Follow
Deguang Kong
Title
Cited by
Cited by
Year
Robust nonnegative matrix factorization using l21-norm
D Kong, C Ding, H Huang
Proceedings of the 20th ACM international conference on Information and …, 2011
3222011
Discriminant malware distance learning on structural information for automated malware classification
D Kong, G Yan
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
2252013
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
1222015
Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
1152017
Exclusive Feature Learning on Arbitrary Structures via -norm
D Kong, R Fujimaki, J Liu, F Nie, C Ding
Advances in neural information processing systems 27, 2014
1072014
Multi-label relieff and f-statistic feature selections for image annotation
D Kong, C Ding, H Huang, H Zhao
2012 IEEE conference on computer vision and pattern recognition, 2352-2359, 2012
992012
Deeprebirth: Accelerating deep neural network execution on mobile devices
D Li, X Wang, D Kong
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
952018
Exploring discriminatory features for automated malware classification
G Yan, N Brown, D Kong
International Conference on Detection of Intrusions and Malware, and …, 2013
932013
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications
D Kong, L Cen, H Jin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
702015
Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features
L Tran, D Kong, H Jin, J Liu
Thirtieth AAAI Conference on Artificial Intelligence, 2016
602016
Puppies: Transformation-supported personalized privacy preserving partial image sharing
J He, B Liu, D Kong, X Bao, N Wang, H Jin, G Kesidis
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
542016
An iterative locally linear embedding algorithm
D Kong, CHQ Ding, H Huang, F Nie
arXiv preprint arXiv:1206.6463, 2012, 2012
482012
Robust non-negative dictionary learning
Q Pan, D Kong, C Ding, B Luo
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
392014
ISA: a source code static vulnerability detection system based on data fusion
D Kong, Q Zheng, C Chen, J Shuai, M Zhu
2nd International ICST Conference on Scalable Information Systems, 2010
292010
DeepLight: Deep lightweight feature interactions for accelerating CTR predictions in ad serving
W Deng, J Pan, T Zhou, D Kong, A Flores, G Lin
Proceedings of the 14th ACM international conference on Web search and data …, 2021
252021
Protecting your children from inappropriate content in mobile apps: An automatic maturity rating framework
B Hu, B Liu, NZ Gong, D Kong, H Jin
Proceedings of the 24th ACM International on Conference on Information and …, 2015
252015
Uncorrelated group lasso
D Kong, J Liu, B Liu, X Bao
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
222016
Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective
D Kong, M Zhang, C Ding
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2013
222013
Obfuscated Malware Detection Based on Boosting Multilevel Features
D Kong, X Tan, H Xi, T Gong, J Shuai
Journal of Software 22 (3), 522-533, 2011
19*2011
Attention convolutional neural network for advertiser-level click-through rate forecasting
H Gao, D Kong, M Lu, X Bai, J Yang
Proceedings of the 2018 World Wide Web Conference, 1855-1864, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–20