default search action
Deguang Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j5]He Xiong, Deguang Kong, Feiping Nie:
Cauchy balanced nonnegative matrix factorization. Artif. Intell. Rev. 56(10): 11867-11903 (2023) - [j4]Zijun Yao, Deguang Kong, Miao Lu, Xiao Bai, Jian Yang, Hui Xiong:
Multi-View Multi-Task Campaign Embedding for Cold-Start Conversion Rate Forecasting. IEEE Trans. Big Data 9(1): 280-293 (2023) - 2019
- [j3]He Xiong, Deguang Kong:
Elastic nonnegative matrix factorization. Pattern Recognit. 90: 464-475 (2019) - 2013
- [j2]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. Secur. Commun. Networks 6(7): 818-832 (2013) - 2011
- [j1]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: semantics aware signature generation for polymorphic worm detection. Int. J. Inf. Sec. 10(5): 269-283 (2011)
Conference and Workshop Papers
- 2024
- [c43]Yudong Zhang, Deguang Kong, Juanjuan Li, Tao Yang, Feng Yao, Ge Yang:
Using Segment-Level Attention to Guide Breast Ultrasound Video Classification. ISBI 2024: 1-5 - 2023
- [c42]Xiyang Hu, Xinchi Chen, Peng Qi, Deguang Kong, Kunlun Liu, William Yang Wang, Zhiheng Huang:
Language Agnostic Multilingual Information Retrieval with Contrastive Learning. ACL (Findings) 2023: 9133-9146 - [c41]Danilo Neves Ribeiro, Shen Wang, Xiaofei Ma, Henghui Zhu, Rui Dong, Deguang Kong, Juliette Burger, Anjelica Ramos, Zhiheng Huang, William Yang Wang, George Karypis, Bing Xiang, Dan Roth:
STREET: A Multi-Task Structured Reasoning and Explanation Benchmark. ICLR 2023 - 2021
- [c40]Wei Deng, Junwei Pan, Tian Zhou, Deguang Kong, Aaron Flores, Guang Lin:
DeepLight: Deep Lightweight Feature Interactions for Accelerating CTR Predictions in Ad Serving. WSDM 2021: 922-930 - 2020
- [c39]Xian Wu, Suleyman Cetintas, Deguang Kong, Miao Lu, Jian Yang, Nitesh V. Chawla:
Learning from Cross-Modal Behavior Dynamics with Graph-Regularized Neural Contextual Bandit. WWW 2020: 995-1005 - 2019
- [c38]Deguang Kong, Lei Cen:
Mobile App Risk Ranking via Exclusive Sparse Coding. WWW 2019: 2922-2928 - 2018
- [c37]Dawei Li, Xiaolong Wang, Deguang Kong:
DeepRebirth: Accelerating Deep Neural Network Execution on Mobile Devices. AAAI 2018: 2322-2330 - [c36]Deguang Kong, Xiannian Fan, Konstantin Shmakov, Jian Yang:
A Combinational Optimization Approach for Advertising Budget Allocation. WWW (Companion Volume) 2018: 53-54 - [c35]Deguang Kong, Konstantin Shmakov, Jian Yang:
Demystifying Advertising Campaign for CPA Goal Optimization. WWW (Companion Volume) 2018: 83-84 - [c34]Deguang Kong, Konstantin Shmakov, Jian Yang:
An Inflection Point Approach for Advertising Bid Optimization. WWW (Companion Volume) 2018: 91-92 - [c33]Hongchang Gao, Deguang Kong, Miao Lu, Xiao Bai, Jian Yang:
Attention Convolutional Neural Network for Advertiser-level Click-through Rate Forecasting. WWW 2018: 1855-1864 - 2017
- [c32]Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. ACSAC 2017: 288-302 - [c31]Xiaolong Wang, Yin Zhou, Deguang Kong, Jon Currey, Dawei Li, Jiayu Zhou:
Unleash the Black Magic in Age: A Multi-Task Deep Neural Network Approach for Cross-Age Face Verification. FG 2017: 596-603 - 2016
- [c30]Lam Tran, Deguang Kong, Hongxia Jin, Ji Liu:
Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features. AAAI 2016: 1317-1323 - [c29]Deguang Kong, Ji Liu, Bo Liu, Xuan Bao:
Uncorrelated Group LASSO. AAAI 2016: 1765-1771 - [c28]Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis:
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. DSN 2016: 359-370 - 2015
- [c27]Deguang Kong, Lei Cen, Hongxia Jin:
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications. CCS 2015: 530-541 - [c26]Bing Hu, Bin Liu, Neil Zhenqiang Gong, Deguang Kong, Hongxia Jin:
Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework. CIKM 2015: 1111-1120 - [c25]Xuan Bao, Bin Liu, Bo Tang, Bing Hu, Deguang Kong, Hongxia Jin:
PinPlace: associate semantic meanings with indoor locations without active fingerprinting. UbiComp 2015: 921-925 - [c24]Deguang Kong, Hongxia Jin:
Towards Permission Request Prediction on Mobile Apps via Structure Feature Learning. SDM 2015: 604-612 - [c23]Lei Cen, Deguang Kong, Hongxia Jin, Luo Si:
Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments. SDM 2015: 658-666 - [c22]Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong:
Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference. WSDM 2015: 315-324 - 2014
- [c21]Deguang Kong, Chris H. Q. Ding:
Non-Convex Feature Learning via L_{p, inf} Operator. AAAI 2014: 1918-1924 - [c20]Deguang Kong, Chris H. Q. Ding:
Pairwise-Covariance Linear Discriminant Analysis. AAAI 2014: 1925-1931 - [c19]Qihe Pan, Deguang Kong, Chris H. Q. Ding, Bin Luo:
Robust Non-Negative Dictionary Learning. AAAI 2014: 2027-2033 - [c18]Deguang Kong, Guanhua Yan:
Transductive malware label propagation: Find your lineage from your neighbors. INFOCOM 2014: 1411-1419 - [c17]Deguang Kong, Ryohei Fujimaki, Ji Liu, Feiping Nie, Chris H. Q. Ding:
Exclusive Feature Learning on Arbitrary Structures via \ell_{1, 2}-norm. NIPS 2014: 1655-1663 - 2013
- [c16]Guanhua Yan, Nathan Brown, Deguang Kong:
Exploring Discriminatory Features for Automated Malware Classification. DIMVA 2013: 41-61 - [c15]Deguang Kong, Chris H. Q. Ding:
Efficient Algorithms for Selecting Features with Arbitrary Group Constraints via Group Lasso. ICDM 2013: 379-388 - [c14]Deguang Kong, Guanhua Yan:
Discriminant malware distance learning on structural information for automated malware classification. KDD 2013: 1357-1365 - [c13]Deguang Kong, Miao Zhang, Chris H. Q. Ding:
Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective. ECML/PKDD (2) 2013: 177-193 - [c12]Chris H. Q. Ding, Deguang Kong, Miao Zhang:
Collective Kernel Construction in Noisy Environment. SDM 2013: 64-72 - [c11]Deguang Kong, Guanhua Yan:
Discriminant malware distance learning on structuralinformation for automated malware classification. SIGMETRICS 2013: 347-348 - 2012
- [c10]Deguang Kong, Chris H. Q. Ding, Heng Huang, Haifeng Zhao:
Multi-label ReliefF and F-statistic feature selections for image annotation. CVPR 2012: 2352-2359 - [c9]Chris H. Q. Ding, Deguang Kong:
Nonnegative matrix factorization using a robust error function. ICASSP 2012: 2033-2036 - [c8]Deguang Kong, Chris H. Q. Ding:
A Semi-definite Positive Linear Discriminant Analysis and Its Applications. ICDM 2012: 942-947 - [c7]Deguang Kong, Chris H. Q. Ding, Heng Huang, Feiping Nie:
An Iterative Locally Linear Embedding Algorithm. ICML 2012 - [c6]Deguang Kong, Chris H. Q. Ding:
Maximum Consistency Preferential Random Walks. ECML/PKDD (2) 2012: 339-354 - 2011
- [c5]Deguang Kong, Chris H. Q. Ding, Heng Huang:
Robust nonnegative matrix factorization using L21-norm. CIKM 2011: 673-682 - [c4]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - 2010
- [c3]Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. SecureComm 2010: 1-19 - [c2]Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:
Protecting Kernel Data through Virtualization Technology. SECURWARE 2010: 5-10 - 2007
- [c1]Deguang Kong, Quan Zheng, Chao Chen, Jianmei Shuai, Ming Zhu:
ISA: a source code static vulnerability detection system based on data fusion. Infoscale 2007: 55
Informal and Other Publications
- 2023
- [i9]Deguang Kong, Miao Lu, Konstantin Shmakov, Jian Yang:
Robust Consensus Clustering and its Applications for Advertising Forecasting. CoRR abs/2301.00717 (2023) - [i8]Danilo Neves Ribeiro, Shen Wang, Xiaofei Ma, Henry Zhu, Rui Dong, Deguang Kong, Juliette Burger, Anjelica Ramos, William Yang Wang, Zhiheng Huang, George Karypis, Bing Xiang, Dan Roth:
STREET: A Multi-Task Structured Reasoning and Explanation Benchmark. CoRR abs/2302.06729 (2023) - [i7]Deguang Kong, Daniel Xiaodan Zhou, Zhiheng Huang, Steph Sigalas:
Personalized Search Via Neural Contextual Semantic Relevance Ranking. CoRR abs/2309.05113 (2023) - [i6]Deguang Kong, Abhay Jha, Lei Yun:
Learning Personalized User Preference from Cold Start in Multi-turn Conversations. CoRR abs/2309.05127 (2023) - 2022
- [i5]Xiyang Hu, Xinchi Chen, Peng Qi, Deguang Kong, Kunlun Liu, William Yang Wang, Zhiheng Huang:
Language Agnostic Multilingual Information Retrieval with Contrastive Learning. CoRR abs/2210.06633 (2022) - [i4]Deguang Kong, Konstantin Shmakov, Jian Yang:
Demystifying Advertising Campaign Bid Recommendation: A Constraint target CPA Goal Optimization. CoRR abs/2212.13915 (2022) - [i3]Deguang Kong, Konstantin Shmakov, Jian Yang:
Do not Waste Money on Advertising Spend: Bid Recommendation via Concavity Changes. CoRR abs/2212.13923 (2022) - 2017
- [i2]Dawei Li, Xiaolong Wang, Deguang Kong:
DeepRebirth: Accelerating Deep Neural Network Execution on Mobile Devices. CoRR abs/1708.04728 (2017) - [i1]Deguang Kong:
Science Driven Innovations Powering Mobile Product: Cloud AI vs. Device AI Solutions on Smart Device. CoRR abs/1711.07580 (2017)
Coauthor Index
aka: Chris H. Q. Ding
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint