default search action
Guoqiang Shu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Shiqin Di, Jinchen Xu, Guoqiang Shu, Congcong Feng, Xiaodong Ding, Zheng Shan:
Amplitude transformed quantum convolutional neural network. Appl. Intell. 53(18): 20863-20873 (2023) - [c12]Chenglin Li, Yuanzhen Xie, Chenyun Yu, Bo Hu, Zang Li, Guoqiang Shu, Xiaohu Qie, Di Niu:
One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation. WSDM 2023: 366-374 - 2022
- [j3]Guoqiang Shu, Zheng Shan, Shiqin Di, Xiaodong Ding, Congcong Feng:
A Hybrid Quantum Image-Matching Algorithm. Entropy 24(12): 1816 (2022) - [c11]Chenglin Li, Mingjun Zhao, Huanming Zhang, Chenyun Yu, Lei Cheng, Guoqiang Shu, Beibei Kong, Di Niu:
RecGURU: Adversarial Learning of Generalized User Representations for Cross-Domain Recommendation. WSDM 2022: 571-581 - [i2]Chenglin Li, Yuanzhen Xie, Chenyun Yu, Bo Hu, Zang Li, Guoqiang Shu, Xiaohu Qie, Di Niu:
One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation. CoRR abs/2211.11964 (2022) - 2021
- [i1]Chenglin Li, Mingjun Zhao, Huanming Zhang, Chenyun Yu, Lei Cheng, Guoqiang Shu, Beibei Kong, Di Niu:
RecGURU: Adversarial Learning of Generalized User Representations for Cross-Domain Recommendation. CoRR abs/2111.10093 (2021)
2010 – 2019
- 2011
- [j2]Guoqiang Shu, David Lee:
A Formal Methodology for Network Protocol Fingerprinting. IEEE Trans. Parallel Distributed Syst. 22(11): 1813-1825 (2011)
2000 – 2009
- 2008
- [j1]Neelam Soundarajan, Jason O. Hallstrom, Guoqiang Shu, Adem Delibas:
Patterns: from system design to software testing. Innov. Syst. Softw. Eng. 4(1): 71-85 (2008) - [c10]Guoqiang Shu, Yating Hsu, David Lee:
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. FORTE 2008: 299-304 - [c9]Yating Hsu, Guoqiang Shu, David Lee:
A model-based approach to security flaw detection of network protocol implementations. ICNP 2008: 114-123 - [c8]Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang, David Lee:
VCSTC: Virtual Cyber Security Testing Capability - An Application Oriented Paradigm for Network Infrastructure Protection. TestCom/FATES 2008: 119-134 - 2007
- [c7]Guoqiang Shu, David Lee:
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach. ICDCS 2007: 25 - [c6]Neelam Soundarajan, Jason O. Hallstrom, Adem Delibas, Guoqiang Shu:
Testing Patterns. SEW 2007: 109-120 - 2006
- [c5]Zhijun Liu, Guoqiang Shu, Na Li, David Lee:
Defending against Instant Messaging Worms. GLOBECOM 2006 - [c4]Guoqiang Shu, David Lee:
Network Protocol System Fingerprinting - A Formal Approach. INFOCOM 2006 - [c3]Guoqiang Shu, David Lee, Mihalis Yannakakis:
A note on broadcast encryption key management with applications to large scale emergency alert systems. IPDPS 2006 - [c2]Guoqiang Shu, David Lee:
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. TestCom 2006: 357-372 - 2002
- [c1]Guoqiang Shu, Chao Li, Qing Wang, Mingshu Li:
Validating Objected-Oriented Prototype of Real-Time Systems with Timed Automata. IEEE International Workshop on Rapid System Prototyping 2002: 99-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint