Guoqiang Li

Affiliations:
  • Shanghai Jiao Tong University, School of Software, China
  • Nagoya University, Japan (former)
  • Japan Advanced Institute of Science and Technology, Japan (former)


According to our database1, Guoqiang Li authored at least 95 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
An Effective Data-Driven Cloud Resource Procurement Scheme With Personalized Reserve Prices.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Design and Analysis of a Human-Machine Interaction System for Researching Human's Dynamic Emotion.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning.
IEEE Trans. Software Eng., 2021

Discovering semantically related technical terms and web resources in Q&A discussions.
Frontiers Inf. Technol. Electron. Eng., 2021

Learning natural ordering of tags in domain-specific Q&A sites.
Frontiers Inf. Technol. Electron. Eng., 2021

BPPChecker: An SMT-based Model Checker on Basic Parallel Processes.
CoRR, 2021

Essence of Factual Knowledge.
CoRR, 2021

A Parallel Implementation of Liveness on Knowledge Graphs under Label Constraints.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Panoramic Radiographic X-Ray Image Tooth Root Segmentation Based on LeNet-5 Networks.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2021

2020
IoT-Enabled Service for Crude-Oil Production Systems Against Unpredictable Disturbance.
IEEE Trans. Serv. Comput., 2020

Effective Data-Driven Technology for Efficient Vision-Based Outdoor Industrial Systems.
IEEE Trans. Ind. Informatics, 2020

Temporal Tensor Local Binary Pattern: A Novel Local Tensor Time Series Descriptor.
IEEE Trans. Ind. Informatics, 2020

Pipeline provenance for cloud-based big data analytics.
Softw. Pract. Exp., 2020

Statistical Detection of Collective Data Fraud.
CoRR, 2020

Object detection for graphical user interface: old fashioned or deep learning or a combination?
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Unblind your apps: predicting natural-language labels for mobile GUI components by deep learning.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Statistical Detection Of Collective Data Fraud.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
A Configurable WoT Application Platform Based on Spatiotemporal Semantic Scenarios.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds.
ACM Trans. Internet Techn., 2019

Unsupervised blocking and probabilistic parallelisation for record matching of distributed big data.
J. Supercomput., 2019

Ada-Things: An adaptive virtual machine monitoring and migration strategy for internet of things applications.
J. Parallel Distributed Comput., 2019

Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities.
J. Parallel Distributed Comput., 2019

A context-based service matching approach towards functional reliability for industrial systems.
Enterp. Inf. Syst., 2019

Video denoising for security and privacy in fog computing.
Concurr. Comput. Pract. Exp., 2019

Hierarchical extreme learning machine based image denoising network for visual Internet of Things.
Appl. Soft Comput., 2019

Data Provenance Based System for Classification and Linear Regression in Distributed Machine Learning.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

Detect Triangle Attack on Blockchain by Trace Analysis.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Object Detection Boosting using Object Attributes in Detect and Describe Framework.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

ActionNet: vision-based workflow action recognition from programming screencasts.
Proceedings of the 41st International Conference on Software Engineering, 2019

Model Checking is Possible to Verify Large-scale Vehicle Distributed Application Systems.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
R<sup>2</sup>C: Robust Rolling-Upgrade in Clouds.
IEEE Trans. Dependable Secur. Comput., 2018

Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm.
IEEE Trans. Comput. Soc. Syst., 2018

Verifying OSEK/VDX automotive applications: A Spin-based model checking approach.
Softw. Test. Verification Reliab., 2018

Asynchronous multi-process timed automata.
Softw. Qual. J., 2018

A CNN-SIFT Hybrid Pedestrian Navigation Method Based on First-Person Vision.
Remote. Sens., 2018

Data-Driven Proactive Policy Assurance of Post Quality in Community q&a Sites.
Proc. ACM Hum. Comput. Interact., 2018

Digital image splicing detection based on Markov features in block DWT domain.
Multim. Tools Appl., 2018

Double JPEG compression detection based on block statistics.
Multim. Tools Appl., 2018

Detecting users' anomalous emotion using social media for business intelligence.
J. Comput. Sci., 2018

A customised automata algorithm and toolkit for language learning and application.
Int. J. Big Data Intell., 2018

autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications.
Sci. China Inf. Sci., 2018

Updatable timed automata with one updatable clock.
Sci. China Inf. Sci., 2018

Evaluation of redundancy-based system: a model checking approach.
Sci. China Inf. Sci., 2018

SCFM: Social and crowdsourcing factorization machines for recommendation.
Appl. Soft Comput., 2018

Comparison among Four Prominent Text Processing Tools.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

Intelligent Healthcare Knowledge Resources in Chinese: A Survey.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

Toward Sustainable Smart Mobility Information Infrastructure Platform - Current Status -.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

An efficient approach for verifying automobile distributed application systems on timing property.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Examine Manipulated Datasets with Topology Data Analysis: A Case Study.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

2017
Exploiting long-term and short-term preferences and RFID trajectories in shop recommendation.
Softw. Pract. Exp., 2017

Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing.
IEEE Syst. J., 2017

Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler.
J. Syst. Archit., 2017

A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds.
Future Gener. Comput. Syst., 2017

Active Learning with Density-Initialized Decision Tree for Record Matching.
Proceedings of the 29th International Conference on Scientific and Statistical Database Management, 2017

The Complexity of Linear-Time Temporal Logic Model Repair.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2017

Nested Timed Automata with Invariants.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017

A Novel Hidden Markov Model for Genome-Wide Association Studies.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Behavior Analysis Method Towards Product Quality Management.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2017

Nested Timed Automata with Diagonal Constraints.
Proceedings of the Formal Methods and Software Engineering, 2017

Indexing for Large Scale Data Querying Based on Spark SQL.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

2016
An online greedy allocation of VMs with non-increasing reservations in clouds.
J. Supercomput., 2016

Non-Intrusive Anomaly Detection With Streaming Performance Metrics and Logs for DevOps in Public Clouds: A Case Study in AWS.
IEEE Trans. Emerg. Top. Comput., 2016

A preemptive truthful VMs allocation online mechanism in private cloud.
J. Comput. Sci., 2016

On Termination and Boundedness of Nested Updatable Timed Automata.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Schedulability Analysis of Timed Regular Tasks by Under-Approximation on WCET.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2016

CAT: A Customized Automata Toolkit.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Probabilistic parallelisation of blocking non-matched records for big data.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Constructing format-preserving printing from syntax-directed definitions.
Sci. China Inf. Sci., 2015

On Reachability Analysis of Updatable Timed Automata with One Updatable Clock.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2015

A Refined Algorithm for Reachability Analysis of Updatable Timed Automata.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Nested Timed Automata with Frozen Clocks.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2015

2014
An Over-Approximation Forward Analysis for Nested Timed Automata.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

Online Mechanism Design for VMs Allocation in Private Cloud.
Proceedings of the Network and Parallel Computing, 2014

Toward SIL Evaluation for a Resilience Strategy.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Game Analysis of Workload Factoring with the Hybrid Cloud.
Proceedings of the First International Symposium on Computing and Networking, 2013

Nested Timed Automata.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2013

2012
Modeling and Analysis of Real-Time Systems with Mutex Components.
Int. J. Found. Comput. Sci., 2012

Multi-index evaluation algorithm based on principal component analysis for node importance in complex networks.
IET Networks, 2012

An Improved Full Abstraction Approach to Analyzing Locality Semantics.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Emerald: An Automated Modeling and Verification Tool for Component-Based Real-Time Systems.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

Measuring Time Lag with Nested Preemptions and Resumptions.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

2011
A Game Theoretic Model and Tree Analysis Method for Fair Exchange Protocols.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

2009
Environmental Simulation of Real-Time Systems with Nested Interrupts.
Proceedings of the TASE 2009, 2009

2008
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol.
Proceedings of the Automated Technology for Verification and Analysis, 2008

2007
On-the-Fly Model Checking of Fair Non-repudiation Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2007

2006
Secrecy of Signals by Typing in Signal Transduction.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

2005
A Simple Process Calculus for the analysis of Security Protocols.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Typing Aberrance in Signal Transduction.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Representation of the Signal Transduction with Aberrance Using Ipi Calculus.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Analyzing iKP Security in Applied Pi Calculus.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...