Xiaoqing Gong

Orcid: 0000-0003-4896-8849

According to our database1, Xiaoqing Gong authored at least 36 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An adaptive graph learning method for automated molecular interactions and properties predictions.
Nat. Mach. Intell., 2022

GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program.
J. Inf. Secur. Appl., 2022

Dynamic User Scheduling with User Satisfaction Rate in Cell-Free Massive MIMO.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
Weighted multi-view common subspace learning method.
Pattern Recognit. Lett., 2021

Exploiting Serialized Fine-Grained Action Recognition Using WiFi Sensing.
Mob. Inf. Syst., 2021

2020
JSTIFuzz: Type-Inference-based JavaScript Engine Fuzzing.
Proceedings of the International Conference on Networking and Network Applications, 2020

Resource Allocation Optimization with Guaranteed Security Level for Anti-traceable Access.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing.
IEEE/ACM Trans. Netw., 2019

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019

Plant Identification Based on Multi-branch Convolutional Neural Network with Attention.
Proceedings of the Image and Graphics Technologies and Applications, 2019

LoRaSense: An Interference-aware Concurrent Transmission Model.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2018
Artistic features extraction from chinese calligraphy works via regional guided filter with reference image.
Multim. Tools Appl., 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Comput. Secur., 2018

Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mob. Inf. Syst., 2017

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017

SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Node Immunization with Time-Sensitive Restrictions.
Sensors, 2016

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mob. Inf. Syst., 2016

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN.
Proceedings of the International Conference on Networking and Network Applications, 2016

Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2013
Performance Evaluation of a Supply Chain Network.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Software Attack Modeling and Its Application.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
A Reliable Transmission Protocol Based on Dynamic Link Cache.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
An Authentication Protocol Applied to RFID Security Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...