Ge Cheng

Orcid: 0000-0002-4342-8029

According to our database1, Ge Cheng authored at least 18 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph Elimination Networks.
CoRR, 2024

2023
Lagrange programming neural network for robust passive elliptic positioning.
J. Frankl. Inst., November, 2023

Robust Matrix Completion for Elliptic Positioning in the Presence of Outliers and Missing Data.
IEEE Trans. Geosci. Remote. Sens., 2023

2022
Deep Maxout Network Gaussian Process.
CoRR, 2022

Design of Frequency-Invariant Beamformers Using a Weighted Spatial-Response-Variance Measure.
Proceedings of the 30th European Signal Processing Conference, 2022

Fusion of Global and Local Features for Text Classification.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022

2020
Analyzing the Chain of Trust Model Based on Entity Dependence.
Proceedings of the Information Security - 23rd International Conference, 2020

2017
Evaluating segmental liver function using T1 mapping on Gd-EOB-DTPA-enhanced MRI with a 3.0 Tesla.
BMC Medical Imaging, 2017

2016
Predicting the Outcome of NBA Playoffs Based on the Maximum Entropy Principle.
Entropy, 2016

2015
Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps.
Int. J. Bifurc. Chaos, 2015

2014
Deciphering a novel image cipher based on mixed transformed Logistic maps.
CoRR, 2014

2013
Cherub: Fine-grained application protection with on-demand virtualization.
Comput. Math. Appl., 2013

2010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010

Autonomous agent based intrusion detection in virtual computing environment.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions.
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009

Unattended Remote Attestation Delegation for Grid Computing.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

2008
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...