default search action
Daofu Gong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Yan Li, Zhenyu Li, Daofu Gong, Qian Hu, Haoyu Lu:
BotCL: a social bot detection model based on graph contrastive learning. Knowl. Inf. Syst. 66(9): 5185-5202 (2024) - 2023
- [j15]Lei Tan, Daofu Gong, Jinmao Xu, Zhenyu Li, Fenlin Liu:
Meta-path fusion based neural recommendation in heterogeneous information networks. Neurocomputing 529: 236-248 (2023) - [j14]Lei Tan, Daofu Gong, Zhenyu Li, Shaoyong Du, Fenlin Liu:
Neural Attention Networks for Recommendation With Auxiliary Data. IEEE Trans. Netw. Serv. Manag. 20(2): 1125-1139 (2023) - [c15]Lei Tan, Jinmao Xu, Daofu Gong, Fenlin Liu:
Recurrent Attentive Neural Networks for Sequential Recommendation. CNML 2023: 356-360 - [c14]Haoyu Lu, Daofu Gong, Zhenyu Li, Feng Liu, Fenlin Liu:
BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models. ICC 2023: 2870-2876 - 2022
- [j13]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image fragile watermarking algorithm based on deneighbourhood mapping. IET Image Process. 16(10): 2652-2664 (2022) - [j12]Jinmao Xu, Lei Tan, Daofu Gong, Fenlin Liu:
Extended matrix factorization with entity network construction for recommendation. J. Ambient Intell. Humaniz. Comput. 13(4): 1763-1775 (2022) - [c13]Yilong Wang, Daofu Gong, Zhenyu Li, Fenlin Liu:
A Fragile Watermarking Algorithm Based on Multiple Watermarking. IVSP 2022: 48-55 - [i1]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping. CoRR abs/2201.10272 (2022) - 2021
- [c12]Zhenyu Li, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors:
Self-embedding watermarking method for G-code used in 3D printing. WIFS 2021: 1-6 - 2020
- [c11]Ling Chen, Wenwen Liu, Daofu Gong, Yan Chen:
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering. IWCMC 2020: 403-406 - [c10]Ling Chen, Wenwen Liu, Daofu Gong, Yan Chen:
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks. IWCMC 2020: 407-411
2010 – 2019
- 2019
- [j11]Haoyu Lu, Daofu Gong, Fenlin Liu, Ping Wang, Yuhan Kang:
Deep neural network-based image copyright protection scheme. J. Electronic Imaging 28(2): 023021 (2019) - [j10]Liu Feng, Daofu Gong, Fenlin Liu, Haoyu Lu:
Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation. Multim. Tools Appl. 78(7): 8133-8149 (2019) - [j9]Yan Chen, Yu Wang, Daofu Gong:
Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement. Peer-to-Peer Netw. Appl. 12(6): 1480-1488 (2019) - [j8]Fei Xiang, Daofu Gong, Jie Li, Fenlin Liu:
A code protection method against function call analysis in P2P network. Peer-to-Peer Netw. Appl. 12(6): 1799-1809 (2019) - [c9]Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu:
Enhanced branch obfuscation based on exception handling and encrypted mapping table. ACM TUR-C 2019: 140:1-140:9 - [c8]Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding:
A Security-Sensitive Function Mining Framework for Source Code. ICAIS (4) 2019: 421-432 - 2018
- [j7]Yilong Wang, Daofu Gong, Bin Lu, Fei Xiang, Fenlin Liu:
Exception Handling-Based Dynamic Software Watermarking. IEEE Access 6: 8882-8889 (2018) - [c7]Pai Liu, Fenlin Liu, Daofu Gong:
Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect. ICCCS (2) 2018: 366-376 - [c6]Zhenyu Li, Daofu Gong, Fenlin Liu, Adrian G. Bors:
3D Steganalysis Using the Extended Local Feature Set. ICIP 2018: 1683-1687 - 2017
- [j6]Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN based hopping multicast communication against DoS attack. KSII Trans. Internet Inf. Syst. 11(4): 2196-2218 (2017) - [j5]Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. Secur. Commun. Networks 2017: 1560594:1-1560594:12 (2017) - [j4]Jun Chen, Xiangyang Luo, Yanqing Guo, Yi Zhang, Daofu Gong:
A Survey on Breaking Technique of Text-Based CAPTCHA. Secur. Commun. Networks 2017: 6898617:1-6898617:15 (2017) - 2016
- [j3]Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:
Random table and hash coding-based binary code obfuscation against stack trace analysis. IET Inf. Secur. 10(1): 18-27 (2016) - [j2]Xin Ge, Bin Lu, Fenlin Liu, Daofu Gong:
An Image Encryption Algorithm Based on Information Hiding. Int. J. Bifurc. Chaos 26(11): 1650192:1-1650192:14 (2016) - 2015
- [j1]Xin Xie, Fenlin Liu, Bin Lu, Daofu Gong:
基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes). 计算机科学 42(3): 167-173 (2015) - 2013
- [c5]Yuan Liu, Xiangyang Luo, Jicang Lu, Daofu Gong:
Steganalysis of F5-like steganography based on selection of joint distribution features. ICIMCS 2013: 71-75 - 2010
- [c4]Shenyu Liu, Xi He, Daofu Gong:
Bayesian Decision Based Method for Assets Recognition of Risk Assessment. IIH-MSP 2010: 380-383
2000 – 2009
- 2009
- [c3]Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing:
An Authentication Watermark Algorithm for JPEG images. ARES 2009: 584-588 - 2008
- [c2]Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, Daofu Gong:
Multi-class steganalysis for Jpeg stego algorithms. ICIP 2008: 2076-2079 - [c1]Daofu Gong, Fenlin Liu, Bin Lu, Ping Wang, Lan Ding:
Hiding Informationin in Java Class File. ISCSCT (2) 2008: 160-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint