default search action
Liangyi Gong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Huan Liu, Liangyi Gong, Xiuliang Mo, Guozhong Dong, Jie Yu:
LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks. IEEE Internet Things J. 11(14): 25371-25381 (2024) - [j26]Hao Lin, Jiaxing Qiu, Hongyi Wang, Zhenhua Li, Liangyi Gong, Di Gao, Yunhao Liu, Feng Qian, Zhao Zhang, Ping Yang, Tianyin Xu:
Take the Blue Pill: Pursuing Mobile App Testing Fidelity, Efficiency, and Accessibility with Virtual Device Farms. GetMobile Mob. Comput. Commun. 28(1): 5-9 (2024) - [j25]Liangyi Gong, Hao Lin, Daibo Liu, Lanqi Yang, Hongyi Wang, Jiaxing Qiu, Zhenhua Li, Feng Qian:
Who Should We Blame for Android App Crashes? An In-Depth Study at Scale and Practical Resolutions. ACM Trans. Sens. Networks 20(3): 62:1-62:24 (2024) - 2023
- [c31]Wei Wan, Ke Wang, Jinxia Wei, Liangyi Gong, Pan Huang, Hao Fu, Yuhao Fu:
Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder. LCN 2023: 1-4 - [c30]Hao Lin, Jiaxing Qiu, Hongyi Wang, Zhenhua Li, Liangyi Gong, Di Gao, Yunhao Liu, Feng Qian, Zhao Zhang, Ping Yang, Tianyin Xu:
Virtual Device Farms for Mobile App Testing at Scale: A Pursuit for Fidelity, Efficiency, and Accessibility. MobiCom 2023: 45:1-45:17 - [c29]Huaishuo Ren, Liangyi Gong, Xiuliang Mo, Lanqi Yang, Zuwei Yin:
Robust Intrusion Detection for Industrial IoT. MSN 2023: 390-397 - 2022
- [j24]Qianwen Ye, Hongxia Bie, Kuan-Ching Li, Xiaochen Fan, Liangyi Gong, Xiangjian He, Gengfa Fang:
EdgeLoc: A Robust and Real-Time Localization System Toward Heterogeneous IoT Devices. IEEE Internet Things J. 9(5): 3865-3876 (2022) - [j23]Lei Zhang, Wenyuan Huang, Xiaoxia Jia, Xiaojie Fan, Xiaochen Fan, Liangyi Gong, Wenyuan Tao, Shiwen Mao:
Wi-Gym: Gymnastics Activity Assessment Using Commodity Wi-Fi. IEEE Internet Things J. 9(23): 24051-24064 (2022) - [j22]Jialai Liu, Kai Liu, Feiyu Jin, Liangyi Gong:
Toward robust and adaptive pedestrian monitoring using CSI: design, implementation, and evaluation. Neural Comput. Appl. 34(14): 12063-12075 (2022) - [j21]Liangyi Gong, Chaocan Xiang, Xiaochen Fan, Tao Wu, Chao Chen, Miao Yu, Wu Yang:
Device-free near-field human sensing using WiFi signals. Pers. Ubiquitous Comput. 26(3): 461-474 (2022) - [j20]Liangyi Gong, Zhenhua Li, Hongyi Wang, Hao Lin, Xiaobo Ma, Yunhao Liu:
Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape. IEEE Trans. Mob. Comput. 21(12): 4488-4501 (2022) - [c28]Chaocan Xiang, Yaoyu Li, Yanlin Zhou, Suining He, Yuben Qu, Zhenhua Li, Liangyi Gong, Chao Chen:
A Comparative Approach to Resurrecting the Market of MOD Vehicular Crowdsensing. INFOCOM 2022: 1479-1488 - [c27]Di Gao, Hao Lin, Zhenhua Li, Chengen Huang, Yunhao Liu, Feng Qian, Liangyi Gong, Tianyin Xu:
Trinity: High-Performance Mobile Emulation through Graphics Projection. OSDI 2022: 285-301 - [c26]ZhiLiang Bu, Chunlei Zhao, Liangyi Gong, Yan Wang, Yi Yang, Xi Wang:
ML-based Privacy Leakage Behavior Detection in Android Apps at Scale. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 921-928 - 2021
- [j19]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li:
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor. Mob. Networks Appl. 26(4): 1668-1685 (2021) - [j18]Liangyi Gong, Chundong Wang, Hong Yang, Zhiyuan Li, Zhentang Zhao:
Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks. Mob. Networks Appl. 26(6): 2515-2524 (2021) - [j17]Chaocan Xiang, Xiaochen Fan, Chao Chen, Liangyi Gong, Songtao Guo:
Fisher information-empowered sensing quality quantification for crowdsensing networks. Neural Comput. Appl. 33(13): 7563-7574 (2021) - [j16]Xiaochen Fan, Chaocan Xiang, Chao Chen, Panlong Yang, Liangyi Gong, Xudong Song, Priyadarsi Nanda, Xiangjian He:
