Xi Gong

According to our database1, Xi Gong authored at least 31 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UAV-assisted ISAC network physical layer security based on Stackelberg game.
Ad Hoc Networks, January, 2024

2023
Complexity-based graph convolutional neural network for epilepsy diagnosis in normal, acute, and chronic stages.
Frontiers Comput. Neurosci., February, 2023

Understanding public perspectives on fracking in the United States using social media big data.
Ann. GIS, January, 2023

Ocular Disease Recognition and Classification using TripleGAN.
Proceedings of the 8th International Conference on Biomedical Signal and Image Processing, 2023

2022
Feature Matching for Remote-Sensing Image Registration via Neighborhood Topological and Affine Consistency.
Remote. Sens., 2022

Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Social media mining under the COVID-19 context: Progress, challenges, and opportunities.
Int. J. Appl. Earth Obs. Geoinformation, 2022

2021
Urban function classification at road segment level using taxi trajectory data: A graph convolutional neural network approach.
Comput. Environ. Urban Syst., 2021

2020
Shifting ranges of eleven invasive alien plants in China in the face of climate change.
Ecol. Informatics, 2020

ClusterLens: A Focus+Context Approach to Multi-Resolution Spatial Clustering.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
What is the difference in global research on Central Asia before and after the collapse of the USSR: a bibliometric analysis.
Scientometrics, 2019

Genetic landscape and landscape connectivity of <i>Ceratopteris thalictroides</i>, an endangered aquatic fern.
Ecol. Informatics, 2019

Evolutionary hotspots in the middle and lower reaches of the Yangtze River Basin.
Ecol. Informatics, 2019

Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
Deep Salient Feature Based Anti-Noise Transfer Network for Scene Classification of Remote Sensing Imagery.
Remote. Sens., 2018

Conditional convolution neural network enhanced random forest for facial expression recognition.
Pattern Recognit., 2018

2017
An analysis of movement patterns between zones using taxi GPS data.
Trans. GIS, 2017

Identification of evolutionary hotspots in the Poyang Lake Basin based on genetic data from multiple rare and endangered plant species.
Ecol. Informatics, 2017

Deep Transfer Feature Based Convolutional Neural Forests for Head Pose Estimation.
Proceedings of the Image and Video Technology, 2017

2016
Landscape connectivity of Cercidiphyllum japonicum, an endangered species and its implications for conservation.
Ecol. Informatics, 2016

A visual analytics approach to high-dimensional logistic regression modeling and its application to an environmental health study.
Proceedings of the 2016 IEEE Pacific Visualization Symposium, 2016

2015
Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Mark on the globe: a quest for scientific bases of geographic information and its international influence.
Int. J. Geogr. Inf. Sci., 2014

2013
Orthogonal Wavelet Transform Dynamic Weighted Multi-Modulus Blind Equalization Algorithm Based on Dynamic Particle Swarm.
J. Comput., 2013

Clustering of temporal event processes.
Int. J. Geogr. Inf. Sci., 2013

Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

UMicS: from anonymized data to usable microdata.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Computational identification of 48 potato microRNAs and their targets.
Comput. Biol. Chem., 2009

2008
Genome-wide computational analyses of microRNAs and their targets from Canis familiaris.
Comput. Biol. Chem., 2008


  Loading...