed Systems}, journal = {Comput. J.}, volume = {38}, number = {8}, pages = {633--642}, year = {1995}, url = {https://doi.org/10.1093/comjnl/38.8.633}, doi = {10.1093/COMJNL/38.8.633}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ReiterG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Gong95, author = {Li Gong}, title = {Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations}, journal = {Distributed Comput.}, volume = {9}, number = {3}, pages = {131--145}, year = {1995}, url = {https://doi.org/10.1007/s004460050015}, doi = {10.1007/S004460050015}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Gong95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Gong95, author = {Li Gong}, title = {Collisionful Keyed Hash Functions with Selectable Collisions}, journal = {Inf. Process. Lett.}, volume = {55}, number = {3}, pages = {167--170}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00085-Q}, doi = {10.1016/0020-0190(95)00085-Q}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Gong95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/GongQ95, author = {Li Gong and Xiaolei Qian}, title = {Enriching the Expressive Power of Security Labels}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {7}, number = {5}, pages = {839--841}, year = {1995}, url = {https://doi.org/10.1109/69.469837}, doi = {10.1109/69.469837}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/GongQ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/GongS95, author = {Li Gong and Nachum Shacham}, title = {Multicast security and its extension to a mobile environment}, journal = {Wirel. Networks}, volume = {1}, number = {3}, pages = {281--295}, year = {1995}, url = {https://doi.org/10.1007/BF01200847}, doi = {10.1007/BF01200847}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/GongS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Gong95, author = {Li Gong}, title = {Optimal authentication protocols resistant to password guessing attacks}, booktitle = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95), March 13-15, 1995, Kenmare, County Kerry, Ireland}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/CSFW.1995.518549}, doi = {10.1109/CSFW.1995.518549}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Gong95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gong94, author = {Li Gong}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {New Protocols for Third-Party-Based Authentication and Secure Broadcast}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {176--183}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191218}, doi = {10.1145/191177.191218}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gong94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/GongS94, author = {Li Gong and Nachum Shacham}, title = {Elements of trusted multicasting}, booktitle = {1994 International Conference on Network Protocols, {ICNP} 1994, Boston, MA, USA, October 25-28, 1994, Proceedings}, pages = {23--30}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/ICNP.1994.344380}, doi = {10.1109/ICNP.1994.344380}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/GongS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GongQ94, author = {Li Gong and Xiaolei Qian}, title = {The complexity and composability of secure interoperation}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {190--200}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296581}, doi = {10.1109/RISP.1994.296581}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/GongQ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongLNS93, author = {Li Gong and T. Mark A. Lomas and Roger M. Needham and Jerome H. Saltzer}, title = {Protecting Poorly Chosen Secrets from Guessing Attacks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {648--656}, year = {1993}, url = {https://doi.org/10.1109/49.223865}, doi = {10.1109/49.223865}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongLNS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Gong93, author = {Li Gong}, title = {Increasing Availability and Security of an Authentication Service}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {657--662}, year = {1993}, url = {https://doi.org/10.1109/49.223866}, doi = {10.1109/49.223866}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Gong93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gong93, author = {Li Gong}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Lower Bounds on Messages and Rounds for Network Authentication Protocols}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {26--37}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168592}, doi = {10.1145/168588.168592}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gong93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Gong93, author = {Li Gong}, title = {A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols}, booktitle = {6th {IEEE} Computer Security Foundations Workshop - CSFW'93, Franconia, New Hampshire, USA, June 15-17, 1993, Proceedings}, pages = {131--136}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/CSFW.1993.246633}, doi = {10.1109/CSFW.1993.246633}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Gong93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReiterG93, author = {Michael K. Reiter and Li Gong}, title = {Preventing denial and forgery of causal relationships in distributed systems}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {30--40}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287645}, doi = {10.1109/RISP.1993.287645}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/ReiterG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Gong92, author = {Li Gong}, title = {A Security Risk of Depending