default search action
Zhaoquan Gu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Jianchang Huang, Yinyao Dai, Fang Lu, Bin Wang, Zhaoquan Gu, Boyang Zhou, Yaguan Qian:
Adversarial perturbation denoising utilizing common characteristics in deep feature space. Appl. Intell. 54(2): 1672-1690 (2024) - [j62]Haiyan Wang, Weimin Yang, Wenying Feng, Liyi Zeng, Zhaoquan Gu:
Threat intelligence named entity recognition techniques based on few-shot learning. Array 23: 100364 (2024) - [j61]Junjian Zhang, Hao Tan, Le Wang, Yaguan Qian, Zhaoquan Gu:
Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems. CAAI Trans. Intell. Technol. 9(3): 620-631 (2024) - [j60]Yaguan Qian, Wenzhuo Huang, Qinqin Yu, Tengteng Yao, Xiang Ling, Bin Wang, Zhaoquan Gu, Yanchun Zhang:
Robust filter pruning guided by deep frequency-features for edge intelligence. Neurocomputing 610: 128586 (2024) - [j59]Zhaohua Li, Le Wang, Zhaoquan Gu, Yang Lv, Zhihong Tian:
Labels Are Culprits: Defending Gradient Attack on Privacy. IEEE Internet Things J. 11(4): 6007-6019 (2024) - [j58]Denghui Zhang, Muhammad Shafiq, Gautam Srivastava, Thippa Reddy Gadekallu, Le Wang, Zhaoquan Gu:
STBCIoT: Securing the Transmission of Biometric Images in Customer IoT. IEEE Internet Things J. 11(9): 16279-16288 (2024) - [j57]Jiawei Zhang, Rui Chen, Yanchun Zhang, Weihong Han, Zhaoquan Gu, Shuqiang Yang, Yongquan Fu:
MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss. Knowl. Based Syst. 283: 111110 (2024) - [j56]Lei Du, Zhaoquan Gu, Ye Wang, Cuiyun Gao:
Open World Intrusion Detection: An Open Set Recognition Method for CAN Bus in Intelligent Connected Vehicles. IEEE Netw. 38(3): 76-82 (2024) - [j55]Jianye Yang, Sheng Fang, Zhaoquan Gu, Ziyi Ma, Xuemin Lin, Zhihong Tian:
TC-Match: Fast Time-constrained Continuous Subgraph Matching. Proc. VLDB Endow. 17(11): 2791-2804 (2024) - [j54]Ling Zhou, Jianming Li, Zhaoquan Gu, Jing Qiu, Brij B. Gupta, Zhihong Tian:
PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network. IEEE Trans. Comput. Soc. Syst. 11(4): 4718-4726 (2024) - [j53]Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang:
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs. IEEE Trans. Inf. Forensics Secur. 19: 7633-7645 (2024) - [j52]Jianhua Wang, Jianye Yang, Zhaoquan Gu, Dian Ouyang, Zhihong Tian, Xuemin Lin:
Efficient Maximal Biclique Enumeration on Large Signed Bipartite Graphs. IEEE Trans. Knowl. Data Eng. 36(9): 4618-4631 (2024) - [j51]Yaguan Qian, Zhiqiang He, Yuqi Wang, Bin Wang, Xiang Ling, Zhaoquan Gu, Haijiang Wang, Shaoning Zeng, Wassim Swaileh:
Hierarchical Threshold Pruning Based on Uniform Response Criterion. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10869-10881 (2024) - [j50]Lei Du, Zhaoquan Gu, Ye Wang, Le Wang, Yan Jia:
A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 21(2): 2389-2401 (2024) - [j49]Haoliang Tan, Wen Xia, Xiangyu Zou, Cai Deng, Qing Liao, Zhaoquan Gu:
The Design of Fast Delta Encoding for Delta Compression Based Storage Systems. ACM Trans. Storage 20(4): 23:1-23:30 (2024) - [j48]Xiaochen Liu, Hao Tan, Junjian Zhang, Aiping Li, Zhaoquan Gu:
Transferable universal adversarial perturbations against speaker recognition systems. World Wide Web (WWW) 27(3): 33 (2024) - [j47]Zhiqiang Zhang, Le Wang, Junyi Zhu, Dong Zhu, Zhaoquan Gu, Yanchun Zhang:
MIM: A multiple integration model for intrusion detection on imbalanced samples. World Wide Web (WWW) 27(4): 47 (2024) - [c99]Yu Cao, Yilu Chen, Ye Wang, Ning Hu, Zhaoquan Gu, Yan Jia:
TS-AUBD: A Novel Two-Stage Method for Abnormal User Behavior Detection. APWeb/WAIM (5) 2024: 17-30 - [c98]Yushun Xie, Zhaoquan Gu, Runnan Tan, Cui Luo, Xiangyu Song, Haiyan Wang:
Generating Adversarial Texts by the Universal Tail Word Addition Attack. APWeb/WAIM (1) 2024: 310-326 - [c97]Hao Wang, Ye Wang, Zhaoquan Gu, Yan Jia:
AGAE: Unsupervised Anomaly Detection for Encrypted Malicious Traffic. APWeb/WAIM (4) 2024: 448-464 - [c96]Angxiao Zhao, Wenying Feng, Ning Hu, Dawei Zhao, Zhaoquan Gu:
Knowledge Embedding Enabled Cyber Security Defense for Networked System: A Novel Risk Detection Method based on Knowledge Graph. CSCWD 2024: 3146-3151 - [c95]Yushun Xie, Haiyan Wang, Le Wang, Lei Luo, Jianxin Li, Zhaoquan Gu:
Reinforced Negative Sampling for Knowledge Graph Embedding. DASFAA (4) 2024: 358-374 - [c94]Haoliang Tan, Xiangyu Zou, Binzhaoshuo Wan, Zhaoquan Gu, Wen Xia:
SuperDelta: Multiple Referenced Base Chunks Scheme for Fine-grained Deduplication Backup Storage System. DCC 2024: 362-371 - 2023
- [j46]Yinyao Dai, Yaguan Qian, Fang Lu, Bin Wang, Zhaoquan Gu, Wei Wang, Jian Wan, Yanchun Zhang:
Improving adversarial robustness of medical imaging systems via adding global attention noise. Comput. Biol. Medicine 164: 107251 (2023) - [j45]Yulu Qi, Zhaoquan Gu, Aiping Li, Xiaojuan Zhang, Muhammad Shafiq, Yangyang Mei, Kaihan Lin:
Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems. Comput. Electr. Eng. 108: 108660 (2023) - [j44]Zhaoquan Gu, Huan Zhang, Le Wang, Muhammad Shafiq, Kai Jin:
Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture. Comput. Electr. Eng. 108: 108690 (2023) - [j43]Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, Jinchang Ren, Li Zhu, Jujian Lv:
IR-Capsule: Two-Stream Network for Face Forgery Detection. Cogn. Comput. 15(1): 13-22 (2023) - [j42]Denghui Zhang, Zhaoquan Gu, Lijing Ren, Muhammad Shafiq:
An interpretability security framework for intelligent decision support systems based on saliency map. Int. J. Inf. Sec. 22(5): 1249-1260 (2023) - [j41]Keke Tang, Yawen Shi, Tianrui Lou, Weilong Peng, Xu He, Peican Zhu, Zhaoquan Gu, Zhihong Tian:
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds. IEEE Internet Things J. 10(6, March 15): 5158-5169 (2023) - [j40]Huan Zhang, Zhaoquan Gu, Hao Tan, Le Wang, Ziqi Zhu, Yushun Xie, Jianxin Li:
Masking and purifying inputs for blocking textual adversarial attacks. Inf. Sci. 648: 119501 (2023) - [j39]Xujian Liang, Zhaoquan Gu, Yushun Xie, Le Wang, Zhihong Tian:
MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption. Knowl. Based Syst. 273: 110560 (2023) - [j38]Yan Jia, Zhaoquan Gu, Lei Du, Yu Long, Ye Wang, Jianxin Li, Yanchun Zhang:
Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model. Knowl. Based Syst. 276: 110781 (2023) - [j37]Uno Fang, Jianxin Li, Xuequan Lu, Ajmal Mian, Zhaoquan Gu:
Robust image clustering via context-aware contrastive graph learning. Pattern Recognit. 138: 109340 (2023) - [j36]Binyue Deng, Denghui Zhang, Fashan Dong, Junjian Zhang, Muhammad Shafiq, Zhaoquan Gu:
Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images. Remote. Sens. 15(4): 885 (2023) - [j35]Songxuan Wei, Yan Jia, Zhaoquan Gu, Muhammad Shafiq, Le Wang:
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range. IEEE Syst. J. 17(4): 5292-5302 (2023) - [j34]Zhaohua Li, Le Wang, Guangyao Chen, Zhiqiang Zhang, Muhammad Shafiq, Zhaoquan Gu:
E2EGI: End-to-End Gradient Inversion in Federated Learning. IEEE J. Biomed. Health Informatics 27(2): 756-767 (2023) - [j33]Yan Jia, Zhaoquan Gu, Zhihao Jiang, Cuiyun Gao, Jianye Yang:
Persistent graph stream summarization for real-time graph analytics. World Wide Web (WWW) 26(5): 2647-2667 (2023) - [j32]Angxiao Zhao, Zhaoquan Gu, Yan Jia, Wenying Feng, Jianye Yang, Yanchun Zhang:
TSEE: a novel knowledge embedding framework for cyberspace security. World Wide Web (WWW) 26(6): 4131-4152 (2023) - [c93]Keke Tang, Jianpeng Wu, Weilong Peng, Yawen Shi, Peng Song, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
Deep Manifold Attack on Point Clouds via Parameter Plane Stretching. AAAI 2023: 2420-2428 - [c92]Angxiao Zhao, Haiyan Wang, Junjian Zhang, Yunhui Liu, Changchang Ma, Zhaoquan Gu:
TSKE: Two-Stream Knowledge Embedding for Cyberspace Security. APWeb-WAIM (2) 2023: 132-146 - [c91]Zhaoquan Gu, Haiyan Wang, Xiayu Xiang, Ke Zhou, Wenying Feng, Jianxin Li:
CY-Apollo: A Multi-view Profile System for Complicated Network Attacks. APWeb/WAIM (4) 2023: 489-495 - [c90]Junjian Zhang, Binyue Deng, Hao Tan, Le Wang, Zhaoquan Gu:
DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems. DADA@IJCAI 2023: 12-17 - [c89]Songxuan Wei, Yushun Xie, Angxiao Zhao, Xiao Jing, Cui Luo, Zhaoquan Gu:
Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices. DSC 2023: 1-7 - [c88]Dong Zhu, Haonan Tan, Le Wang, YuJie Feng, Yao Lin, Zhaoquan Gu:
Knowledge Graph Embedding via Adaptive Negative Subsampling. DSC 2023: 38-43 - [c87]Angxiao Zhao, Yunhui Liu, Songxuan Wei, Yu Long, Wenying Feng, Zhaoquan Gu:
Research on the Prospect of Knowledge Graph Completion Based on the Federated Setting. DSC 2023: 60-67 - [c86]Yipeng Lu, Denghui Zhang, Zhaoquan Gu, Jing Qiu:
Towards Scale-Aware Self-Supervised Multi-Frame Depth Estimation with IMU Motion Dynamics. DSC 2023: 90-97 - [c85]Xiaochen Liu, Hao Tan, Junjian Zhang, Aiping Li, Zhaoquan Gu:
Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition. DSC 2023: 151-158 - [c84]Yunhui Liu, Angxiao Zhao, Lei Du, Chenhui Zhang, Hao Yan, Zhaoquan Gu:
OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis Distance. DSC 2023: 253-260 - [c83]Yu Long, Xiayu Xiang, Xiao Jing, Angxiao Zhao, Lei Du, Zhaoquan Gu:
MDATA Model Based Cyber Security Knowledge Representation and Application. DSC 2023: 483-490 - [c82]Lijing Ren, Denghui Zhang, Qingduo Zeng, Zhaoquan Gu:
Toward the Secure Transmission of Large-Scale Images in Autonomous Driving. DSC 2023: 540-545 - [c81]Changchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu:
Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis. DSC 2023: 583-590 - [c80]Dong Zhu, Yao Lin, Haonan Tan, Le Wang, Zhaoquan Gu:
Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings. ICPADS 2023: 1358-1364 - [c79]Yinlong Wang, Yunting Tao, Fanyu Kong, Zhaoquan Gu, Jia Yu, Hanlin Zhang:
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers. ICPADS 2023: 2531-2538 - [c78]Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. ASE 2023: 345-357 - [c77]Keke Tang, Tianrui Lou, Xu He, Yawen Shi, Peican Zhu, Zhaoquan Gu:
Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training. KSEM (1) 2023: 328-342 - [c76]Dong Zhu, Yao Lin, Le Wang, Yushun Xie, Jie Jiang, Zhaoquan Gu:
Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings. NLPCC (1) 2023: 184-196 - [i14]Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. CoRR abs/2308.10523 (2023) - [i13]Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou:
F2AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns. CoRR abs/2310.14561 (2023) - 2022
- [j31]Hao Tan, Zhaoquan Gu, Le Wang, Huan Zhang, Brij B. Gupta, Zhihong Tian:
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems. Comput. Electr. Eng. 104(Part): 108446 (2022) - [j30]Yaguan Qian, Jiamin Wang, Haijiang Wang, Zhaoquan Gu, Bin Wang, Shaoning Zeng, Wassim Swaileh:
Visually imperceptible adversarial patch attacks. Comput. Secur. 123: 102943 (2022) - [j29]Bin Zhu, Zhaoquan Gu, Yaguan Qian, Francis C. M. Lau, Zhihong Tian:
Leveraging transferability and improved beam search in textual adversarial attacks. Neurocomputing 500: 135-142 (2022) - [j28]Yaguan Qian, Xiaoyu Liang, Ming Kang, Bin Wang, Zhaoquan Gu, Xing Wang, Chunming Wu:
GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy. Int. J. Pattern Recognit. Artif. Intell. 36(13): 2251015:1-2251015:26 (2022) - [j27]Dongda Li, Zhaoquan Gu, Yuexuan Wang, Changwei Ren, Francis C. M. Lau:
One model packs thousands of items with Recurrent Conditional Query Learning. Knowl. Based Syst. 235: 107683 (2022) - [j26]Denghui Zhang, Lijing Ren, Muhammad Shafiq, Zhaoquan Gu:
A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT. Remote. Sens. 14(24): 6371 (2022) - [j25]Zhiqiang Zhang, Le Wang, Guangyao Chen, Zhaoquan Gu, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means. Simul. Model. Pract. Theory 120: 102614 (2022) - [j24]Zhaoquan Gu, Yan Zhu, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Applying artificial bee colony algorithm to the multidepot vehicle routing problem. Softw. Pract. Exp. 52(3): 756-771 (2022) - [j23]Zhaoquan Gu, Hao Li, Sajid Khan, Lianbing Deng, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT. IEEE Trans. Green Commun. Netw. 6(1): 89-106 (2022) - [j22]Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. ACM Trans. Priv. Secur. 25(3): 23:1-23:24 (2022) - [j21]Zhaoquan Gu, Le Wang, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Epidemic Risk Assessment by a Novel Communication Station Based Method. IEEE Trans. Netw. Sci. Eng. 9(1): 332-344 (2022) - [c75]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving Robustness of Language Models from a Geometry-aware Perspective. ACL (Findings) 2022: 3115-3125 - [c74]Yulu Qi, Zhaoquan Gu, Yangyang Mei, Kaihan Lin, Aiping Li:
A General Construction Method of Cyber Security Knowledge Graph. BESC 2022: 1-7 - [c73]Ju Yang, Liang Zhou, Le Wang, Shudong Li, Ziqing Lin, Zhaoquan Gu:
A Multi-step Attack Detection Framework for the Power System Network. DSC 2022: 1-8 - [c72]Fashan Dong, Binyue Deng, Haiyang Yu, Wenrong Xie, Huawei Xu, Zhaoquan Gu:
An Asterisk-shaped Patch Attack for Object Detection. DSC 2022: 126-133 - [c71]Junjian Zhang, Hao Tan, Binyue Deng, Jiacen Hu, Dong Zhu, Linyi Huang, Zhaoquan Gu:
NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition. DSC 2022: 167-174 - [c70]Ziqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang, Denghui Zhang, Zhaoquan Gu:
Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise. DSC 2022: 249-256 - [c69]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Example Attacks against ASR Systems: An Overview. DSC 2022: 470-477 - [c68]Yaguan Qian, Shenghui Huang, Bin Wang, Xiang Ling, Xiaohui Guan, Zhaoquan Gu, Shaoning Zeng, Wujie Zhou, Haijiang Wang:
Robust Network Architecture Search via Feature Distortion Restraining. ECCV (5) 2022: 122-138 - [c67]Zhiqiang He, Yaguan Qian, Yuqi Wang, Bin Wang, Xiaohui Guan, Zhaoquan Gu, Xiang Ling, Shaoning Zeng, Haijiang Wang, Wujie Zhou:
Filter Pruning via Feature Discrimination in Deep Neural Networks. ECCV (21) 2022: 245-261 - [c66]Hao Tan, Junjian Zhang, Huan Zhang, Le Wang, Yaguan Qian, Zhaoquan Gu:
NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems. INTERSPEECH 2022: 4386-4390 - [i12]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving robustness of language models from a geometry-aware perspective. CoRR abs/2204.13309 (2022) - [i11]Yaguan Qian, Yuqi Wang, Bin Wang, Zhaoquan Gu, Yuhan Guo, Wassim Swaileh:
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning. CoRR abs/2207.01396 (2022) - [i10]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Attacks on ASR Systems: An Overview. CoRR abs/2208.02250 (2022) - 2021
- [j20]Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu, Zhaoquan Gu:
Enhanced YOLO v3 Tiny Network for Real-Time Ship Detection From Visual Image. IEEE Access 9: 16692-16706 (2021) - [j19]Zhaoquan Gu, Keke Tang, Zhen Wang, Yanhua Li, Wei Shi, Zhihong Tian:
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications. Frontiers Neurorobotics 15 (2021) - [j18]Zheng Chen, Zhaoquan Gu, Yuexuan Wang:
Which is the fairest allocation in the max-min fairness-based coalitional game? Theor. Comput. Sci. 888: 56-69 (2021) - [j17]Zhaoquan Gu, Yuexuan Wang, Tong Shen, Francis C. M. Lau:
On Heterogeneous Sensing Capability for Distributed Rendezvous in Cognitive Radio Networks. IEEE Trans. Mob. Comput. 20(11): 3211-3226 (2021) - [j16]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Hui Lu, Lihua Yin, Le Wang:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 921-932 (2021) - [j15]Zhaoquan Gu, Dongda Li, Nadra Guizani, Xiaojiang Du, Zhihong Tian:
An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks. IEEE Wirel. Commun. 28(5): 43-49 (2021) - [j14]Denghui Zhang, Zhaoquan Gu:
A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX. Wirel. Commun. Mob. Comput. 2021: 6660709:1-6660709:12 (2021) - [c65]Zeshi Wang, Mohan Li, Zhaoquan Gu:
A Review of Entity Alignment based on Graph Convolutional Neural Network. DSC 2021: 144-151 - [c64]Huili Luo, Zhaoquan Gu, Chunajing Zhang, Le Wang, Shuhao Li, Zhiqin Chen:
A Universal Targeted Attack Method against Image Classification. DSC 2021: 179-186 - [c63]Jin Jiang, Mohan Li, Zhaoquan Gu:
A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs. DSC 2021: 187-194 - [c62]Hao Tan, Chenwei Liu, Yinyu Lyu, Xiao Zhang, Denghui Zhang, Zhaoquan Gu:
Audio Steganography with Speech Recognition System. DSC 2021: 256-263 - [c61]Wenrong Xie, Fashan Dong, Haiyang Yu, Zhaoquan Gu, Le Wang, Zhihong Tian:
Generate Adversarial Examples Combined with Image Entropy Distribution. DSC 2021: 272-279 - [c60]Huan Zhang, Yushun Xie, Ziqi Zhu, Jingling Sun, Chao Li, Zhaoquan Gu:
Attack-words Guided Sentence Generation for Textual Adversarial Attack. DSC 2021: 280-287 - [c59]Kaihan Lin, Weihong Han, Zhaoquan Gu, Shudong Li:
A Survey of DeepFakes Generation and Detection. DSC 2021: 474-478 - [c58]Haiyang Yu, Fashan Dong, Jianming Li, Wenrong Xie, Jing Qiu, Zhaoquan Gu:
Adversarial Attacks on Vehicle Re-Identification. DSC 2021: 500-507 - [c57]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. ICCV 2021: 1133-1142 - [c56]Bin Zhu, Zhaoquan Gu, Yushun Xie, Danni Wu, Yaguan Qian, Le Wang:
Word-Level Textual Adversarial Attack in the Embedding Space. IJCNN 2021: 1-8 - [c55]Hao Sun, Yanjun Tong, Jing Zhao, Zhaoquan Gu:
DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection. ISC 2021: 320-337 - [p6]Yan Jia, Zhaoquan Gu, Aiping Li, Weihong Han:
Introduction to the MDATA Model. MDATA: A New Knowledge Representation Model 2021: 1-18 - [p5]Yan Jia, Aiping Li, Zhaoquan Gu, Bin Zhou, Ye Wang, Xiang Wang, Hongkui Tu:
The Framework of the MDATA Computing Model. MDATA: A New Knowledge Representation Model 2021: 19-31 - [p4]Huchen Zhou, Mohan Li, Zhaoquan Gu, Zhihong Tian:
Spatiotemporal Data Cleaning and Knowledge Fusion. MDATA: A New Knowledge Representation Model 2021: 32-50 - [p3]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhihong Tian, Zhaoquan Gu:
Entity Alignment: Optimization by Seed Selection. MDATA: A New Knowledge Representation Model 2021: 99-116 - [p2]Yunyi Tang, Le Wang, Xiaolong Chen, Zhaoquan Gu, Zhihong Tian:
Knowledge Extraction: Automatic Classification of Matching Rules. MDATA: A New Knowledge Representation Model 2021: 117-130 - [p1]Yulu Qi, Rong Jiang, Aiping Li, Zhaoquan Gu, Yan Jia:
A Distributed Framework for APT Attack Analysis. MDATA: A New Knowledge Representation Model 2021: 199-219 - [e2]Yan Jia, Zhaoquan Gu, Aiping Li:
MDATA: A New Knowledge Representation Model - Theory, Methods and Applications. Lecture Notes in Computer Science 12647, Springer 2021, ISBN 978-3-030-71589-2 [contents] - [i9]Yaguan Qian, Qiqi Shao, Tengteng Yao, Bin Wang, Shaoning Zeng, Zhaoquan Gu, Wassim Swaileh:
Towards Speeding up Adversarial Training in Latent Spaces. CoRR abs/2102.00662 (2021) - [i8]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. CoRR abs/2108.06024 (2021) - [i7]Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian:
TREATED: Towards Universal Defense against Textual Adversarial Attacks. CoRR abs/2109.06176 (2021) - [i6]Dongda Li, Zhaoquan Gu, Yuexuan Wang, Changwei Ren, Francis C. M. Lau:
One model Packs Thousands of Items with Recurrent Conditional Query Learning. CoRR abs/2111.06726 (2021) - 2020
- [j13]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Le Wang, Chunsheng Zhu, Zhihong Tian:
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack. IEEE Access 8: 25262-25271 (2020) - [j12]Hao Li, Lianbing Deng, Zhaoquan Gu:
A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System. IEEE Access 8: 30127-30151 (2020) - [j11]Yaguan Qian, Dan-feng Ma, Bin Wang, Jun Pan, Jiamin Wang, Zhaoquan Gu, Jian-Hai Chen, Wujie Zhou, Jing-Sheng Lei:
Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks. Comput. Secur. 95: 101826 (2020) - [j10]Hao Li, Lianbing Deng, Zhaoquan Gu:
An image encryption scheme based on precision limited chaotic system. Multim. Tools Appl. 79(27-28): 19387-19410 (2020) - [j9]Zhaoquan Gu, Zhen Cao, Zhihong Tian, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani:
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks. Sensors 20(3): 657 (2020) - [j8]Zhaoquan Gu, Tong Shen, Yuexuan Wang, Francis C. M. Lau:
Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 19(1): 91-105 (2020) - [c54]Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - [c53]Weiguo Wang, Zhaoquan Gu, Keke Tang:
An Improved Algorithm for Bert. CIAT 2020: 116-120 - [c52]Yinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang, Zhaoquan Gu:
Convolutional Neural Network based Timbre Classification. CIAT 2020: 186-191 - [c51]Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - [c50]Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. CIAT 2020: 374-378 - [c49]Xiangyi Kong, Zhaoquan Gu, Lihua Yin:
A Unified Information Diffusion Model for Social Networks. DSC 2020: 38-44 - [c48]Yushun Xie, Zhaoquan Gu, Bin Zhu, Le Wang, Weihong Han, Lihua Yin:
Adversarial Examples for Chinese Text Classification. DSC 2020: 238-245 - [c47]Huchen Zhou, Mohan Li, Zhaoquan Gu:
Knowledge Fusion and Spatiotemporal Data Cleaning: A Review. DSC 2020: 295-301 - [c46]Yunyi Tang, Wang Le, Xiaolong Chen, Zhaoquan Gu, Lihua Yin, Xin Yi:
Automatic Classification of Matching Rules in Pattern Matching. DSC 2020: 302-306 - [c45]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhaoquan Gu:
Seeds Optimization for Entity Alignment in Knowledge Graph Embedding. DSC 2020: 333-338 - [c44]Yushun Xie, Zhaoquan Gu, Xiaopeng Fu, Le Wang, Weihong Han, Yuexuan Wang:
Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 590-596 - [c43]Zheng Chen, Zhaoquan Gu, Yuexuan Wang:
Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System? WASA (1) 2020: 51-64 - [e1]Zhihong Tian, Lihua Yin, Zhaoquan Gu:
CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 [contents] - [i5]Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh:
TEAM: We Need More Powerful Adversarial Examples for DNNs. CoRR abs/2007.15836 (2020) - [i4]Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Ling, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. CoRR abs/2009.10537 (2020) - [i3]Yaguan Qian, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
Towards Imperceptible Adversarial Image Patches Based on Network Explanations. CoRR abs/2012.00909 (2020)
2010 – 2019
- 2019
- [j7]Jing Qiu, Weihua Jiang, Bingzhi Sun, Chunsheng Zhu, Lei Du, Zhaoquan Gu:
Resonance p-Laplacian Problem in Edge Device Control of IoT. IEEE Access 7: 149776-149784 (2019) - [j6]Le Wang, Zhihong Tian, Zhaoquan Gu, Hui Lu:
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 7: 169066-169072 (2019) - [j5]Zhaoquan Gu, Yuexuan Wang, Wei Shi, Zhihong Tian, Kui Ren, Francis C. M. Lau:
A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 19(8): 1887 (2019) - [j4]Hao Li, Zhaoquan Gu, Lianbing Deng, Yi Han, Cheng Yang, Zhihong Tian:
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos. Sensors 19(24): 5366 (2019) - [c42]Kai Jin, Ce Jin, Zhaoquan Gu:
Cooperation via Codes in Restricted Hat Guessing Games. AAMAS 2019: 547-555 - [c41]Yu Zhang, Xiangtao Liu, Tianle Zhang, Zhaoquan Gu:
Review of the Electric Vehicle Charging Station Location Problem. DependSys 2019: 435-445 - [c40]Lixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao:
Rebalancing the Car-Sharing System: A Reinforcement Learning Method. DSC 2019: 62-69 - [c39]Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. DSC 2019: 284-291 - [c38]Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Xiaoling Zheng, Mingli Song:
Weighted-Ring Similarity Measurement for Community Detection in Social Network. DSC 2019: 292-299 - [c37]Yan Liu, Dongwen Zhang, Lei Du, Zhaoquan Gu, Jing Qiu, Qingji Tan:
A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task. DSC 2019: 416-421 - [c36]Zhaoquan Gu, Yuexuan Wang, Keke Tang, Chao Li, Mohan Li, Lihua Yin:
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 129-134 - [c35]Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Zhihong Tian, Mingli Song, Chunsheng Zhu:
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful? IWCMC 2019: 348-353 - [c34]Zhaoquan Gu, Yuexuan Wang, Yijie Wu, Yongcai Wang, Yueming Wang:
Minimum Control Cost of Weighted Linear Dynamic Networks. WASA 2019: 111-123 - [i2]Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang:
Decision Propagation Networks for Image Classification. CoRR abs/1911.12101 (2019) - 2018
- [j3]Jing Qiu, Yuhan Chai, Yan Liu, Zhaoquan Gu, Shudong Li, Zhihong Tian:
Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City. IEEE Access 6: 74854-74864 (2018) - [j2]Tianyuan Sun, Yongcai Wang, Deying Li, Zhaoquan Gu, Jia Xu:
WCS: Weighted Component Stitching for Sparse Network Localization. IEEE/ACM Trans. Netw. 26(5): 2242-2253 (2018) - [c33]Tianshu Li, Zhaoquan Gu, Xiao Lin, Shudong Li, Qingfeng Tan:
Approximation Algorithms for Controller Placement Problems in Software Defined Networks. DSC 2018: 250-257 - [c32]Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. DSC 2018: 266-273 - [c31]Tianyuan Sun, Yongcai Wang, Deying Li, Wenping Chen, Zhaoquan Gu:
Robust Component-Based Network Localization with Noisy Range Measurements. ICCCN 2018: 1-9 - [c30]Zhaoquan Gu, Yuexuan Wang, Xiao Lin:
Achieving Real-Time Quality of Service in Software Defined Networks. IECON 2018: 4165-4170 - [c29]Zhaoquan Gu, Yuexuan Wang, Xiao Lin:
Achieving Real-Time Quality of Service with Software Defined Networking. iThings/GreenCom/CPSCom/SmartData 2018: 758-765 - [c28]Tong Shen, Yuexuan Wang, Zhaoquan Gu, Dongda Li, Zhen Cao, Heming Cui, Francis C. M. Lau:
Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network. MASS 2018: 353-361 - [c27]Tong Shen, Zhaoquan Gu, Yuexuan Wang, Sivan Toledo, Senran Zhang, Mingli Song:
Where to Rendezvous?: Preferring Quiet Channels in Cognitive Radio Networks. MSWiM 2018: 325-332 - [c26]Yongqin Fu, Yuexuan Wang, Zhaoquan Gu, Xiaolin Zheng, Tianhao Wei, Zhen Cao, Heming Cui, Francis C. M. Lau:
How Local Information Improves Rendezvous in Cognitive Radio Networks. SECON 2018: 352-360 - [c25]Zhen Cao, Zhaoquan Gu, Yuexuan Wang, Heming Cui:
Panacea: A low-latency, energy-efficient neighbor discovery protocol for wireless sensor networks. WCNC 2018: 1-6 - [i1]Tianyuan Sun, Yongcai Wang, Deying Li, Wenping Chen, Zhaoquan Gu:
Robust Component-based Network Localization with Noisy Range Measurements. CoRR abs/1807.00108 (2018) - 2017
- [b1]Zhaoquan Gu, Yuexuan Wang, Qiang-Sheng Hua, Francis C. M. Lau:
Rendezvous in Distributed Systems - Theory, Algorithms and Applications. Springer 2017, ISBN 978-981-10-3679-8, pp. 3-262 - [c24]Jinzheng Tu, Tianhong Li, Shiteng Chen, Chong Zu, Zhaoquan Gu:
Exploring Efficient Strategies for Minesweeper. AAAI Workshops 2017 - [c23]Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu:
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. ACSAC 2017: 79-90 - [c22]Xiao Lin, Min Zhang, Yongfeng Zhang, Zhaoquan Gu:
Disparity-Aware Group Formation for Recommendation. AAMAS 2017: 1604-1606 - [c21]Xiao Lin, Min Zhang, Yongfeng Zhang, Zhaoquan Gu, Yiqun Liu, Shaoping Ma:
Boosting Moving Average Reversion Strategy for Online Portfolio Selection: A Meta-learning Approach. DASFAA (2) 2017: 494-510 - [c20]Yuexuan Wang, Zhaoquan Gu, Lei Song, Tongyang Li, Heming Cui, Francis C. M. Lau:
Speeding up 3D Printing Using Multi-Head Slicing Algorithms. ES 2017: 99-106 - [c19]Xiao Lin, Zhaoquan Gu:
Rendezvous with Utilities in Cognitive Radio Networks. MSWiM 2017: 71-78 - [c18]Xiao Lin, Min Zhang, Yongfeng Zhang, Zhaoquan Gu, Yiqun Liu, Shaoping Ma:
Fairness-Aware Group Recommendation with Pareto-Efficiency. RecSys 2017: 107-115 - [c17]Xiao Lin, Zhaoquan Gu:
Modeling Implicit Communities in Recommender Systems. WISE (2) 2017: 387-402 - [c16]Xiao Lin, Zhaoquan Gu:
Coordinating Disagreement and Satisfaction in Group Formation for Recommendation. WISE (2) 2017: 403-419 - [c15]Xiao Lin, Zhaoquan Gu:
How Does Fairness Matter in Group Recommendation. WISE (2) 2017: 458-466 - 2016
- [c14]Haosen Pu, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Hai Jin:
Dynamic rendezvous algorithms for cognitive radio networks. ICC 2016: 1-6 - [c13]Yongcai Wang, Lei Song, Zhaoquan Gu, Deying Li:
IntenCT: Efficient Multi-Target Counting and Tracking by Binary Proximity Sensors. SECON 2016: 1-9 - [c12]Xuehan Ye, Yongcai Wang, Wei Hu, Lei Song, Zhaoquan Gu, Deying Li:
WarpMap: Accurate and Efficient Indoor Location by Dynamic Warping in Sequence-Type Radio-Map. SECON 2016: 1-9 - 2015
- [c11]Yang Gao, Zhaoquan Gu, Qiang-Sheng Hua, Hai Jin:
Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks. COCOON 2015: 759-770 - [c10]Zhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau:
Improved rendezvous algorithms for heterogeneous cognitive radio networks. INFOCOM 2015: 154-162 - [c9]Weiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau:
Minimum control latency of dynamic networks. INFOCOM 2015: 648-656 - [c8]Haosen Pu, Zhaoquan Gu, Qiang-Sheng Hua, Hai Jin:
Communication and Block Game in Cognitive Radio Networks. MSWiM 2015: 211-218 - 2014
- [c7]Zhaoquan Gu, Qiang-Sheng Hua, Weiguo Dai:
Fully distributed algorithms for blind rendezvous in cognitive radio networks. MobiHoc 2014: 155-164 - [c6]Guyue Li, Zhaoquan Gu, Xiao Lin, Haosen Pu, Qiang-Sheng Hua:
Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks. MSWiM 2014: 313-320 - [c5]Zhaoquan Gu, Qiang-Sheng Hua, Weiguo Dai:
Local sequence based rendezvous algorithms for Cognitive Radio Networks. SECON 2014: 194-202 - [c4]Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis Chi-Moon Lau:
Oblivious Rendezvous in Cognitive Radio Networks. SIROCCO 2014: 165-179 - 2013
- [j1]Zhaoquan Gu, Guanyu Wang, Qiang-Sheng Hua, Yuexuan Wang:
Improved minimum latency aggregation scheduling in wireless sensor networks under the SINR model. Int. J. Sens. Networks 14(1): 22-32 (2013) - [c3]Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis C. M. Lau:
Reducing information gathering latency through Mobile Aerial Sensor Network. INFOCOM 2013: 656-664 - [c2]Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis C. M. Lau:
Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks. SECON 2013: 371-379 - 2012
- [c1]Zhaoquan Gu, Guanyu Wang, Yuexuan Wang:
Path-loss fluctuations towards robust scheduling algorithms in the SINR model. MASS 2012: 416-424
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint