Yongkang Gong

Orcid: 0000-0003-3216-2998

According to our database1, Yongkang Gong authored at least 18 papers between 2020 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improved Whale Optimization Algorithm Based on Fusion Gravity Balance.
Axioms, July, 2023

Computation Offloading for Rechargeable Users in Space-Air-Ground Networks.
IEEE Trans. Veh. Technol., March, 2023

Decentralized Edge Intelligence-Driven Network Resource Orchestration Mechanism.
IEEE Netw., 2023

Model-Assisted In-Orbit Intelligent Computation for Satellite-Ground Integrated Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Privacy-Assisted Computation Offloading Schemes for Satellite-Ground Digital Twin Networks.
Proceedings of the IEEE International Conference on Communications, 2023

WSN Coverage Optimization based on Improved Sparrow Search Algorithm.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

2022
Multi-Agent Driven Resource Allocation and Interference Management for Deep Edge Networks.
IEEE Trans. Veh. Technol., 2022

A High Precision and Multifunctional Electro-Optical Conversion Efficiency Measurement System for Metamaterial-Based Thermal Emitters.
Sensors, 2022

Security Configuration and Pricing Scheme for Satellite-Terrestrial IoT: A Stackelberg Game.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Computation Offloading and Energy Harvesting Schemes for Sum Rate Maximization in Space-Air-Ground Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Antiforensics of Speech Resampling Using Dual-Path Strategy.
Wirel. Commun. Mob. Comput., 2021

Defending and Detecting Audio Adversarial Example using Frame Offsets.
KSII Trans. Internet Inf. Syst., 2021

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise.
CoRR, 2021

Distributed Multi-Agent Empowered Resource Allocation in Deep Edge Networks.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Identification of Synthetic Spoofed Speech with Deep Capsule Network.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio.
IEEE Access, 2020

Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey.
Proceedings of the Security and Privacy in Digital Economy, 2020

Deep Reinforcement Learning Aided Computation Offloading and Resource Allocation for IoT.
Proceedings of the IEEE Computing, 2020


  Loading...