Ling Dong

Orcid: 0000-0003-1612-6671

According to our database1, Ling Dong authored at least 23 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VGC-GAN: A multi-graph convolution adversarial network for stock price prediction.
Expert Syst. Appl., February, 2024

Cross-lingual speaker transfer for Cambodian based on feature disentangler and time-frequency attention adaptive normalization.
Int. J. Web Inf. Syst., 2024

2023
Using deep learning and genetic algorithms for melody generation and optimization in music.
Soft Comput., November, 2023

Underwater image enhancement using a mixed generative adversarial network.
IET Image Process., March, 2023

2022
Unsupervised Real-World Image Super-Resolution via Dual Synthetic-to-Realistic and Realistic-to-Synthetic Translations.
IEEE Signal Process. Lett., 2022

Weakly-supervised contrastive learning-based implicit degradation modeling for blind image super-resolution.
Knowl. Based Syst., 2022

2021
Fabrication of Weak C-Axis Preferred AlN Thin Film for Temperature Measurement.
Sensors, 2021

New Energy Wide Area Complementary Planning Method for Multi-Energy Power System.
IEEE Access, 2021

2020
Advances in Supply Chain Finance and FinTech Innovations Overview.
Found. Trends Technol. Inf. Oper. Manag., 2020

2019
Introduction and Conceptual Overview of Contents.
Found. Trends Technol. Inf. Oper. Manag., 2019

2018
Distance formulas capable of unifying Euclidian space and probability space.
CoRR, 2018

2017
Quantifying Nanoparticle Mixing State to Account for Both Location and Size Effects.
Technometrics, 2017

Introduction to the Special Issue on Integrated Risk Management in Supply Chains.
Found. Trends Technol. Inf. Oper. Manag., 2017

Introduction to the Special Issue on Supply Chain Finance.
Found. Trends Technol. Inf. Oper. Manag., 2017

2009
When is a key establishment protocol correct?
Secur. Commun. Networks, 2009

Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009

2008
New Upper Bounds on Sizes of Permutation Arrays
CoRR, 2008

Sampling Clock Offset Estimation Algorithm Based on IEEE 802.11n.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Identification of linear time-invariant, nonlinear and time varying dynamic systems using genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Computational Prediction of UV-responsible MicroRNA Genes in Vitis vinifera Genome.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

2006
A Practical Clumped-Tree Multicast Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...