on Synchronized Clocks}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {26}, number = {1}, pages = {49--53}, year = {1992}, url = {https://doi.org/10.1145/130704.130709}, doi = {10.1145/130704.130709}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Gong92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BullGS92, author = {John A. Bull and Li Gong and Karen R. Sollins}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {Towards Security in an Open Systems Federation}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {3--20}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013889}, doi = {10.1007/BFB0013889}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BullGS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReiterBG92, author = {Michael K. Reiter and Kenneth P. Birman and Li Gong}, title = {Integrating security in a group oriented distributed system}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213273}, doi = {10.1109/RISP.1992.213273}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/ReiterBG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Gong91, author = {Li Gong}, title = {Handling Infeasible Specifications fo Cryptographic Protocols}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {99--102}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151575}, doi = {10.1109/CSFW.1991.151575}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Gong91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GligorKSG91, author = {Virgil D. Gligor and Rajashekar Kailar and Stuart G. Stubblebine and Li Gong}, title = {Logics for Cryptographic Protocols - Virtues and Limitations}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {219--226}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151591}, doi = {10.1109/CSFW.1991.151591}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GligorKSG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Gong90, author = {Li Gong}, title = {A note on redundancy in encrypted messages}, journal = {Comput. Commun. Rev.}, volume = {20}, number = {5}, pages = {18--22}, year = {1990}, url = {https://doi.org/10.1145/381906.381918}, doi = {10.1145/381906.381918}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Gong90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GongW90, author = {Li Gong and David J. Wheeler}, title = {A Matrix Key-Distribution Scheme}, journal = {J. Cryptol.}, volume = {2}, number = {1}, pages = {51--59}, year = {1990}, url = {https://doi.org/10.1007/BF02252869}, doi = {10.1007/BF02252869}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GongW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Gong90, author = {Li Gong}, title = {Verifiable-Text Attacks in Cryptographic Protocols}, booktitle = {Proceedings {IEEE} {INFOCOM} '90, The Conference on Computer Communications, Ninth Annual Joint Conference of the {IEEE} Computer and Communications Societies, The Multiple Facets of Integration, San Francisco, CA, USA, June 3-7, 1990}, pages = {686--693}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/INFCOM.1990.91310}, doi = {10.1109/INFCOM.1990.91310}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/Gong90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GongNY90, author = {Li Gong and Roger M. Needham and Raphael Yahalom}, title = {Reasoning about Belief in Cryptographic Protocols}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {234--248}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63854}, doi = {10.1109/RISP.1990.63854}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/GongNY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Gong89, author = {Li Gong}, title = {Using one-way functions for authentication}, journal = {Comput. Commun. Rev.}, volume = {19}, number = {5}, pages = {8--11}, year = {1989}, url = {https://doi.org/10.1145/74681.74682}, doi = {10.1145/74681.74682}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Gong89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Gong89, author = {Li Gong}, title = {On Security in Capability-Based Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {23}, number = {2}, pages = {56--60}, year = {1989}, url = {https://doi.org/10.1145/858344.858349}, doi = {10.1145/858344.858349}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Gong89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Gong89, author = {Li Gong}, title = {Securely Replicating Authentication Services}, booktitle = {9th International Conference on Distributed Computing Systems, {ICDCS} 1989, Newport Beach, CA, USA, June 5-9, 1989}, pages = {85--93}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/ICDCS.1989.37934}, doi = {10.1109/ICDCS.1989.37934}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Gong89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/LomasGSN89, author = {T. Mark A. Lomas and Li Gong and Jerome H. Saltzer and Roger M. Needham}, editor = {Gregory R. Andrews}, title = {Reducing Risks from Poorly Chosen Keys}, booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles, {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6, 1989}, pages = {14--18}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/74850.74853}, doi = {10.1145/74850.74853}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/LomasGSN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Gong89, author = {Li Gong}, title = {A Secure Identity-Based Capability System}, booktitle = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989}, pages = {56--63}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SECPRI.1989.36277}, doi = {10.1109/SECPRI.1989.36277}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Gong89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.