Gong, Lixiao
52  results:
Search for persons X
?
1

GDTM: Gaussian Differential Trust Mechanism for Optimal Rec..:

, In: Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science,
Gong, Lixiao ; Xu, Guangquan ; Cui, Jingyi... - p. 78-92 , 2024
 
?
2

ASQ-FastBM3D: An Adaptive Denoising Framework for Defending..:

Xu, Guangquan ; Han, Zhengbo ; Gong, Lixiao...
IEEE Transactions on Reliability.  72 (2023)  1 - p. 317-328 , 2023
 
?
3

A Privacy-Preserving Medical Data Sharing Scheme Based on B..:

Xu, Guangquan ; Qi, Chen ; Dong, Wenyu...
IEEE Journal of Biomedical and Health Informatics.  27 (2023)  2 - p. 698-709 , 2023
 
?
5

Delay-CJ: A novel cryptojacking covert attack method based ..:

Xu, Guangquan ; Dong, Wenyu ; Xing, Jun...
Digital Communications and Networks.  9 (2023)  5 - p. 1169-1179 , 2023
 
?
6

Delay-CJ:a novel cryptojacking covert attack method based o..:

Xu, Guangquan ; Dong, Wenyu ; Xing, Jun...
Xu , G , Dong , W , Xing , J , Lei , W , Liu , J , Gong , L , Feng , M , Zheng , X & Liu , S 2023 , ' Delay-CJ : a novel cryptojacking covert attack method based on delayed strategy and its detection ' , Digital Communications and Networks , vol. 9 , no. 5 , pp. 1169-1179 . https://doi.org/10.1016/j.dcan.2022.04.030.  , 2023
 
?
7

UAF-GUARD: Defending the Use-After-Free Exploits via Fine-g..:

Xu, Guangquan ; Lei, Wenqing ; Gong, Lixiao...
https://orbit.dtu.dk/en/publications/f450785a-4c9c-4bd8-870d-bb285a6ed6e4.  , 2023
 
?
8

Delay-CJ: A novel cryptojacking covert attack method based ..:

Guangquan Xu ; Wenyu Dong ; Jun Xing...
http://www.sciencedirect.com/science/article/pii/S2352864822000864.  , 2023
 
?
12

Long-term outcomes of endoscopic papillary large-balloon di..:

Li, Tao ; Hao, Li-Xiao ; Lv, Chan...
Hepatobiliary & Pancreatic Diseases International.  22 (2023)  4 - p. 392-398 , 2023
 
1-15