Li Gong

Orcid: 0000-0001-7703-0978

According to our database1, Li Gong authored at least 131 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Line hardening strategies for resilient power systems considering cyber-topology interdependence.
Reliab. Eng. Syst. Saf., January, 2024

2023
An Unsupervised Machine Learning Approach for Monitoring Data Fusion and Health Indicator Construction.
Sensors, August, 2023

An IoT-Based Wearable Labor Progress Monitoring System for Remote Evaluation of Admission Time to Hospital.
IEEE J. Biomed. Health Informatics, June, 2023

Coordinated Repair Crew Dispatch Problem for Cyber-Physical Distribution System.
IEEE Trans. Smart Grid, May, 2023

A 3D Offline Packing Algorithm considering Cargo Orientation and Stability.
Int. J. Distributed Sens. Networks, 2023

2022
Multi-Objective Optimal Planning for Distribution Network Considering the Uncertainty of PV Power and Line-Switch State.
Sensors, 2022

An Object-Based Markov Random Field with Partition-Global Alternately Updated for Semantic Segmentation of High Spatial Resolution Remote Sensing Image.
Remote. Sens., 2022

Comparison of Weighted Mean Temperature in Greenland Calculated by Four Reanalysis Data.
Remote. Sens., 2022

Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment.
Quantum Inf. Process., 2022

Semantic Segmentation for Remote Sensing Images Using Pyramid Object-Based Markov Random Field With Dual-Track Information Transmission.
IEEE Geosci. Remote. Sens. Lett., 2022

Life Prediction of Hydraulic Concrete Based on Grey Residual Markov Model.
J. Inf. Process. Syst., 2022

An IoT-based intelligent irrigation system with data fusion and a self-powered wide-area network.
J. Ind. Inf. Integr., 2022

Modeling ecosystem impacts of the invasive Japanese smelt <i>Hypomesus nipponensis</i> in Lake Erhai, southwestern China.
Ecol. Informatics, 2022

2021
A Wearable Hand Rehabilitation System With Soft Gloves.
IEEE Trans. Ind. Informatics, 2021

Imputation of GPS Coordinate Time Series Using missForest.
Remote. Sens., 2021

2020
Deterministic bidirectional controlled remote preparation without information splitting.
Quantum Inf. Process., 2020

Type Drive Analysis of Urban Water Security Factors.
J. Inf. Process. Syst., 2020

An unmanned aerial vehicle flight formation for enhanced emergency communication based on conformal antenna design.
J. Commun. Inf. Networks, 2020

IEEE 1588 for Clock Synchronization in Industrial IoT and Related Applications: A Review on Contributing Technologies, Protocols and Enhancement Methodologies.
IEEE Access, 2020

Accelerating Poisoning Attack Through Momentum and Adam Algorithms.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

PGxMine: Text Mining for Curation of PharmGKB.
Proceedings of the Pacific Symposium on Biocomputing 2020, 2020

Soft Exoskeleton Glove for Hand Assistance Based on Human-machine Interaction and Machine Learning.
Proceedings of the IEEE International Conference on Human-Machine Systems, 2020

2019
An Appraisal of Nodule Diagnosis for Lung Cancer in CT Images.
J. Medical Syst., 2019

Damage Mechanism of Drift Ice Impact.
J. Inf. Process. Syst., 2019

Automated pulmonary nodule detection in CT images using 3D deep squeeze-and-excitation networks.
Int. J. Comput. Assist. Radiol. Surg., 2019

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SYSTRAN @ WNGT 2019: DGT Task.
Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP 2019, 2019

Enhanced Transformer Model for Data-to-Text Generation.
Proceedings of the 3rd Workshop on Neural Generation and Translation@EMNLP-IJCNLP 2019, 2019

2018
Automatic nodule detection for lung cancer in CT images: A review.
Comput. Biol. Medicine, 2018

Tencent Neural Machine Translation Systems for WMT18.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018

2017
The quantification of blood-brain barrier disruption using dynamic contrast-enhanced magnetic resonance imaging in aging rhesus monkeys with spontaneous type 2 diabetes mellitus.
NeuroImage, 2017

A data-synthesis-driven method for detecting and extracting vague cognitive regions.
Int. J. Geogr. Inf. Sci., 2017

Interactive Levy Flight in Interest Space.
CoRR, 2017

A miniaturized phased high intensity focused ultrasound transducer-driven system with MR compatibility.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Incorporating spatial interaction patterns in classifying and understanding urban land use.
Int. J. Geogr. Inf. Sci., 2016

