default search action
Xiaoqing Gong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Yanan Tian, Chenbin Wang, Ruiqiang Lu, Henry H. Y. Tong, Xiaoqing Gong, Jiayue Qiu, Shaoliang Peng, Xiaojun Yao, Huanxiang Liu:
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion. Future Gener. Comput. Syst. 161: 189-200 (2024) - 2022
- [j15]Xiao Li, Yuanhai Chang, Guixin Ye, Xiaoqing Gong, Zhanyong Tang:
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program. J. Inf. Secur. Appl. 65: 103088 (2022) - [j14]Yuquan Li, Chang-Yu Hsieh, Ruiqiang Lu, Xiaoqing Gong, Xiaorui Wang, Pengyong Li, Shuo Liu, Yanan Tian, Dejun Jiang, Jiaxian Yan, Qifeng Bai, Huanxiang Liu, Shengyu Zhang, Xiaojun Yao:
An adaptive graph learning method for automated molecular interactions and properties predictions. Nat. Mach. Intell. 4(7): 645-651 (2022) - [c22]Xiaoqing Gong, Gang Wu:
Dynamic User Scheduling with User Satisfaction Rate in Cell-Free Massive MIMO. ICCC Workshops 2022: 100-105 - 2021
- [j13]Weiyuan Tong, Rong Li, Xiaoqing Gong, Shuangjiao Zhai, Xia Zheng, Guixin Ye:
Exploiting Serialized Fine-Grained Action Recognition Using WiFi Sensing. Mob. Inf. Syst. 2021: 4770143:1-4770143:17 (2021) - [j12]Jing An, Xiaoxia Liu, Mei Shi, Jun Guo, Xiaoqing Gong, Zhihui Li:
Weighted multi-view common subspace learning method. Pattern Recognit. Lett. 151: 355-361 (2021) - 2020
- [c21]Bo Jin, Hao Jin, Yashen Wang, Yangyang Li, Xi Luo, Xiaoqing Gong, Xiaoyan Yin:
Resource Allocation Optimization with Guaranteed Security Level for Anti-traceable Access. ISPA/BDCloud/SocialCom/SustainCom 2020: 909-916 - [c20]Yuli Wang, Xiaoqing Gong, Hao Chen, Jing Li, Baoying Liu, Shuai Cao:
JSTIFuzz: Type-Inference-based JavaScript Engine Fuzzing. NaNA 2020: 381-387
2010 – 2019
- 2019
- [j11]Wei Wang, Zheng Wang, Meng Li, Zhanyong Tang, Huanting Wang, Guixin Ye, Fuwei Wang, Jie Ren, Xiaoqing Gong, Dingyi Fang:
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity. IEEE Access 7: 169160-169173 (2019) - [j10]Kang Yang, Tianzhang Xing, Yang Liu, Zhenjiang Li, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. IEEE/ACM Trans. Netw. 27(5): 2043-2055 (2019) - [c19]Jing Zhang, Ruyue Liu, Xiaoqing Gong, Feng Chen, Baoying Liu, Dingyi Fang, Jingjing Zhao, Xiaojiang Chen:
LoRaSense: An Interference-aware Concurrent Transmission Model. EWSN 2019: 330-335 - [c18]Pengxi Li, Xiaoqing Gong, Xu Hu, Lianqi Shi, Xiaoting Xue, Jun Guo, Pengfei Xu, Daguang Gan:
Plant Identification Based on Multi-branch Convolutional Neural Network with Attention. IGTA 2019: 472-481 - 2018
- [j9]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Comput. Secur. 74: 202-220 (2018) - [j8]Min Long, Fei Peng, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - [j7]Lei Wang, Xiaoqing Gong, Yongqin Zhang, Pengfei Xu, Xiaojiang Chen, Dingyi Fang, Xia Zheng, Jun Guo:
Artistic features extraction from chinese calligraphy works via regional guided filter with reference image. Multim. Tools Appl. 77(3): 2973-2990 (2018) - [c17]Chao Xue, Zhanyong Tang, Guixin Ye, Guanghui Li, Xiaoqing Gong, Wei Wangg, Dingyi Fang, Zheng Wang:
Exploiting Code Diversity to Enhance Code Virtualization Protection. ICPADS 2018: 620-627 - [c16]Pengfei Xu, Lei Wang, Ziyu Guan, Xia Zheng, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Xiaoqing Gong, Zheng Wang:
Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach. IJCAI 2018: 1050-1056 - [c15]Kang Yang, Xiaoqing Gong, Yang Liu, Zhenjiang Li, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. SECON 2018: 190-198 - 2017
- [j6]Zhaoqiang Wang, Jingjing Zhao, Xiaojiang Chen, Xiaoqing Gong, Zhanyong Tang, Chen Liu, Dingyi Fang:
Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(1-2): 41-66 (2017) - [j5]Zhanyong Tang, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, Zheng Wang:
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes. Mob. Inf. Syst. 2017: 1248578:1-1248578:14 (2017) - [j4]Fei Peng, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [c14]Jie Zhang, Zhanyong Tang, Rong Li, Xiaojiang Chen, Xiaoqing Gong, Dingyi Fang, Zheng Wang:
Protect Sensitive Information against Channel State Information Based Attacks. CSE/EUC (2) 2017: 203-210 - [c13]Beibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang:
DexPro: A Bytecode Level Code Protection System for Android Applications. CSS 2017: 367-382 - [c12]Lina Song, Zhanyong Tang, Zhen Li, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Zheng Wang:
AppIS: Protect Android Apps Against Runtime Repackaging Attacks. ICPADS 2017: 25-32 - [c11]Kang Yang, Xiaoqing Gong, Shiwei Song, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang:
SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices. ICPADS 2017: 113-120 - [c10]Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Zheng Wang:
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. TrustCom/BigDataSE/ICESS 2017: 261-268 - [c9]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Heng Zhang, Jie Liu, Zheng Wang:
Exploit dynamic data flows to protect software against semantic attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j3]Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, Feng Chen:
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality. Mob. Inf. Syst. 2016: 8793025:1-8793025:14 (2016) - [j2]Wen Cui, Xiaoqing Gong, Chen Liu, Dan Xu, Xiaojiang Chen, Dingyi Fang, Shaojie Tang, Fan Wu, Guihai Chen:
Node Immunization with Time-Sensitive Restrictions. Sensors 16(12): 2141 (2016) - [c8]Wen Cui, Xiaoqing Gong, Chen Liu, Dan Xu, Zhuang Yin, Xiaojiang Chen, Dingyi Fang:
Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective. ICPADS 2016: 368-375 - [c7]Xiaoqing Gong, Xuan Wang, Jun Guo, Anwen Wang, Dan Xu, Na An, Xiaojiang Chen, Dingyi Fang, Xia Zheng:
DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN. NaNA 2016: 77-83 - [c6]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. Trustcom/BigDataSE/ISPA 2016: 489-496 - 2015
- [j1]Zhanyong Tang, Jie Zhang, Xiaoqing Gong, Xiaohua Cheng, Xiaojiang Chen, Dingyi Fang, Wei Wang:
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 252653:1-252653:18 (2015) - 2013
- [c5]Huaijun Wang, Dingyi Fang, Hao Dong, Yuanxiao Lei, Xiaoqing Gong, Yuanxiang Gu:
Software Attack Modeling and Its Application. HPCC/EUC 2013: 1152-1158 - [c4]Tinggui Chen, Xiaoqing Gong:
Performance Evaluation of a Supply Chain Network. ITQM 2013: 1003-1009 - 2011
- [c3]Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin:
The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring. CIS 2011: 767-770 - [c2]Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Baishun Zhou, Lang Qin:
A Reliable Transmission Protocol Based on Dynamic Link Cache. iThings/CPSCom 2011: 752-755
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint