default search action
Guanggang Geng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Jun-Min Shao, Guo-Qiang Zeng, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Comput. Secur. 143: 103910 (2024) - [j36]Fei-Fan Tu, Dongjie Liu, Zhiwei Yan, Xiao-Bo Jin, Guang-Gang Geng:
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems. Comput. Secur. 144: 103961 (2024) - [j35]Yu Zhang, Guo-Qiang Zeng, Min-Rong Chen, Guang-Gang Geng, Jian Weng, Kang-Di Lu:
DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution. Expert Syst. Appl. 255: 124705 (2024) - [j34]Jianglan Fu, Yinyan Zhang, Guanggang Geng, Zhiquan Liu:
Recurrent Neural Network With Scheduled Varying Gain for Solving Time-Varying QP. IEEE Trans. Circuits Syst. II Express Briefs 71(2): 882-886 (2024) - [j33]Linyan Dai, Yinyan Zhang, Guanggang Geng:
Norm-Based Finite-Time Convergent Recurrent Neural Network for Dynamic Linear Inequality. IEEE Trans. Ind. Informatics 20(3): 4874-4883 (2024) - [j32]Guo-Qiang Zeng, Hai-Nan Wei, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
DACO-BD: Data Augmentation Combinatorial Optimization-Based Backdoor Defense in Deep Neural Networks for SAR Image Classification. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - [j31]Yinyan Zhang, Bolin Liao, Guanggang Geng:
GNN Model With Robust Finite-Time Convergence for Time-Varying Systems of Linear Equations. IEEE Trans. Syst. Man Cybern. Syst. 54(8): 4786-4797 (2024) - 2023
- [j30]Chengxi Jiang, Shijie Xu, Guanggang Geng, Jian Weng, Xinchang Zhang:
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification. Clust. Comput. 26(3): 1785-1800 (2023) - [j29]Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu, Yu Zhang:
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems. Comput. Secur. 132: 103310 (2023) - [j28]Quanlong Guan, Jiawei Lei, Chaonan Wang, Guanggang Geng, Yuansheng Zhong, Liangda Fang, Xiujie Huang, Weiqi Luo:
BI-FERH: Blockchain-IoT based framework for securing smart hotel. Comput. Sci. Inf. Syst. 20(4): 1541-1568 (2023) - [j27]Yinyan Zhang, Shuai Li, Xuefeng Zhou, Jian Weng, Guanggang Geng:
Single-state distributed k-winners-take-all neural network model. Inf. Sci. 647: 119528 (2023) - [j26]Yinyan Zhang, Guanggang Geng:
Finite-Time Convergent Modified Davidenko Method for Dynamic Nonlinear Equations. IEEE Trans. Circuits Syst. II Express Briefs 70(4): 1630-1634 (2023) - [j25]Yinyan Zhang, Shuai Li, Guanggang Geng:
Initialization-Based k-Winners-Take-All Neural Network Model Using Modified Gradient Descent. IEEE Trans. Neural Networks Learn. Syst. 34(8): 4130-4138 (2023) - [j24]Xinchang Zhang, Yinglong Wang, Guanggang Geng, Jiguo Yu:
Delay-Optimized Multicast Tree Packing in Software-Defined Networks. IEEE Trans. Serv. Comput. 16(1): 261-275 (2023) - [c33]Quanlong Guan, Jiawei Lei, Chaonan Wang, Guanggang Geng, Yuansheng Zhong, Liangda Fang, Xiujie Huang, Weiqi Luo:
A Practical Framework of Blockchain in IoT Information Management. SMC 2023: 274-279 - [i7]Zhiwei Yan, Randy Bush, Guanggang Geng, Ties de Kock, Jiankang Yao:
Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC 9455: 1-6 (2023) - 2022
- [j23]Dongjie Liu, Guang-Gang Geng, Xinchang Zhang:
Multi-scale semantic deep fusion models for phishing website detection. Expert Syst. Appl. 209: 118305 (2022) - [j22]Xiaobo Jin, Jianyu Miao, Qiufeng Wang, Guanggang Geng, Kaizhu Huang:
Sparse matrix factorization with L2, 1 norm for matrix completion. Pattern Recognit. 127: 108655 (2022) - [j21]Shi-Jie Xu, Guang-Gang Geng, Xiao-Bo Jin, Dongjie Liu, Jian Weng:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. IEEE Trans. Inf. Forensics Secur. 17: 2166-2181 (2022) - 2021
- [j20]Dongjie Liu, Guang-Gang Geng, Xiao-Bo Jin, Wei Wang:
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment. Comput. Secur. 110: 102421 (2021) - [j19]Shanxiang Lyu, Zheng Wang, Ling Liu, Hongliang He, Guanggang Geng:
Boosting Low-Complexity Vector Perturbation Variants Based on Rectangular Shaping. IEEE Trans. Veh. Technol. 70(7): 7211-7215 (2021) - [j18]Heng Sun, Miaomiao Chen, Jian Weng, Zhiquan Liu, Guanggang Geng:
Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism. IEEE Trans. Veh. Technol. 70(10): 10880-10893 (2021) - [j17]Xinchang Zhang, Yinglong Wang, Meihong Yang, Guanggang Geng:
Toward Concurrent Video Multicast Orchestration for Caching-Assisted Mobile Networks. IEEE Trans. Veh. Technol. 70(12): 13205-13220 (2021) - [c32]Xuebiao Yuchi, Zhiwei Yan, Kejun Dong, Hongtao Li, Guanggang Geng, Sachin Shetty:
Dealing with the Domain Name Abuse: Issues and Approaches. EUC 2021: 166-173 - [c31]Yan-Ming Huang, Dongjie Liu, Zhiwei Yan, Yan-Ming Zhang, Guang-Gang Geng:
An Abused Webpage Detection Method Based on Screenshots Text Recognition. ICEA 2021: 106-110
2010 – 2019
- 2019
- [j16]Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zeng, Guanggang Geng:
Is DNS Ready for Ubiquitous Internet of Things? IEEE Access 7: 28835-28846 (2019) - [j15]Yanling Zhao, Ye Li, Xinchang Zhang, Guanggang Geng, Wei Zhang, Yanjie Sun:
A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning. IEEE Access 7: 95397-95417 (2019) - [j14]Guang-Gang Geng, Zhiwei Yan, Jong-Hyouk Lee, Xiao-Bo Jin, Dongjie Liu:
An Efficient Antiphishing Method to Secure eConsume. IEEE Consumer Electron. Mag. 8(6): 42-46 (2019) - [j13]Xiao-Bo Jin, Xu-Yao Zhang, Kaizhu Huang, Guang-Gang Geng:
Stochastic Conjugate Gradient Algorithm With Variance Reduction. IEEE Trans. Neural Networks Learn. Syst. 30(5): 1360-1369 (2019) - 2018
- [j12]Xiao-Bo Jin, Guang-Gang Geng, Guo-Sen Xie, Kaizhu Huang:
Approximately optimizing NDCG using pair-wise loss. Inf. Sci. 453: 50-65 (2018) - [j11]Zhiwei Yan, Guanggang Geng, Hidenori Nakazato, Yong-Jin Park:
Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI). J. Internet Serv. Inf. Secur. 8(1): 31-45 (2018) - [c30]Liguo Chen, Yuedong Zhang, Qi Zhao, Guanggang Geng, Zhiwei Yan:
Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark. FNC/MobiSPC 2018: 310-315 - [c29]Xinan Duan, Zhiwei Yan, Guanggang Geng, Baoping Yan:
DNSLedger: Decentralized and distributed name resolution for ubiquitous IoT. ICCE 2018: 1-3 - [c28]Guang-Gang Geng, Zhiwei Yan, Yu Zeng, Xiao-Bo Jin:
RRPhish: Anti-phishing via mining brand resources request. ICCE 2018: 1-2 - 2017
- [j10]Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park:
Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay. IEEE Access 5: 243-251 (2017) - [j9]Zhiwei Yan, Syed Hassan Ahmed, Guanggang Geng, Hidenori Nakazato, Yong-Jin Park:
Network Mobility in a Locator/ID Separation Context. IEEE Access 5: 27897-27904 (2017) - [j8]Zhiwei Yan, Sherali Zeadally, Guanggang Geng:
ISBORD: Internet Searching based on Resource Description. ICT Express 3(1): 48-51 (2017) - [j7]Yilan Liao, Wenwen Chen, Kaichao Wu, Dongyue Li, Xin Liu, Guanggang Geng, Zheng Su, Zheng Zheng:
A site selection method of DNS using the particle swarm optimization algorithm. Trans. GIS 21(5): 969-983 (2017) - [c27]Xi Zhang, Yu Zeng, Xiao-Bo Jin, Zhiwei Yan, Guang-Gang Geng:
Boosting the phishing detection performance by semantic analysis. IEEE BigData 2017: 1063-1070 - [c26]Zhou Fa, Guang-Gang Geng, Zhiwei Yan, Xiao-Dong Lee:
A robust internet abuse detection method. IEEE BigData 2017: 1712-1715 - [c25]Xuebiao Yuchi, Guanggang Geng, Zhiwei Yan, Xiaodong Lee:
Towards tackling privacy disclosure issues in Domain Name Service. IM 2017: 813-816 - [c24]Zhiwei Yan, Guanggang Geng, Hidenori Nakazato, Yong-Jin Park, Kashif Nisar, Ag Asri Ag Ibrahim:
On-Demand DTN Communications in Heterogeneous Access Networks Based on NDN. VTC Spring 2017: 1-2 - [i6]Xiao-Bo Jin, Xu-Yao Zhang, Kaizhu Huang, Guang-Gang Geng:
Stochastic Conjugate Gradient Algorithm with Variance Reduction. CoRR abs/1710.09979 (2017) - 2016
- [c23]Xueni Li, Guanggang Geng, Zhiwei Yan, Yong Chen, Xiaodong Lee:
Phishing detection based on newly registered domains. IEEE BigData 2016: 3685-3692 - [c22]Xiao-Bo Jin, Guang-Gang Geng, Kaizhu Huang, Zhiwei Yan:
Statistical Entity Ranking with Domain Knowledge. NLPCC/ICCPOL 2016: 811-818 - [c21]Cuicui Wang, Guanggang Geng, Zhiwei Yan:
A Cross-Domain Hidden Spam Detection Method Based on Domain Name Resolution. QSHINE 2016: 3-11 - [c20]Zhiwei Yan, Jong-Hyouk Lee, Guanggang Geng, Xiaodong Lee, Yong-Jin Park:
A Novel DMM Architecture Based on NDN. QSHINE 2016: 485-491 - [i5]Xiao-Bo Jin, Guang-Gang Geng, Kaizhu Huang, Zhiwei Yan:
Ranking Entity Based on Both of Word Frequency and Word Sematic Features. CoRR abs/1608.01068 (2016) - 2015
- [j6]Xiao-Bo Jin, Guanggang Geng, Minghe Sun, Dexian Zhang:
Combination of multiple bipartite ranking for multipartite web content quality evaluation. Neurocomputing 149: 1305-1314 (2015) - [j5]Guang-Gang Geng, Xiao-Dong Lee, Yan-Ming Zhang:
Combating phishing attacks via brand identity and authorization features. Secur. Commun. Networks 8(6): 888-898 (2015) - [j4]Yan-Ming Zhang, Kaizhu Huang, Guang-Gang Geng, Cheng-Lin Liu:
MTC: A Fast and Robust Graph-Based Transductive Learning Method. IEEE Trans. Neural Networks Learn. Syst. 26(9): 1979-1991 (2015) - [c19]Xiaowei Liu, Zhiwei Yan, Guanggang Geng, Xiaodong Lee, Shian-Shyong Tseng, Ching-Heng Ku:
RPKI Deployment: Risks and Alternative Solutions. ICGEC (1) 2015: 299-310 - 2014
- [c18]Guanggang Geng, Xiu-Tao Yang, Wei Wang, Chi-Jie Meng:
A Taxonomy of Hyperlink Hiding Techniques. APWeb 2014: 165-176 - 2013
- [c17]Guang-Gang Geng, Xiao-Dong Lee, Wei Wang, Shian-Shyong Tseng:
Favicon - a clue to phishing sites detection. eCrime 2013: 1-10 - [c16]Wei Wang, Xiao-Dong Lee, An-Lei Hu, Guanggang Geng:
Co-training based semi-supervised Web spam detection. FSKD 2013: 789-793 - [c15]Shian-Shyong Tseng, Ching-Heng Ku, Ai-Chin Lu, Yuh-Jye Wang, Guang-Gang Geng:
Building a Self-Organizing Phishing Model Based upon Dynamic EMCUD. IIH-MSP 2013: 509-512 - [c14]Yan-Ming Zhang, Kaizhu Huang, Guanggang Geng, Cheng-Lin Liu:
Fast kNN Graph Construction with Locality Sensitive Hashing. ECML/PKDD (2) 2013: 660-674 - [i4]Xiao-Bo Jin, Guanggang Geng:
Linear NDCG and Pair-wise Loss. CoRR abs/1303.2417 (2013) - [i3]Guanggang Geng, Yan-Ming Zhang, Xiao-Dong Lee, Wei Wang, An-Lei Hu:
A Taxonomy of Hyperlink Hiding Techniques. CoRR abs/1303.2438 (2013) - [i2]Guanggang Geng, Xiao-Bo Jin, Xinchang Zhang, Dexian Zhang:
Evaluating Web Content Quality via Multi-scale Features. CoRR abs/1304.6181 (2013) - [i1]Xiao-Bo Jin, Guanggang Geng, Dexian Zhang:
Combination of Multiple Bipartite Ranking for Web Content Quality Evaluation. CoRR abs/1309.3132 (2013) - 2012
- [j3]Guanggang Geng, Li-Ming Wang, Wei Wang, An-Lei Hu, Shuo Shen:
Statistical cross-language Web content quality assessment. Knowl. Based Syst. 35: 312-319 (2012) - [c13]Xiao-Bo Jin, Junwei Yu, Dexian Zhang, Guanggang Geng:
Multi-partite ranking with multi-class AdaBoost algorithm. FSKD 2012: 884-887 - [c12]Xiao-Bo Jin, Guanggang Geng, Junwei Yu, Dexian Zhang:
Multi-label learning vector quantization algorithm. ICPR 2012: 2140-2143 - 2011
- [j2]Xinchang Zhang, Meihong Yang, Guanggang Geng, Wanming Luo, Xingfeng Li:
A two-tiered reliable application layer multicast. Comput. Sci. Inf. Syst. 8(3): 909-929 (2011) - [j1]Xinchang Zhang, Meihong Yang, Guanggang Geng, Wanming Luo:
A DFSM-Based Protocol Conformance Testing and Diagnosing Method. Informatica 22(3): 447-469 (2011) - [c11]Guanggang Geng, Xiaodong Li, Li-Ming Wang, Wei Wang, Shuo Shen:
Statistical feature extraction for cross-language web content quality assessment. SIGIR 2011: 1129-1130 - [c10]Bo Hong, Wei Wang, Liming Wang, Guanggang Geng, Yali Xiao, Xiaodong Li, Wei Mao:
A Hybrid System to Find & Fight Phishing Attacks Actively. Web Intelligence 2011: 506-509
2000 – 2009
- 2009
- [c9]Guanggang Geng, Qiudan Li, Xinchang Zhang:
Link based small sample learning for web spam detection. WWW 2009: 1185-1186 - 2008
- [c8]Guanggang Geng, Chunheng Wang, Qiudan Li:
Improving Spamdexing Detection Via a Two-Stage Classification Strategy. AIRS 2008: 356-364 - [c7]Guanggang Geng, Chunheng Wang, Qiudan Li:
Improving web spam detection with re-extracted features. WWW 2008: 1119-1120 - [c6]Qiudan Li, Chunheng Wang, Guanggang Geng:
Improving personalized services in mobile commerce by a novel multicriteria rating approach. WWW 2008: 1235-1236 - 2007
- [c5]Guanggang Geng, Chunheng Wang, Qiudan Li, Yuanping Zhu:
Fighting Link Spam with a Two-Stage Ranking Strategy. ECIR 2007: 699-702 - [c4]Guanggang Geng, Chunheng Wang, Qiudan Li, Lei Xu, Xiao-Bo Jin:
Boosting the Performance of Web Spam Detection with Ensemble Under-Sampling Classification. FSKD (4) 2007: 583-587 - [c3]Qiudan Li, Chunheng Wang, Guanggang Geng, Ruwei Dai:
A Concept Lattice-Based Kernel Method for Mining Knowledge in an M-Commerce System. ISNN (1) 2007: 1280-1285 - [c2]Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang:
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. PAISI 2007: 314-315 - [c1]Qiudan Li, Chunheng Wang, Guanggang Geng, Ruwei Dai:
A novel collaborative filtering-based framework for personalized services in m-commerce. WWW 2007: 1251-1252
Coauthor Index
aka: Xiaobo Jin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint