Daofu Gong

Orcid: 0000-0002-7810-2950

According to our database1, Daofu Gong authored at least 30 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Neural Attention Networks for Recommendation With Auxiliary Data.
IEEE Trans. Netw. Serv. Manag., June, 2023

Meta-path fusion based neural recommendation in heterogeneous information networks.
Neurocomputing, April, 2023

BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models.
Proceedings of the IEEE International Conference on Communications, 2023

Recurrent Attentive Neural Networks for Sequential Recommendation.
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023

2022
Extended matrix factorization with entity network construction for recommendation.
J. Ambient Intell. Humaniz. Comput., 2022

Image fragile watermarking algorithm based on deneighbourhood mapping.
IET Image Process., 2022

Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping.
CoRR, 2022

2021
Self-embedding watermarking method for G-code used in 3D printing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

2020
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
A code protection method against function call analysis in P2P network.
Peer-to-Peer Netw. Appl., 2019

Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement.
Peer-to-Peer Netw. Appl., 2019

Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation.
Multim. Tools Appl., 2019

Deep neural network-based image copyright protection scheme.
J. Electronic Imaging, 2019

A Security-Sensitive Function Mining Framework for Source Code.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Enhanced branch obfuscation based on exception handling and encrypted mapping table.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Exception Handling-Based Dynamic Software Watermarking.
IEEE Access, 2018

3D Steganalysis Using the Extended Local Feature Set.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks.
Secur. Commun. Networks, 2017

A Survey on Breaking Technique of Text-Based CAPTCHA.
Secur. Commun. Networks, 2017

An SDN based hopping multicast communication against DoS attack.
KSII Trans. Internet Inf. Syst., 2017

2016
An Image Encryption Algorithm Based on Information Hiding.
Int. J. Bifurc. Chaos, 2016

Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016

2015
基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes).
计算机科学, 2015

2013
Steganalysis of F5-like steganography based on selection of joint distribution features.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

2010
Bayesian Decision Based Method for Assets Recognition of Risk Assessment.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
An Authentication Watermark Algorithm for JPEG images.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Hiding Informationin in Java Class File.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Multi-class steganalysis for Jpeg stego algorithms.
Proceedings of the International Conference on Image Processing, 2008


  Loading...