Deguang Kong
Title
Cited by
Cited by
Year
Robust nonnegative matrix factorization using l21-norm
D Kong, C Ding, H Huang
Proceedings of the 20th ACM international conference on Information and …, 2011
2612011
Discriminant malware distance learning on structural information for automated malware classification
D Kong, G Yan
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
1802013
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
982015
Multi-label relieff and f-statistic feature selections for image annotation
D Kong, C Ding, H Huang, H Zhao
2012 IEEE conference on computer vision and pattern recognition, 2352-2359, 2012
892012
Exclusive Feature Learning on Arbitrary Structures via -norm
D Kong, R Fujimaki, J Liu, F Nie, C Ding
Advances in Neural Information Processing Systems, 1655-1663, 2014
832014
Exploring discriminatory features for automated malware classification
G Yan, N Brown, D Kong
International Conference on Detection of Intrusions and Malware, and …, 2013
822013
Deeprebirth: Accelerating deep neural network execution on mobile devices
D Li, X Wang, D Kong
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
622018
Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
622017
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications
D Kong, L Cen, H Jin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
An iterative locally linear embedding algorithm
D Kong, CHQ Ding, H Huang, F Nie
arXiv preprint arXiv:1206.6463, 2012, 2012
452012
Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features
L Tran, D Kong, H Jin, J Liu
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
422016
Puppies: Transformation-supported personalized privacy preserving partial image sharing
J He, B Liu, D Kong, X Bao, N Wang, H Jin, G Kesidis
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
342016
Robust non-negative dictionary learning
Q Pan, D Kong, C Ding, B Luo
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
342014
ISA: a source code static vulnerability detection system based on data fusion.
D Kong, Q Zheng, C Chen, J Shuai, M Zhu
InfoScale, 55, 2007
222007
Protecting your children from inappropriate content in mobile apps: An automatic maturity rating framework
B Hu, B Liu, NZ Gong, D Kong, H Jin
Proceedings of the 24th ACM International on Conference on Information and …, 2015
202015
Obfuscated Malware Detection Based on Boosting Multilevel Features
D Kong, X Tan, H Xi, T Gong, J Shuai
Journal of Software 22 (3), 522-533, 2011
19*2011
Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective
D Kong, M Zhang, C Ding
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2013
182013
Efficient algorithms for selecting features with arbitrary group constraints via group lasso
D Kong, C Ding
2013 IEEE 13th International Conference on Data Mining, 379-388, 2013
162013
Towards permission request prediction on mobile apps via structure feature learning
D Kong, H Jin
Proceedings of the 2015 SIAM International Conference on Data Mining, 604-612, 2015
152015
Mobile app security risk assessment: A crowdsourcing ranking approach from user comments
L Cen, D Kong, H Jin, L Si
Proceedings of the 2015 SIAM International Conference on Data Mining, 658-666, 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20