Folgen
Deguang Kong
Titel
Zitiert von
Zitiert von
Jahr
Robust nonnegative matrix factorization using l21-norm
D Kong, C Ding, H Huang
Proceedings of the 20th ACM international conference on Information and …, 2011
3932011
Discriminant malware distance learning on structural information for automated malware classification
D Kong, G Yan
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
2712013
Computing system with privacy control mechanism and method of operation thereof
D Kong, H Jin
US Patent 10,127,403, 2018
2072018
Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd annual computer security applications conference …, 2017
1582017
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
1362015
Exclusive Feature Learning on Arbitrary Structures via -norm
D Kong, R Fujimaki, J Liu, F Nie, C Ding
Advances in neural information processing systems 27, 2014
1312014
Deeprebirth: Accelerating deep neural network execution on mobile devices
D Li, X Wang, D Kong
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
1242018
Multi-label relieff and f-statistic feature selections for image annotation
D Kong, C Ding, H Huang, H Zhao
2012 IEEE conference on computer vision and pattern recognition, 2352-2359, 2012
1212012
Exploring discriminatory features for automated malware classification
G Yan, N Brown, D Kong
International Conference on Detection of Intrusions and Malware, and …, 2013
1112013
Deeplight: Deep lightweight feature interactions for accelerating ctr predictions in ad serving
W Deng, J Pan, T Zhou, D Kong, A Flores, G Lin
Proceedings of the 14th ACM international conference on Web search and data …, 2021
892021
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications
D Kong, L Cen, H Jin
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
892015
Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features
L Tran, D Kong, H Jin, J Liu
Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016
802016
Puppies: Transformation-supported personalized privacy preserving partial image sharing
J He, B Liu, D Kong, X Bao, N Wang, H Jin, G Kesidis
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
712016
An iterative locally linear embedding algorithm
D Kong, CHQ Ding, H Huang, F Nie
arXiv preprint arXiv:1206.6463, 2012, 2012
542012
Robust non-negative dictionary learning
Q Pan, D Kong, C Ding, B Luo
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
412014
Protecting your children from inappropriate content in mobile apps: An automatic maturity rating framework
B Hu, B Liu, NZ Gong, D Kong, H Jin
Proceedings of the 24th ACM International on Conference on Information and …, 2015
352015
ISA: a source code static vulnerability detection system based on data fusion
D Kong, Q Zheng, C Chen, J Shuai, M Zhu
2nd International ICST Conference on Scalable Information Systems, 2010
332010
Attention convolutional neural network for advertiser-level click-through rate forecasting
H Gao, D Kong, M Lu, X Bai, J Yang
Proceedings of the 2018 world wide web conference, 1855-1864, 2018
272018
Uncorrelated group lasso
D Kong, J Liu, B Liu, X Bao
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
252016
Mobile app security risk assessment: A crowdsourcing ranking approach from user comments
L Cen, D Kong, H Jin, L Si
Proceedings of the 2015 SIAM International Conference on Data Mining, 658-666, 2015
242015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20