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning. IEEE Trans. Mob. Comput. 20(6): 2154-2171 (2021) - [j15]Liangyi Gong, Hao Lin, Zhenhua Li, Feng Qian, Yang Li, Xiaobo Ma, Yunhao Liu:
Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection. IEEE Trans. Parallel Distributed Syst. 32(7): 1615-1628 (2021) - [c25]Di Gao, Hao Lin, Zhenhua Li, Feng Qian, Qi Alfred Chen, Zhiyun Qian, Wei Liu, Liangyi Gong, Yunhao Liu:
A nationwide census on wifi security threats: prevalence, riskiness, and the economics. MobiCom 2021: 242-255 - [c24]Xinlei Yang, Xianlong Wang, Zhenhua Li, Yunhao Liu, Feng Qian, Liangyi Gong, Rui Miao, Tianyin Xu:
Fast and Light Bandwidth Testing for Internet Users. NSDI 2021: 1011-1026 - [c23]Yang Li, Hao Lin, Zhenhua Li, Yunhao Liu, Feng Qian, Liangyi Gong, Xianlong Xin, Tianyin Xu:
A nationwide study on cellular reliability: measurement, analysis, and enhancements. SIGCOMM 2021: 597-609 - 2020
- [j14]Xiaochen Fan, Chaocan Xiang, Liangyi Gong, Xin He, Yuben Qu, Saeed Amirgholipour, Yue Xi, Priyadarsi Nanda, Xiangjian He:
Deep learning for intelligent traffic sensing and prediction: recent advances and future challenges. CCF Trans. Pervasive Comput. Interact. 2(4): 240-260 (2020) - [c22]Liangyi Gong, Zhenhua Li, Feng Qian, Zifan Zhang, Qi Alfred Chen, Zhiyun Qian, Hao Lin, Yunhao Liu:
Experiences of landing machine learning onto market-scale mobile malware detection. EuroSys 2020: 2:1-2:14 - [c21]Runhua Zhang, Guowei Shen, Liangyi Gong, Chun Guo:
DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration. HPCC/DSS/SmartCity 2020: 302-311
2010 – 2019
- 2019
- [j13]Shujie Ren, Huaibin Wang, Liangyi Gong, Chaocan Xiang, Xuangou Wu, Yufeng Du:
Intelligent Contactless Gesture Recognition Using WLAN Physical Layer Information. IEEE Access 7: 92758-92767 (2019) - [j12]Meiguang Liu, Lei Zhang, Panlong Yang, Liangfu Lu, Liangyi Gong:
Wi-Run: Device-free step estimation system with commodity Wi-Fi. J. Netw. Comput. Appl. 143: 77-88 (2019) - [j11]Liangyi Gong, Yiyang Zhao, Chaocan Xiang, Zhenhua Li, Chen Qian, Panlong Yang:
Robust Light-Weight Magnetic-Based Door Event Detection with Smartphones. IEEE Trans. Mob. Comput. 18(11): 2631-2646 (2019) - [c20]Xiaochen Fan, Chaocan Xiang, Liangyi Gong, Xiangjian He, Chao Chen, Xiang Huang:
UrbanEdge: deep learning empowered edge computing for urban IoT time series prediction. ACM TUR-C 2019: 12:1-12:6 - [c19]Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu:
Overview of IoT Security Architecture. DSC 2019: 338-345 - [c18]Jian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu:
The Current Research of IoT Security. DSC 2019: 346-353 - [c17]Hang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu:
A Survey: Cloud Data Security Based on Blockchain Technology. DSC 2019: 618-624 - [c16]Shujie Ren, Huaibin Wang, Bin Li, Liangyi Gong, Hao Yang, Chaocan Xiang, Bo Li:
Demo: Robust Contactless Gesture Recognition Using Commodity WiFi. EWSN 2019: 273-275 - [c15]Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu:
Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning. GLOBECOM 2019: 1-6 - 2018
- [j10]Chundong Wang, Zhentang Zhao, Liangyi Gong, Likun Zhu, Zheli Liu, Xiaochun Cheng:
A Distributed Anomaly Detection System for In-Vehicle Network Using HTM. IEEE Access 6: 9091-9098 (2018) - [j9]Xiaochen Fan, Xiangjian He, Chaocan Xiang, Deepak Puthal, Liangyi Gong, Priyadarsi Nanda, Gengfa Fang:
Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps. IEEE Access 6: 47535-47545 (2018) - [j8]Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng:
