Progressive layered extraction (ple): A novel multi-task learning (mtl) model for personalized recommendations H Tang, J Liu, M Zhao, X Gong Proceedings of the 14th ACM Conference on Recommender Systems, 269-278, 2020 | 357 | 2020 |
Secure collaborative outsourced data mining with multi-owner in cloud computing Q Lu, Y Xiong, X Gong, W Huang 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 30 | 2012 |
Real-time short video recommendation on mobile devices X Gong, Q Feng, Y Zhang, J Qin, W Ding, B Li, P Jiang, K Gai Proceedings of the 31st ACM international conference on information …, 2022 | 29 | 2022 |
Personalized Privacy‐Preserving Trajectory Data Publishing Q Lu, C Wang, Y Xiong, H Xia, W Huang, X Gong Chinese Journal of Electronics 26 (2), 285-291, 2017 | 24 | 2017 |
Fast similarity search of multi-dimensional time series via segment rotation X Gong, Y Xiong, W Huang, L Chen, Q Lu, Y Hu Database Systems for Advanced Applications: 20th International Conference …, 2015 | 15 | 2015 |
A distributed ECC-DSS authentication scheme based on CRT-VSS and trusted computing in MANET Q Lu, Y Xiong, W Huang, X Gong, F Miao 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 12 | 2012 |
Fine-grained refinement on tpm-based protocol applications W Huang, Y Xiong, X Wang, F Miao, C Wu, X Gong, Q Lu IEEE transactions on information forensics and security 8 (6), 1013-1026, 2013 | 10 | 2013 |
Privacy‐Preserving Collaborative Filtering Based on Time‐Drifting Characteristic F Zhao, Y Xiong, X Liang, X Gong, Q Lu Chinese Journal of Electronics 25 (1), 20-25, 2016 | 8 | 2016 |
Node behavior and identity-based trusted authentication in wireless sensor networks T LIU, Q LU Journal of Computer Applications 33 (07), 1842, 2013 | 5 | 2013 |
A trusted Ad Hoc routing protocol based on fuzzy mathematics X Gong, Y Xiong, Q Lu, F Miao, W Huang Chinese Journal of Electronics 22 (1), 155-159, 2013 | 5 | 2013 |
Similar time series retrieval using only important segments X Gong, C Wang, Y Xiong, W Huang Chinese Journal of Electronics 26 (1), 22-26, 2017 | 3 | 2017 |
A secure adaptive routing strategy using immune mechanism in MANET H Yiqing, X Yan, L Qiwei, G Xudong, H Wenchao Chinese Journal of Electronics 22 (4), 784-788, 2013 | 2 | 2013 |
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET X Wang, Q Lu, Y Xiong, F Miao, W Huang, T Liu, X WU Chinese Journal of Electronics 23 (2), 2014 | 1 | 2014 |
Magemite: Character inputting system based on magnetic sensor Y Ke, Y Xiong, Y Hu, X Gong, W Huang 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015 | | 2015 |
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism Y Hu, Y Xiong, X Gong, Q Lu, M Li, W Huang 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | | 2013 |
Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN M Han, X GONG Journal of Computer Applications 33 (05), 1343, 2013 | | 2013 |
Fine-grained Refinement on TPM-based Protocol Applications (Extended Version) W Huang, Y Xiong, X Wang, F Miao, C Wu, XD Gong, Q Lu | | 2013 |