default search action
Li Gong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Yichun Shen, Shuyi Wang, Yuhan Shen, Hua Xing, Li Gong, Jingyi Hu:
KOA Massage Robot: A Study on the Reduction of TCM Manipulation Based on PSO-BP Algorithm. IEEE Access 12: 149367-149380 (2024) - [j68]Jinjing An, Xin Hu, Li Gong, Zhuo Zou, Lirong Zheng:
Fuzzy reliability evaluation and machine learning-based fault prediction of wind turbines. J. Ind. Inf. Integr. 40: 100606 (2024) - [j67]Meng Tian, Zhengcheng Dong, Li Gong, Xianpei Wang:
Line hardening strategies for resilient power systems considering cyber-topology interdependence. Reliab. Eng. Syst. Saf. 241: 109644 (2024) - 2023
- [j66]Xianpei Wang, Li Gong, Haocheng Zhao, Bowen Li, Meng Tian:
A 3D Offline Packing Algorithm considering Cargo Orientation and Stability. Int. J. Distributed Sens. Networks 2023: 1-14 (2023) - [j65]Lin Huang, Xin Pan, Yajie Liu, Li Gong:
An Unsupervised Machine Learning Approach for Monitoring Data Fusion and Health Indicator Construction. Sensors 23(16): 7239 (2023) - [j64]Li Gong, Zhiqing Xiao, Lihua Xu, Yan Ding, Zhuo Zou, Lirong Zheng:
An IoT-Based Wearable Labor Progress Monitoring System for Remote Evaluation of Admission Time to Hospital. IEEE J. Biomed. Health Informatics 27(6): 3037-3048 (2023) - [j63]Meng Tian, Zhengcheng Dong, Li Gong, Xianpei Wang:
Coordinated Repair Crew Dispatch Problem for Cyber-Physical Distribution System. IEEE Trans. Smart Grid 14(3): 2288-2300 (2023) - 2022
- [j62]Chengjie Yin, Li Gong, Yushun Chen, Leyi Ni, Tony J. Pitcher, Bin Kang, Longgen Guo:
Modeling ecosystem impacts of the invasive Japanese smelt Hypomesus nipponensis in Lake Erhai, southwestern China. Ecol. Informatics 67: 101488 (2022) - [j61]Li Gong, Jinlong Yan, Yiqiao Chen, Jinjing An, Lei He, Lirong Zheng, Zhuo Zou:
An IoT-based intelligent irrigation system with data fusion and a self-powered wide-area network. J. Ind. Inf. Integr. 29: 100367 (2022) - [j60]Li Gong, Xuelei Gong, Ying Liang, Bingzong Zhang, Yiqun Yang:
Life Prediction of Hydraulic Concrete Based on Grey Residual Markov Model. J. Inf. Process. Syst. 18(4): 457-469 (2022) - [j59]Hongtai Yao, Xianpei Wang, Le Zhao, Meng Tian, Li Gong, Bowen Li:
Semantic Segmentation for Remote Sensing Images Using Pyramid Object-Based Markov Random Field With Dual-Track Information Transmission. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j58]Li Gong, Xiu-Bo Chen, Gang Xu, Yan Chang, Yi-Xian Yang:
Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment. Quantum Inf. Process. 21(11): 375 (2022) - [j57]Hongtai Yao, Xianpei Wang, Le Zhao, Meng Tian, Zini Jian, Li Gong, Bowen Li:
An Object-Based Markov Random Field with Partition-Global Alternately Updated for Semantic Segmentation of High Spatial Resolution Remote Sensing Image. Remote. Sens. 14(1): 127 (2022) - [j56]Chengcheng Luo, Feng Xiao, Li Gong, Jintao Lei, Wenhao Li, Shengkai Zhang:
Comparison of Weighted Mean Temperature in Greenland Calculated by Four Reanalysis Data. Remote. Sens. 14(21): 5431 (2022) - [j55]Li Gong, Xianpei Wang, Meng Tian, Hongtai Yao, Jiachuan Long:
Multi-Objective Optimal Planning for Distribution Network Considering the Uncertainty of PV Power and Line-Switch State. Sensors 22(13): 4927 (2022) - 2021
- [j54]Shengkai Zhang, Li Gong, Qi Zeng, Wenhao Li, Feng Xiao, Jintao Lei:
Imputation of GPS Coordinate Time Series Using missForest. Remote. Sens. 13(12): 2312 (2021) - [j53]Xiaoshi Chen, Li Gong, Liang Wei, Shih-Ching Yeh, Li Da Xu, Lirong Zheng, Zhuo Zou:
A Wearable Hand Rehabilitation System With Soft Gloves. IEEE Trans. Ind. Informatics 17(2): 943-952 (2021) - 2020
- [j52]Zeba Idrees, Jose Granados, Yang Sun, Shahid Latif, Li Gong, Zhuo Zou, Lirong Zheng:
IEEE 1588 for Clock Synchronization in Industrial IoT and Related Applications: A Review on Contributing Technologies, Protocols and Enhancement Methodologies. IEEE Access 8: 155660-155678 (2020) - [j51]Qianyun Zhang, Xiaoqian Ren, Li Gong, Lei Cheng, Yue Gao:
An unmanned aerial vehicle flight formation for enhanced emergency communication based on conformal antenna design. J. Commun. Inf. Networks 5(3): 294-301 (2020) - [j50]Li Gong, Hong Wang, Chunling Jin, Lili Lu, Menghan Ma:
Type Drive Analysis of Urban Water Security Factors. J. Inf. Process. Syst. 16(4): 784-794 (2020) - [j49]Songya Ma, Li Gong:
Deterministic bidirectional controlled remote preparation without information splitting. Quantum Inf. Process. 19(8): 255 (2020) - [c61]Xiaoshi Chen, Li Gong, Lirong Zheng, Zhuo Zou:
Soft Exoskeleton Glove for Hand Assistance Based on Human-machine Interaction and Machine Learning. ICHMS 2020: 1-6 - [c60]Jake Lever, Julia M. Barbarino, Li Gong, Rachel Huddart, Katrin Sangkuhl, Ryan Whaley, Michelle Whirl Carrillo, Mark Woon, Teri E. Klein, Russ B. Altman:
PGxMine: Text Mining for Curation of PharmGKB. PSB 2020: 611-622 - [c59]Wenbo Jiang, Hongwei Li, Li Gong, Haomiao Yang, Rongxing Lu:
Accelerating Poisoning Attack Through Momentum and Adam Algorithms. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j48]Li Gong, Shan Jiang, Zhiyong Yang, Guobin Zhang, Lu Wang:
Automated pulmonary nodule detection in CT images using 3D deep squeeze-and-excitation networks. Int. J. Comput. Assist. Radiol. Surg. 14(11): 1969-1979 (2019) - [j47]Li Gong, Zhonghui Wang, Yaxian Li, Chunling Jin, Jing Wang:
Damage Mechanism of Drift Ice Impact. J. Inf. Process. Syst. 15(6): 1350-1364 (2019) - [j46]Guobin Zhang, Zhiyong Yang, Li Gong, Shan Jiang, Lu Wang, Xi Cao, Lin Wei, Hongyun Zhang, Ziqi Liu:
An Appraisal of Nodule Diagnosis for Lung Cancer in CT Images. J. Medical Syst. 43(7): 181:1-181:18 (2019) - [c58]Li Gong, Josep Maria Crego, Jean Senellart:
Enhanced Transformer Model for Data-to-Text Generation. NGT@EMNLP-IJCNLP 2019: 148-156 - [c57]Li Gong, Josep Maria Crego, Jean Senellart:
SYSTRAN @ WNGT 2019: DGT Task. NGT@EMNLP-IJCNLP 2019: 262-267 - [c56]Li Gong, Hongwei Li, Guowen Xu, Xizhao Luo, Mi Wen:
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data. GLOBECOM 2019: 1-6 - 2018
- [j45]Guobin Zhang, Shan Jiang, Zhiyong Yang, Li Gong, Xiaodong Ma, Zeyang Zhou, Chao Bao, Qi Liu:
Automatic nodule detection for lung cancer in CT images: A review. Comput. Biol. Medicine 103: 287-300 (2018) - [c55]Mingxuan Wang, Li Gong, Wenhuan Zhu, Jun Xie, Chao Bian:
Tencent Neural Machine Translation Systems for WMT18. WMT (shared task) 2018: 522-527 - 2017
- [j44]Song Gao, Krzysztof Janowicz, Daniel R. Montello, Yingjie Hu, Jiue-An Yang, Grant McKenzie, Yiting Ju, Li Gong, Benjamin Adams, Bo Yan:
A data-synthesis-driven method for detecting and extracting vague cognitive regions. Int. J. Geogr. Inf. Sci. 31(6): 1245-1271 (2017) - [j43]Ziqian Xu, Wen Zeng, Jiayu Sun, Wei Chen, Ruzhi Zhang, Zunyuan Yang, Zunwei Yao, Lei Wang, Li Song, Yushu Chen, Yu Zhang, Chunhua Wang, Li Gong, Bing Wu, Tinghua Wang, Jie Zheng, Fabao Gao:
The quantification of blood-brain barrier disruption using dynamic contrast-enhanced magnetic resonance imaging in aging rhesus monkeys with spontaneous type 2 diabetes mellitus. NeuroImage 158: 480-487 (2017) - [c54]Li Gong, Guofeng Shen, Shan Qiao, Wenjie Liu, Yuchi Yi:
A miniaturized phased high intensity focused ultrasound transducer-driven system with MR compatibility. CISP-BMEI 2017: 1-5 - [i2]Fanqi Zeng, Li Gong, Jing Liu, Jiang Zhang, Qinghua Chen, Ruyue Xin:
Interactive Levy Flight in Interest Space. CoRR abs/1705.09462 (2017) - 2016
- [j42]Xi Liu, Chaogui Kang, Li Gong, Yu Liu:
Incorporating spatial interaction patterns in classifying and understanding urban land use. Int. J. Geogr. Inf. Sci. 30(2): 334-350 (2016) - 2015
- [j41]Grant McKenzie, Krzysztof Janowicz, Song Gao, Li Gong:
How where is when? On the regional variability and resolution of geosocial temporal signatures for points of interest. Comput. Environ. Urban Syst. 54: 336-346 (2015) - [c53]Marianna Apidianaki, Li Gong:
LIMSI: Translations as Source of Indirect Supervision for Multilingual All-Words Sense Disambiguation and Entity Linking. SemEval@NAACL-HLT 2015: 298-302 - 2014
- [b2]Li Gong:
On-demand Development of Statistical Machine Translation Systems. (Développement à la demande des systèmes de traduction automatique statistiques). University of Paris-Sud, Orsay, France, 2014 - [c52]Jin Tian, Fei Wu, Guohui Zeng, Li Gong:
A Modified Storage Format for Accelerating SPMV. CSO 2014: 547-550 - [c51]Jin Tian, Fei Gao, Xiankun Sun, Li Gong:
An Efficient Column-Major Ordering Format for Finite Element Analysis. CSO 2014: 562-565 - [c50]Li Gong, Aurélien Max, François Yvon:
Incremental development of statistical machine translation systems. IWSLT 2014 - [c49]Li Gong, Aurélien Max, François Yvon:
(Much) Faster Construction of SMT Phrase Tables from Large-scale Parallel Corpora (Construction (très) rapide de tables de traduction à partir de grands bi-textes) [in French]. TALN (3) 2014: 26-27 - [c48]Li Gong, Aurélien Max, François Yvon:
Towards a More Efficient Development of Statistical Machine Translation Systems (Vers un développement plus efficace des systèmes de traduction statistique : un peu de vert dans un monde de BLEU) [in French]. TALN (2) 2014: 395-400 - [c47]Nicolas Pécheux, Li Gong, Quoc-Khanh Do, Benjamin Marie, Yulia Ivanishcheva, Alexandre Allauzen, Thomas Lavergne, Jan Niehues, Aurélien Max, François Yvon:
LIMSI $@$ WMT'14 Medical Translation Task. WMT@ACL 2014: 246-253 - 2013
- [c46]Jin Tian, Fei Wu, Rui Zou, Guohui Zeng, Li Gong:
The Storage Formats for Accelerating SMVP on a GPU. BIFE 2013: 513-516 - [c45]Jin Tian, Guohui Zeng, Fei Wu, Rui Zou, Li Gong:
The Creation of Knowledge Innovation System. BIFE 2013: 542-544 - [c44]Li Gong, Aurélien Max, François Yvon:
Improving bilingual sub-sentential alignment by sampling-based transpotting. IWSLT 2013 - [i1]Xi Liu, Li Gong, Yongxi Gong, Yu Liu:
Revealing daily travel patterns and city structure with taxi trip data. CoRR abs/1310.6592 (2013) - 2012
- [j40]Fabio Rinaldi, Simon Clematide, Yael Garten, Michelle Whirl Carrillo, Li Gong, Joan M. Hebert, Katrin Sangkuhl, Caroline F. Thorn, Teri E. Klein, Russ B. Altman:
Using ODIN for a PharmGKB revalidation experiment. Database J. Biol. Databases Curation 2012 (2012) - [c43]Li Gong, Jin Tian:
Model for Renegotiation in Infrastructure Projects with Government Guarantee. BIFE 2012: 646-648 - [c42]Jin Tian, Li Gong:
Novel Pre-treatment for Inhomogeneous Dielectric Media in Finite Element Analysis. CSO 2012: 699-701 - [c41]Li Gong, Aurélien Max, François Yvon:
Towards contextual adaptation for any-text translation. IWSLT 2012: 292-299 - [c40]Hai Son Le, Thomas Lavergne, Alexandre Allauzen, Marianna Apidianaki, Li Gong, Aurélien Max, Artem Sokolov, Guillaume Wisniewski, François Yvon:
LIMSI @ WMT12. WMT@NAACL-HLT 2012: 330-337 - 2011
- [j39]Li Gong:
Java security architecture revisited. Commun. ACM 54(11): 48-52 (2011) - [j38]Min-Sun Kim, Li Gong, Nicole Saito, Kimberly Nishigaya, Marjorie Cabico, Pascale Lafontaine:
The Role of Self-Construal on Preferred Communication Styles with Humanoid Robots. Int. J. Humanoid Robotics 8(2): 359-374 (2011) - [j37]Li Gong:
Java Security Architecture Revisited. ACM Queue 9(9): 30 (2011) - [c39]Guang Ma, Li Gong, Kuikui Chen, Wanbei Bai:
One Kind of Brand-New Experimental Teaching Idea and Assessment Methods on Basic Geology in Network Environment. CSEE (3) 2011: 202-206 - [c38]Guangri Jin, Li Gong, Hiroshi Furukawa:
Automatic Transmission Period Setting for Intermittent Periodic Transmission in Wireless Backhaul. DICTAP (1) 2011: 577-592 - 2010
- [j36]Guoxing Zhang, Ju'e Guo, Guorong Chai, Li Gong, Xuejun Wang:
Using jump-diffusion modeling for valuing real options in infrastructure projects. Frontiers Comput. Sci. China 4(2): 263-270 (2010)
2000 – 2009
- 2009
- [j35]Min-Sun Kim, Jennifer Sur, Li Gong:
Humans and humanoid social robots in communication contexts. AI Soc. 24(4): 317-325 (2009) - [c37]Li Gong:
Java Security: A Ten Year Retrospective. ACSAC 2009: 395-405 - 2008
- [j34]Li Gong:
How social is social responses to computers? The function of the degree of anthropomorphism in computer representations. Comput. Hum. Behav. 24(4): 1494-1509 (2008) - [j33]Li Gong:
The boundary of racial prejudice: Comparing preferences for computer-synthesized White, Black, and robot characters. Comput. Hum. Behav. 24(5): 2074-2093 (2008) - [j32]Tina Hernandez-Boussard, Michelle Whirl Carrillo, Joan M. Hebert, Li Gong, Ryan Owen, Mei Gong, Winston Gor, Feng Liu, Chuong Truong, Ryan Whaley, Mark Woon, Tina Zhou, Russ B. Altman, Teri E. Klein:
The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge. Nucleic Acids Res. 36(Database-Issue): 913-918 (2008) - [c36]Jiayu Wu, Hongguang Cheng, Ayan Zeng, Fanghua Hao, Dan Wang, Li Gong:
Landscape Change and its Simulation using GIS, Landscape Ecology and the Markov Model. IGARSS (4) 2008: 197-200 - [c35]Dan Wang, Hongguang Cheng, Fanghua Hao, Ayan Zeng, Jiayu Wu, Li Gong:
Dynamic Simulation on the Spatio-Temporal Patterns of Land use in the Area of Continued Hydropower Station Construction in the Upper Reach of Yellow River. IGARSS (4) 2008: 711-714 - 2007
- [j31]Li Gong:
Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents. Int. J. Hum. Comput. Stud. 65(3): 183-191 (2007) - 2004
- [j30]Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap:
Guest Editors' Introduction: Securing the High-Speed Internet. Computer 37(6): 33-35 (2004) - [j29]Li Gong:
It's China(town). IEEE Internet Comput. 8(5): 103-104 (2004) - 2003
- [j28]Li Gong, Jennifer Lai:
To Mix or Not to Mix Synthetic Speech and Human Speech? Contrasting Impact on Judge-Rated Task Performance versus Self-Rated Performance and Attitudinal Responses. Int. J. Speech Technol. 6(2): 123-131 (2003) - [j27]Li Gong:
A New Column for a New Year. IEEE Internet Comput. 7(1): 96 (2003) - [j26]Li Gong:
Why Cross-Platform Security. IEEE Internet Comput. 7(3): 95-96 (2003) - [j25]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider:
Guest editorial overview. IEEE J. Sel. Areas Commun. 21(1): 1-4 (2003) - [c34]Li Gong:
Is Cross-Platform Security Possible? ACISP 2003: 402 - [c33]Li Gong:
Multimodal Interactions on Mobile Devices and Users' Behavioral and Attitudinal Preferences. HCI (4) 2003: 1402-1406 - [c32]Li Gong:
Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust. INTERACT 2003 - 2002
- [b1]Scott Oaks, Bernard Traversat, Li Gong:
JXTA in a nutshell - a desktop quick reference. O'Reilly 2002, ISBN 978-0-596-00236-7, pp. I-XII, 1-401 - [j24]Li Gong:
Tutorial: Peer to Peer Networks in Action. IEEE Distributed Syst. Online 3(1) (2002) - [j23]Li Gong:
Guest Editor's Introduction: Peer-to-Peer Networks in Action. IEEE Internet Comput. 6(1): 37-39 (2002) - 2001
- [j22]Li Gong:
A Software Architecture for Open Service Gateways. IEEE Internet Comput. 5(1): 64-70 (2001) - [j21]Li Gong:
Industry Report: JXTA: A Network Programming Environment. IEEE Internet Comput. 5(3): 88-95 (2001) - [c31]Li Gong, Jennifer Lai:
Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude. CHI 2001: 158-165 - 2000
- [j20]Clifford Nass, Li Gong:
Speech interfaces from an evolutionary perspective. Commun. ACM 43(9): 36-43 (2000) - [j19]Li Gong, Ravi S. Sandhu:
Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Comput. 4(6): 38-41 (2000) - [c30]Li Gong:
Developing Security Systems in the Real World. ECOOP 2000: 251
1990 – 1999
- 1999
- [c29]Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers:
User Authentication and Authorization in the Java(tm) Platform. ACSAC 1999: 285-290 - [c28]Clifford Nass, Li Gong:
Maximized Modality or constrained consistency? AVSP 1999: 1 - [c27]Li Gong, Satya Dodda:
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). HASE 1999: 89-96 - 1998
- [j18]Li Gong:
Secure Java Class Loading. IEEE Internet Comput. 2(6): 56-61 (1998) - [c26]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - [c25]Dirk Balfanz, Li Gong:
Experience with Secure Multi-Processing in Java. ICDCS 1998: 398-405 - [c24]Li Gong, Roland Schemers:
Signing, Sealing, and Guarding Java Objects. Mobile Agents and Security 1998: 206-216 - [c23]Li Gong, Roland Schemers:
Implementing Protection Domains in the JavaTM Development Kit 1.2. NDSS 1998 - [e3]Li Gong, Michael K. Reiter:
CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998. ACM 1998, ISBN 1-58113-007-4 [contents] - 1997
- [j17]Li Gong:
Enclaves: Enabling Secure Collaboration Over the Internet. IEEE J. Sel. Areas Commun. 15(3): 567-575 (1997) - [j16]Li Gong:
Java security: present and near future. IEEE Micro 17(3): 14-19 (1997) - [j15]James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford:
Firewalls: An Expert Roundtable. IEEE Softw. 14(5): 60-66 (1997) - [c22]Li Gong:
New security architectural directions for Java. COMPCON 1997: 97-102 - [c21]Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong:
Secure Software Architectures. S&P 1997: 84-93 - [c20]Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox:
Ensuring Assurance in Mobile Computing. S&P 1997: 114-118 - [c19]Li Gong, Marianne Mueller, Hemma Prafullchandra, Roland Schemers:
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. USENIX Symposium on Internet Technologies and Systems 1997 - [e2]Richard Graveman, Philippe A. Janson, Clifford Neuman, Li Gong:
CCS '97, Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997. ACM 1997, ISBN 0-89791-912-2 [contents] - 1996
- [j14]Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang:
Practical Protocols for Certified Electronic Mail. J. Netw. Syst. Manag. 4(3): 279-297 (1996) - [j13]Li Gong, Xiaolei Qian:
Computational Issues in Secure Interoperation. IEEE Trans. Software Eng. 22(1): 43-52 (1996) - [c18]Iskender Agi, Li Gong:
An Empirical Study of Secure MPEG Video Transmissions. NDSS 1996: 137-144 - [c17]Simon N. Foley, Li Gong, Xiaolei Qian:
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. S&P 1996: 142-153 - [e1]Li Gong, Jacques Stearn:
CCS '96, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996. ACM 1996, ISBN 0-89791-829-0 [contents] - 1995
- [j12]Michael K. Reiter, Li Gong:
Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995) - [j11]Li Gong:
Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. Distributed Comput. 9(3): 131-145 (1995) - [j10]Li Gong:
Collisionful Keyed Hash Functions with Selectable Collisions. Inf. Process. Lett. 55(3): 167-170 (1995) - [j9]Li Gong, Xiaolei Qian:
Enriching the Expressive Power of Security Labels. IEEE Trans. Knowl. Data Eng. 7(5): 839-841 (1995) - [j8]Li Gong, Nachum Shacham:
Multicast security and its extension to a mobile environment. Wirel. Networks 1(3): 281-295 (1995) - [c16]Li Gong:
Optimal authentication protocols resistant to password guessing attacks. CSFW 1995: 24-29 - 1994
- [c15]Li Gong:
New Protocols for Third-Party-Based Authentication and Secure Broadcast. CCS 1994: 176-183 - [c14]Li Gong, Nachum Shacham:
Elements of trusted multicasting. ICNP 1994: 23-30 - [c13]Li Gong, Xiaolei Qian:
The complexity and composability of secure interoperation. S&P 1994: 190-200 - 1993
- [j7]Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer:
Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE J. Sel. Areas Commun. 11(5): 648-656 (1993) - [j6]Li Gong:
Increasing Availability and Security of an Authentication Service. IEEE J. Sel. Areas Commun. 11(5): 657-662 (1993) - [c12]Li Gong:
Lower Bounds on Messages and Rounds for Network Authentication Protocols. CCS 1993: 26-37 - [c11]Li Gong:
A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. CSFW 1993: 131-136 - [c10]Michael K. Reiter, Li Gong:
Preventing denial and forgery of causal relationships in distributed systems. S&P 1993: 30-40 - 1992
- [j5]Li Gong:
A Security Risk of Depending on Synchronized Clocks. ACM SIGOPS Oper. Syst. Rev. 26(1): 49-53 (1992) - [c9]John A. Bull, Li Gong, Karen R. Sollins:
Towards Security in an Open Systems Federation. ESORICS 1992: 3-20 - [c8]Michael K. Reiter, Kenneth P. Birman, Li Gong:
Integrating security in a group oriented distributed system. S&P 1992: 18-32 - 1991
- [c7]Li Gong:
Handling Infeasible Specifications fo Cryptographic Protocols. CSFW 1991: 99-102 - [c6]Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 - 1990
- [j4]Li Gong:
A note on redundancy in encrypted messages. Comput. Commun. Rev. 20(5): 18-22 (1990) - [j3]Li Gong, David J. Wheeler:
A Matrix Key-Distribution Scheme. J. Cryptol. 2(1): 51-59 (1990) - [c5]Li Gong:
Verifiable-Text Attacks in Cryptographic Protocols. INFOCOM 1990: 686-693 - [c4]Li Gong, Roger M. Needham, Raphael Yahalom:
Reasoning about Belief in Cryptographic Protocols. S&P 1990: 234-248
1980 – 1989
- 1989
- [j2]Li Gong:
Using one-way functions for authentication. Comput. Commun. Rev. 19(5): 8-11 (1989) - [j1]Li Gong:
On Security in Capability-Based Systems. ACM SIGOPS Oper. Syst. Rev. 23(2): 56-60 (1989) - [c3]Li Gong:
Securely Replicating Authentication Services. ICDCS 1989: 85-93 - [c2]T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham:
Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18 - [c1]Li Gong:
A Secure Identity-Based Capability System. S&P 1989: 56-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint