Deguang Kong

Orcid: 0000-0001-9415-8439

According to our database1, Deguang Kong authored at least 54 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Using Segment-Level Attention to Guide Breast Ultrasound Video Classification.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

2023
Cauchy balanced nonnegative matrix factorization.
Artif. Intell. Rev., October, 2023

Multi-View Multi-Task Campaign Embedding for Cold-Start Conversion Rate Forecasting.
IEEE Trans. Big Data, February, 2023

Learning Personalized User Preference from Cold Start in Multi-turn Conversations.
CoRR, 2023

Personalized Search Via Neural Contextual Semantic Relevance Ranking.
CoRR, 2023

STREET: A Multi-Task Structured Reasoning and Explanation Benchmark.
CoRR, 2023

Robust Consensus Clustering and its Applications for Advertising Forecasting.
CoRR, 2023

STREET: A Multi-Task Structured Reasoning and Explanation Benchmark.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Language Agnostic Multilingual Information Retrieval with Contrastive Learning.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Do not Waste Money on Advertising Spend: Bid Recommendation via Concavity Changes.
CoRR, 2022

Demystifying Advertising Campaign Bid Recommendation: A Constraint target CPA Goal Optimization.
CoRR, 2022

2021
DeepLight: Deep Lightweight Feature Interactions for Accelerating CTR Predictions in Ad Serving.
Proceedings of the WSDM '21, 2021

2020
Learning from Cross-Modal Behavior Dynamics with Graph-Regularized Neural Contextual Bandit.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
Elastic nonnegative matrix factorization.
Pattern Recognit., 2019

Mobile App Risk Ranking via Exclusive Sparse Coding.
Proceedings of the World Wide Web Conference, 2019

2018
An Inflection Point Approach for Advertising Bid Optimization.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Demystifying Advertising Campaign for CPA Goal Optimization.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Combinational Optimization Approach for Advertising Budget Allocation.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Attention Convolutional Neural Network for Advertiser-level Click-through Rate Forecasting.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

DeepRebirth: Accelerating Deep Neural Network Execution on Mobile Devices.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Science Driven Innovations Powering Mobile Product: Cloud AI vs. Device AI Solutions on Smart Device.
CoRR, 2017

Unleash the Black Magic in Age: A Multi-Task Deep Neural Network Approach for Cross-Age Face Verification.
Proceedings of the 12th IEEE International Conference on Automatic Face & Gesture Recognition, 2017

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Uncorrelated Group LASSO.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015

Towards Permission Request Prediction on Mobile Apps via Structure Feature Learning.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

PinPlace: associate semantic meanings with indoor locations without active fingerprinting.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exclusive Feature Learning on Arbitrary Structures via \ell_{1, 2}-norm.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Transductive malware label propagation: Find your lineage from your neighbors.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Robust Non-Negative Dictionary Learning.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Pairwise-Covariance Linear Discriminant Analysis.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Non-Convex Feature Learning via L_{p, inf} Operator.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Semantic aware attribution analysis of remote exploits.
Secur. Commun. Networks, 2013

Discriminant malware distance learning on structuralinformation for automated malware classification.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Collective Kernel Construction in Noisy Environment.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Discriminant malware distance learning on structural information for automated malware classification.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Efficient Algorithms for Selecting Features with Arbitrary Group Constraints via Group Lasso.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Exploring Discriminatory Features for Automated Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

2012
Maximum Consistency Preferential Random Walks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

An Iterative Locally Linear Embedding Algorithm.
Proceedings of the 29th International Conference on Machine Learning, 2012

A Semi-definite Positive Linear Discriminant Analysis and Its Applications.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Nonnegative matrix factorization using a robust error function.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Multi-label ReliefF and F-statistic feature selections for image annotation.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

2011
SAS: semantics aware signature generation for polymorphic worm detection.
Int. J. Inf. Sec., 2011

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2011

Robust nonnegative matrix factorization using L21-norm.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Protecting Kernel Data through Virtualization Technology.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2007
ISA: a source code static vulnerability detection system based on data fusion.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007


  Loading...