Guojun Peng
Orcid: 0000-0001-5731-8958
According to our database1,
Guojun Peng
authored at least 34 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comput. Secur., February, 2024
E<sup>2</sup>CFD: Towards Effective and Efficient Cost Function Design for Safe Reinforcement Learning via Large Language Model.
CoRR, 2024
LLaMoCo: Instruction Tuning of Large Language Models for Optimization Code Generation.
CoRR, 2024
2023
IEEE Trans. Cogn. Commun. Netw., October, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
2022
Ship Path Optimization That Accounts for Geographical Traffic Characteristics to Increase Maritime Port Safety.
IEEE Trans. Intell. Transp. Syst., 2022
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022
Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022
2021
A Direction-Constrained Space-Time Prism-Based Approach for Quantifying Possible Multi-Ship Collision Risks.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Internet Things J., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Automatic Identification System-Based Approach for Assessing the Near-Miss Collision Risk Dynamics of Ships in Ports.
IEEE Trans. Intell. Transp. Syst., 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
Computation of universal unfolding of the double zero bifurcation in the Z<sub>2</sub>-symmetric system.
Int. J. Comput. Math., 2014
2009
Bifurcations of a Holling-Type II predator-prey System with Constant Rate Harvesting.
Int. J. Bifurc. Chaos, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
2006
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006
2005
Research on WEBGIS real-time distribution system of port navigation-supporting information.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005