


default search action
Ge Cheng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j13]Ge Cheng
, Qifan Luo, Yun Zhang
:
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network. Inf. Softw. Technol. 181: 107686 (2025)
[j12]Yun Zhang, Ge Cheng:
DiffBCE: Difference contrastive learning for binary code embeddings. Inf. Softw. Technol. 187: 107822 (2025)
[j11]Traymon E. Beavers
, Ge Cheng, Yajie Duan
, Javier Cabrera, Mariusz Lubomirski, Dhammika Amaratunga, Jeffrey E. Teigler:
Data Nuggets: A Method for Reducing Big Data While Preserving Data Structure. J. Comput. Graph. Stat. 34(1): 330-342 (2025)
[j10]Crystal T. Chang
, Hodan Farah, Haiwen Gui
, Shawheen Justin Rezaei, Charbel Bou-Khalil, Ye-Jean Park, Akshay Swaminathan
, Jesutofunmi A. Omiye, Akaash Kolluri, Akash Chaurasia
, Alejandro Lozano
, Alice Heiman, Allison Sihan Jia, Amit Kaushal, Angela Jia, Angelica Iacovelli, Archer Yang, Arghavan Salles, Arpita Singhal, Balasubramanian Narasimhan, Benjamin Belai, Benjamin H. Jacobson
, Binglan Li
, Celeste H. Poe, Chandan Sanghera, Chenming Zheng, Conor Messer
, Damien Varid Kettud, Deven Pandya, Dhamanpreet Kaur, Diana Hla, Diba Dindoust, Dominik Moehrle, Duncan Ross, Ellaine Chou, Eric Lin, Fateme Nateghi Haredasht, Ge Cheng, Irena Gao, Jacob Chang, Jake Silberg, Jason A. Fries
, Jiapeng Xu, Joe Jamison, John S. Tamaresis, Jonathan H. Chen, Joshua Lazaro
, Juan M. Banda, Julie J. Lee
, Karen Ebert Matthys, Kirsten R. Steffner
, Lu Tian, Luca Pegolotti, Malathi Srinivasan, Maniragav Manimaran, Matthew Schwede, Minghe Zhang, Minh Nguyen
, Mohsen Fathzadeh, Qian Zhao, Rika Bajra, Rohit Khurana
, Ruhana Azam, Rush Bartlett, Sang T. Truong
, Scott L. Fleming, Shriti Raj
, Solveig Behr, Sonia Onyeka
, Sri Muppidi, Tarek Bandali
, Tiffany Y. Eulalio, Wenyuan Chen, Xuanyu Zhou
, Yanan Ding
, Ying Cui
, Yuqi Tan
, Yutong Liu, Nigam Shah, Roxana Daneshjou
:
Red teaming ChatGPT in medicine to yield real-world insights on model behavior. npj Digit. Medicine 8(1) (2025)
[i4]Ge Cheng, Shuo Wang, Yun Zhang:
Understanding InfoNCE: Transition Probability Matrix Induced Feature Clustering. CoRR abs/2511.12180 (2025)- 2024
[j9]Yifan Hou, Ge Cheng
, Yun Zhang
, Dongliang Zhang:
Methods of incorporating common element characteristics for law article prediction. Artif. Intell. Law 32(2): 487-503 (2024)
[j8]Yun Zhang
, Yuling Liu, Ge Cheng
, Jie Wang:
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs. Comput. J. 67(5): 1710-1718 (2024)
[i3]Shuo Wang, Ge Cheng, Yun Zhang:
Graph Elimination Networks. CoRR abs/2401.01233 (2024)- 2023
[j7]Keyuan Hu
, Wenxin Xiong
, Yuwei Wang
, Zhang-Lei Shi, Ge Cheng, Hing Cheung So, Zhi Wang:
Lagrange programming neural network for robust passive elliptic positioning. J. Frankl. Inst. 360(16): 12150-12169 (2023)
[j6]Wenxin Xiong
, Ge Cheng, Christian Schindelhauer
, Hing Cheung So
:
Robust Matrix Completion for Elliptic Positioning in the Presence of Outliers and Missing Data. IEEE Trans. Geosci. Remote. Sens. 61: 1-12 (2023)- 2022
[c8]Yifan Hou, Ge Cheng
, Yun Zhang
, Dongliang Zhang:
Fusion of Global and Local Features for Text Classification. CACML 2022: 410-415
[c7]Congwei Feng, Huawei Chen, Ge Cheng, Yue Ivan Wu:
Design of Frequency-Invariant Beamformers Using a Weighted Spatial-Response-Variance Measure. EUSIPCO 2022: 1826-1830
[i2]Libin Liang, Ye Tian, Ge Cheng:
Deep Maxout Network Gaussian Process. CoRR abs/2208.04468 (2022)- 2020
[c6]Ge Cheng
, Hui Xie
, Dongliang Zhang
:
Analyzing the Chain of Trust Model Based on Entity Dependence. ISC 2020: 146-159
2010 – 2019
- 2017
[j5]Zhi-Peng Zhou, Liling Long
, Wei-Jia Qiu, Ge Cheng, Li-Juan Huang, Teng-Fei Yang, Zhong-Kui Huang:
Evaluating segmental liver function using T1 mapping on Gd-EOB-DTPA-enhanced MRI with a 3.0 Tesla. BMC Medical Imaging 17(1): 20:1-20:7 (2017)- 2016
[j4]Ge Cheng, Zhenyu Zhang
, Moses Ntanda Kyebambe
, Nasser Kimbugwe
:
Predicting the Outcome of NBA Playoffs Based on the Maximum Entropy Principle. Entropy 18(12): 450 (2016)- 2015
[j3]Yuansheng Liu, Hua Fan, Eric Yong Xie, Ge Cheng, Chengqing Li
:
Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps. Int. J. Bifurc. Chaos 25(13): 1550188:1-1550188:9 (2015)- 2014
[i1]Yuansheng Liu, Eric Yong Xie, Ge Cheng, Chengqing Li:
Deciphering a novel image cipher based on mixed transformed Logistic maps. CoRR abs/1404.3600 (2014)- 2013
[j2]Hai Jin, Ge Cheng, Deqing Zou, Xinwen Zhang:
Cherub: Fine-grained application protection with on-demand virtualization. Comput. Math. Appl. 65(9): 1326-1338 (2013)- 2010
[j1]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang:
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing. Concurr. Comput. Pract. Exp. 22(13): 1893-1910 (2010)
[c5]Alex K. Ohoussou, Hai Jin, Deqing Zou, Feng Zhao, Guofu Xiang, Ge Cheng:
Autonomous agent based intrusion detection in virtual computing environment. WCNIS 2010: 682-686
2000 – 2009
- 2009
[c4]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang, Min Li, Chen Yu, Guofu Xiang:
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure. GRID 2009: 113-119
[c3]Ge Cheng:
Unattended Remote Attestation Delegation for Grid Computing. NAS 2009: 204-207
[c2]Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, Alex K. Ohoussou:
CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions. SVM 2009: 43-54- 2008
[c1]Ge Cheng, Hai Jin, Deqing Zou, Alex K. Ohoussou, Feng Zhao:
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. ICYCS 2008: 1481-1487
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 23:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







