关注
Guoqiang Li
Guoqiang Li
Associate Professor of School of Software, Shanghai Jiao Tong University
在 sjtu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Analysis of security in blockchain: Case study in 51%-attack detecting
C Ye, G Li, H Cai, Y Gu, A Fukuda
2018 5th International Conference on Dependable Systems and Their …, 2018
1872018
Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?
J Chen, M Xie, Z Xing, C Chen, X Xu, L Zhu, G Li
arXiv preprint arXiv:2008.05132, 2020
1392020
Unblind your apps: Predicting natural-language labels for mobile gui components by deep learning
J Chen, C Chen, Z Xing, X Xu, L Zhu, G Li, J Wang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1312020
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines
D Zhao, Z Xing, C Chen, X Xu, L Zhu, G Li, J Wang
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
602020
ActionNet: vision-based workflow action recognition from programming screencasts
D Zhao, Z Xing, C Chen, X Xia, G Li
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
492019
Easy-to-deploy API extraction by multi-level feature embedding and transfer learning
S Ma, Z Xing, C Chen, C Chen, L Qu, G Li
IEEE Transactions on Software Engineering 47 (10), 2296-2311, 2019
382019
Data-driven proactive policy assurance of post quality in community q&a sites
C Chen, X Chen, J Sun, Z Xing, G Li
Proceedings of the ACM on human-computer interaction 2 (CSCW), 1-22, 2018
362018
Digital image splicing detection based on Markov features in block DWT domain
Q Zhang, W Lu, R Wang, G Li
Multimedia Tools and Applications 77 (23), 31239-31260, 2018
352018
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites
X Ren, Z Xing, X Xia, G Li, J Sun
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
332019
Nested timed automata
G Li, X Cai, M Ogawa, S Yuen
Formal Modeling and Analysis of Timed Systems: 11th International Conference …, 2013
262013
Double JPEG compression detection based on block statistics
J Li, W Lu, J Weng, Y Mao, G Li
Multimedia Tools and Applications 77 (24), 31895-31910, 2018
222018
Environmental simulation of real-time systems with nested interrupts
G Li, S Yuen, M Adachi
2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009
172009
IoT-enabled service for crude-oil production systems against unpredictable disturbance
Q Duan, D Sun, G Li, G Yang, WW Yan
IEEE Transactions on Services Computing 13 (4), 759-768, 2020
112020
A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds
X Tao, G Li, D Sun, H Cai
Future Generation Computer Systems 76, 582-589, 2017
112017
Object Detection Boosting using Object Attributes in Detect and Describe Framework
MJ Khan, A Zafar, V Tumanian, D Yue, G Li
2019 IEEE 31st International Conference on Tools with Artificial …, 2019
102019
Detect Triangle Attack on Blockchain by Trace Analysis
Y Wang, G Li
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
102019
区块链的安全检测模型
叶聪聪, 李国强, 蔡鸿明, 顾永跟
软件学报 29 (5), 1348-1359, 2018
102018
Nested timed automata with frozen clocks
G Li, M Ogawa, S Yuen
International Conference on Formal Modeling and Analysis of Timed Systems …, 2015
102015
A population-based study to assess two convolutional neural networks for dental age estimation
J Wang, J Dou, J Han, G Li, J Tao
BMC Oral Health 23 (1), 109, 2023
92023
Verifying OSEK/VDX automotive applications: A Spin‐based model checking approach
H Zhang, G Li, Z Cheng, J Xue
Software Testing, Verification and Reliability 28 (3), e1662, 2018
92018
系统目前无法执行此操作,请稍后再试。
文章 1–20