2015
How where is when? On the regional variability and resolution of geosocial temporal signatures for points of interest.
Comput. Environ. Urban Syst., 2015

LIMSI: Translations as Source of Indirect Supervision for Multilingual All-Words Sense Disambiguation and Entity Linking.
Proceedings of the 9th International Workshop on Semantic Evaluation, 2015

2014
On-demand Development of Statistical Machine Translation Systems. (Développement à la demande des systèmes de traduction automatique statistiques).
PhD thesis, 2014

LIMSI $@$ WMT'14 Medical Translation Task.
Proceedings of the Ninth Workshop on Statistical Machine Translation, 2014

(Much) Faster Construction of SMT Phrase Tables from Large-scale Parallel Corpora (Construction (très) rapide de tables de traduction à partir de grands bi-textes) [in French].
Proceedings of the Traitement Automatique des Langues Naturelles, 2014

Towards a More Efficient Development of Statistical Machine Translation Systems (Vers un développement plus efficace des systèmes de traduction statistique : un peu de vert dans un monde de BLEU) [in French].
Proceedings of the Traitement Automatique des Langues Naturelles, 2014

Incremental development of statistical machine translation systems.
Proceedings of the 11th International Workshop on Spoken Language Translation: Papers, 2014

A Modified Storage Format for Accelerating SPMV.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

An Efficient Column-Major Ordering Format for Finite Element Analysis.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

2013
Revealing daily travel patterns and city structure with taxi trip data.
CoRR, 2013

Improving bilingual sub-sentential alignment by sampling-based transpotting.
Proceedings of the 10th International Workshop on Spoken Language Translation: Papers, 2013

The Creation of Knowledge Innovation System.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

The Storage Formats for Accelerating SMVP on a GPU.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
Using ODIN for a PharmGKB revalidation experiment.
Database J. Biol. Databases Curation, 2012

LIMSI @ WMT12.
Proceedings of the Seventh Workshop on Statistical Machine Translation, 2012

Towards contextual adaptation for any-text translation.
Proceedings of the 2012 International Workshop on Spoken Language Translation, 2012

Novel Pre-treatment for Inhomogeneous Dielectric Media in Finite Element Analysis.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

Model for Renegotiation in Infrastructure Projects with Government Guarantee.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
The Role of Self-Construal on Preferred Communication Styles with Humanoid Robots.
Int. J. Humanoid Robotics, 2011

Java security architecture revisited.
Commun. ACM, 2011

Automatic Transmission Period Setting for Intermittent Periodic Transmission in Wireless Backhaul.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

One Kind of Brand-New Experimental Teaching Idea and Assessment Methods on Basic Geology in Network Environment.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Using jump-diffusion modeling for valuing real options in infrastructure projects.
Frontiers Comput. Sci. China, 2010

2009
Humans and humanoid social robots in communication contexts.
AI Soc., 2009

Java Security: A Ten Year Retrospective.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge.
Nucleic Acids Res., 2008

The boundary of racial prejudice: Comparing preferences for computer-synthesized White, Black, and robot characters.
Comput. Hum. Behav., 2008

How social is social responses to computers? The function of the degree of anthropomorphism in computer representations.
Comput. Hum. Behav., 2008

Landscape Change and its Simulation using GIS, Landscape Ecology and the Markov Model.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Dynamic Simulation on the Spatio-Temporal Patterns of Land use in the Area of Continued Hydropower Station Construction in the Upper Reach of Yellow River.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2007
Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents.
Int. J. Hum. Comput. Stud., 2007

2004
It's China(town).
IEEE Internet Comput., 2004

Guest Editors' Introduction: Securing the High-Speed Internet.
Computer, 2004

2003
Guest editorial overview.
IEEE J. Sel. Areas Commun., 2003

Why Cross-Platform Security.
IEEE Internet Comput., 2003

A New Column for a New Year.
IEEE Internet Comput., 2003

To Mix or Not to Mix Synthetic Speech and Human Speech? Contrasting Impact on Judge-Rated Task Performance versus Self-Rated Performance and Attitudinal Responses.
Int. J. Speech Technol., 2003

Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003

Multimodal Interactions on Mobile Devices and Users' Behavioral and Attitudinal Preferences.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003

Is Cross-Platform Security Possible?
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Guest Editor's Introduction: Peer-to-Peer Networks in Action.
IEEE Internet Comput., 2002

Tutorial: Peer to Peer Networks in Action.
IEEE Distributed Syst. Online, 2002

JXTA in a nutshell - a desktop quick reference.
O'Reilly, ISBN: 978-0-596-00236-7, 2002

2001
Industry Report: JXTA: A Network Programming Environment.
IEEE Internet Comput., 2001

A Software Architecture for Open Service Gateways.
IEEE Internet Comput., 2001

Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

2000
Guest Editors' Introduction: What Makes Security Technologies Relevant?
IEEE Internet Comput., 2000

Speech interfaces from an evolutionary perspective.
Commun. ACM, 2000

Developing Security Systems in the Real World.
Proceedings of the ECOOP 2000, 2000

1999
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2).
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

Maximized Modality or constrained consistency?
Proceedings of the Auditory-Visual Speech Processing, 1999

User Authentication and Authorization in the Java(tm) Platform.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Secure Java Class Loading.
IEEE Internet Comput., 1998

Implementing Protection Domains in the Java<sup>TM</sup> Development Kit 1.2.
Proceedings of the Network and Distributed System Security Symposium, 1998

Signing, Sealing, and Guarding Java Objects.
Proceedings of the Mobile Agents and Security, 1998

Experience with Secure Multi-Processing in Java.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Firewalls: An Expert Roundtable.
IEEE Softw., 1997

Java security: present and near future.
IEEE Micro, 1997

Enclaves: Enabling Secure Collaboration Over the Internet.
IEEE J. Sel. Areas Commun., 1997

Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2.
Proceedings of the 1st USENIX Symposium on Internet Technologies and Systems, 1997

Ensuring Assurance in Mobile Computing.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Secure Software Architectures.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

New security architectural directions for Java.
Proceedings of the Proceedings IEEE COMPCON 97, 1997

1996
Computational Issues in Secure Interoperation.
IEEE Trans. Software Eng., 1996

Practical Protocols for Certified Electronic Mail.
J. Netw. Syst. Manag., 1996

A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

An Empirical Study of Secure MPEG Video Transmissions.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

1995
Multicast security and its extension to a mobile environment.
Wirel. Networks, 1995

Enriching the Expressive Power of Security Labels.
IEEE Trans. Knowl. Data Eng., 1995

Collisionful Keyed Hash Functions with Selectable Collisions.
Inf. Process. Lett., 1995

Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations.
Distributed Comput., 1995

Securing Causal Relationships in Distributed Systems.
Comput. J., 1995

Optimal authentication protocols resistant to password guessing attacks.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
The complexity and composability of secure interoperation.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Elements of trusted multicasting.
Proceedings of the 1994 International Conference on Network Protocols, 1994

New Protocols for Third-Party-Based Authentication and Secure Broadcast.
Proceedings of the CCS '94, 1994

1993
Protecting Poorly Chosen Secrets from Guessing Attacks.
IEEE J. Sel. Areas Commun., 1993

Increasing Availability and Security of an Authentication Service.
IEEE J. Sel. Areas Commun., 1993

Preventing denial and forgery of causal relationships in distributed systems.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

Lower Bounds on Messages and Rounds for Network Authentication Protocols.
Proceedings of the CCS '93, 1993

1992
A Security Risk of Depending on Synchronized Clocks.
ACM SIGOPS Oper. Syst. Rev., 1992

Integrating security in a group oriented distributed system.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Towards Security in an Open Systems Federation.
Proceedings of the Computer Security, 1992

1991
Handling Infeasible Specifications fo Cryptographic Protocols.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Logics for Cryptographic Protocols - Virtues and Limitations.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
A Matrix Key-Distribution Scheme.
J. Cryptol., 1990

A note on redundancy in encrypted messages.
Comput. Commun. Rev., 1990

Reasoning about Belief in Cryptographic Protocols.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Verifiable-Text Attacks in Cryptographic Protocols.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990

1989
On Security in Capability-Based Systems.
ACM SIGOPS Oper. Syst. Rev., 1989

Using one-way functions for authentication.
Comput. Commun. Rev., 1989

A Secure Identity-Based Capability System.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Reducing Risks from Poorly Chosen Keys.
Proceedings of the Twelfth ACM Symposium on Operating System Principles, 1989

Securely Replicating Authentication Services.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989


  Loading...