Neng Gao

Orcid: 0000-0002-0870-5692

According to our database1, Neng Gao authored at least 99 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation.
Cybersecur., December, 2024

Enhancing Generative Generalized Zero Shot Learning via Multi-Space Constraints and Adaptive Integration.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

Elevating Privacy in Federated Learning: An Efficient Approach with SAM Optimization for Personalized Local Models.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Enhancing Document-Level Event Extraction via Structure-Aware Heterogeneous Graph with Multi-Granularity Subsentences.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
The Signaling Mechanism of Fairness Concern in E-CLSC.
J. Organ. End User Comput., 2023

Variational Autoencoder with Stochastic Masks to Solve Exposure Bias in Recommendation (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

A Multi-view Knowledge Graph Embedding Model Considering Structure and Semantics.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Pure Hardware Design and Implementation on FPGA of WireGuard-based VPN Gateway.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
RuleSQLova: Improving Text-to-SQL with Logic Rules.
Proceedings of the International Joint Conference on Neural Networks, 2022

Hierarchical Graph Attention Network with Heterogeneous Tripartite Graph for Numerical Reasoning over Text.
Proceedings of the International Joint Conference on Neural Networks, 2022

BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

BEFSR: A Multiple Attention-Based Model Considering Bidirectional Entity Information Flows and Few-Shot Relations.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Multi-level Fusion of Multi-modal Semantic Embeddings for Zero Shot Learning.
Proceedings of the International Conference on Multimodal Interaction, 2022

Aggregating Heterogeneous Neighbors and Node Types for Numerical Reasoning over Text.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022

GSDM: A Gated Semantic Discriminating Model for Knowledge Graph Completion.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
MCCR: Learning Multi-order Convolutional Correlations for Recommendation.
Proceedings of the 2021 IEEE SmartWorld, 2021

Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

PLVCG: A Pretraining Based Model for Live Video Comment Generation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Incorporating Common Knowledge and Specific Entity Linking Knowledge for Machine Reading Comprehension.
Proceedings of the Knowledge Science, Engineering and Management, 2021

ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model.
Proceedings of the International Joint Conference on Neural Networks, 2021

Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media.
Proceedings of the Database Systems for Advanced Applications, 2021

TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Learning from Audience Interaction: Multi-Instance Multi-Label Topic Model for Video Shots Annotating.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Incorporating Attributes Semantics into Knowledge Graph Embeddings.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020

TransMVG: Knowledge Graph Embedding Based on Multiple-Valued Gates.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Multiple Demographic Attributes Prediction in Mobile and Sensor Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

TransBidiFilter: Knowledge Embedding Based on a Bidirectional Filter.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

User Preference Excitation Network for Sequential Recommendation.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Binarized Attributed Network Embedding via Neural Networks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

FGRec: A Fine-Grained Point-of-Interest Recommendation Framework by Capturing Intrinsic Influences.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

User Alignment with Jumping Seed Alignment Information Propagation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Practical Defense against Attribute Inference Attacks in Session-based Recommendations.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Leveraging Knowledge Context Information to Enhance Personalized Recommendation.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Knowledge Graph Embedding Based on Relevance and Inner Sequence of Relations.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

FGCRec: Fine-Grained Geographical Characteristics Modeling for Point-of-Interest Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
HidingGAN: High Capacity Information Hiding with Generative Adversarial Network.
Comput. Graph. Forum, 2019

CARec: Content-Aware Point-of-Interest Recommendation via Adaptive Bayesian Personalized Ranking.
Aust. J. Intell. Inf. Process. Syst., 2019

Attributed Network Embedding via a Siamese Neural Network.
Proceedings of the 2019 IEEE SmartWorld, 2019

Differential Attribute Desensitization System for Personal Information Protection.
Proceedings of the 2019 IEEE SmartWorld, 2019

Your Pedometer Tells You: Attribute Inference via Daily Walking Step Count.
Proceedings of the 2019 IEEE SmartWorld, 2019

Knowledge Graph Embedding with Order Information of Triplets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

TransI: Translating Infinite Dimensional Embeddings Based on Trend Smooth Distance.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Reducing Style Overfitting for Character Recognition via Parallel Neural Networks with Style to Content Connection.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Personalized Point-of-Interest Recommendation on Ranking with Poisson Factorization.
Proceedings of the International Joint Conference on Neural Networks, 2019

The Application of Network Based Embedding in Local Topic Detection from Social Media.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

STNet: A Style Transformation Network for Deep Image Steganography.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

SCS: Style and Content Supervision Network for Character Recognition with Unseen Font Style.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Node-Edge Bilateral Attributed Network Embedding.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Anchor User Oriented Accordant Embedding for User Identity Linkage.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Aligning Users Across Social Networks by Joint User and Label Consistence Representation.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Demographic Prediction from Purchase Data Based on Knowledge-Aware Embedding.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Dynamic Graph Link Prediction by Semantic Evolution.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

DCAR: Deep Collaborative Autoencoder for Recommendation with Implicit Feedback.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Text and Time Series, 2019

Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream.
Proceedings of the Database Systems for Advanced Applications, 2019

More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

TransGate: Knowledge Graph Embedding with Shared Gate Structure.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
NANE: Attributed Network Embedding with Local and Global Information.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

User Identity Linkage with Accumulated Information from Neighbouring Anchor Links.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Translation-Based Attributed Network Embedding.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

MultNet: An Efficient Network Representation Learning for Large-Scale Social Relation Extraction.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

CNN-Based Chinese Character Recognition with Skeleton Feature.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A MIML-LSTM neural network for integrated fine-grained event forecasting.
Proceedings of 2018 International Conference on Big Data Technologies, 2018

Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
Proceedings of the Computer Security, 2018

2017
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015

A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015

QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.
Proceedings of the Information Security Practice and Experience, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware.
IACR Cryptol. ePrint Arch., 2013

High Radix Montgomery Modular Multiplier on Modern FPGA.
Proceedings of the 12th IEEE International Conference on Trust, 2013

MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

An Efficient Reconfigurable II-ONB Modular Multiplier.
Proceedings of the Security and Privacy in Communication Networks, 2013

2012
RIKE: Using Revocable Identities to Support Key Escrow in PKIs.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Towards Attack Resilient Social Network Based Threshold Signing.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2003
ARECA: a highly attack resilient certification authority.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003


  Loading...