Deguang Kong
Cited by
Cited by
Robust nonnegative matrix factorization using l21-norm
D Kong, C Ding, H Huang
Proceedings of the 20th ACM international conference on Information and …, 2011
Discriminant malware distance learning on structural information for automated malware classification
D Kong, G Yan
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
Exclusive Feature Learning on Arbitrary Structures via -norm
D Kong, R Fujimaki, J Liu, F Nie, C Ding
Advances in neural information processing systems, 1655-1663, 2014
Multi-label relieff and f-statistic feature selections for image annotation
D Kong, C Ding, H Huang, H Zhao
2012 IEEE conference on computer vision and pattern recognition, 2352-2359, 2012
Exploring discriminatory features for automated malware classification
G Yan, N Brown, D Kong
International Conference on Detection of Intrusions and Malware, and …, 2013
Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Deeprebirth: Accelerating deep neural network execution on mobile devices
D Li, X Wang, D Kong
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications
D Kong, L Cen, H Jin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features
L Tran, D Kong, H Jin, J Liu
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
An iterative locally linear embedding algorithm
D Kong, CHQ Ding, H Huang, F Nie
arXiv preprint arXiv:1206.6463, 2012, 2012
Puppies: Transformation-supported personalized privacy preserving partial image sharing
J He, B Liu, D Kong, X Bao, N Wang, H Jin, G Kesidis
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
Robust non-negative dictionary learning
Q Pan, D Kong, C Ding, B Luo
Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
ISA: a source code static vulnerability detection system based on data fusion.
D Kong, Q Zheng, C Chen, J Shuai, M Zhu
InfoScale, 55, 2007
Protecting your children from inappropriate content in mobile apps: An automatic maturity rating framework
B Hu, B Liu, NZ Gong, D Kong, H Jin
Proceedings of the 24th ACM International on Conference on Information and …, 2015
Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective
D Kong, M Zhang, C Ding
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2013
Obfuscated Malware Detection Based on Boosting Multilevel Features
D Kong, X Tan, H Xi, T Gong, J Shuai
Journal of Software 22 (3), 522-533, 2011
Uncorrelated group lasso
D Kong, J Liu, B Liu, X Bao
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
Efficient algorithms for selecting features with arbitrary group constraints via group lasso
D Kong, C Ding
2013 IEEE 13th International Conference on Data Mining, 379-388, 2013
Towards permission request prediction on mobile apps via structure feature learning
D Kong, H Jin
Proceedings of the 2015 SIAM International Conference on Data Mining, 604-612, 2015
The system can't perform the operation now. Try again later.
Articles 1–20