Gang Li

According to our database1, Gang Li authored at least 100 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020

Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020

Multivariable data imputation for the analysis of incomplete credit data.
Expert Syst. Appl., 2020

New advancement in information technologies for industry 4.0.
Enterprise IS, 2020

2019
Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019

Industry 4.0 and big data innovations.
Enterprise IS, 2019

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.
CoRR, 2019

Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017).
Concurr. Comput. Pract. Exp., 2019

Fast Valuation of Large Portfolios of Variable Annuities via Transfer Learning.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Duo Attention with Deep Learning on Tomato Yield Prediction and Factor Interpretation.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Deep Neighbor Embedding for Evaluation of Large Portfolios of Variable Annuities.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Polynomial Representation for Persistence Diagram.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
A Novel Approach for Information Discovery in Wireless Sensor Grids.
J. Network Syst. Manage., 2018

Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018

Advances in Processing, Mining, and Learning Complex Data: From Foundations to Real-World Applications.
Complexity, 2018

Domestic Violence Crisis Identification From Facebook Posts Based on Deep Learning.
IEEE Access, 2018

IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks.
IEEE Access, 2018

ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Group Outlying Aspects Mining.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

Book review "Analytics in smart tourism design"; Zheng Xiang, Daniel R. Fesenmaier; ISBN 978-3-319-44262-4, 978-3-319-44263-1, Springer, 2017, 328 pp., $302.71.
J. of IT & Tourism, 2017

Boosting imbalanced data learning with Wiener process oversampling.
Frontiers Comput. Sci., 2017

Curbing collusive cyber-gossips for business brand management.
Enterprise IS, 2017

New advances in securing cyberspace and curbing crowdturfing.
Concurr. Comput. Pract. Exp., 2017

FEPDF: A Robust Feature Extractor for Malicious PDF Detection.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Learning Robust Low-Rank Approximation for Crowdsourcing on Riemannian Manifold.
Proceedings of the International Conference on Computational Science, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

A differentially private algorithm for location data release.
Knowl. Inf. Syst., 2016

Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.
J. Network Syst. Manage., 2016

Book Review "Advances in Crowdsourcing".
J. of IT & Tourism, 2016

Securing cyberspace.
Concurr. Comput. Pract. Exp., 2016

Riemannian optimization with subspace tracking for low-rank recovery.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Privacy preserving data release for tagging recommender systems.
Web Intell., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Information Forensics and Security, 2015

Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Network Syst. Manage., 2015

Big data related technologies, challenges and future prospects.
J. of IT & Tourism, 2015

A survey of recommendation techniques based on offline data processing.
Concurr. Comput. Pract. Exp., 2015

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Modelling personal preferences for Top-N movie recommendations.
Web Intell. Agent Syst., 2014

Privacy preserving collaborative filtering for KNN attack resisting.
Social Netw. Analys. Mining, 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Social Netw. Analys. Mining, 2014

Context-Aware Service Ranking in Wireless Sensor Networks.
J. Network Syst. Manage., 2014

Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.
J. Netw. Comput. Appl., 2014

Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.
J. Netw. Comput. Appl., 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014

Special issue on behavior data security issues in network information propagation.
Future Gener. Comput. Syst., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

2013
Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybern., 2013

A learning method for Top-N recommendations with incomplete data.
Social Netw. Analys. Mining, 2013

A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.
J. Network Syst. Manage., 2013

Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey.
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013

Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Information discovery in multidimensional wireless sensor networks.
Proceedings of the International Conference on Information Networking 2013, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Guest Editorial.
J. Networks, 2012

Learning User Preference Patterns for Top-N Recommendations.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Hierarchical Workflow Management in Wireless Sensor Network.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Improving Top-N Recommendations with User Consuming Profiles.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Learning Rating Patterns for Top-N Recommendations.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.
Proceedings of the Agents and Data Mining Interaction - 8th International Workshop, 2012

2011
Multi-granularity context model for dynamic Web service composition.
J. Netw. Comput. Appl., 2011

CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.
J. Netw. Comput. Appl., 2011

Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011

Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.
Proceedings of the Agents and Data Mining Interaction, 2011

2009
Facilitating dynamic web service composition with fine-granularity context management.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2007
An effective non-parametric method for globally clustering genes from expression profiles.
Medical Biol. Eng. Comput., 2007

2006
Learning from facial aging patterns for automatic age estimation.
Proceedings of the 14th ACM International Conference on Multimedia, 2006

Abnormal Behavior Detection for Early Warning of Terrorist Attack.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

Integrating Local One-Class Classifiers for Image Retrieval.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

Finding the Optimal Cardinality Value for Information Bottleneck Method.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Dependency Bagging.
Proceedings of the Rough Sets, 2005

Evolving Insight into High-Dimensional Data.
Proceedings of the Advances in Intelligent Computing, 2005

Study of Ensemble Strategies in Discovering Linear Causal Models.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
What Will Affect Software Reuse: A Causal Model Analysis.
International Journal of Software Engineering and Knowledge Engineering, 2004

Software Warehouse: Its Design, Management And Application.
International Journal of Software Engineering and Knowledge Engineering, 2004

The Discovery of Generalized Causal Models with Mixed Variables Using MML Criterion.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Accelerating Linear Causal Model Discovery Using Hoeffding Bounds.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

On the Size of Training Set and the Benefit from Ensemble.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Identifying Markov Blankets Using Lasso Estimation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Ensembling MML Causal Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

2002
An Improved Approach for the Discovery of Causal Models via MML.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2002

Linear Causal Model Discovery Using the MML criterion.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

An Empirical Study of Encoding Schemes and Search Strategies in Discovering Causal Networks.
Proceedings of the Machine Learning: ECML 2002, 2002

2001
Evolutionary Structure Learning Algorithm for Bayesian Network and Penalized Mutual Information Metric.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001

Inexact Field Learning: An Approach to Induce High Quality Rules from Low Quality Data.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001


  Loading...