Xiaoqing Gong

According to our database1, Xiaoqing Gong authored at least 27 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


LoRaSense: An Interference-aware Concurrent Transmission Model.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Artistic features extraction from chinese calligraphy works via regional guided filter with reference image.
Multimedia Tools Appl., 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
IJDCF, 2018

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Computers & Security, 2018

cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multimedia Tools Appl., 2017

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mobile Information Systems, 2017

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017

SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Node Immunization with Time-Sensitive Restrictions.
Sensors, 2016

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mobile Information Systems, 2016

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN.
Proceedings of the International Conference on Networking and Network Applications, 2016

Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
IJDSN, 2015

Performance Evaluation of a Supply Chain Network.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Software Attack Modeling and Its Application.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Reliable Transmission Protocol Based on Dynamic Link Cache.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An Authentication Protocol Applied to RFID Security Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009