Channel State Information-Based Detection of Sybil Attacks in Wireless Networks. J. Internet Serv. Inf. Secur. 8(1): 2-17 (2018) - [j7]Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng:
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. Sensors 18(3): 878 (2018) - [c14]Chunlei Zhao, Yunlong Li, Ruiqi Hong, Jian Zhang, Liangyi Gong:
Supervision of Webcasting-Anchor Behavior Evaluation Based on Barrage Emotion Analysis. BigCom 2018: 66-71 - [c13]Jian Zhang, Luxin Zheng, Liangyi Gong, Zhaojun Gu:
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation. DSC 2018: 910-916 - [c12]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Xiaojiang Du:
Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor. GLOBECOM 2018: 1-6 - [c11]Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiu-liang Mo, Wenjun Yang, Min Li, Zhaoyang Li:
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. ICA3PP (4) 2018: 234-248 - [c10]Jian Zhang, Wenxu Wang, Liangyi Gong, Zhaojun Gu:
CloudI: Cloud Security based on Cloud Introspection. ICMLC 2018: 341-346 - [c9]Lei Zhang, Meiguang Liu, Liangfu Lu, Liangyi Gong:
Wi-Run: Multi-Runner Step Estimation Using Commodity Wi-Fi. SECON 2018: 235-243 - [c8]Chunlei Zhao, Wenbai Zheng, Liangyi Gong, Mengzhe Zhang, Chundong Wang:
Quick and Accurate Android Malware Detection Based on Sensitive APIs. SmartIoT 2018: 143-148 - [c7]Liangyi Gong, Chundong Wang, Likun Zhu, Jian Zhang, Wu Yang, Yiyang Zhao, Chaocan Xiang:
LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information. WASA 2018: 748-753 - 2017
- [j6]Chundong Wang, Zhiyuan Li, Liangyi Gong, Xiu-liang Mo, Hong Yang, Yi Zhao:
An Android Malicious Code Detection Method Based on Improved DCA Algorithm. Entropy 19(2): 65 (2017) - [c6]Chaocan Xiang, Panlong Yang, Xiaochen Fan, Liangyi Gong:
Quantifying sensing quality of crowd sensing networks with confidence interval. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j5]Liangyi Gong, Wu Yang, Zimu Zhou, Dapeng Man, Haibin Cai, Xiancun Zhou, Zheng Yang:
An adaptive wireless passive human detection via fine-grained physical layer information. Ad Hoc Networks 38: 38-50 (2016) - [j4]Liangyi Gong, Wu Yang, Dapeng Man, Jiguang Lv:
iPil: improving passive indoor localisation via link-based CSI features. Int. J. Ad Hoc Ubiquitous Comput. 23(1/2): 36-45 (2016) - [c5]Jiguang Lv, Wu Yang, Liangyi Gong, Dapeng Man, Xiaojiang Du:
Robust WLAN-Based Indoor Fine-Grained Intrusion Detection. GLOBECOM 2016: 1-6 - [c4]Liangyi Gong, Wu Yang, Chaocan Xiang, Dapeng Man, Miao Yu, Zuwei Yin:
WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey. Trustcom/BigDataSE/ISPA 2016: 1129-1136 - 2015
- [j3]Wu Yang, Liangyi Gong, Dapeng Man, Jiguang Lv, Haibin Cai, Xiancun Zhou, Zheng Yang:
Enhancing the Performance of Indoor Device-Free Passive Localization. Int. J. Distributed Sens. Networks 11: 256162:1-256162:11 (2015) - [j2]Wu Yang, Guowei Shen, Wei Wang, Liangyi Gong, Miao Yu, Guozhong Dong:
Anomaly Detection in Microblogging via Co-Clustering. J. Comput. Sci. Technol. 30(5): 1097-1108 (2015) - [j1]Liangyi Gong, Wu Yang, Dapeng Man, Guozhong Dong, Miao Yu, Jiguang Lv:
WiFi-Based Real-Time Calibration-Free Passive Human Motion Detection. Sensors 15(12): 32213-32229 (2015) - [c3]Yiyang Zhao, Chen Qian, Liangyi Gong, Zhenhua Li, Yunhao Liu:
LMDD: Light-Weight Magnetic-Based Door Detection with Your Smartphone. ICPP 2015: 919-928 - [c2]Liangyi Gong, Dapeng Man, Jiguang Lv, Guowei Shen, Wu Yang:
FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection. UIC/ATC/ScalCom 2015: 308-311 - 2014
- [c1]Wu Yang, Guozhong Dong, Wei Wang, Guowei Shen, Liangyi Gong, Miao Yu, Jiguang Lv, Yaxue Hu:
Detecting Bots in Follower Markets. BIC-TA 2014: 525-530
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint