default search action
Rong Geng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Jiafeng Ren, Rong Geng:
Provenance-based APT campaigns detection via masked graph representation learning. Comput. Secur. 148: 104159 (2025) - 2024
- [j9]Yan Wang, Qindong Sun, Dongzhu Rong, Rong Geng:
Multi-domain awareness for compressed deepfake videos detection over social networks guided by common mechanisms between artifacts. Comput. Vis. Image Underst. 247: 104072 (2024) - [j8]Wenxiong Li, Rong Geng, Suiyin Chen:
CSP-free adaptive Kriging surrogate model method for reliability analysis with small failure probability. Reliab. Eng. Syst. Saf. 243: 109898 (2024) - [j7]Han Cao, Qindong Sun, Yaqi Li, Rong Geng, Xiaoxiong Wang:
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain. ACM Trans. Priv. Secur. 27(1): 4:1-4:25 (2024) - 2023
- [i1]Wenxiong Li, Rong Geng, Suiyin Chen:
PSO-embedded adaptive Kriging surrogate model method for structural reliability analysis with small failure probability. CoRR abs/2304.07010 (2023) - 2022
- [j6]Jialei Chen, Chong Fu, Haoyu Xie, Xu Zheng, Rong Geng, Chiu-Wing Sham:
Uncertainty teacher with dense focal loss for semi-supervised medical image segmentation. Comput. Biol. Medicine 149: 106034 (2022) - 2021
- [j5]Rong Geng, Ning Ye, Jun Liu, Dakai Zhu:
Towards channel state information based coding to enhance security in satellite communication. J. Syst. Archit. 112: 101843 (2021) - [c7]Chunhong Cao, Ce Ji, Rong Geng:
The Application of PBL + Flipped Classroom Teaching Mode in Computer Practice Courses. ICEIT 2021: 1-4 - [c6]Rong Geng, Chunhong Cao, Ce Ji:
Research on the Integration of Curriculum Ideological and Political Elements into Communication Principles. ICEIT 2021: 106-110 - [c5]Ce Ji, Chunhong Cao, Rong Geng, Xiao Zhang:
Design of PBL Teaching Method Based on OBE Mode. ICEIT 2021: 116-119 - 2020
- [c4]Yuntong Zhang, Jingye Xu, Zhiwei Wang, Rong Geng, Kim-Kwang Raymond Choo, Jesús Arturo Pérez Díaz, Dakai Zhu:
Efficient and Intelligent Attack Detection in Software Defined IoT Networks. ICESS 2020: 1-9
2010 – 2019
- 2018
- [j4]Rong Geng, Xiaojie Wang, Jun Liu:
A Software Defined Networking-Oriented Security Scheme for Vehicle Networks. IEEE Access 6: 58195-58203 (2018) - [j3]Rong Geng, Xiaojie Wang, Ning Ye, Jun Liu:
A Fault Prediction Algorithm Based on Rough Sets and Back Propagation Neural Network for Vehicular Networks. IEEE Access 6: 74984-74992 (2018) - 2016
- [j2]Rong Geng, Zhaolong Ning, Ning Ye:
A load-balancing and coding-aware multicast protocol for mobile ad hoc networks. Int. J. Commun. Syst. 29(17): 2457-2470 (2016) - [c3]Rong Geng, Xiaojie Wang, Ning Ye:
A Reliable Big Data Transmission Algorithm for Space Information Network. iThings/GreenCom/CPSCom/SmartData 2016: 888-893 - 2015
- [c2]Ning Ye, Rong Geng, Xiaoshi Song, Qunyang Wang, Zhaolong Ning:
Hierarchic Topology Management by Decision Model and Smart Agents in Space Information Networks. HPCC/CSS/ICESS 2015: 1817-1825 - 2012
- [j1]Rong Geng, Lei Guo, Xingwei Wang:
A new adaptive MAC protocol with QoS support based on IEEE 802.11 in ad hoc networks. Comput. Electr. Eng. 38(3): 582-590 (2012)
2000 – 2009
- 2006
- [c1]Rong Geng, Zhe Li:
QoS-Aware Routing Based on Local Information for Mobile Ad Hoc Networks. ICDCIT 2006: 159-167
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint