Остановите войну!
for scientists:
default search action
Feng Dong
Publications
- 2024
- [j18]Yunmiao Gui, Dingbo Tan, Zhi Liu, Feng Dong:
Worry not rareness but disparity: Impact of fairness concerns on platforms' pricing and matching decision in competitive two-sided markets. Expert Syst. Appl. 238(Part B): 121683 (2024) - [j17]Yunmiao Gui, Huihui Zhai, Feng Dong, Zhi Liu:
Value-added service investment and pricing decisions in two-sided platform: the role of user expectations. Kybernetes 53(2): 557-579 (2024) - 2023
- [j16]Bowen Sun, Xiaofeng Wang, Hao Li, Feng Dong, Yang Wang:
Small-target ship detection in SAR images based on densely connected deep neural network with attention in complex scenes. Appl. Intell. 53(4): 4162-4179 (2023) - [c27]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c26]Jingjing Wang, Liu Wang, Feng Dong, Haoyu Wang:
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. IMC 2023: 253-267 - [c25]Jiayu Zhang, Shaojun Cheng, Feng Dong, Ke Chen, Yong Qiao, Zhigang Mao, Jianfei Jiang:
A Hierarchical Communication Algorithm for Distributed Deep Learning Training. MWSCAS 2023: 526-530 - [c24]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [i10]Feng Dong, Jinchao Zhu:
Underwater Camouflage Object Detection Dataset. CoRR abs/2303.12946 (2023) - [i9]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023) - [i8]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. CoRR abs/2311.02331 (2023) - 2022
- [j15]Feng Dong, Xiaofeng Wang, Ammar Oad, Mir Sajjad Hussain Talpur, Mansoor Ahmed Khuhro, Bowen Sun:
A Feature Sparse Co-Attention Network for Visual internet of things (VIoT) sensing. Comput. Electr. Eng. 101: 107988 (2022) - [j12]Feng Dong, Xiao Wang, Jiawen Chen:
Family ownership and cooperative R&D: the moderating effect of political ties. J. Knowl. Manag. 26(2): 403-422 (2022) - [j10]Jinchao Zhu, Xiaoyu Zhang, Xian Fang, Muhammad Rameez Ur Rahman, Feng Dong, Yuehua Li, Siyu Yan, Panlong Tan:
Boosting RGB-D salient object detection with adaptively cooperative dynamic fusion network. Knowl. Based Syst. 251: 109205 (2022) - [j9]Lingfeng Huang, Feng Dong, Yutian Fu:
Prediction Algorithm for Satellite Instantaneous Attitude and Image Pixel Offset Based on Synchronous Clocks. Remote. Sens. 14(16): 3941 (2022) - [j8]Jinchao Zhu, Xiaoyu Zhang, Xian Fang, Feng Dong, Yu Qiu:
Modal-Adaptive Gated Recoding Network for RGB-D Salient Object Detection. IEEE Signal Process. Lett. 29: 359-363 (2022) - [j7]Jianfei Jiang, Mingjun Jiang, Jiayu Zhang, Feng Dong:
A CPU-FPGA Heterogeneous Acceleration System for Scene Text Detection Network. IEEE Trans. Circuits Syst. II Express Briefs 69(6): 2947-2951 (2022) - [i4]Yuxuan Wang, Feng Dong, Jinchao Zhu:
Interactive Context-Aware Network for RGB-T Salient Object Detection. CoRR abs/2211.06097 (2022) - 2021
- [c23]Yiliang Guo, Mingjun Jiang, Feng Dong, Kehua Yu, Ke Chen, Wei Qu, Jianfei Jiang:
A CPU-FPGA Based Heterogeneous Accelerator for RepVGG. ASICON 2021: 1-4 - [c20]Hanshu Hong, Qin Wu, Feng Dong, Wei Song, Ronghua Sun, Tao Han, Cheng Zhou, Hongwei Yang:
NetGraph: An Intelligent Operated Digital Twin Platform for Data Center Networks. NAI@SIGCOMM 2021: 26-32 - [i3]Feng Dong, Jinchao Zhu, Xian Fang, Qiu Yu:
Modal-Adaptive Gated Recoding Network for RGB-D Salient Object Detection. CoRR abs/2108.06281 (2021) - 2020
- [c19]Nan Wu, Feng Dong, Shu Zhao:
Ultrasound Tomography Using Limited Rays in Transmission Field. I2MTC 2020: 1-6 - [c17]Feng Dong, Jia Liu, Liang Gu, Min Ma:
Anti-html Evasion in Intrusion Prevention System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 617-622 - [c16]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [i2]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - 2019
- [j5]Wenxiu Wang, Yutian Fu, Feng Dong, Feng Li:
Semantic segmentation of remote sensing ship image via a convolutional neural networks model. IET Image Process. 13(6): 1016-1022 (2019) - [c15]Junning Jiang, Liang Cai, Feng Dong, Kehua Yu, Ke Chen, Wei Qu, Jianfei Jiang:
Deploying and Optimizing Convolutional Neural Networks on Heterogeneous Architecture. ASICON 2019: 1-4 - [c14]Yue Zhao, Tong Li, Feng Dong, Qin Wang, Weifeng He, Jianfei Jiang:
A New Approximate Multiplier Design for Digital Signal Processing. ASICON 2019: 1-4 - 2018
- [j4]Feng Dong, Junfeng Wang, Qi Li, Guoai Xu, Shaodong Zhang:
Defect Prediction in Android Binary Executables Using Deep Neural Network. Wirel. Pers. Commun. 102(3): 2261-2285 (2018) - [c12]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein:
FraudDroid: automated ad fraud detection for Android apps. ESEC/SIGSOFT FSE 2018: 257-268 - [c11]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang:
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries? HotMobile 2018: 75-80 - 2017
- [i1]Feng Dong, Haoyu Wang, Yuanchun Li, Yao Guo, Li Li, Shaodong Zhang, Guoai Xu:
FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection. CoRR abs/1709.01213 (2017) - 2016
- [c9]Feng Dong, Yanhui Guo, Chengze Li, Guoai Xu, Fang Wei:
ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes. CCIS 2016: 77-81 - [c8]Linshu Ouyang, Feng Dong, Miao Zhang:
Android malware detection using 3-level ensemble. CCIS 2016: 393-397 - 2014
- [c6]Diarmuid P. O'Donoghue, James F. Power, Sian O'Briain, Feng Dong, Aidan Mooney, Donny Hurley, Yalemisew M. Abgaz, Charles Markham:
Can a Computationally Creative System Create Itself? Creative Artefacts and Creative Processes. ICCC 2014: 146-154 - [c5]Diarmuid P. O'Donoghue, Horacio Saggion, Feng Dong, Donny Hurley, Yalemisew M. Abgaz, X. Zheng, Óscar Corcho, Jian J. Zhang, J. M. Careil, Babak Mahdian, Xia Zhao:
Towards Dr Inventor: A Tool for Promoting Scientific Creativity. ICCC 2014: 268-271 - 2010
- [c4]Hui Wang, Xiaomin Mao, Feng Dong:
Application of five-element connection number on the comprehensive impact evaluation of water-saving renovation in irrigation area. FSKD 2010: 994-997 - 1997
- [j1]Feng Dong, Wenli Cai, Tianzhou Chen, Jiaoying Shi:
Three-dimensional volume datafield reconstruction from physical model. J. Comput. Sci. Technol. 12(3): 217-230 (1997) - [c1]Feng Dong, Jiaoying Shi:
Multiresolution data modelling for irregular data fields based on wavelets. IV 1997: 64-70
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint