callback( { "result":{ "query":"Hongsong* Li", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"40.61" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"0" }, "hits":{ "@total":"206", "@computed":"206", "@sent":"206", "@first":"0", "hit":[{ "@score":"3", "@id":"7764", "info":{"authors":{"author":[{"@pid":"60/2","text":"Hongsong Chen"},{"@pid":"45/2385","text":"Xingyu Li"},{"@pid":"62/9032","text":"Wenmao Liu"}]},"title":"Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.","venue":"Comput. Secur.","volume":"137","pages":"103581","year":"2024","type":"Journal Articles","access":"closed","key":"journals/compsec/ChenLL24","doi":"10.1016/J.COSE.2023.103581","ee":"https://doi.org/10.1016/j.cose.2023.103581","url":"https://dblp.org/rec/journals/compsec/ChenLL24"}, "url":"URL#7764" }, { "@score":"3", "@id":"17682", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"363/7752","text":"Gaosheng Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Multi-granularity cross-modal representation learning for named entity recognition on social media.","venue":"Inf. Process. Manag.","volume":"61","number":"1","pages":"103546","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ipm/LiuWLLRZS24","doi":"10.1016/J.IPM.2023.103546","ee":"https://doi.org/10.1016/j.ipm.2023.103546","url":"https://dblp.org/rec/journals/ipm/LiuWLLRZS24"}, "url":"URL#17682" }, { "@score":"5", "@id":"18131", "info":{"authors":{"author":[{"@pid":"07/1951","text":"Jing Xu"},{"@pid":"31/316","text":"Chuandong Li 0001"},{"@pid":"90/6986-1","text":"Xing He 0001"},{"@pid":"276/2763","text":"Hongsong Wen"},{"@pid":"12/5927","text":"Xiaoyu Zhang"}]},"title":"A fixed-time converging neurodynamic approach with time-varying coefficients for l1-minimization problem.","venue":"Inf. Sci.","volume":"654","pages":"119876","year":"2024","type":"Journal Articles","access":"closed","key":"journals/isci/XuLHWZ24","doi":"10.1016/J.INS.2023.119876","ee":"https://doi.org/10.1016/j.ins.2023.119876","url":"https://dblp.org/rec/journals/isci/XuLHWZ24"}, "url":"URL#18131" }, { "@score":"4", "@id":"42171", "info":{"authors":{"author":[{"@pid":"60/7022","text":"Haiyan Li"},{"@pid":"66/2026","text":"Shaolin Peng"},{"@pid":"231/0947","text":"Xun Lang"},{"@pid":"369/0129","text":"Shuhua Ye"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"Spatial-guided informative semantic joint transformer for single-image deraining.","venue":"J. Supercomput.","volume":"80","number":"5","pages":"6522-6551","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiPLYL24","doi":"10.1007/S11227-023-05697-Z","ee":"https://doi.org/10.1007/s11227-023-05697-z","url":"https://dblp.org/rec/journals/tjs/LiPLYL24"}, "url":"URL#42171" }, { "@score":"2", "@id":"43348", "info":{"authors":{"author":[{"@pid":"13/3918","text":"Yuqi Zhang"},{"@pid":"05/2084","text":"Qi Qian"},{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"47/2929-2","text":"Chong Liu 0002"},{"@pid":"04/3462","text":"Weihua Chen"},{"@pid":"88/898-19","text":"Fan Wang 0019"}]},"title":"Graph Convolution Based Efficient Re-Ranking for Visual Retrieval.","venue":"IEEE Trans. Multim.","volume":"26","pages":"1089-1101","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tmm/ZhangQWLCW24","doi":"10.1109/TMM.2023.3276167","ee":"https://doi.org/10.1109/TMM.2023.3276167","url":"https://dblp.org/rec/journals/tmm/ZhangQWLCW24"}, "url":"URL#43348" }, { "@score":"4", "@id":"44433", "info":{"authors":{"author":[{"@pid":"63/9705","text":"Siyuan Li"},{"@pid":"231/1852","text":"Yongpan Wang"},{"@pid":"337/2228","text":"Chaopeng Dong"},{"@pid":"189/2409","text":"Shouguo Yang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"82/2248","text":"Hao Sun"},{"@pid":"299/0093","text":"Zhe Lang"},{"@pid":"336/2531","text":"Zuxin Chen"},{"@pid":"18/689","text":"Weijie Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"33","number":"2","pages":"52:1-52:35","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tosem/LiWDYLSLCWZS24","doi":"10.1145/3625294","ee":"https://doi.org/10.1145/3625294","url":"https://dblp.org/rec/journals/tosem/LiWDYLSLCWZS24"}, "url":"URL#44433" }, { "@score":"2", "@id":"44525", "info":{"authors":{"author":[{"@pid":"99/6737","text":"Zhao Liu"},{"@pid":"248/5235","text":"Xuesen Chu"},{"@pid":"237/8827","text":"Xiaojing Lv"},{"@pid":"248/5044","text":"Hongsong Meng"},{"@pid":"188/7012","text":"Hanyue Liu"},{"@pid":"161/2889","text":"Guanghui Zhu"},{"@pid":"71/3657","text":"Haohuan Fu"},{"@pid":"67/3001","text":"Guangwen Yang"}]},"title":"SunwayLB: Enabling Extreme-Scale Lattice Boltzmann Method Based Computing Fluid Dynamics Simulations on Advanced Heterogeneous Supercomputers.","venue":"IEEE Trans. Parallel Distributed Syst.","volume":"35","number":"2","pages":"324-337","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tpds/LiuCLMLZFY24","doi":"10.1109/TPDS.2023.3343706","ee":"https://doi.org/10.1109/TPDS.2023.3343706","url":"https://dblp.org/rec/journals/tpds/LiuCLMLZFY24"}, "url":"URL#44525" }, { "@score":"3", "@id":"48155", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"347/2797","text":"Shuaizong Si"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Hierarchical Aligned Multimodal Learning for NER on Tweet Posts.","venue":"AAAI","pages":"18680-18688","year":"2024","type":"Conference and Workshop Papers","access":"closed","key":"conf/aaai/Liu0RLSZS24","doi":"10.1609/AAAI.V38I17.29831","ee":"https://doi.org/10.1609/aaai.v38i17.29831","url":"https://dblp.org/rec/conf/aaai/Liu0RLSZS24"}, "url":"URL#48155" }, { "@score":"5", "@id":"104628", "info":{"authors":{"author":[{"@pid":"60/7022","text":"Haiyan Li"},{"@pid":"05/2680","text":"Zhixin Wang"},{"@pid":"71/3692","text":"Wei Shen"},{"@pid":"00/5457","text":"Huilin Li"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"73/8078","text":"Pengfei Yu"}]},"title":"SSCK-Net: Spine segmentation in MRI based on cross attention and key-points recognition-assisted learner.","venue":"Biomed. Signal Process. Control.","volume":"86","number":"Part C","pages":"105278","year":"2023","type":"Journal Articles","access":"closed","key":"journals/bspc/LiWSLLY23","doi":"10.1016/J.BSPC.2023.105278","ee":"https://doi.org/10.1016/j.bspc.2023.105278","url":"https://dblp.org/rec/journals/bspc/LiWSLLY23"}, "url":"URL#104628" }, { "@score":"2", "@id":"111179", "info":{"authors":{"author":[{"@pid":"255/8761","text":"Jianqiang Xiong"},{"@pid":"91/5830","text":"Hongsong Shi"},{"@pid":"356/9694","text":"Guoyi Guo"},{"@pid":"18/2453","text":"Xiaohu Liu"},{"@pid":"357/0181","text":"Chuncai Xiao"},{"@pid":"356/9618","text":"Shuangxia Zhu"}]},"title":"Research on intelligent transportation and shared parking spaces inurban areas based on multi-source data integration.","venue":"Comput. Electr. Eng.","volume":"110","pages":"108835","year":"2023","type":"Journal Articles","access":"closed","key":"journals/cee/XiongSGLXZ23","doi":"10.1016/J.COMPELECENG.2023.108835","ee":"https://doi.org/10.1016/j.compeleceng.2023.108835","url":"https://dblp.org/rec/journals/cee/XiongSGLXZ23"}, "url":"URL#111179" }, { "@score":"3", "@id":"118269", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"CL-GAN: A GAN-based continual learning model for generating and detecting AGDs.","venue":"Comput. Secur.","volume":"131","pages":"103317","year":"2023","type":"Journal Articles","access":"closed","key":"journals/compsec/Ren0LLZS23","doi":"10.1016/J.COSE.2023.103317","ee":"https://doi.org/10.1016/j.cose.2023.103317","url":"https://dblp.org/rec/journals/compsec/Ren0LLZS23"}, "url":"URL#118269" }, { "@score":"3", "@id":"137717", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Owner name entity recognition in websites based on multiscale features and multimodal co-attention.","venue":"Expert Syst. Appl.","volume":"224","pages":"120014","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/RenLLLZS23","doi":"10.1016/J.ESWA.2023.120014","ee":"https://doi.org/10.1016/j.eswa.2023.120014","url":"https://dblp.org/rec/journals/eswa/RenLLLZS23"}, "url":"URL#137717" }, { "@score":"2", "@id":"138836", "info":{"authors":{"author":[{"@pid":"80/10587","text":"Xifeng Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"98/627","text":"Han Xiao"},{"@pid":"203/3329","text":"Zan Zhou 0001"},{"@pid":"78/10624","text":"Shujie Yang"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.","venue":"Trans. Emerg. Telecommun. Technol.","volume":"34","number":"7","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ett/WangZXZYS23","doi":"10.1002/ETT.4791","ee":"https://doi.org/10.1002/ett.4791","url":"https://dblp.org/rec/journals/ett/WangZXZYS23"}, "url":"URL#138836" }, { "@score":"3", "@id":"154303", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.","venue":"Int. J. Intell. Syst.","volume":"2023","pages":"1-11","year":"2023","type":"Journal Articles","access":"open","key":"journals/ijis/Ren0LLZS23","doi":"10.1155/2023/3138551","ee":"https://doi.org/10.1155/2023/3138551","url":"https://dblp.org/rec/journals/ijis/Ren0LLZS23"}, "url":"URL#154303" }, { "@score":"2", "@id":"173870", "info":{"authors":{"author":[{"@pid":"342/5148","text":"Zailiang Zhu"},{"@pid":"342/5248","text":"Bozheng Dou"},{"@pid":"318/9161","text":"Yukang Cao"},{"@pid":"00/2797","text":"Jian Jiang"},{"@pid":"119/1783","text":"Yueying Zhu"},{"@pid":"44/3371","text":"Dong Chen"},{"@pid":"242/9825","text":"Hongsong Feng"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"95/8624","text":"Ben-gong Zhang"},{"@pid":"78/5604","text":"Tianshou Zhou"},{"@pid":"33/2989","text":"Guo-Wei Wei 0001"}]},"title":"TIDAL: Topology-Inferred Drug Addiction Learning.","venue":"J. Chem. Inf. Model.","volume":"63","number":"5","pages":"1472-1489","year":"2023","type":"Journal Articles","access":"closed","key":"journals/jcisd/ZhuDCJZCFLZZW23","doi":"10.1021/ACS.JCIM.3C00046","ee":"https://doi.org/10.1021/acs.jcim.3c00046","url":"https://dblp.org/rec/journals/jcisd/ZhuDCJZCFLZZW23"}, "url":"URL#173870" }, { "@score":"2", "@id":"181451", "info":{"authors":{"author":[{"@pid":"80/10587","text":"Xifeng Wang"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"188/7759","text":"Chao Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"82/4593","text":"Lian Zhao"},{"@pid":"78/10624","text":"Shujie Yang"},{"@pid":"51/4906","text":"Changqiao Xu"}]},"title":"Intelligent Connected Vehicle Security: Threats, Attacks and Defenses.","venue":"J. Inf. Sci. Eng.","volume":"39","number":"6","pages":"1265-1303","year":"2023","type":"Journal Articles","access":"open","key":"journals/jise/WangSWZZYX23","ee":"http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=195_2632","url":"https://dblp.org/rec/journals/jise/WangSWZZYX23"}, "url":"URL#181451" }, { "@score":"4", "@id":"188774", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.","venue":"Knowl. Inf. Syst.","volume":"65","number":"10","pages":"4411-4429","year":"2023","type":"Journal Articles","access":"closed","key":"journals/kais/RenLLLLZS23","doi":"10.1007/S10115-023-01908-4","ee":"https://doi.org/10.1007/s10115-023-01908-4","url":"https://dblp.org/rec/journals/kais/RenLLLLZS23"}, "url":"URL#188774" }, { "@score":"5", "@id":"227229", "info":{"authors":{"author":[{"@pid":"343/0659","text":"Yasheng Li"},{"@pid":"44/7938","text":"Ningfang Liao"},{"@pid":"343/0768","text":"Yumei Li 0015"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"63/7938","text":"Wenmin Wu"}]},"title":"Color Conversion of Wide-Color-Gamut Cameras Using Optimal Training Groups.","venue":"Sensors","volume":"23","number":"16","pages":"7186","year":"2023","type":"Journal Articles","access":"open","key":"journals/sensors/LiLLLW23","doi":"10.3390/S23167186","ee":"https://doi.org/10.3390/s23167186","url":"https://dblp.org/rec/journals/sensors/LiLLLW23"}, "url":"URL#227229" }, { "@score":"4", "@id":"254370", "info":{"authors":{"author":[{"@pid":"259/3821","text":"Zhaoteng Yan"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"189/2409","text":"Shouguo Yang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"20","number":"5","pages":"3890-3909","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tdsc/YanLLYZS23","doi":"10.1109/TDSC.2022.3223103","ee":"https://doi.org/10.1109/TDSC.2022.3223103","url":"https://dblp.org/rec/journals/tdsc/YanLLYZS23"}, "url":"URL#254370" }, { "@score":"2", "@id":"263747", "info":{"authors":{"author":[{"@pid":"47/2929-2","text":"Chong Liu 0002"},{"@pid":"13/3918","text":"Yuqi Zhang"},{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"04/3462","text":"Weihua Chen"},{"@pid":"88/898-19","text":"Fan Wang 0019"},{"@pid":"75/6434-8","text":"Yan Huang 0008"},{"@pid":"12/4493","text":"Yi-Dong Shen"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Efficient Token-Guided Image-Text Retrieval With Consistent Multimodal Contrastive Training.","venue":"IEEE Trans. Image Process.","volume":"32","pages":"3622-3633","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tip/LiuZWCWHSW23","doi":"10.1109/TIP.2023.3286710","ee":"https://doi.org/10.1109/TIP.2023.3286710","url":"https://dblp.org/rec/journals/tip/LiuZWCWHSW23"}, "url":"URL#263747" }, { "@score":"5", "@id":"317981", "info":{"authors":{"author":[{"@pid":"116/1011-85","text":"Jun Li 0085"},{"@pid":"350/7965","text":"Fengshi Zhang"},{"@pid":"70/8002","text":"Yonghe Guo"},{"@pid":"63/9705","text":"Siyuan Li"},{"@pid":"350/8353","text":"Guanjun Wu"},{"@pid":"51/5839","text":"Dahui Li"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy.","venue":"CSCWD","pages":"559-564","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/cscwd/LiZGLWLZ23","doi":"10.1109/CSCWD57460.2023.10152847","ee":"https://doi.org/10.1109/CSCWD57460.2023.10152847","url":"https://dblp.org/rec/conf/cscwd/LiZGLWLZ23"}, "url":"URL#317981" }, { "@score":"4", "@id":"322899", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"43/3166","text":"Zhi Li"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet.","venue":"DASFAA","pages":"19-33","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasfaa/RenLLLLZS23","doi":"10.1007/978-3-031-35415-1_2","ee":"https://doi.org/10.1007/978-3-031-35415-1_2","url":"https://dblp.org/rec/conf/dasfaa/RenLLLLZS23"}, "url":"URL#322899" }, { "@score":"3", "@id":"326150", "info":{"authors":{"author":[{"@pid":"85/2150","text":"Xiaohui Chen"},{"@pid":"47/5523","text":"Lei Cui"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"53/5889","text":"Zhiyu Hao"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.","venue":"DSN","pages":"165-178","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dsn/ChenCWLZHS23","doi":"10.1109/DSN58367.2023.00027","ee":"https://doi.org/10.1109/DSN58367.2023.00027","url":"https://dblp.org/rec/conf/dsn/ChenCWLZHS23"}, "url":"URL#326150" }, { "@score":"3", "@id":"354503", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"13/6922","text":"Xin Zheng"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.","venue":"ICASSP","pages":"1-5","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/LiuZLLRZS23","doi":"10.1109/ICASSP49357.2023.10096470","ee":"https://doi.org/10.1109/ICASSP49357.2023.10096470","url":"https://dblp.org/rec/conf/icassp/LiuZLLRZS23"}, "url":"URL#354503" }, { "@score":"3", "@id":"394098", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"36/2561","text":"Zhiyu Wang"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"86/7981","text":"Fei Lv 0001"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises.","venue":"IJCNN","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/LiuLWRLLZS23","doi":"10.1109/IJCNN54540.2023.10191251","ee":"https://doi.org/10.1109/IJCNN54540.2023.10191251","url":"https://dblp.org/rec/conf/ijcnn/LiuLWRLLZS23"}, "url":"URL#394098" }, { "@score":"3", "@id":"394256", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.","venue":"IJCNN","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/RenWLZS23","doi":"10.1109/IJCNN54540.2023.10192043","ee":"https://doi.org/10.1109/IJCNN54540.2023.10192043","url":"https://dblp.org/rec/conf/ijcnn/RenWLZS23"}, "url":"URL#394256" }, { "@score":"2", "@id":"395929", "info":{"authors":{"author":[{"@pid":"242/5025","text":"Zhengyang Ai"},{"@pid":"330/5555","text":"Junnan Yin"},{"@pid":"347/2797","text":"Shuaizong Si"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation.","venue":"INNS DLIA@IJCNN","pages":"177-186","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/inns-dlia/AiYSZS23","doi":"10.1016/J.PROCS.2023.08.155","ee":"https://doi.org/10.1016/j.procs.2023.08.155","url":"https://dblp.org/rec/conf/inns-dlia/AiYSZS23"}, "url":"URL#395929" }, { "@score":"2", "@id":"400381", "info":{"authors":{"author":[{"@pid":"82/2248","text":"Hao Sun"},{"@pid":"172/1514","text":"Yongji Liu"},{"@pid":"151/4858","text":"Zhenquan Ding"},{"@pid":"181/1848","text":"Yang Xiao"},{"@pid":"53/5889","text":"Zhiyu Hao"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.","venue":"ISCC","pages":"1214-1220","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SunLDXHZ23","doi":"10.1109/ISCC58397.2023.10217978","ee":"https://doi.org/10.1109/ISCC58397.2023.10217978","url":"https://dblp.org/rec/conf/iscc/SunLDXHZ23"}, "url":"URL#400381" }, { "@score":"3", "@id":"404458", "info":{"authors":{"author":[{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"43/656","text":"Tao Liu"},{"@pid":"137/5266","text":"Le Guan"},{"@pid":"21/6121-5","text":"Peng Liu 0005"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"68/7938","text":"Kejiang Ye"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.","venue":"ISSTA","pages":"360-372","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/issta/ChengZLG0LZYS23","doi":"10.1145/3597926.3598062","ee":"https://doi.org/10.1145/3597926.3598062","url":"https://dblp.org/rec/conf/issta/ChengZLG0LZYS23"}, "url":"URL#404458" }, { "@score":"4", "@id":"416896", "info":{"authors":{"author":[{"@pid":"63/9705","text":"Siyuan Li"},{"@pid":"337/2228","text":"Chaopeng Dong"},{"@pid":"231/1852","text":"Yongpan Wang"},{"@pid":"133/9071","text":"Wenming Liu"},{"@pid":"18/689","text":"Weijie Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.","venue":"MILCOM","pages":"741-746","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/milcom/LiDWLWLZS23","doi":"10.1109/MILCOM58377.2023.10356328","ee":"https://doi.org/10.1109/MILCOM58377.2023.10356328","url":"https://dblp.org/rec/conf/milcom/LiDWLWLZS23"}, "url":"URL#416896" }, { "@score":"3", "@id":"441276", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.","venue":"SIGIR","pages":"1929-1933","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigir/RenWLZS23","doi":"10.1145/3539618.3591972","ee":"https://doi.org/10.1145/3539618.3591972","url":"https://dblp.org/rec/conf/sigir/RenWLZS23"}, "url":"URL#441276" }, { "@score":"4", "@id":"493104", "info":{"authors":{"author":[{"@pid":"63/9705","text":"Siyuan Li"},{"@pid":"231/1852","text":"Yongpan Wang"},{"@pid":"337/2228","text":"Chaopeng Dong"},{"@pid":"189/2409","text":"Shouguo Yang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"82/2248","text":"Hao Sun"},{"@pid":"299/0093","text":"Zhe Lang"},{"@pid":"336/2531","text":"Zuxin Chen"},{"@pid":"18/689","text":"Weijie Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries.","venue":"CoRR","volume":"abs/2305.04026","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-04026","doi":"10.48550/ARXIV.2305.04026","ee":"https://doi.org/10.48550/arXiv.2305.04026","url":"https://dblp.org/rec/journals/corr/abs-2305-04026"}, "url":"URL#493104" }, { "@score":"3", "@id":"495194", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"347/2797","text":"Shuaizong Si"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.","venue":"CoRR","volume":"abs/2305.08372","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2305-08372","doi":"10.48550/ARXIV.2305.08372","ee":"https://doi.org/10.48550/arXiv.2305.08372","url":"https://dblp.org/rec/journals/corr/abs-2305-08372"}, "url":"URL#495194" }, { "@score":"2", "@id":"506191", "info":{"authors":{"author":[{"@pid":"47/2929-2","text":"Chong Liu 0002"},{"@pid":"13/3918","text":"Yuqi Zhang"},{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"04/3462","text":"Weihua Chen"},{"@pid":"88/898","text":"Fan Wang"},{"@pid":"75/6434-8","text":"Yan Huang 0008"},{"@pid":"12/4493","text":"Yi-Dong Shen"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Efficient Token-Guided Image-Text Retrieval with Consistent Multimodal Contrastive Training.","venue":"CoRR","volume":"abs/2306.08789","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2306-08789","doi":"10.48550/ARXIV.2306.08789","ee":"https://doi.org/10.48550/arXiv.2306.08789","url":"https://dblp.org/rec/journals/corr/abs-2306-08789"}, "url":"URL#506191" }, { "@score":"2", "@id":"506193", "info":{"authors":{"author":[{"@pid":"13/3918","text":"Yuqi Zhang"},{"@pid":"05/2084-1","text":"Qi Qian 0001"},{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"47/2929-2","text":"Chong Liu 0002"},{"@pid":"04/3462","text":"Weihua Chen"},{"@pid":"88/898","text":"Fan Wang"}]},"title":"Graph Convolution Based Efficient Re-Ranking for Visual Retrieval.","venue":"CoRR","volume":"abs/2306.08792","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2306-08792","doi":"10.48550/ARXIV.2306.08792","ee":"https://doi.org/10.48550/arXiv.2306.08792","url":"https://dblp.org/rec/journals/corr/abs-2306-08792"}, "url":"URL#506193" }, { "@score":"2", "@id":"512823", "info":{"authors":{"author":[{"@pid":"64/5725","text":"Long Chen"},{"@pid":"00/2797","text":"Jian Jiang"},{"@pid":"342/5248","text":"Bozheng Dou"},{"@pid":"242/9825","text":"Hongsong Feng"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"119/1783","text":"Yueying Zhu"},{"@pid":"95/8624","text":"Ben-gong Zhang"},{"@pid":"78/5604","text":"Tianshou Zhou"},{"@pid":"33/2989","text":"Guo-Wei Wei 0001"}]},"title":"Machine Learning Study of the Extended Drug-target Interaction Network informed by Pain Related Voltage-Gated Sodium Channels.","venue":"CoRR","volume":"abs/2307.05794","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2307-05794","doi":"10.48550/ARXIV.2307.05794","ee":"https://doi.org/10.48550/arXiv.2307.05794","url":"https://dblp.org/rec/journals/corr/abs-2307-05794"}, "url":"URL#512823" }, { "@score":"4", "@id":"598809", "info":{"authors":{"author":[{"@pid":"60/7022","text":"Haiyan Li"},{"@pid":"146/3385","text":"Xiaofang Dong"},{"@pid":"71/3692","text":"Wei Shen"},{"@pid":"330/6783","text":"Fuhua Ge"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"Resampling-based cost loss attention network for explainable imbalanced diabetic retinopathy grading.","venue":"Comput. Biol. Medicine","volume":"149","pages":"105970","year":"2022","type":"Journal Articles","access":"closed","key":"journals/cbm/LiDSGL22","doi":"10.1016/J.COMPBIOMED.2022.105970","ee":"https://doi.org/10.1016/j.compbiomed.2022.105970","url":"https://dblp.org/rec/journals/cbm/LiDSGL22"}, "url":"URL#598809" }, { "@score":"2", "@id":"603577", "info":{"authors":{"author":[{"@pid":"17/2247","text":"Kai Yang"},{"@pid":"81/4036","text":"Haining Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.","venue":"Comput. Ind.","volume":"138","pages":"103613","year":"2022","type":"Journal Articles","access":"closed","key":"journals/cii/YangWWS22","doi":"10.1016/J.COMPIND.2022.103613","ee":"https://doi.org/10.1016/j.compind.2022.103613","url":"https://dblp.org/rec/journals/cii/YangWWS22"}, "url":"URL#603577" }, { "@score":"4", "@id":"658164", "info":{"authors":{"author":[{"@pid":"308/6883","text":"Yougang Lyu"},{"@pid":"152/5077-2","text":"Zihan Wang 0002"},{"@pid":"58/10440","text":"Zhaochun Ren"},{"@pid":"168/4596","text":"Pengjie Ren"},{"@pid":"88/1081","text":"Zhumin Chen"},{"@pid":"11/6389","text":"Xiaozhong Liu"},{"@pid":"37/6489","text":"Yujun Li"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"52/10774","text":"Hongye Song"}]},"title":"Improving legal judgment prediction through reinforced criminal element extraction.","venue":"Inf. Process. Manag.","volume":"59","number":"1","pages":"102780","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ipm/LyuWRRCLLLS22","doi":"10.1016/J.IPM.2021.102780","ee":"https://doi.org/10.1016/j.ipm.2021.102780","url":"https://dblp.org/rec/journals/ipm/LyuWRRCLLLS22"}, "url":"URL#658164" }, { "@score":"2", "@id":"704530", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"},{"@pid":"56/8278","text":"Jiashi Feng"},{"@pid":"244/9623","text":"Daquan Zhou"}]},"title":"Velocity-to-velocity human motion forecasting.","venue":"Pattern Recognit.","volume":"124","pages":"108424","year":"2022","type":"Journal Articles","access":"closed","key":"journals/pr/WangWFZ22","doi":"10.1016/J.PATCOG.2021.108424","ee":"https://doi.org/10.1016/j.patcog.2021.108424","url":"https://dblp.org/rec/journals/pr/WangWFZ22"}, "url":"URL#704530" }, { "@score":"2", "@id":"714857", "info":{"authors":{"author":[{"@pid":"329/6954","text":"Shipeng Ying"},{"@pid":"98/1223","text":"Hongsong Qu"},{"@pid":"226/4360","text":"Shuping Tao"},{"@pid":"98/8024","text":"Liangliang Zheng"},{"@pid":"72/3947","text":"Xiaobin Wu"}]},"title":"Radiation Sensitivity Analysis of Ocean Wake Information Detection System Based on Visible Light Remote Sensing.","venue":"Remote. Sens.","volume":"14","number":"16","pages":"4054","year":"2022","type":"Journal Articles","access":"open","key":"journals/remotesensing/YingQTZW22","doi":"10.3390/RS14164054","ee":"https://doi.org/10.3390/rs14164054","url":"https://dblp.org/rec/journals/remotesensing/YingQTZW22"}, "url":"URL#714857" }, { "@score":"2", "@id":"715445", "info":{"authors":{"author":[{"@pid":"269/5897","text":"Zheng Zhi"},{"@pid":"98/1223","text":"Hongsong Qu"},{"@pid":"226/4360","text":"Shuping Tao"},{"@pid":"98/8024","text":"Liangliang Zheng"},{"@pid":"329/6954","text":"Shipeng Ying"},{"@pid":"329/7271","text":"Heqian Zhu"}]},"title":"The Design of Cone and Pendulum Scanning Mode Using Dual-Camera with Multi-Dimensional Motion Imaging Micro-Nanosatellite.","venue":"Remote. Sens.","volume":"14","number":"18","pages":"4613","year":"2022","type":"Journal Articles","access":"open","key":"journals/remotesensing/ZhiQTZYZ22","doi":"10.3390/RS14184613","ee":"https://doi.org/10.3390/rs14184613","url":"https://dblp.org/rec/journals/remotesensing/ZhiQTZYZ22"}, "url":"URL#715445" }, { "@score":"3", "@id":"783484", "info":{"authors":{"author":[{"@pid":"233/1228","text":"Yanzeng Li"},{"@pid":"261/9841","text":"Jiangxia Cao"},{"@pid":"141/4386","text":"Xin Cong"},{"@pid":"01/1844-6","text":"Zhenyu Zhang 0006"},{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"56/7911","text":"Tingwen Liu"}]},"title":"Enhancing Chinese Pre-trained Language Model via Heterogeneous Linguistics Graph.","venue":"ACL","pages":"1986-1996","year":"2022","type":"Conference and Workshop Papers","access":"open","key":"conf/acl/LiCCZ0ZL22","doi":"10.18653/V1/2022.ACL-LONG.140","ee":"https://doi.org/10.18653/v1/2022.acl-long.140","url":"https://dblp.org/rec/conf/acl/LiCCZ0ZL22"}, "url":"URL#783484" }, { "@score":"2", "@id":"814380", "info":{"authors":{"author":[{"@pid":"176/9300","text":"Weiqiong Cao"},{"@pid":"91/5830","text":"Hongsong Shi"},{"@pid":"44/2144-11","text":"Hua Chen 0011"},{"@pid":"03/4995","text":"Jiazhe Chen"},{"@pid":"14/3166","text":"Limin Fan"},{"@pid":"74/2464","text":"Wenling Wu"}]},"title":"Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA.","venue":"CT-RSA","pages":"169-195","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/ctrsa/CaoSCCFW22","doi":"10.1007/978-3-030-95312-6_8","ee":"https://doi.org/10.1007/978-3-030-95312-6_8","url":"https://dblp.org/rec/conf/ctrsa/CaoSCCFW22"}, "url":"URL#814380" }, { "@score":"2", "@id":"843554", "info":{"authors":{"author":[{"@pid":"171/1094","text":"Haiqiang Fei"},{"@pid":"35/7092","text":"Wei Wang"},{"@pid":"87/1254","text":"Yu Chen"},{"@pid":"151/4858","text":"Zhenquan Ding"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"172/1514","text":"Yongji Liu"},{"@pid":"53/5889","text":"Zhiyu Hao"},{"@pid":"343/8693","text":"Chengli Yu"}]},"title":"A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation.","venue":"HPCC/DSS/SmartCity/DependSys","pages":"285-294","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpcc/FeiWCDZLHY22","doi":"10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00069","ee":"https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00069","url":"https://dblp.org/rec/conf/hpcc/FeiWCDZLHY22"}, "url":"URL#843554" }, { "@score":"2", "@id":"851754", "info":{"authors":{"author":[{"@pid":"294/5115","text":"Puzhuo Liu"},{"@pid":"294/4627","text":"Dongliang Fang"},{"@pid":"24/2771","text":"Chuan Qin"},{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"176/7476","text":"Shichao Lv"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Finding Vulnerabilities in Internal-binary of Firmware with Clues.","venue":"ICC","pages":"5397-5402","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuFQCLZS22","doi":"10.1109/ICC45855.2022.9839008","ee":"https://doi.org/10.1109/ICC45855.2022.9839008","url":"https://dblp.org/rec/conf/icc/LiuFQCLZS22"}, "url":"URL#851754" }, { "@score":"2", "@id":"868435", "info":{"authors":{"author":[{"@pid":"04/11534","text":"Sen Zhao"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"189/2409","text":"Shouguo Yang"},{"@pid":"232/0043","text":"Yicheng Zeng"},{"@pid":"198/6947","text":"Zhihui Zhao"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification.","venue":"ICNP","pages":"1-12","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ZhaoWYZZZS22","doi":"10.1109/ICNP55882.2022.9940264","ee":"https://doi.org/10.1109/ICNP55882.2022.9940264","url":"https://dblp.org/rec/conf/icnp/ZhaoWYZZZS22"}, "url":"URL#868435" }, { "@score":"3", "@id":"870561", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.","venue":"ICPR","pages":"1557-1563","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icpr/LiuLWLRZ22","doi":"10.1109/ICPR56361.2022.9956373","ee":"https://doi.org/10.1109/ICPR56361.2022.9956373","url":"https://dblp.org/rec/conf/icpr/LiuLWLRZ22"}, "url":"URL#870561" }, { "@score":"2", "@id":"887068", "info":{"authors":{"author":[{"@pid":"232/0043","text":"Yicheng Zeng"},{"@pid":"299/7707","text":"Jiaqian Peng"},{"@pid":"198/6947","text":"Zhihui Zhao"},{"@pid":"181/4577","text":"Zhanwei Song"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"SIFOL: Solving Implicit Flows in Loops for Concolic Execution.","venue":"IPCCC","pages":"290-297","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZengPZSZS22","doi":"10.1109/IPCCC55026.2022.9894348","ee":"https://doi.org/10.1109/IPCCC55026.2022.9894348","url":"https://dblp.org/rec/conf/ipccc/ZengPZSZS22"}, "url":"URL#887068" }, { "@score":"3", "@id":"895577", "info":{"authors":{"author":[{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"204/3729","text":"Yuekang Li"},{"@pid":"200/7275","text":"Cen Zhang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"51/3710-3","text":"Yang Liu 0003"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.","venue":"ISSTA","pages":"417-428","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/issta/ZhengLZZLS22","doi":"10.1145/3533767.3534414","ee":"https://doi.org/10.1145/3533767.3534414","url":"https://dblp.org/rec/conf/issta/ZhengLZZLS22"}, "url":"URL#895577" }, { "@score":"3", "@id":"929895", "info":{"authors":{"author":[{"@pid":"350/8506","text":"Jingfei Bian"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"64/5630","text":"Qiang Wang"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.","venue":"SecureComm","pages":"20-38","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/securecomm/BianYLZWS22","doi":"10.1007/978-3-031-25538-0_2","ee":"https://doi.org/10.1007/978-3-031-25538-0_2","url":"https://dblp.org/rec/conf/securecomm/BianYLZWS22"}, "url":"URL#929895" }, { "@score":"3", "@id":"937899", "info":{"authors":{"author":[{"@pid":"198/6947","text":"Zhihui Zhao"},{"@pid":"232/0043","text":"Yicheng Zeng"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.","venue":"SRDS","pages":"166-177","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/srds/ZhaoZWLZS22","doi":"10.1109/SRDS55811.2022.00024","ee":"https://doi.org/10.1109/SRDS55811.2022.00024","url":"https://dblp.org/rec/conf/srds/ZhaoZWLZS22"}, "url":"URL#937899" }, { "@score":"4", "@id":"941380", "info":{"authors":{"author":[{"@pid":"171/1094","text":"Haiqiang Fei"},{"@pid":"293/8501","text":"Yindan Zhang"},{"@pid":"35/7092","text":"Wei Wang"},{"@pid":"97/8968","text":"Yubo Li"},{"@pid":"90/3055","text":"Hui Xu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"53/5889","text":"Zhiyu Hao"},{"@pid":"51/5839","text":"Dahui Li"}]},"title":"Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching.","venue":"SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta","pages":"778-787","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/uic/FeiZWLXZHL22","doi":"10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00120","ee":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00120","url":"https://dblp.org/rec/conf/uic/FeiZWLXZHL22"}, "url":"URL#941380" }, { "@score":"2", "@id":"946342", "info":{"authors":{"author":[{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Discover the ICS Landmarks Based on Multi-stage Clue Mining.","venue":"WASA","pages":"139-151","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/LiuWLZS22","doi":"10.1007/978-3-031-19211-1_12","ee":"https://doi.org/10.1007/978-3-031-19211-1_12","url":"https://dblp.org/rec/conf/wasa/LiuWLZS22"}, "url":"URL#946342" }, { "@score":"3", "@id":"946903", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"09/0","text":"Min Xu"},{"@pid":"96/372","text":"Gang Xiong"},{"@pid":"02/369","text":"Shuqin Zhang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.","venue":"WCNC","pages":"560-565","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcnc/RenLXXZZS22","doi":"10.1109/WCNC51071.2022.9771807","ee":"https://doi.org/10.1109/WCNC51071.2022.9771807","url":"https://dblp.org/rec/conf/wcnc/RenLXXZZS22"}, "url":"URL#946903" }, { "@score":"2", "@id":"972270", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Threat Detection for General Social Engineering Attack Using Machine Learning Techniques.","venue":"CoRR","volume":"abs/2203.07933","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2203-07933","doi":"10.48550/ARXIV.2203.07933","ee":"https://doi.org/10.48550/arXiv.2203.07933","url":"https://dblp.org/rec/journals/corr/abs-2203-07933"}, "url":"URL#972270" }, { "@score":"3", "@id":"997173", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.","venue":"CoRR","volume":"abs/2207.00232","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2207-00232","doi":"10.48550/ARXIV.2207.00232","ee":"https://doi.org/10.48550/arXiv.2207.00232","url":"https://dblp.org/rec/journals/corr/abs-2207-00232"}, "url":"URL#997173" }, { "@score":"3", "@id":"1021399", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"36/2561","text":"Zhiyu Wang"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"86/7981","text":"Fei Lyu 0001"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises.","venue":"CoRR","volume":"abs/2210.10581","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2210-10581","doi":"10.48550/ARXIV.2210.10581","ee":"https://doi.org/10.48550/arXiv.2210.10581","url":"https://dblp.org/rec/journals/corr/abs-2210-10581"}, "url":"URL#1021399" }, { "@score":"3", "@id":"1023913", "info":{"authors":{"author":[{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"13/6922","text":"Xin Zheng"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis.","venue":"CoRR","volume":"abs/2210.15824","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2210-15824","doi":"10.48550/ARXIV.2210.15824","ee":"https://doi.org/10.48550/arXiv.2210.15824","url":"https://dblp.org/rec/journals/corr/abs-2210-15824"}, "url":"URL#1023913" }, { "@score":"2", "@id":"1051290", "info":{"authors":{"author":[{"@pid":"259/3875","text":"Qinping Feng"},{"@pid":"226/4360","text":"Shuping Tao"},{"@pid":"04/3240","text":"Chunyu Liu"},{"@pid":"98/1223","text":"Hongsong Qu"}]},"title":"An Improved Fourier-Mellin Transform-Based Registration Used in TDI-CMOS.","venue":"IEEE Access","volume":"9","pages":"64165-64178","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/FengTLQ21","doi":"10.1109/ACCESS.2021.3075235","ee":"https://doi.org/10.1109/ACCESS.2021.3075235","url":"https://dblp.org/rec/journals/access/FengTLQ21"}, "url":"URL#1051290" }, { "@score":"4", "@id":"1054137", "info":{"authors":{"author":[{"@pid":"292/6225","text":"Kequan Li"},{"@pid":"88/2827","text":"Yan Chen"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"44/7726","text":"Xiangwei Mu"},{"@pid":"139/6932-1","text":"Xuhong Zhang 0001"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"DeepRecipes: Exploring Massive Online Recipes and Recovering Food Ingredient Amounts.","venue":"IEEE Access","volume":"9","pages":"67859-67873","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/LiCLMZL21","doi":"10.1109/ACCESS.2021.3077645","ee":"https://doi.org/10.1109/ACCESS.2021.3077645","url":"https://dblp.org/rec/journals/access/LiCLMZL21"}, "url":"URL#1054137" }, { "@score":"2", "@id":"1059120", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods.","venue":"IEEE Access","volume":"9","pages":"11895-11910","year":"2021","type":"Journal Articles","access":"open","key":"journals/access/WangZS21","doi":"10.1109/ACCESS.2021.3051633","ee":"https://doi.org/10.1109/ACCESS.2021.3051633","url":"https://dblp.org/rec/journals/access/WangZS21"}, "url":"URL#1059120" }, { "@score":"2", "@id":"1092902", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.","venue":"Cybersecur.","volume":"4","number":"1","pages":"31","year":"2021","type":"Journal Articles","access":"open","key":"journals/cybersec/WangZLS21","doi":"10.1186/S42400-021-00094-6","ee":"https://doi.org/10.1186/s42400-021-00094-6","url":"https://dblp.org/rec/journals/cybersec/WangZLS21"}, "url":"URL#1092902" }, { "@score":"2", "@id":"1182338", "info":{"authors":{"author":[{"@pid":"259/3875","text":"Qinping Feng"},{"@pid":"226/4360","text":"Shuping Tao"},{"@pid":"04/3240","text":"Chunyu Liu"},{"@pid":"98/1223","text":"Hongsong Qu"},{"@pid":"32/1213","text":"Wei Xu"}]},"title":"IFRAD: A Fast Feature Descriptor for Remote Sensing Images.","venue":"Remote. Sens.","volume":"13","number":"18","pages":"3774","year":"2021","type":"Journal Articles","access":"open","key":"journals/remotesensing/FengTLQX21","doi":"10.3390/RS13183774","ee":"https://doi.org/10.3390/rs13183774","url":"https://dblp.org/rec/journals/remotesensing/FengTLQX21"}, "url":"URL#1182338" }, { "@score":"2", "@id":"1185599", "info":{"authors":{"author":[{"@pid":"72/3947","text":"Xiaobin Wu"},{"@pid":"98/1223","text":"Hongsong Qu"},{"@pid":"98/8024","text":"Liangliang Zheng"},{"@pid":"295/1437","text":"Tan Gao"},{"@pid":"90/46","text":"Ziyu Zhang"}]},"title":"A Remote Sensing Image Destriping Model Based on Low-Rank and Directional Sparse Constraint.","venue":"Remote. Sens.","volume":"13","number":"24","pages":"5126","year":"2021","type":"Journal Articles","access":"open","key":"journals/remotesensing/WuQZGZ21","doi":"10.3390/RS13245126","ee":"https://doi.org/10.3390/rs13245126","url":"https://dblp.org/rec/journals/remotesensing/WuQZGZ21"}, "url":"URL#1185599" }, { "@score":"2", "@id":"1226198", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"16/8313","text":"Shengcai Liao"},{"@pid":"75/1281","text":"Ling Shao 0001"}]},"title":"AFAN: Augmented Feature Alignment Network for Cross-Domain Object Detection.","venue":"IEEE Trans. Image Process.","volume":"30","pages":"4046-4056","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tip/WangLS21","doi":"10.1109/TIP.2021.3066046","ee":"https://doi.org/10.1109/TIP.2021.3066046","url":"https://dblp.org/rec/journals/tip/WangLS21"}, "url":"URL#1226198" }, { "@score":"2", "@id":"1247886", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"56/7911","text":"Tingwen Liu"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Discontinuous Named Entity Recognition as Maximal Clique Discovery.","venue":"ACL/IJCNLP","pages":"764-774","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/acl/Wang0ZLYS20","doi":"10.18653/V1/2021.ACL-LONG.63","ee":"https://doi.org/10.18653/v1/2021.acl-long.63","url":"https://dblp.org/rec/conf/acl/Wang0ZLYS20"}, "url":"URL#1247886" }, { "@score":"2", "@id":"1248784", "info":{"authors":{"author":[{"@pid":"294/4627","text":"Dongliang Fang"},{"@pid":"181/4577","text":"Zhanwei Song"},{"@pid":"137/5266","text":"Le Guan"},{"@pid":"294/5115","text":"Puzhuo Liu"},{"@pid":"209/3889","text":"Anni Peng"},{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"21/6121-5","text":"Peng Liu 0005"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.","venue":"ACSAC","pages":"849-860","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/acsac/FangSGLPCZLZS21","doi":"10.1145/3485832.3488028","ee":"https://doi.org/10.1145/3485832.3488028","url":"https://dblp.org/rec/conf/acsac/FangSGLPCZLZS21"}, "url":"URL#1248784" }, { "@score":"2", "@id":"1293023", "info":{"authors":{"author":[{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"56/7911","text":"Tingwen Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"13/1898-4","text":"Bin Wang 0004"}]},"title":"Maximal Clique Based Non-Autoregressive Open Information Extraction.","venue":"EMNLP","pages":"9696-9706","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/emnlp/0002WLZSW21","doi":"10.18653/V1/2021.EMNLP-MAIN.764","ee":"https://doi.org/10.18653/v1/2021.emnlp-main.764","url":"https://dblp.org/rec/conf/emnlp/0002WLZSW21"}, "url":"URL#1293023" }, { "@score":"2", "@id":"1339926", "info":{"authors":{"author":[{"@pid":"53/4105","text":"Caihong Liu"},{"@pid":"179/0151","text":"Zhenjia Dou"},{"@pid":"08/6001","text":"Yu Hu"},{"@pid":"127/1432","text":"Hongsong Zhou"}]},"title":"Some Basic Problems of Weak Signal Detection Based on Duffing Chaos System.","venue":"ICSPCC","pages":"1-6","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icspcc/LiuDHZ21","doi":"10.1109/ICSPCC52875.2021.9564931","ee":"https://doi.org/10.1109/ICSPCC52875.2021.9564931","url":"https://dblp.org/rec/conf/icspcc/LiuDHZ21"}, "url":"URL#1339926" }, { "@score":"3", "@id":"1394977", "info":{"authors":{"author":[{"@pid":"259/3821","text":"Zhaoteng Yan"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"303/7015","text":"Wenping Bai"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features.","venue":"SciSec","pages":"21-35","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/scisec/YanLBYZS21","doi":"10.1007/978-3-030-89137-4_2","ee":"https://doi.org/10.1007/978-3-030-89137-4_2","url":"https://dblp.org/rec/conf/scisec/YanLBYZS21"}, "url":"URL#1394977" }, { "@score":"3", "@id":"1398649", "info":{"authors":{"author":[{"@pid":"152/5077-2","text":"Zihan Wang 0002"},{"@pid":"52/10774","text":"Hongye Song"},{"@pid":"58/10440","text":"Zhaochun Ren"},{"@pid":"168/4596","text":"Pengjie Ren"},{"@pid":"88/1081","text":"Zhumin Chen"},{"@pid":"11/6389","text":"Xiaozhong Liu"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"r/MdRijke","text":"Maarten de Rijke"}]},"title":"Cross-Domain Contract Element Extraction with a Bi-directional Feedback Clause-Element Relation Network.","venue":"SIGIR","pages":"1003-1012","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigir/WangSRRCLLR21","doi":"10.1145/3404835.3462873","ee":"https://doi.org/10.1145/3404835.3462873","url":"https://dblp.org/rec/conf/sigir/WangSRRCLLR21"}, "url":"URL#1398649" }, { "@score":"3", "@id":"1411458", "info":{"authors":{"author":[{"@pid":"19/1374","text":"Xiao Hu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"19/6306","text":"Zhiqiang Shi"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"A Robust IoT Device Identification Method with Unknown Traffic Detection.","venue":"WASA","pages":"190-202","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/HuLSYZS21","doi":"10.1007/978-3-030-85928-2_15","ee":"https://doi.org/10.1007/978-3-030-85928-2_15","url":"https://dblp.org/rec/conf/wasa/HuLSYZS21"}, "url":"URL#1411458" }, { "@score":"3", "@id":"1411517", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"FIUD: A Framework to Identify Users of Devices.","venue":"WASA","pages":"45-57","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/RenLZS21","doi":"10.1007/978-3-030-86130-8_4","ee":"https://doi.org/10.1007/978-3-030-86130-8_4","url":"https://dblp.org/rec/conf/wasa/RenLZS21"}, "url":"URL#1411517" }, { "@score":"3", "@id":"1448364", "info":{"authors":{"author":[{"@pid":"152/5077-2","text":"Zihan Wang 0002"},{"@pid":"52/10774","text":"Hongye Song"},{"@pid":"58/10440","text":"Zhaochun Ren"},{"@pid":"168/4596","text":"Pengjie Ren"},{"@pid":"88/1081","text":"Zhumin Chen"},{"@pid":"11/6389","text":"Xiaozhong Liu"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"r/MdRijke","text":"Maarten de Rijke"}]},"title":"Cross-Domain Contract Element Extraction with a Bi-directional Feedback Clause-Element Relation Network.","venue":"CoRR","volume":"abs/2105.06083","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2105-06083","ee":"https://arxiv.org/abs/2105.06083","url":"https://dblp.org/rec/journals/corr/abs-2105-06083"}, "url":"URL#1448364" }, { "@score":"2", "@id":"1452354", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"56/7911","text":"Tingwen Liu"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Discontinuous Named Entity Recognition as Maximal Clique Discovery.","venue":"CoRR","volume":"abs/2106.00218","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2106-00218","ee":"https://arxiv.org/abs/2106.00218","url":"https://dblp.org/rec/journals/corr/abs-2106-00218"}, "url":"URL#1452354" }, { "@score":"2", "@id":"1452830", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"116/6919","text":"Peipei Liu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples.","venue":"CoRR","volume":"abs/2106.01157","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2106-01157","ee":"https://arxiv.org/abs/2106.01157","url":"https://dblp.org/rec/journals/corr/abs-2106-01157"}, "url":"URL#1452830" }, { "@score":"2", "@id":"1454908", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"16/8313","text":"Shengcai Liao"},{"@pid":"75/1281","text":"Ling Shao 0001"}]},"title":"AFAN: Augmented Feature Alignment Network for Cross-Domain Object Detection.","venue":"CoRR","volume":"abs/2106.05499","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2106-05499","ee":"https://arxiv.org/abs/2106.05499","url":"https://dblp.org/rec/journals/corr/abs-2106-05499"}, "url":"URL#1454908" }, { "@score":"2", "@id":"1468451", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"299/7707","text":"Jiaqian Peng"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks.","venue":"CoRR","volume":"abs/2108.06529","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2108-06529","ee":"https://arxiv.org/abs/2108.06529","url":"https://dblp.org/rec/journals/corr/abs-2108-06529"}, "url":"URL#1468451" }, { "@score":"3", "@id":"1476743", "info":{"authors":{"author":[{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"43/656","text":"Tao Liu"},{"@pid":"137/5266","text":"Le Guan"},{"@pid":"21/6121-5","text":"Peng Liu 0005"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.","venue":"CoRR","volume":"abs/2109.12209","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2109-12209","ee":"https://arxiv.org/abs/2109.12209","url":"https://dblp.org/rec/journals/corr/abs-2109-12209"}, "url":"URL#1476743" }, { "@score":"2", "@id":"1522694", "info":{"authors":{"author":[{"@pid":"266/4205","text":"Zuoguang Wang"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Defining Social Engineering in Cybersecurity.","venue":"IEEE Access","volume":"8","pages":"85094-85115","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/WangSZ20a","doi":"10.1109/ACCESS.2020.2992807","ee":"https://doi.org/10.1109/ACCESS.2020.2992807","url":"https://dblp.org/rec/journals/access/WangSZ20a"}, "url":"URL#1522694" }, { "@score":"4", "@id":"1689961", "info":{"authors":{"author":[{"@pid":"32/971","text":"Juntao Li"},{"@pid":"52/5716-76","text":"Chang Liu 0076"},{"@pid":"39/449","text":"Jian Wang"},{"@pid":"53/6625","text":"Lidong Bing"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"11/6389","text":"Xiaozhong Liu"},{"@pid":"63/1870","text":"Dongyan Zhao 0001"},{"@pid":"19/2405-1","text":"Rui Yan 0001"}]},"title":"Cross-Lingual Low-Resource Set-to-Description Retrieval for Global E-Commerce.","venue":"AAAI","pages":"8212-8219","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiLWBLL0Y20","doi":"10.1609/AAAI.V34I05.6335","ee":"https://doi.org/10.1609/aaai.v34i05.6335","url":"https://dblp.org/rec/conf/aaai/LiLWBLL0Y20"}, "url":"URL#1689961" }, { "@score":"2", "@id":"1720505", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"230/4361","text":"Yueyang Zhang"},{"@pid":"56/7911","text":"Tingwen Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.","venue":"COLING","pages":"1572-1582","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/coling/WangYZLZS20","doi":"10.18653/V1/2020.COLING-MAIN.138","ee":"https://doi.org/10.18653/v1/2020.coling-main.138","url":"https://dblp.org/rec/conf/coling/WangYZLZS20"}, "url":"URL#1720505" }, { "@score":"4", "@id":"1726748", "info":{"authors":{"author":[{"@pid":"301/6126","text":"Yimo Ren"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"131/8360","text":"Weizhong Wang"},{"@pid":"30/7421","text":"Yachao Li"}]},"title":"The Mining of IP Landmarks for Internet Webcams.","venue":"CWSN","pages":"257-268","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/cwsn/Ren0ZSWL20","doi":"10.1007/978-981-33-4214-9_19","ee":"https://doi.org/10.1007/978-981-33-4214-9_19","url":"https://dblp.org/rec/conf/cwsn/Ren0ZSWL20"}, "url":"URL#1726748" }, { "@score":"3", "@id":"1731632", "info":{"authors":{"author":[{"@pid":"03/4645","text":"Zheng Gao"},{"@pid":"222/7936","text":"Lujun Zhao"},{"@pid":"03/281","text":"Heng Huang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"212/2092","text":"Changlong Sun"},{"@pid":"14/1217","text":"Luo Si"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"Behavior Based Dynamic Summarization on Product Aspects via Reinforcement Neighbour Selection.","venue":"ECAI","pages":"2022-2029","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/ecai/GaoZHLSSL20","doi":"10.3233/FAIA200323","ee":"https://doi.org/10.3233/FAIA200323","url":"https://dblp.org/rec/conf/ecai/GaoZHLSSL20"}, "url":"URL#1731632" }, { "@score":"3", "@id":"1783351", "info":{"authors":{"author":[{"@pid":"53/4105","text":"Caihong Liu"},{"@pid":"181/2689","text":"Qing Li"},{"@pid":"08/6001","text":"Yu Hu"},{"@pid":"127/1432","text":"Hongsong Zhou"}]},"title":"A Duffing Detection Method of Eliminating Noise False Alarm Based on Detection Statistics.","venue":"ICSPCC","pages":"1-6","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icspcc/LiuLHZ20","doi":"10.1109/ICSPCC50002.2020.9259512","ee":"https://doi.org/10.1109/ICSPCC50002.2020.9259512","url":"https://dblp.org/rec/conf/icspcc/LiuLHZ20"}, "url":"URL#1783351" }, { "@score":"3", "@id":"1830491", "info":{"authors":{"author":[{"@pid":"85/5001","text":"Xiaohui Duan"},{"@pid":"15/828-5","text":"Ping Gao 0005"},{"@pid":"04/6901","text":"Meng Zhang"},{"@pid":"202/8402","text":"Tingjian Zhang"},{"@pid":"248/5044","text":"Hongsong Meng"},{"@pid":"17/7624","text":"Yuxuan Li"},{"@pid":"80/1737","text":"Bertil Schmidt"},{"@pid":"71/3657","text":"Haohuan Fu"},{"@pid":"120/9592","text":"Lin Gan"},{"@pid":"75/3841","text":"Wei Xue"},{"@pid":"67/3001","text":"Guangwen Yang"},{"@pid":"31/371","text":"Weiguo Liu"}]},"title":"Neighbor-list-free molecular dynamics on sunway TaihuLight supercomputer.","venue":"PPoPP","pages":"413-414","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/ppopp/Duan0ZZMLSFGXYL20","doi":"10.1145/3332466.3374532","ee":"https://doi.org/10.1145/3332466.3374532","url":"https://dblp.org/rec/conf/ppopp/Duan0ZZMLSFGXYL20"}, "url":"URL#1830491" }, { "@score":"3", "@id":"1835351", "info":{"authors":{"author":[{"@pid":"85/5001","text":"Xiaohui Duan"},{"@pid":"15/828-5","text":"Ping Gao 0005"},{"@pid":"04/6901","text":"Meng Zhang"},{"@pid":"202/8402","text":"Tingjian Zhang"},{"@pid":"248/5044","text":"Hongsong Meng"},{"@pid":"17/7624","text":"Yuxuan Li"},{"@pid":"80/1737","text":"Bertil Schmidt"},{"@pid":"71/3657","text":"Haohuan Fu"},{"@pid":"120/9592","text":"Lin Gan"},{"@pid":"75/3841","text":"Wei Xue"},{"@pid":"31/371","text":"Weiguo Liu"},{"@pid":"67/3001","text":"Guangwen Yang"}]},"title":"Cell-list based molecular dynamics on many-core processors: a case study on sunway TaihuLight supercomputer.","venue":"SC","pages":"22","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sc/Duan0ZZMLSFGXLY20","doi":"10.1109/SC41405.2020.00026","ee":"https://doi.org/10.1109/SC41405.2020.00026","url":"https://dblp.org/rec/conf/sc/Duan0ZZMLSFGXLY20"}, "url":"URL#1835351" }, { "@score":"2", "@id":"1836322", "info":{"authors":{"author":[{"@pid":"280/8744","text":"Liting Deng"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"280/8684","text":"Mingfeng Xin"},{"@pid":"69/4248","text":"Yue Sun"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Malware Classification Using Attention-Based Transductive Learning Network.","venue":"SecureComm","pages":"403-418","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/securecomm/DengWXSSZ20","doi":"10.1007/978-3-030-63095-9_26","ee":"https://doi.org/10.1007/978-3-030-63095-9_26","url":"https://dblp.org/rec/conf/securecomm/DengWXSSZ20"}, "url":"URL#1836322" }, { "@score":"3", "@id":"1839461", "info":{"authors":{"author":[{"@pid":"03/4645","text":"Zheng Gao"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"132/5378","text":"Zhuoren Jiang"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"Detecting User Community in Sparse Domain via Cross-Graph Pairwise Learning.","venue":"SIGIR","pages":"139-148","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigir/GaoLJL20","doi":"10.1145/3397271.3401055","ee":"https://doi.org/10.1145/3397271.3401055","url":"https://dblp.org/rec/conf/sigir/GaoLJL20"}, "url":"URL#1839461" }, { "@score":"3", "@id":"1839678", "info":{"authors":{"author":[{"@pid":"198/6597","text":"Yongzhen Wang"},{"@pid":"39/449","text":"Jian Wang"},{"@pid":"03/281","text":"Heng Huang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"Evolutionary Product Description Generation: A Dynamic Fine-Tuning Approach Leveraging User Click Behavior.","venue":"SIGIR","pages":"119-128","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigir/WangWHLL20","doi":"10.1145/3397271.3401140","ee":"https://doi.org/10.1145/3397271.3401140","url":"https://dblp.org/rec/conf/sigir/WangWHLL20"}, "url":"URL#1839678" }, { "@score":"3", "@id":"1853641", "info":{"authors":{"author":[{"@pid":"259/3821","text":"Zhaoteng Yan"},{"@pid":"42/6220","text":"Nan Yu"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.","venue":"WASA","pages":"602-614","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/YanYWLZS20","doi":"10.1007/978-3-030-59016-1_50","ee":"https://doi.org/10.1007/978-3-030-59016-1_50","url":"https://dblp.org/rec/conf/wasa/YanYWLZS20"}, "url":"URL#1853641" }, { "@score":"3", "@id":"1853657", "info":{"authors":{"author":[{"@pid":"198/6947","text":"Zhihui Zhao"},{"@pid":"131/8360","text":"Weizhong Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"04/11534","text":"Sen Zhao"},{"@pid":"87/3691","text":"Yan Hu"}]},"title":"EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.","venue":"WASA","pages":"755-767","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/ZhaoWZLSZH20","doi":"10.1007/978-3-030-59016-1_62","ee":"https://doi.org/10.1007/978-3-030-59016-1_62","url":"https://dblp.org/rec/conf/wasa/ZhaoWZLSZH20"}, "url":"URL#1853657" }, { "@score":"4", "@id":"1887531", "info":{"authors":{"author":[{"@pid":"32/971","text":"Juntao Li"},{"@pid":"52/5716-76","text":"Chang Liu 0076"},{"@pid":"39/449","text":"Jian Wang"},{"@pid":"53/6625","text":"Lidong Bing"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"11/6389","text":"Xiaozhong Liu"},{"@pid":"63/1870","text":"Dongyan Zhao 0001"},{"@pid":"19/2405-1","text":"Rui Yan 0001"}]},"title":"Cross-Lingual Low-Resource Set-to-Description Retrieval for Global E-Commerce.","venue":"CoRR","volume":"abs/2005.08188","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2005-08188","ee":"https://arxiv.org/abs/2005.08188","url":"https://dblp.org/rec/journals/corr/abs-2005-08188"}, "url":"URL#1887531" }, { "@score":"3", "@id":"1909817", "info":{"authors":{"author":[{"@pid":"03/4645","text":"Zheng Gao"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"132/5378","text":"Zhuoren Jiang"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"Detecting User Community in Sparse Domain via Cross-Graph Pairwise Learning.","venue":"CoRR","volume":"abs/2009.02637","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2009-02637","ee":"https://arxiv.org/abs/2009.02637","url":"https://dblp.org/rec/journals/corr/abs-2009-02637"}, "url":"URL#1909817" }, { "@score":"2", "@id":"1920516", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"84/2694","text":"Yong Wang"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"XLBoost-Geo: An IP Geolocation System Based on Extreme Landmark Boosting.","venue":"CoRR","volume":"abs/2010.13396","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2010-13396","ee":"https://arxiv.org/abs/2010.13396","url":"https://dblp.org/rec/journals/corr/abs-2010-13396"}, "url":"URL#1920516" }, { "@score":"2", "@id":"1920522", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"95/10266-2","text":"Bowen Yu 0002"},{"@pid":"230/4361","text":"Yueyang Zhang"},{"@pid":"56/7911","text":"Tingwen Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.","venue":"CoRR","volume":"abs/2010.13415","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2010-13415","ee":"https://arxiv.org/abs/2010.13415","url":"https://dblp.org/rec/journals/corr/abs-2010-13415"}, "url":"URL#1920522" }, { "@score":"3", "@id":"1934979", "info":{"authors":{"author":[{"@pid":"176/9300","text":"Weiqiong Cao"},{"@pid":"91/5830","text":"Hongsong Shi"},{"@pid":"44/2144-11","text":"Hua Chen 0011"},{"@pid":"10/264","text":"Wei Xi"},{"@pid":"46/3744","text":"Haoyuan Li"},{"@pid":"14/3166","text":"Limin Fan"},{"@pid":"74/2464","text":"Wenling Wu"}]},"title":"Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.","venue":"IACR Cryptol. ePrint Arch.","volume":"2020","pages":"803","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/iacr/CaoSCXLFW20","ee":"https://eprint.iacr.org/2020/803","url":"https://dblp.org/rec/journals/iacr/CaoSCXLFW20"}, "url":"URL#1934979" }, { "@score":"6", "@id":"1986378", "info":{"authors":{"author":[{"@pid":"52/253","text":"Zhihao Wang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"64/6025-59","text":"Wei Li 0059"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Towards IP geolocation with intermediate routers based on topology discovery.","venue":"Cybersecur.","volume":"2","number":"1","pages":"13","year":"2019","type":"Journal Articles","access":"open","key":"journals/cybersec/WangLLLZS19","doi":"10.1186/S42400-019-0030-2","ee":"https://doi.org/10.1186/s42400-019-0030-2","url":"https://dblp.org/rec/journals/cybersec/WangLLLZS19"}, "url":"URL#1986378" }, { "@score":"2", "@id":"2040879", "info":{"authors":{"author":[{"@pid":"176/6731","text":"Xiong Zhan"},{"@pid":"97/3499","text":"Hao Guo"},{"@pid":"80/3328","text":"Xiaoyun He"},{"@pid":"209/7082","text":"Zhoubin Liu"},{"@pid":"160/5587","text":"Xuejie Sun"},{"@pid":"60/2","text":"Hongsong Chen"}]},"title":"国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).","venue":"计算机科学","volume":"46","number":"11A","pages":"428-432","year":"2019","type":"Journal Articles","access":"open","key":"journals/jsjkx/ZhanGHLSC19","ee":"http://www.jsjkx.com/CN/Y2019/V46/I11A/428","url":"https://dblp.org/rec/journals/jsjkx/ZhanGHLSC19"}, "url":"URL#2040879" }, { "@score":"2", "@id":"2103819", "info":{"authors":{"author":[{"@pid":"60/2","text":"Hongsong Chen"},{"@pid":"20/2039","text":"Ming Liu"},{"@pid":"01/8379","text":"Zhongchuan Fu"}]},"title":"Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network.","venue":"Wirel. Pers. Commun.","volume":"104","number":"2","pages":"595-615","year":"2019","type":"Journal Articles","access":"closed","key":"journals/wpc/ChenLF19","doi":"10.1007/S11277-018-6036-3","ee":"https://doi.org/10.1007/s11277-018-6036-3","url":"https://dblp.org/rec/journals/wpc/ChenLF19"}, "url":"URL#2103819" }, { "@score":"2", "@id":"2170818", "info":{"authors":{"author":[{"@pid":"259/3821","text":"Zhaoteng Yan"},{"@pid":"176/7476","text":"Shichao Lv"},{"@pid":"230/4361","text":"Yueyang Zhang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Remote Fingerprinting on Internet-Wide Printers Based on Neural Network.","venue":"GLOBECOM","pages":"1-6","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YanLZZS19","doi":"10.1109/GLOBECOM38437.2019.9014144","ee":"https://doi.org/10.1109/GLOBECOM38437.2019.9014144","url":"https://dblp.org/rec/conf/globecom/YanLZZS19"}, "url":"URL#2170818" }, { "@score":"4", "@id":"2224419", "info":{"authors":{"author":[{"@pid":"75/6627","text":"Ke Li"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"78/7230","text":"Hui Wen"}]},"title":"Side-Channel Information Leakage of Traffic Data in Instant Messaging.","venue":"IPCCC","pages":"1-8","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LiLZSW19","doi":"10.1109/IPCCC47392.2019.8958775","ee":"https://doi.org/10.1109/IPCCC47392.2019.8958775","url":"https://dblp.org/rec/conf/ipccc/LiLZSW19"}, "url":"URL#2224419" }, { "@score":"2", "@id":"2224449", "info":{"authors":{"author":[{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"181/4577","text":"Zhanwei Song"},{"@pid":"16/1656","text":"Yuyan Sun"},{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.","venue":"IPCCC","pages":"1-8","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhengSSCZS19","doi":"10.1109/IPCCC47392.2019.8958740","ee":"https://doi.org/10.1109/IPCCC47392.2019.8958740","url":"https://dblp.org/rec/conf/ipccc/ZhengSSCZS19"}, "url":"URL#2224449" }, { "@score":"2", "@id":"2224847", "info":{"authors":{"author":[{"@pid":"99/6737","text":"Zhao Liu"},{"@pid":"248/5235","text":"Xuesen Chu"},{"@pid":"237/8827","text":"Xiaojing Lv"},{"@pid":"248/5044","text":"Hongsong Meng"},{"@pid":"176/9293","text":"Shupeng Shi"},{"@pid":"248/5316","text":"Wenji Han"},{"@pid":"180/7981","text":"Jingheng Xu"},{"@pid":"71/3657","text":"Haohuan Fu"},{"@pid":"67/3001","text":"Guangwen Yang"}]},"title":"SunwayLB: Enabling Extreme-Scale Lattice Boltzmann Method Based Computing Fluid Dynamics Simulations on Sunway TaihuLight.","venue":"IPDPS","pages":"557-566","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipps/LiuCLMSHXFY19","doi":"10.1109/IPDPS.2019.00065","ee":"https://doi.org/10.1109/IPDPS.2019.00065","url":"https://dblp.org/rec/conf/ipps/LiuCLMSHXFY19"}, "url":"URL#2224847" }, { "@score":"3", "@id":"2282802", "info":{"authors":{"author":[{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"129/1113","text":"Xiaojing Liao"},{"@pid":"06/6268","text":"XiaoFeng Wang 0001"},{"@pid":"81/4036","text":"Haining Wang"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"17/2247","text":"Kai Yang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.","venue":"USENIX Security Symposium","pages":"887-903","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/uss/FengL0W0YZS19","ee":"https://www.usenix.org/conference/usenixsecurity19/presentation/feng","url":"https://dblp.org/rec/conf/uss/FengL0W0YZS19"}, "url":"URL#2282802" }, { "@score":"2", "@id":"2282897", "info":{"authors":{"author":[{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"204/5761","text":"Ali Davanian"},{"@pid":"77/6178-1","text":"Heng Yin 0001"},{"@pid":"69/6818","text":"Chengyu Song"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.","venue":"USENIX Security Symposium","pages":"1099-1114","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/uss/ZhengDYSZS19","ee":"https://www.usenix.org/conference/usenixsecurity19/presentation/zheng","url":"https://dblp.org/rec/conf/uss/ZhengDYSZS19"}, "url":"URL#2282897" }, { "@score":"3", "@id":"2286545", "info":{"authors":{"author":[{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"181/2815","text":"Xu Wang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"25/1145-2","text":"Hai Zhao 0002"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.","venue":"WASA","pages":"346-357","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/WangWZZLS19","doi":"10.1007/978-3-030-23597-0_28","ee":"https://doi.org/10.1007/978-3-030-23597-0_28","url":"https://dblp.org/rec/conf/wasa/WangWZZLS19"}, "url":"URL#2286545" }, { "@score":"2", "@id":"2286548", "info":{"authors":{"author":[{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"24/3562","text":"Weidong Zhang"},{"@pid":"87/3691","text":"Yan Hu"},{"@pid":"48/4407","text":"Qing Hu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Lightweight IoT Malware Visualization Analysis via Two-Bits Networks.","venue":"WASA","pages":"613-621","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/WenZHHZS19","doi":"10.1007/978-3-030-23597-0_51","ee":"https://doi.org/10.1007/978-3-030-23597-0_51","url":"https://dblp.org/rec/conf/wasa/WenZHHZS19"}, "url":"URL#2286548" }, { "@score":"2", "@id":"2290653", "info":{"authors":{"author":[{"@pid":"181/2815","text":"Xu Wang"},{"@pid":"66/4822","text":"Yucheng Wang"},{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"246/7361","text":"Yuchi Zou"}]},"title":"IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices.","venue":"WOWMOM","pages":"1-9","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/wowmom/WangWFZSZ19","doi":"10.1109/WOWMOM.2019.8793012","ee":"https://doi.org/10.1109/WoWMoM.2019.8793012","url":"https://dblp.org/rec/conf/wowmom/WangWFZSZ19"}, "url":"URL#2290653" }, { "@score":"3", "@id":"2326499", "info":{"authors":{"author":[{"@pid":"03/4645","text":"Zheng Gao"},{"@pid":"49/2335","text":"Lin Guo"},{"@pid":"40/4719","text":"Chi Ma"},{"@pid":"35/573-28","text":"Xiao Ma 0028"},{"@pid":"09/1171","text":"Kai Sun"},{"@pid":"166/2426","text":"Hang Xiang"},{"@pid":"118/5116","text":"Xiaoqiang Zhu"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"11/6389","text":"Xiaozhong Liu"}]},"title":"AMAD: Adversarial Multiscale Anomaly Detection on High-Dimensional and Time-Evolving Categorical Data.","venue":"CoRR","volume":"abs/1907.06582","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1907-06582","ee":"http://arxiv.org/abs/1907.06582","url":"https://dblp.org/rec/journals/corr/abs-1907-06582"}, "url":"URL#2326499" }, { "@score":"3", "@id":"2368537", "info":{"authors":{"author":[{"@pid":"156/0093","text":"Jinfa Wang"},{"@pid":"25/1145-2","text":"Hai Zhao 0002"},{"@pid":"77/6958","text":"Jiu-Qiang Xu"},{"@pid":"226/5576","text":"Hequn Li"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"223/4255","text":"Shuai Chao"},{"@pid":"231/0779","text":"Chunyang Zheng"}]},"title":"Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow Interaction.","venue":"IEEE Access","volume":"6","pages":"64801-64816","year":"2018","type":"Journal Articles","access":"open","key":"journals/access/WangZXLZCZ18","doi":"10.1109/ACCESS.2018.2873291","ee":"https://doi.org/10.1109/ACCESS.2018.2873291","url":"https://dblp.org/rec/journals/access/WangZXLZCZ18"}, "url":"URL#2368537" }, { "@score":"3", "@id":"2393338", "info":{"authors":{"author":[{"@pid":"229/3926","text":"Christian Herrero-Veron"},{"@pid":"00/7559","text":"Jianping Zheng"},{"@pid":"97/5917","text":"Joachim W. Walewski"},{"@pid":"74/9197","text":"Michael Bahr"},{"@pid":"229/3964","text":"Kurt Bischinger"},{"@pid":"128/8022","text":"Hyounhee Koo"},{"@pid":"229/3991","text":"Tricci So"},{"@pid":"199/7788","text":"Kiran Makhijani"},{"@pid":"62/5158","text":"Richard Li"},{"@pid":"206/0475","text":"Marc Holness"},{"@pid":"23/1337","text":"Yoshifumi Nishida"},{"@pid":"31/9324","text":"Philip Eardley"},{"@pid":"229/3884","text":"Jiajun Ma"},{"@pid":"91/5830","text":"Hongsong Shi"},{"@pid":"181/2839","text":"Kai Chen"},{"@pid":"229/3820","text":"Gaetan Pradel"},{"@pid":"85/4087","text":"Yanbin Zhang"},{"@pid":"79/11353","text":"Xiaotian Yao"},{"@pid":"96/2192","text":"Liang Wei"},{"@pid":"229/3746","text":"John Caras"},{"@pid":"68/6180","text":"Abbie Barbir"},{"@pid":"229/3989","text":"Hiroshi Takechi"},{"@pid":"138/4337","text":"Junjie Xie"},{"@pid":"229/3827","text":"Keundug Park"},{"@pid":"31/5983","text":"Sang-Woo Lee"}]},"title":"Standards News.","venue":"IEEE Commun. Stand. Mag.","volume":"2","number":"3","pages":"4-12","year":"2018","type":"Journal Articles","access":"closed","key":"journals/csm/Herrero-VeronZW18","doi":"10.1109/MCOMSTD.2018.8515141","ee":"http://doi.ieeecomputersociety.org/10.1109/MCOMSTD.2018.8515141","url":"https://dblp.org/rec/journals/csm/Herrero-VeronZW18"}, "url":"URL#2393338" }, { "@score":"2", "@id":"2462245", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Learning content and style: Joint action recognition and person identification from human skeletons.","venue":"Pattern Recognit.","volume":"81","pages":"23-35","year":"2018","type":"Journal Articles","access":"closed","key":"journals/pr/WangW18","doi":"10.1016/J.PATCOG.2018.03.030","ee":"https://doi.org/10.1016/j.patcog.2018.03.030","url":"https://dblp.org/rec/journals/pr/WangW18"}, "url":"URL#2462245" }, { "@score":"2", "@id":"2487101", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Cross-Agent Action Recognition.","venue":"IEEE Trans. Circuits Syst. Video Technol.","volume":"28","number":"10","pages":"2908-2919","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tcsv/WangW18a","doi":"10.1109/TCSVT.2017.2746092","ee":"https://doi.org/10.1109/TCSVT.2017.2746092","url":"https://dblp.org/rec/journals/tcsv/WangW18a"}, "url":"URL#2487101" }, { "@score":"2", "@id":"2492283", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Beyond Joints: Learning Representations From Primitive Geometries for Skeleton-Based Action Recognition and Detection.","venue":"IEEE Trans. Image Process.","volume":"27","number":"9","pages":"4382-4394","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tip/WangW18","doi":"10.1109/TIP.2018.2837386","ee":"https://doi.org/10.1109/TIP.2018.2837386","url":"https://dblp.org/rec/journals/tip/WangW18"}, "url":"URL#2492283" }, { "@score":"6", "@id":"2493986", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Employing Semantic Context for Sparse Information Extraction Assessment.","venue":"ACM Trans. Knowl. Discov. Data","volume":"12","number":"5","pages":"54:1-54:36","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiWLW18","doi":"10.1145/3201407","ee":"https://doi.org/10.1145/3201407","url":"https://dblp.org/rec/journals/tkdd/LiWLW18"}, "url":"URL#2493986" }, { "@score":"4", "@id":"2494096", "info":{"authors":{"author":[{"@pid":"38/3988","text":"Zhixu Li"},{"@pid":"39/2405-10","text":"Ying He 0010"},{"@pid":"177/7280","text":"Binbin Gu"},{"@pid":"52/94-2","text":"An Liu 0002"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"}]},"title":"Diagnosing and Minimizing Semantic Drift in Iterative Bootstrapping Extraction.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"30","number":"5","pages":"852-865","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkde/LiHG0LWZ18","doi":"10.1109/TKDE.2017.2782697","ee":"https://doi.org/10.1109/TKDE.2017.2782697","url":"https://dblp.org/rec/journals/tkde/LiHG0LWZ18"}, "url":"URL#2494096" }, { "@score":"3", "@id":"2597403", "info":{"authors":{"author":[{"@pid":"24/744","text":"Xueyan Zhang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"86/3304","text":"Fulin Cheng"},{"@pid":"77/2893","text":"Yanhua Wang"},{"@pid":"235/2781","text":"Xinyu Ai"}]},"title":"3D SOM Leaming And Neighborhood Algorithm.","venue":"ICSAI","pages":"911-915","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icsai/ZhangLCWA18","doi":"10.1109/ICSAI.2018.8599510","ee":"https://doi.org/10.1109/ICSAI.2018.8599510","url":"https://dblp.org/rec/conf/icsai/ZhangLCWA18"}, "url":"URL#2597403" }, { "@score":"2", "@id":"2599131", "info":{"authors":{"author":[{"@pid":"53/4105","text":"Caihong Liu"},{"@pid":"69/452","text":"Qi Yan"},{"@pid":"284/7149","text":"Yuhong Pang"},{"@pid":"127/1432","text":"Hongsong Zhou"}]},"title":"Detection Method of Eliminating False Alarm Caused by Noise Based on Variable Damping Ratio.","venue":"ICSPCC","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icspcc/LiuYPZ18","doi":"10.1109/ICSPCC.2018.8567763","ee":"https://doi.org/10.1109/ICSPCC.2018.8567763","url":"https://dblp.org/rec/conf/icspcc/LiuYPZ18"}, "url":"URL#2599131" }, { "@score":"3", "@id":"2614305", "info":{"authors":{"author":[{"@pid":"24/3562","text":"Weidong Zhang"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"A graph neural network based efficient firmware information extraction method for IoT devices.","venue":"IPCCC","pages":"1-8","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangLWZS18","doi":"10.1109/PCCC.2018.8711005","ee":"https://doi.org/10.1109/PCCC.2018.8711005","url":"https://dblp.org/rec/conf/ipccc/ZhangLWZS18"}, "url":"URL#2614305" }, { "@score":"3", "@id":"2646165", "info":{"authors":{"author":[{"@pid":"16/1506","text":"Feng Yi"},{"@pid":"131/2657","text":"Libo Yin"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"62/2655-9","text":"Gang Li 0009"}]},"title":"Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.","venue":"PAKDD","pages":"488-499","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/YiYWZSL18","doi":"10.1007/978-3-319-93034-3_39","ee":"https://doi.org/10.1007/978-3-319-93034-3_39","url":"https://dblp.org/rec/conf/pakdd/YiYWZSL18"}, "url":"URL#2646165" }, { "@score":"4", "@id":"2670284", "info":{"authors":{"author":[{"@pid":"75/6627","text":"Ke Li"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.","venue":"SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI","pages":"741-747","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/uic/LiWLZS18","doi":"10.1109/SMARTWORLD.2018.00142","ee":"https://doi.org/10.1109/SmartWorld.2018.00142","url":"https://dblp.org/rec/conf/uic/LiWLZS18"}, "url":"URL#2670284" }, { "@score":"3", "@id":"2673143", "info":{"authors":{"author":[{"@pid":"230/8270","text":"Linjia He"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"33/8760","text":"Tong Xue"},{"@pid":"230/8212","text":"Deyuan Sun"},{"@pid":"230/8289","text":"Shoulun Zhu"},{"@pid":"73/3338","text":"Gangyi Ding"}]},"title":"Am I in the theater?: usability study of live performance based virtual reality.","venue":"VRST","pages":"28:1-28:11","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/vrst/HeLXSZD18","doi":"10.1145/3281505.3281508","ee":"https://doi.org/10.1145/3281505.3281508","url":"https://dblp.org/rec/conf/vrst/HeLXSZD18"}, "url":"URL#2673143" }, { "@score":"3", "@id":"2812364", "info":{"authors":{"author":[{"@pid":"89/8339","text":"Yun Ren"},{"@pid":"86/3304","text":"Fulin Cheng"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"基于频率敏感三维自组织映射的视差估计算法 (Disparity Estimation Algorithm Based on Frequency Sensitive Three-dimensional Self-organizing Map).","venue":"计算机科学","volume":"44","number":"Z11","pages":"225-227","year":"2017","type":"Journal Articles","access":"open","key":"journals/jsjkx/RenCL17","doi":"10.11896/J.ISSN.1002-137X.2017.11A.047","ee":"https://doi.org/10.11896/j.issn.1002-137X.2017.11A.047","url":"https://dblp.org/rec/journals/jsjkx/RenCL17"}, "url":"URL#2812364" }, { "@score":"2", "@id":"2836671", "info":{"authors":{"author":[{"@pid":"92/3781-2","text":"Hongtao Wang 0002"},{"@pid":"78/7230","text":"Hui Wen"},{"@pid":"16/1506","text":"Feng Yi"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.","venue":"Sensors","volume":"17","number":"3","pages":"550","year":"2017","type":"Journal Articles","access":"open","key":"journals/sensors/WangWYZS17","doi":"10.3390/S17030550","ee":"https://doi.org/10.3390/s17030550","url":"https://dblp.org/rec/journals/sensors/WangWYZS17"}, "url":"URL#2836671" }, { "@score":"3", "@id":"2852486", "info":{"authors":{"author":[{"@pid":"09/8350","text":"Shuo Yan"},{"@pid":"73/3338","text":"Gangyi Ding"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"161/3891","text":"Ningxiao Sun"},{"@pid":"87/7434","text":"Zheng Guan"},{"@pid":"55/5012","text":"Yufeng Wu"},{"@pid":"30/7663","text":"Longfei Zhang"},{"@pid":"19/825","text":"Tianyu Huang"}]},"title":"Exploring Audience Response in Performing Arts with a Brain-Adaptive Digital Performance System.","venue":"ACM Trans. Interact. Intell. Syst.","volume":"7","number":"4","pages":"16:1-16:28","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tiis/YanDLSGWZH17","doi":"10.1145/3009974","ee":"https://doi.org/10.1145/3009974","url":"https://dblp.org/rec/journals/tiis/YanDLSGWZH17"}, "url":"URL#2852486" }, { "@score":"3", "@id":"2854879", "info":{"authors":{"author":[{"@pid":"29/85","text":"Wentao Wu 0001"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"}]},"title":"Semantic Bootstrapping: A Theoretical Perspective.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"29","number":"2","pages":"446-457","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tkde/WuLWZ17","doi":"10.1109/TKDE.2016.2619347","ee":"https://doi.org/10.1109/TKDE.2016.2619347","url":"https://dblp.org/rec/journals/tkde/WuLWZ17"}, "url":"URL#2854879" }, { "@score":"2", "@id":"2902962", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Modeling Temporal Dynamics and Spatial Configurations of Actions Using Two-Stream Recurrent Neural Networks.","venue":"CVPR","pages":"3633-3642","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cvpr/WangW17","doi":"10.1109/CVPR.2017.387","ee":"https://doi.org/10.1109/CVPR.2017.387","url":"https://dblp.org/rec/conf/cvpr/WangW17"}, "url":"URL#2902962" }, { "@score":"3", "@id":"2941019", "info":{"authors":{"author":[{"@pid":"29/85","text":"Wentao Wu 0001"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"}]},"title":"Semantic Bootstrapping: A Theoretical Perspective.","venue":"ICDE","pages":"7-8","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/WuLWZ17","doi":"10.1109/ICDE.2017.10","ee":"https://doi.org/10.1109/ICDE.2017.10","url":"https://dblp.org/rec/conf/icde/WuLWZ17"}, "url":"URL#2941019" }, { "@score":"2", "@id":"2948129", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Learning robust representations using recurrent neural networks for skeleton based action classification and detection.","venue":"ICME Workshops","pages":"591-596","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/icmcs/Wang017","doi":"10.1109/ICMEW.2017.8026278","ee":"https://doi.org/10.1109/ICMEW.2017.8026278","url":"https://dblp.org/rec/conf/icmcs/Wang017"}, "url":"URL#2948129" }, { "@score":"3", "@id":"2954889", "info":{"authors":{"author":[{"@pid":"53/4105","text":"Caihong Liu"},{"@pid":"127/1432","text":"Hongsong Zhou"},{"@pid":"38/7666","text":"Xiukun Li"}]},"title":"Detection method of a short-time double-duffing chaotic oscillator array.","venue":"ICSPCC","pages":"1-5","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/icspcc/LiuZL17","doi":"10.1109/ICSPCC.2017.8242459","ee":"https://doi.org/10.1109/ICSPCC.2017.8242459","url":"https://dblp.org/rec/conf/icspcc/LiuZL17"}, "url":"URL#2954889" }, { "@score":"2", "@id":"3054709", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Modeling Temporal Dynamics and Spatial Configurations of Actions Using Two-Stream Recurrent Neural Networks.","venue":"CoRR","volume":"abs/1704.02581","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/Wang017","ee":"http://arxiv.org/abs/1704.02581","url":"https://dblp.org/rec/journals/corr/Wang017"}, "url":"URL#3054709" }, { "@score":"2", "@id":"3150409", "info":{"authors":{"author":[{"@pid":"15/5148","text":"Yangyi Sui"},{"@pid":"191/7230","text":"Hongsong Miao"},{"@pid":"61/3337","text":"Yanzhang Wang"},{"@pid":"146/1799","text":"Hui Luan"},{"@pid":"55/1226-3","text":"Jun Lin 0003"}]},"title":"Correction of a Towed Airborne Fluxgate Magnetic Tensor Gradiometer.","venue":"IEEE Geosci. Remote. Sens. Lett.","volume":"13","number":"12","pages":"1837-1841","year":"2016","type":"Journal Articles","access":"open","key":"journals/lgrs/SuiMWLL16","doi":"10.1109/LGRS.2016.2614538","ee":"https://doi.org/10.1109/LGRS.2016.2614538","url":"https://dblp.org/rec/journals/lgrs/SuiMWLL16"}, "url":"URL#3150409" }, { "@score":"3", "@id":"3262102", "info":{"authors":{"author":[{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"76/5895-1","text":"Qi Han 0001"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Identification of visible industrial control devices at Internet scale.","venue":"ICC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FengLHZLS16","doi":"10.1109/ICC.2016.7511426","ee":"https://doi.org/10.1109/ICC.2016.7511426","url":"https://dblp.org/rec/conf/icc/FengLHZLS16"}, "url":"URL#3262102" }, { "@score":"3", "@id":"3263946", "info":{"authors":{"author":[{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"76/5895-1","text":"Qi Han 0001"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"},{"@pid":"55/3002","text":"Jie Cui"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Active Profiling of Physical Devices at Internet Scale.","venue":"ICCCN","pages":"1-9","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icccn/FengLHZLCS16","doi":"10.1109/ICCCN.2016.7568486","ee":"https://doi.org/10.1109/ICCCN.2016.7568486","url":"https://dblp.org/rec/conf/icccn/FengLHZLCS16"}, "url":"URL#3263946" }, { "@score":"3", "@id":"3269355", "info":{"authors":{"author":[{"@pid":"190/2868","text":"Yaowen Zheng"},{"@pid":"23/2177","text":"Kai Cheng"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"182/0949","text":"Shiran Pan"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.","venue":"ICICS","pages":"27-36","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icics/ZhengC0PZS16","doi":"10.1007/978-3-319-50011-9_3","ee":"https://doi.org/10.1007/978-3-319-50011-9_3","url":"https://dblp.org/rec/conf/icics/ZhengC0PZS16"}, "url":"URL#3269355" }, { "@score":"2", "@id":"3271077", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"35/7092-0115","text":"Wei Wang 0115"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"How scenes imply actions in realistic videos?","venue":"ICIP","pages":"1619-1623","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/WangWW16","doi":"10.1109/ICIP.2016.7532632","ee":"https://doi.org/10.1109/ICIP.2016.7532632","url":"https://dblp.org/rec/conf/icip/WangWW16"}, "url":"URL#3271077" }, { "@score":"3", "@id":"3303776", "info":{"authors":{"author":[{"@pid":"09/8350","text":"Shuo Yan"},{"@pid":"73/3338","text":"Gangyi Ding"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"161/3891","text":"Ningxiao Sun"},{"@pid":"55/5012","text":"Yufeng Wu"},{"@pid":"87/7434","text":"Zheng Guan"},{"@pid":"30/7663","text":"Longfei Zhang"},{"@pid":"19/825","text":"Tianyu Huang"}]},"title":"Enhancing Audience Engagement in Performing Arts Through an Adaptive Virtual Environment with a Brain-Computer Interface.","venue":"IUI","pages":"306-316","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iui/YanDLSWGZH16","doi":"10.1145/2856767.2856768","ee":"https://doi.org/10.1145/2856767.2856768","url":"https://dblp.org/rec/conf/iui/YanDLSWGZH16"}, "url":"URL#3303776" }, { "@score":"3", "@id":"3410697", "info":{"authors":{"author":[{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"142/9154","text":"Yunhua He"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Security and privacy in localization for underwater sensor networks.","venue":"IEEE Commun. Mag.","volume":"53","number":"11","pages":"56-62","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cm/LiHCZS15","doi":"10.1109/MCOM.2015.7321972","ee":"https://doi.org/10.1109/MCOM.2015.7321972","url":"https://dblp.org/rec/journals/cm/LiHCZS15"}, "url":"URL#3410697" }, { "@score":"3", "@id":"3434176", "info":{"authors":{"author":[{"@pid":"39/10801","text":"Yongle Chen"},{"@pid":"49/3283-53","text":"Wei Liu 0053"},{"@pid":"61/8573","text":"Yongping Xiong"},{"@pid":"12/8779","text":"Jing Duan"},{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning.","venue":"Int. J. Distributed Sens. Networks","volume":"11","pages":"753191:1-753191:10","year":"2015","type":"Journal Articles","access":"open","key":"journals/ijdsn/ChenLXDLZ15","doi":"10.1155/2015/753191","ee":"https://doi.org/10.1155/2015/753191","url":"https://dblp.org/rec/journals/ijdsn/ChenLXDLZ15"}, "url":"URL#3434176" }, { "@score":"2", "@id":"3459663", "info":{"authors":{"author":[{"@pid":"47/5740","text":"Hong Yang"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol).","venue":"计算机科学","volume":"42","number":"1","pages":"96-100","year":"2015","type":"Journal Articles","access":"open","key":"journals/jsjkx/YangZS15","doi":"10.11896/J.ISSN.1002-137X.2015.01.023","ee":"https://doi.org/10.11896/j.issn.1002-137X.2015.01.023","url":"https://dblp.org/rec/journals/jsjkx/YangZS15"}, "url":"URL#3459663" }, { "@score":"3", "@id":"3495904", "info":{"authors":{"author":[{"@pid":"96/6683","text":"Liqun Li"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"63/4542","text":"Guoliang Xing"},{"@pid":"49/3036","text":"Wei Huangfu"},{"@pid":"91/8572","text":"Ruogu Zhou"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks.","venue":"IEEE Trans. Mob. Comput.","volume":"14","number":"10","pages":"2130-2144","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tmc/LiSXHZZ15","doi":"10.1109/TMC.2014.2374170","ee":"https://doi.org/10.1109/TMC.2014.2374170","url":"https://dblp.org/rec/journals/tmc/LiSXHZZ15"}, "url":"URL#3495904" }, { "@score":"3", "@id":"3500333", "info":{"authors":{"author":[{"@pid":"43/3166-18","text":"Zhi Li 0018"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.","venue":"IEEE Trans. Veh. Technol.","volume":"64","number":"11","pages":"5257-5268","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tvt/LiLZS15","doi":"10.1109/TVT.2014.2381220","ee":"https://doi.org/10.1109/TVT.2014.2381220","url":"https://dblp.org/rec/journals/tvt/LiLZS15"}, "url":"URL#3500333" }, { "@score":"2", "@id":"3508945", "info":{"authors":{"author":[{"@pid":"181/4564","text":"Hongsong Wang"},{"@pid":"35/7092-0115","text":"Wei Wang 0115"},{"@pid":"56/4499-1","text":"Liang Wang 0001"}]},"title":"Hierarchical motion evolution for action recognition.","venue":"ACPR","pages":"574-578","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/acpr/WangWW15","doi":"10.1109/ACPR.2015.7486568","ee":"https://doi.org/10.1109/ACPR.2015.7486568","url":"https://dblp.org/rec/conf/acpr/WangWW15"}, "url":"URL#3508945" }, { "@score":"3", "@id":"3525749", "info":{"authors":{"author":[{"@pid":"03/4995","text":"Jiazhe Chen"},{"@pid":"97/9924","text":"Mingjie Liu"},{"@pid":"153/2657","text":"Hexin Li"},{"@pid":"91/5830","text":"Hongsong Shi"}]},"title":"Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm.","venue":"AsiaCCS","pages":"609-614","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/ChenLLS15","doi":"10.1145/2714576.2714587","ee":"https://doi.org/10.1145/2714576.2714587","url":"https://dblp.org/rec/conf/ccs/ChenLLS15"}, "url":"URL#3525749" }, { "@score":"3", "@id":"3529038", "info":{"authors":{"author":[{"@pid":"09/8350","text":"Shuo Yan"},{"@pid":"73/3338","text":"Gangyi Ding"},{"@pid":"87/7434","text":"Zheng Guan"},{"@pid":"161/3891","text":"Ningxiao Sun"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"30/7663","text":"Longfei Zhang"}]},"title":"OutsideMe: Augmenting Dancer's External Self-Image by Using A Mixed Reality System.","venue":"CHI Extended Abstracts","pages":"965-970","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/chi/YanDGSLZ15","doi":"10.1145/2702613.2732759","ee":"https://doi.org/10.1145/2702613.2732759","url":"https://dblp.org/rec/conf/chi/YanDGSLZ15"}, "url":"URL#3529038" }, { "@score":"2", "@id":"3560942", "info":{"authors":{"author":[{"@pid":"16/1656","text":"Yuyan Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"69/2622","text":"Yong Liao"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Vehicle Anomaly Detection Based on Trajectory Data of ANPR System.","venue":"GLOBECOM","pages":"1-6","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SunZLS15","doi":"10.1109/GLOCOM.2014.7417520","ee":"https://doi.org/10.1109/GLOCOM.2014.7417520","url":"https://dblp.org/rec/conf/globecom/SunZLS15"}, "url":"URL#3560942" }, { "@score":"2", "@id":"3572374", "info":{"authors":{"author":[{"@pid":"25/7632","text":"Yongming Jin"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"19/6306","text":"Zhiqiang Shi"},{"@pid":"05/5990","text":"Xiang Lu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.","venue":"ICC","pages":"7234-7239","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JinZSLS15","doi":"10.1109/ICC.2015.7249481","ee":"https://doi.org/10.1109/ICC.2015.7249481","url":"https://dblp.org/rec/conf/icc/JinZSLS15"}, "url":"URL#3572374" }, { "@score":"3", "@id":"3659150", "info":{"authors":{"author":[{"@pid":"21/5521","text":"Ying Chen"},{"@pid":"83/7278","text":"Changying Li"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"16/1656","text":"Yuyan Sun"}]},"title":"k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks.","venue":"WASA","pages":"50-59","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/wasa/ChenLYZS15","doi":"10.1007/978-3-319-21837-3_6","ee":"https://doi.org/10.1007/978-3-319-21837-3_6","url":"https://dblp.org/rec/conf/wasa/ChenLYZS15"}, "url":"URL#3659150" }, { "@score":"3", "@id":"3732851", "info":{"authors":{"author":[{"@pid":"49/3283-53","text":"Wei Liu 0053"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"39/10801","text":"Yongle Chen"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"LARES: latency-reduced neighbour discovery for contagious diseases prevention.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"16","number":"1","pages":"3-13","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LiuLCZS14","doi":"10.1504/IJAHUC.2014.062488","ee":"https://doi.org/10.1504/IJAHUC.2014.062488","url":"https://dblp.org/rec/journals/ijahuc/LiuLCZS14"}, "url":"URL#3732851" }, { "@score":"2", "@id":"3736390", "info":{"authors":{"author":[{"@pid":"49/3283-53","text":"Wei Liu 0053"},{"@pid":"39/10801","text":"Yongle Chen"},{"@pid":"61/8573","text":"Yongping Xiong"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Optimization of Sampling Cell Size for Fingerprint Positioning.","venue":"Int. J. Distributed Sens. Networks","volume":"10","year":"2014","type":"Journal Articles","access":"open","key":"journals/ijdsn/LiuCXSZ14","doi":"10.1155/2014/273801","ee":"https://doi.org/10.1155/2014/273801","url":"https://dblp.org/rec/journals/ijdsn/LiuCXSZ14"}, "url":"URL#3736390" }, { "@score":"2", "@id":"3736562", "info":{"authors":{"author":[{"@pid":"52/328-7","text":"Di Wu 0007"},{"@pid":"41/1105","text":"He Liu"},{"@pid":"142/9117","text":"Yingrong Bi"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Evolutionary Game Theoretic Modeling and Repetition of Media Distributed Shared in P2P-Based VANET.","venue":"Int. J. Distributed Sens. Networks","volume":"10","year":"2014","type":"Journal Articles","access":"open","key":"journals/ijdsn/WuLBZ14","doi":"10.1155/2014/718639","ee":"https://doi.org/10.1155/2014/718639","url":"https://dblp.org/rec/journals/ijdsn/WuLBZ14"}, "url":"URL#3736562" }, { "@score":"2", "@id":"3836329", "info":{"authors":{"author":[{"@pid":"223/2736","text":"Shanyan Gao"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"44/7544","text":"Xinyun Zhou"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.","venue":"CWSN","pages":"568-582","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/cwsn/GaoZZLS14","doi":"10.1007/978-3-662-46981-1_54","ee":"https://doi.org/10.1007/978-3-662-46981-1_54","url":"https://dblp.org/rec/conf/cwsn/GaoZZLS14"}, "url":"URL#3836329" }, { "@score":"4", "@id":"3843626", "info":{"authors":{"author":[{"@pid":"38/3988","text":"Zhixu Li"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"33/4854-1","text":"Yi Yang 0001"},{"@pid":"74/1890-1","text":"Xiangliang Zhang 0001"},{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"}]},"title":"Overcoming Semantic Drift in Information Extraction.","venue":"EDBT","pages":"169-180","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/edbt/LiLWYZZ14","doi":"10.5441/002/EDBT.2014.16","ee":"https://doi.org/10.5441/002/edbt.2014.16","url":"https://dblp.org/rec/conf/edbt/LiLWYZZ14"}, "url":"URL#3843626" }, { "@score":"3", "@id":"3907246", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"96/1608","text":"Ting Song"},{"@pid":"154/9115","text":"Zehuan Wu"},{"@pid":"139/1182","text":"JianDong Ma"},{"@pid":"73/3338","text":"Gangyi Ding"}]},"title":"Shape from Specular Flow with Near-Field Environment Motion Field.","venue":"ISVC","pages":"367-378","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/isvc/LiSWMD14","doi":"10.1007/978-3-319-14249-4_35","ee":"https://doi.org/10.1007/978-3-319-14249-4_35","url":"https://dblp.org/rec/conf/isvc/LiSWMD14"}, "url":"URL#3907246" }, { "@score":"3", "@id":"3907247", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"96/1608","text":"Ting Song"},{"@pid":"154/9115","text":"Zehuan Wu"},{"@pid":"139/1182","text":"JianDong Ma"},{"@pid":"73/3338","text":"Gangyi Ding"}]},"title":"Reconstruction of a Complex Mirror Surface from a Single Image.","venue":"ISVC","pages":"402-412","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/isvc/LiSWMD14a","doi":"10.1007/978-3-319-14249-4_38","ee":"https://doi.org/10.1007/978-3-319-14249-4_38","url":"https://dblp.org/rec/conf/isvc/LiSWMD14a"}, "url":"URL#3907247" }, { "@score":"2", "@id":"3908470", "info":{"authors":{"author":[{"@pid":"16/1656","text":"Yuyan Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"44/7544","text":"Xinyun Zhou"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.","venue":"ITQM","pages":"48-57","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/itqm/SunZZS14","doi":"10.1016/J.PROCS.2014.05.244","ee":"https://doi.org/10.1016/j.procs.2014.05.244","url":"https://dblp.org/rec/conf/itqm/SunZZS14"}, "url":"URL#3908470" }, { "@score":"2", "@id":"4026822", "info":{"authors":{"author":[{"@pid":"39/10801","text":"Yongle Chen"},{"@pid":"40/8206","text":"Ci Chen"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Efficient Deterministic Anchor Deployment for Sensor Network Positioning.","venue":"Int. J. Distributed Sens. Networks","volume":"9","year":"2013","type":"Journal Articles","access":"open","key":"journals/ijdsn/ChenCZS13","doi":"10.1155/2013/429065","ee":"https://doi.org/10.1155/2013/429065","url":"https://dblp.org/rec/journals/ijdsn/ChenCZS13"}, "url":"URL#4026822" }, { "@score":"2", "@id":"4027244", "info":{"authors":{"author":[{"@pid":"52/328-7","text":"Di Wu 0007"},{"@pid":"119/9096","text":"Yan Ling"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"51/239-1","text":"Jie Liang 0001"}]},"title":"The RSU Access Problem Based on Evolutionary Game Theory for VANET.","venue":"Int. J. Distributed Sens. Networks","volume":"9","year":"2013","type":"Journal Articles","access":"open","key":"journals/ijdsn/WuLZL13","doi":"10.1155/2013/143024","ee":"https://doi.org/10.1155/2013/143024","url":"https://dblp.org/rec/journals/ijdsn/WuLZL13"}, "url":"URL#4027244" }, { "@score":"3", "@id":"4027271", "info":{"authors":{"author":[{"@pid":"60/10412","text":"Chaonong Xu"},{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"09/1234","text":"Xinrong Li"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"32/4821","text":"Guangjie Han"}]},"title":"Distributed Middleware of Large-Scale Wireless Networks.","venue":"Int. J. Distributed Sens. Networks","volume":"9","year":"2013","type":"Journal Articles","access":"open","key":"journals/ijdsn/XuXLZH13","doi":"10.1155/2013/431863","ee":"https://doi.org/10.1155/2013/431863","url":"https://dblp.org/rec/journals/ijdsn/XuXLZH13"}, "url":"URL#4027271" }, { "@score":"3", "@id":"4073647", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"},{"@pid":"w/HaixunWang","text":"Haixun Wang"}]},"title":"Data-Driven Metaphor Recognition and Explanation.","venue":"Trans. Assoc. Comput. Linguistics","volume":"1","pages":"379-390","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tacl/LiZW13","doi":"10.1162/TACL_A_00235","ee":"https://doi.org/10.1162/tacl_a_00235","url":"https://dblp.org/rec/journals/tacl/LiZW13"}, "url":"URL#4073647" }, { "@score":"6", "@id":"4115666", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Assessing sparse information extraction using semantic contexts.","venue":"CIKM","pages":"1709-1714","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/LiWLW13","doi":"10.1145/2505515.2505598","ee":"https://doi.org/10.1145/2505515.2505598","url":"https://dblp.org/rec/conf/cikm/LiWLW13"}, "url":"URL#4115666" }, { "@score":"3", "@id":"4145943", "info":{"authors":{"author":[{"@pid":"86/2043","text":"Weijun Qin"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"142/7133","text":"Jiadi Zhang"},{"@pid":"50/3402-43","text":"Bo Li 0043"}]},"title":"Mo-Fi: Discovering Human Presence Activity with Smartphones using Non-intrusive Wi-Fi Monitors.","venue":"GreenCom/iThings/CPScom","pages":"2241-2242","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/greencom/QinZZL13","doi":"10.1109/GREENCOM-ITHINGS-CPSCOM.2013.424","ee":"https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.424","url":"https://dblp.org/rec/conf/greencom/QinZZL13"}, "url":"URL#4145943" }, { "@score":"3", "@id":"4150222", "info":{"authors":{"author":[{"@pid":"86/2043","text":"Weijun Qin"},{"@pid":"142/7133","text":"Jiadi Zhang"},{"@pid":"50/3402-43","text":"Bo Li 0043"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"16/1656","text":"Yuyan Sun"}]},"title":"Mo-Fi: Discovering Human Presence Activity with Smartphones Using Non-intrusive Wi-Fi Sniffers.","venue":"HPCC/EUC","pages":"2143-2150","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpcc/QinZLZS13","doi":"10.1109/HPCC.AND.EUC.2013.307","ee":"https://doi.org/10.1109/HPCC.and.EUC.2013.307","url":"https://dblp.org/rec/conf/hpcc/QinZLZS13"}, "url":"URL#4150222" }, { "@score":"3", "@id":"4161887", "info":{"authors":{"author":[{"@pid":"117/4320","text":"Zhixian Zhang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"Automatic extraction of top-k lists from the web.","venue":"ICDE","pages":"1057-1068","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/ZhangZWL13","doi":"10.1109/ICDE.2013.6544897","ee":"https://doi.org/10.1109/ICDE.2013.6544897","url":"https://dblp.org/rec/conf/icde/ZhangZWL13"}, "url":"URL#4161887" }, { "@score":"3", "@id":"4162099", "info":{"authors":{"author":[{"@pid":"182/8555","text":"Mingfeng Tang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"182/9094","text":"Yane Wen"},{"@pid":"23/2150","text":"Liping Tang"}]},"title":"A novel multi-object detection method in HSV space.","venue":"ICDIP","pages":"887837","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdip/TangLWT13","doi":"10.1117/12.2031012","ee":"https://doi.org/10.1117/12.2031012","url":"https://dblp.org/rec/conf/icdip/TangLWT13"}, "url":"URL#4162099" }, { "@score":"3", "@id":"4237809", "info":{"authors":{"author":[{"@pid":"181/2613","text":"Ke Wang"},{"@pid":"67/4294","text":"Weidong Yang"},{"@pid":"72/2643-3","text":"Pan Li 0003"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"A decentralized adaptive TDMA scheduling strategy for VANET.","venue":"WCNC Workshops","pages":"216-221","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcnc/WangYLZ13","doi":"10.1109/WCNCW.2013.6533343","ee":"https://doi.org/10.1109/WCNCW.2013.6533343","url":"https://dblp.org/rec/conf/wcnc/WangYLZ13"}, "url":"URL#4237809" }, { "@score":"4", "@id":"4364883", "info":{"authors":{"author":[{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"09/1234","text":"Xinrong Li"},{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"}]},"title":"An energy-efficient link quality monitoring scheme for wireless networks.","venue":"Wirel. Commun. Mob. Comput.","volume":"12","number":"4","pages":"333-344","year":"2012","type":"Journal Articles","access":"closed","key":"journals/wicomm/ZhuLXLL12","doi":"10.1002/WCM.966","ee":"https://doi.org/10.1002/wcm.966","url":"https://dblp.org/rec/journals/wicomm/ZhuLXLL12"}, "url":"URL#4364883" }, { "@score":"2", "@id":"4397735", "info":{"authors":{"author":[{"@pid":"16/3283-14","text":"Xi Chen 0014"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"28/955","text":"Yan Zhen"},{"@pid":"82/6198","text":"Hongbin Chen"}]},"title":"Application of Internet of Things in Power-Line Monitoring.","venue":"CyberC","pages":"423-426","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/cyberc/ChenSZZC12","doi":"10.1109/CYBERC.2012.77","ee":"https://doi.org/10.1109/CyberC.2012.77","url":"https://dblp.org/rec/conf/cyberc/ChenSZZC12"}, "url":"URL#4397735" }, { "@score":"3", "@id":"4406532", "info":{"authors":{"author":[{"@pid":"33/4822","text":"Yue Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Qili Zhu"}]},"title":"Concept-Based Web Search.","venue":"ER","pages":"449-462","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/er/WangLWZ12","doi":"10.1007/978-3-642-34002-4_35","ee":"https://doi.org/10.1007/978-3-642-34002-4_35","url":"https://dblp.org/rec/conf/er/WangLWZ12"}, "url":"URL#4406532" }, { "@score":"2", "@id":"4489206", "info":{"authors":{"author":[{"@pid":"49/3283-53","text":"Wei Liu 0053"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"38/559","text":"Yunhuai Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"13/2266","text":"Ziguo Zhong"},{"@pid":"h/TianHe","text":"Tian He 0001"}]},"title":"Exploiting ephemeral link correlation for mobile wireless networks.","venue":"SenSys","pages":"239-252","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/sensys/LiuSLZZH12","doi":"10.1145/2426656.2426681","ee":"https://doi.org/10.1145/2426656.2426681","url":"https://dblp.org/rec/conf/sensys/LiuSLZZH12"}, "url":"URL#4489206" }, { "@score":"3", "@id":"4491432", "info":{"authors":{"author":[{"@pid":"29/85","text":"Wentao Wu 0001"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Qili Zhu"}]},"title":"Probase: a probabilistic taxonomy for text understanding.","venue":"SIGMOD Conference","pages":"481-492","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigmod/WuLWZ12","doi":"10.1145/2213836.2213891","ee":"https://doi.org/10.1145/2213836.2213891","url":"https://dblp.org/rec/conf/sigmod/WuLWZ12"}, "url":"URL#4491432" }, { "@score":"4", "@id":"4613919", "info":{"authors":{"author":[{"@pid":"85/734","text":"Zhulin An"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"09/1234","text":"Xinrong Li"},{"@pid":"60/10412","text":"Chaonong Xu"},{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"}]},"title":"Nonidentical Linear Pulse-Coupled Oscillators Model With Application to Time Synchronization in Wireless Sensor Networks.","venue":"IEEE Trans. Ind. Electron.","volume":"58","number":"6","pages":"2205-2215","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tie/AnZLXXL11","doi":"10.1109/TIE.2009.2038407","ee":"https://doi.org/10.1109/TIE.2009.2038407","url":"https://dblp.org/rec/journals/tie/AnZLXXL11"}, "url":"URL#4613919" }, { "@score":"3", "@id":"4664503", "info":{"authors":{"author":[{"@pid":"86/2043","text":"Weijun Qin"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"l/YanLiu21","text":"Yan Liu 0021"}]},"title":"RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.","venue":"EUC","pages":"197-204","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/QinLSZL11","doi":"10.1109/EUC.2011.59","ee":"https://doi.org/10.1109/EUC.2011.59","url":"https://dblp.org/rec/conf/euc/QinLSZL11"}, "url":"URL#4664503" }, { "@score":"3", "@id":"4705655", "info":{"authors":{"author":[{"@pid":"86/2159","text":"Yangqiu Song"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"84/6394-6","text":"Zhongyuan Wang 0006"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"79/2536","text":"Weizhu Chen"}]},"title":"Short Text Conceptualization Using a Probabilistic Knowledgebase.","venue":"IJCAI","pages":"2330-2336","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcai/SongWWLC11","doi":"10.5591/978-1-57735-516-8/IJCAI11-388","ee":"https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-388","url":"https://dblp.org/rec/conf/ijcai/SongWWLC11"}, "url":"URL#4705655" }, { "@score":"3", "@id":"4713682", "info":{"authors":{"author":[{"@pid":"85/10645","text":"Jiachen Guo"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"73/8078","text":"Pengfei Yu"}]},"title":"Water Meter ID Identifying and Reading System Based on RFID Technology.","venue":"ISCID","pages":"159-162","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GuoLY11","doi":"10.1109/ISCID.2011.48","ee":"https://doi.org/10.1109/ISCID.2011.48","url":"https://dblp.org/rec/conf/iscid/GuoLY11"}, "url":"URL#4713682" }, { "@score":"3", "@id":"4719873", "info":{"authors":{"author":[{"@pid":"39/800","text":"Feng Zheng"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"ARCrowd - a tangible interface for interactive crowd simulation.","venue":"IUI","pages":"427-430","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/iui/ZhengL11","doi":"10.1145/1943403.1943482","ee":"https://doi.org/10.1145/1943403.1943482","url":"https://dblp.org/rec/conf/iui/ZhengL11"}, "url":"URL#4719873" }, { "@score":"3", "@id":"4729203", "info":{"authors":{"author":[{"@pid":"96/6683","text":"Liqun Li"},{"@pid":"63/4542","text":"Guoliang Xing"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"49/3036","text":"Wei Huangfu"},{"@pid":"91/8572","text":"Ruogu Zhou"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Exploiting FM radio data system for adaptive clock calibration in sensor networks.","venue":"MobiSys","pages":"169-182","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobisys/LiXSHZZ11","doi":"10.1145/1999995.2000012","ee":"https://doi.org/10.1145/1999995.2000012","url":"https://dblp.org/rec/conf/mobisys/LiXSHZZ11"}, "url":"URL#4729203" }, { "@score":"3", "@id":"4729204", "info":{"authors":{"author":[{"@pid":"96/6683","text":"Liqun Li"},{"@pid":"63/4542","text":"Guoliang Xing"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"49/3036","text":"Wei Huangfu"},{"@pid":"91/8572","text":"Ruogu Zhou"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Demo: a sensor network time synchronization protocol based on fm radio data system.","venue":"MobiSys","pages":"367-368","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobisys/LiXSHZZ11a","doi":"10.1145/1999995.2000038","ee":"https://doi.org/10.1145/1999995.2000038","url":"https://dblp.org/rec/conf/mobisys/LiXSHZZ11a"}, "url":"URL#4729204" }, { "@score":"3", "@id":"4868186", "info":{"authors":{"author":[{"@pid":"85/734","text":"Zhulin An"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"63/7711","text":"Meilin Zhang"},{"@pid":"60/10412","text":"Chaonong Xu"},{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"}]},"title":"Linear Pulse-Coupled Oscillators Model¬ - A New Approach for Time Synchronization in Wireless Sensor Networks.","venue":"Wirel. Sens. Netw.","volume":"2","number":"2","pages":"108-114","year":"2010","type":"Journal Articles","access":"open","key":"journals/wsn/AnZZXXL10","doi":"10.4236/WSN.2010.22015","ee":"https://doi.org/10.4236/wsn.2010.22015","url":"https://dblp.org/rec/journals/wsn/AnZZXXL10"}, "url":"URL#4868186" }, { "@score":"3", "@id":"4869767", "info":{"authors":{"author":[{"@pid":"188/7759-77","text":"Chao Wang 0077"},{"@pid":"01/8379","text":"Zhongchuan Fu"},{"@pid":"60/2","text":"Hongsong Chen"},{"@pid":"36/8378","text":"Wei Ba"},{"@pid":"89/6764","text":"Bin Li"},{"@pid":"13/3479","text":"Lin Chen"},{"@pid":"91/7576","text":"Zexu Zhang"},{"@pid":"61/270","text":"Yuying Wang"},{"@pid":"08/4975","text":"Gang Cui"}]},"title":"CFCSS without Aliasing for SPARC Architecture.","venue":"CIT","pages":"2094-2100","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEcit/WangFCBLCZWC10","doi":"10.1109/CIT.2010.356","ee":"https://doi.org/10.1109/CIT.2010.356","url":"https://dblp.org/rec/conf/IEEEcit/WangFCBLCZWC10"}, "url":"URL#4869767" }, { "@score":"4", "@id":"4880714", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"43/4804","text":"Da Li"}]},"title":"A new image coding scheme based upon self organizing maps.","venue":"BIC-TA","pages":"657-660","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/bic-ta/LiL10","doi":"10.1109/BICTA.2010.5645202","ee":"https://doi.org/10.1109/BICTA.2010.5645202","url":"https://dblp.org/rec/conf/bic-ta/LiL10"}, "url":"URL#4880714" }, { "@score":"2", "@id":"4880857", "info":{"authors":{"author":[{"@pid":"67/4294","text":"Weidong Yang"},{"@pid":"13/10765","text":"Ji-Zhao Liu"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"A mobility model based on traffic flow theory for Vehicular Delay Tolerant Network.","venue":"BIC-TA","pages":"1071-1075","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/bic-ta/YangLZ10","doi":"10.1109/BICTA.2010.5645106","ee":"https://doi.org/10.1109/BICTA.2010.5645106","url":"https://dblp.org/rec/conf/bic-ta/YangLZ10"}, "url":"URL#4880857" }, { "@score":"2", "@id":"4896247", "info":{"authors":{"author":{"@pid":"41/7624","text":"Hongsong Liang"}},"title":"The Coupling Mechanism between External Environment Change and Organizational Innovation Based on Chaos Analysis Models.","venue":"DBTA","pages":"1-4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/dbta/Liang10","doi":"10.1109/DBTA.2010.5659116","ee":"https://doi.org/10.1109/DBTA.2010.5659116","url":"https://dblp.org/rec/conf/dbta/Liang10"}, "url":"URL#4896247" }, { "@score":"2", "@id":"4910736", "info":{"authors":{"author":[{"@pid":"16/718","text":"Xiaoming Lu"},{"@pid":"86/2704","text":"Weihua Cao"},{"@pid":"21/8970","text":"Xusheng Huang"},{"@pid":"00/1971","text":"Feiyi Huang"},{"@pid":"17/3407","text":"Liwen He"},{"@pid":"01/8970","text":"Wenhong Yang"},{"@pid":"81/2972","text":"Shaobin Wang"},{"@pid":"31/2303","text":"Xiaotong Zhang"},{"@pid":"60/2","text":"Hongsong Chen"}]},"title":"A Real Implementation of DPI in 3G Network.","venue":"GLOBECOM","pages":"1-5","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LuCHHHYWZC10","doi":"10.1109/GLOCOM.2010.5684117","ee":"https://doi.org/10.1109/GLOCOM.2010.5684117","url":"https://dblp.org/rec/conf/globecom/LuCHHHYWZC10"}, "url":"URL#4910736" }, { "@score":"3", "@id":"4950774", "info":{"authors":{"author":[{"@pid":"39/800","text":"Feng Zheng"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"ARCrowd-a tangible interface for interactive crowd simulation.","venue":"ISMAR","pages":"287-288","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismar/ZhengL10","doi":"10.1109/ISMAR.2010.5643610","ee":"https://doi.org/10.1109/ISMAR.2010.5643610","url":"https://dblp.org/rec/conf/ismar/ZhengL10"}, "url":"URL#4950774" }, { "@score":"4", "@id":"4979631", "info":{"authors":{"author":[{"@pid":"13/1672","text":"Chaokun Wang"},{"@pid":"06/3456-1","text":"Jianmin Wang 0001"},{"@pid":"l/LinXuemin","text":"Xuemin Lin 0001"},{"@pid":"w/WeiWang11","text":"Wei Wang 0011"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"45/8166","text":"Wanpeng Tian"},{"@pid":"90/514","text":"Jun Xu"},{"@pid":"96/4282-41","text":"Rui Li 0041"}]},"title":"MapDupReducer: detecting near duplicates over massive datasets.","venue":"SIGMOD Conference","pages":"1119-1122","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigmod/WangWLWWLTXL10","doi":"10.1145/1807167.1807296","ee":"https://doi.org/10.1145/1807167.1807296","url":"https://dblp.org/rec/conf/sigmod/WangWLWWLTXL10"}, "url":"URL#4979631" }, { "@score":"2", "@id":"5121962", "info":{"authors":{"author":[{"@pid":"41/7624","text":"Hongsong Liang"},{"@pid":"74/7625","text":"Huifeng Xu"}]},"title":"Design of Discriminant Model on Enterprise's Life Cycle.","venue":"DBTA","pages":"622-625","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/dbta/LiangX09","doi":"10.1109/DBTA.2009.18","ee":"https://doi.org/10.1109/DBTA.2009.18","url":"https://dblp.org/rec/conf/dbta/LiangX09"}, "url":"URL#5121962" }, { "@score":"3", "@id":"5308664", "info":{"authors":{"author":[{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"},{"@pid":"67/2554","text":"Bin Duan"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"},{"@pid":"65/2709","text":"Yi Sun"}]},"title":"Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN.","venue":"J. Signal Process. Syst.","volume":"51","number":"2","pages":"145-159","year":"2008","type":"Journal Articles","access":"closed","key":"journals/vlsisp/LiminHBXY08","doi":"10.1007/S11265-007-0103-4","ee":"https://doi.org/10.1007/s11265-007-0103-4","url":"https://dblp.org/rec/journals/vlsisp/LiminHBXY08"}, "url":"URL#5308664" }, { "@score":"2", "@id":"5508369", "info":{"authors":{"author":[{"@pid":"60/2","text":"Hongsong Chen"},{"@pid":"131/6508","text":"Zhaoshun Wang"},{"@pid":"34/6971","text":"Guangping Zeng"},{"@pid":"43/5900","text":"Hongwei Liu"}]},"title":"Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol.","venue":"Wirel. Pers. Commun.","volume":"42","number":"1","pages":"49-62","year":"2007","type":"Journal Articles","access":"closed","key":"journals/wpc/ChenWZL07","doi":"10.1007/S11277-006-9166-Y","ee":"https://doi.org/10.1007/s11277-006-9166-y","url":"https://dblp.org/rec/journals/wpc/ChenWZL07"}, "url":"URL#5508369" }, { "@score":"3", "@id":"5553799", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"50/5510","text":"Baohua Xu"}]},"title":"A New Initial Codebook Algorithm for Learning Vector Quantization.","venue":"ICC","pages":"2610-2613","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiX07","doi":"10.1109/ICC.2007.432","ee":"https://doi.org/10.1109/ICC.2007.432","url":"https://dblp.org/rec/conf/icc/LiX07"}, "url":"URL#5553799" }, { "@score":"3", "@id":"5582028", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"50/5510","text":"Baohua Xu"}]},"title":"A new video coding scheme based upon motion pattern recognition.","venue":"ISSPA","pages":"1-4","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/isspa/LiX07","doi":"10.1109/ISSPA.2007.4555519","ee":"https://doi.org/10.1109/ISSPA.2007.4555519","url":"https://dblp.org/rec/conf/isspa/LiX07"}, "url":"URL#5582028" }, { "@score":"3", "@id":"5599905", "info":{"authors":{"author":[{"@pid":"w/BruceWalter","text":"Bruce Walter"},{"@pid":"m/StephenRMarschner","text":"Stephen R. Marschner"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"36/2362","text":"Kenneth E. Torrance"}]},"title":"Microfacet Models for Refraction through Rough Surfaces.","venue":"Rendering Techniques","pages":"195-206","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/rt/WalterMLT07","doi":"10.2312/EGWR/EGSR07/195-206","ee":"https://doi.org/10.2312/EGWR/EGSR07/195-206","url":"https://dblp.org/rec/conf/rt/WalterMLT07"}, "url":"URL#5599905" }, { "@score":"3", "@id":"5663404", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"21/4222","text":"Houkuan Huang"}]},"title":"PMC: Select Materialized Cells in Data Cubes.","venue":"J. Comput. Sci. Technol.","volume":"21","number":"2","pages":"297-305","year":"2006","type":"Journal Articles","access":"closed","key":"journals/jcst/LiH06","doi":"10.1007/S11390-006-0297-0","ee":"https://doi.org/10.1007/s11390-006-0297-0","url":"https://dblp.org/rec/journals/jcst/LiH06"}, "url":"URL#5663404" }, { "@score":"3", "@id":"5754002", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"68/5216","text":"Jun Sun"}]},"title":"Pedestrian Recognition Based on SVM.","venue":"IMECS","pages":"60-63","year":"2006","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/imecs/LiS06","url":"https://dblp.org/rec/conf/imecs/LiS06"}, "url":"URL#5754002" }, { "@score":"3", "@id":"5754003", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"68/5216","text":"Jun Sun"}]},"title":"Image Enlargement Based on Adaptive Fuzzy Interpolation.","venue":"IMECS","pages":"198-201","year":"2006","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/imecs/LiS06a","url":"https://dblp.org/rec/conf/imecs/LiS06a"}, "url":"URL#5754003" }, { "@score":"3", "@id":"5883486", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"21/4222","text":"Houkuan Huang"},{"@pid":"99/168","text":"Shijin Liu"}]},"title":"PMC: Select Materialized Cells in Data Cubes.","venue":"DaWaK","pages":"168-178","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/dawak/LiHL05","doi":"10.1007/11546849_17","ee":"https://doi.org/10.1007/11546849_17","url":"https://dblp.org/rec/conf/dawak/LiHL05"}, "url":"URL#5883486" }, { "@score":"2", "@id":"5903692", "info":{"authors":{"author":[{"@pid":"96/1241","text":"Ting-Xin Yan"},{"@pid":"86/3925","text":"Yanzhong Bi"},{"@pid":"37/4705","text":"Limin Sun"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.","venue":"ICCNMC","pages":"682-691","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccnmc/YanBSZ05","doi":"10.1007/11534310_72","ee":"https://doi.org/10.1007/11534310_72","url":"https://dblp.org/rec/conf/iccnmc/YanBSZ05"}, "url":"URL#5903692" }, { "@score":"3", "@id":"5907142", "info":{"authors":{"author":[{"@pid":"60/22","text":"Li-Min Sun"},{"@pid":"96/1241","text":"Ting-Xin Yan"},{"@pid":"86/3925","text":"Yanzhong Bi"},{"@pid":"57/5368","text":"Hongsong Zhu"}]},"title":"A Self-adaptive Energy-Aware Data Gathering Mechanism for Wireless Sensor Networks.","venue":"ICIC","pages":"588-597","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/icic/SunYBZ05","doi":"10.1007/11538356_61","ee":"https://doi.org/10.1007/11538356_61","url":"https://dblp.org/rec/conf/icic/SunYBZ05"}, "url":"URL#5907142" }, { "@score":"3", "@id":"5939619", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"21/4222","text":"Houkuan Huang"}]},"title":"New Estimation Methods of Count-Min Sketch.","venue":"RIDE","pages":"73-80","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/ride/LiH05","doi":"10.1109/RIDE.2005.12","ee":"https://doi.org/10.1109/RIDE.2005.12","url":"https://dblp.org/rec/conf/ride/LiH05"}, "url":"URL#5939619" }, { "@score":"3", "@id":"5940115", "info":{"authors":{"author":[{"@pid":"09/5824","text":"Xingye Dong"},{"@pid":"21/4222","text":"Houkuan Huang"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"HQC: An Efficient Method for ROLAP with Hierarchical Dimensions.","venue":"RSFDGrC","pages":"211-220","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/DongHL05","doi":"10.1007/11548706_23","ee":"https://doi.org/10.1007/11548706_23","url":"https://dblp.org/rec/conf/rsfdgrc/DongHL05"}, "url":"URL#5940115" }, { "@score":"3", "@id":"5940357", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"42/6594","text":"Fabio Pellacini"},{"@pid":"36/2362","text":"Kenneth E. Torrance"}]},"title":"A Hybrid Monte Carlo Method for Accurate and Efficient Subsurface Scattering.","venue":"Rendering Techniques","pages":"283-290","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/rt/LiPT05","doi":"10.2312/EGWR/EGSR05/283-290","ee":"https://doi.org/10.2312/EGWR/EGSR05/283-290","url":"https://dblp.org/rec/conf/rt/LiPT05"}, "url":"URL#5940357" }, { "@score":"3", "@id":"5979243", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"21/4222","text":"Houkuan Huang"},{"@pid":"12/4988","text":"Youfang Lin"}]},"title":"DSD: Maintain Data Cubes More Efficiently.","venue":"Fundam. Informaticae","volume":"59","number":"2-3","pages":"173-190","year":"2004","type":"Journal Articles","access":"closed","key":"journals/fuin/LiHL04","ee":"http://content.iospress.com/articles/fundamenta-informaticae/fi59-2-3-06","url":"https://dblp.org/rec/journals/fuin/LiHL04"}, "url":"URL#5979243" }, { "@score":"3", "@id":"6200530", "info":{"authors":{"author":[{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"21/4222","text":"Houkuan Huang"},{"@pid":"12/4988","text":"Youfang Lin"}]},"title":"A New Incremental Maintenance Algorithm of Data Cube.","venue":"RSFDGrC","pages":"499-506","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/LiHL03","doi":"10.1007/3-540-39205-X_84","ee":"https://doi.org/10.1007/3-540-39205-X_84","url":"https://dblp.org/rec/conf/rsfdgrc/LiHL03"}, "url":"URL#6200530" }, { "@score":"3", "@id":"6200537", "info":{"authors":{"author":[{"@pid":"12/4988","text":"Youfang Lin"},{"@pid":"21/4222","text":"Houkuan Huang"},{"@pid":"19/6359","text":"Hongsong Li"}]},"title":"A Distributed Multidimensional Data Model of Data Warehouse.","venue":"RSFDGrC","pages":"664-667","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/LinHL03","doi":"10.1007/3-540-39205-X_112","ee":"https://doi.org/10.1007/3-540-39205-X_112","url":"https://dblp.org/rec/conf/rsfdgrc/LinHL03"}, "url":"URL#6200537" } ] } } } )