Qingyuan Gong

Orcid: 0000-0001-7942-8752

According to our database1, Qingyuan Gong authored at least 29 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
IEEE Trans. Knowl. Data Eng., October, 2023

EasyGraph: A multifunctional, cross-platform, and effective library for interdisciplinary network analysis.
Patterns, October, 2023

Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions.
IEEE Trans. Mob. Comput., 2023

DeepPick: A Deep Learning Approach to Unveil Outstanding Users With Public Attainable Features.
IEEE Trans. Knowl. Data Eng., 2023

FloodSFCP: Quality and Latency Balanced Service Function Chain Placement for Remote Sensing in LEO Satellite Network.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Poster: A Privacy-preserving Heart Rate Prediction System for Drivers in Connected Vehicles.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

A Critical Perceptual Pre-trained Model for Complex Trajectory Recovery.
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Searching and Mining Large Collections of Geospatial Data, 2023

2022
Characterizing and Understanding Development of Social Computing Through DBLP: A Data-Driven Analysis.
J. Soc. Comput., December, 2022

Structural Hole Theory in Social Network Analysis: A Review.
IEEE Trans. Comput. Soc. Syst., 2022

FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Cross-site Prediction on Social Influence for Cold-start Users in Online Social Networks.
ACM Trans. Web, 2021

DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network.
IEEE Trans. Dependable Secur. Comput., 2021

Understanding the Working Time of Developers in IT Companies in China and the United States.
IEEE Softw., 2021

Ghost-dil-NetVLAD: A Lightweight Neural Network for Visual Place Recognition.
CoRR, 2021

2019
Exploring the power of social hub services.
World Wide Web, 2019

Identifying Structural Hole Spanners in Online Social Networks Using Machine Learning.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Understanding Cross-Site Linking in Online Social Networks.
ACM Trans. Web, 2018

DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks.
IEEE Commun. Mag., 2018

Understanding the behavioral differences between american and german users: A data-driven study.
Big Data Min. Anal., 2018

This Place is Swarming: Using a Mobile Social App to Study Human Traffic in Cities.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Deep Learning-Based Malicious Account Detection in the Momo Social Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

LBSLab: A User Data Collection System in Mobile Environments.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

My Application to UbiComp 2018 Broadening Participation Workshop.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

A Multi-tab Website Fingerprinting Attack.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2015
Topology-Aware Node Selection for Data Regeneration in Heterogeneous Distributed Storage Systems.
CoRR, 2015

Optimal Node Selection for Data Regeneration in Heterogeneous Distributed Storage Systems.
Proceedings of the 44th International Conference on Parallel Processing, 2015

2014
Decluster: a complex network model-based data center network topology.
J. Supercomput., 2014

Prometheus: LT Codes Meet Cooperative Transmission in Cellular Networks.
CoRR, 2014


  Loading...