Xudong Gong

Orcid: 0000-0002-2253-2927

According to our database1, Xudong Gong authored at least 16 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimistic Model Rollouts for Pessimistic Offline Policy Optimization.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2022
Real-time Short Video Recommendation on Mobile Devices.
CoRR, 2022

Real-time Short Video Recommendation on Mobile Devices.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2020
Progressive Layered Extraction (PLE): A Novel Multi-Task Learning (MTL) Model for Personalized Recommendations.
Proceedings of the RecSys 2020: Fourteenth ACM Conference on Recommender Systems, 2020

Improving Policy Generalization for Teacher-Student Reinforcement Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2020

2019
Fast Adaptation via Meta Learning in Multi-agent Cooperative Tasks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Synchronous n-Step Method for Independent Q-Learning in Multi-Agent Deep Reinforcement Learning.
Proceedings of the 2019 IEEE SmartWorld, 2019

Parallelized Synchronous Multi-agent Deep Reinforcement Learning with Experience Replay Memory.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

2015
Magemite: Character inputting system based on magnetic sensor.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation.
Proceedings of the Database Systems for Advanced Applications, 2015

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Inf. Forensics Secur., 2013

Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining.
CoRR, 2013

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...