Follow
Xudong Gong
Xudong Gong
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Progressive layered extraction (ple): A novel multi-task learning (mtl) model for personalized recommendations
H Tang, J Liu, M Zhao, X Gong
Proceedings of the 14th ACM Conference on Recommender Systems, 269-278, 2020
3572020
Secure collaborative outsourced data mining with multi-owner in cloud computing
Q Lu, Y Xiong, X Gong, W Huang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
302012
Real-time short video recommendation on mobile devices
X Gong, Q Feng, Y Zhang, J Qin, W Ding, B Li, P Jiang, K Gai
Proceedings of the 31st ACM international conference on information …, 2022
292022
Personalized Privacy‐Preserving Trajectory Data Publishing
Q Lu, C Wang, Y Xiong, H Xia, W Huang, X Gong
Chinese Journal of Electronics 26 (2), 285-291, 2017
242017
Fast similarity search of multi-dimensional time series via segment rotation
X Gong, Y Xiong, W Huang, L Chen, Q Lu, Y Hu
Database Systems for Advanced Applications: 20th International Conference …, 2015
152015
A distributed ECC-DSS authentication scheme based on CRT-VSS and trusted computing in MANET
Q Lu, Y Xiong, W Huang, X Gong, F Miao
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
122012
Fine-grained refinement on tpm-based protocol applications
W Huang, Y Xiong, X Wang, F Miao, C Wu, X Gong, Q Lu
IEEE transactions on information forensics and security 8 (6), 1013-1026, 2013
102013
Privacy‐Preserving Collaborative Filtering Based on Time‐Drifting Characteristic
F Zhao, Y Xiong, X Liang, X Gong, Q Lu
Chinese Journal of Electronics 25 (1), 20-25, 2016
82016
Node behavior and identity-based trusted authentication in wireless sensor networks
T LIU, Q LU
Journal of Computer Applications 33 (07), 1842, 2013
52013
A trusted Ad Hoc routing protocol based on fuzzy mathematics
X Gong, Y Xiong, Q Lu, F Miao, W Huang
Chinese Journal of Electronics 22 (1), 155-159, 2013
52013
Similar time series retrieval using only important segments
X Gong, C Wang, Y Xiong, W Huang
Chinese Journal of Electronics 26 (1), 22-26, 2017
32017
A secure adaptive routing strategy using immune mechanism in MANET
H Yiqing, X Yan, L Qiwei, G Xudong, H Wenchao
Chinese Journal of Electronics 22 (4), 784-788, 2013
22013
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
X Wang, Q Lu, Y Xiong, F Miao, W Huang, T Liu, X WU
Chinese Journal of Electronics 23 (2), 2014
12014
Magemite: Character inputting system based on magnetic sensor
Y Ke, Y Xiong, Y Hu, X Gong, W Huang
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
2015
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism
Y Hu, Y Xiong, X Gong, Q Lu, M Li, W Huang
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
2013
Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN
M Han, X GONG
Journal of Computer Applications 33 (05), 1343, 2013
2013
Fine-grained Refinement on TPM-based Protocol Applications (Extended Version)
W Huang, Y Xiong, X Wang, F Miao, C Wu, XD Gong, Q Lu
2013
The system can't perform the operation now. Try again later.
Articles 1–17