Analysis of security in blockchain: Case study in 51%-attack detecting C Ye, G Li, H Cai, Y Gu, A Fukuda 2018 5th International Conference on Dependable Systems and Their …, 2018 | 187 | 2018 |
Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination? J Chen, M Xie, Z Xing, C Chen, X Xu, L Zhu, G Li arXiv preprint arXiv:2008.05132, 2020 | 139 | 2020 |
Unblind your apps: Predicting natural-language labels for mobile gui components by deep learning J Chen, C Chen, Z Xing, X Xu, L Zhu, G Li, J Wang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 131 | 2020 |
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines D Zhao, Z Xing, C Chen, X Xu, L Zhu, G Li, J Wang 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020 | 60 | 2020 |
ActionNet: vision-based workflow action recognition from programming screencasts D Zhao, Z Xing, C Chen, X Xia, G Li 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 49 | 2019 |
Easy-to-deploy API extraction by multi-level feature embedding and transfer learning S Ma, Z Xing, C Chen, C Chen, L Qu, G Li IEEE Transactions on Software Engineering 47 (10), 2296-2311, 2019 | 38 | 2019 |
Data-driven proactive policy assurance of post quality in community q&a sites C Chen, X Chen, J Sun, Z Xing, G Li Proceedings of the ACM on human-computer interaction 2 (CSCW), 1-22, 2018 | 36 | 2018 |
Digital image splicing detection based on Markov features in block DWT domain Q Zhang, W Lu, R Wang, G Li Multimedia Tools and Applications 77 (23), 31239-31260, 2018 | 35 | 2018 |
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites X Ren, Z Xing, X Xia, G Li, J Sun 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 33 | 2019 |
Nested timed automata G Li, X Cai, M Ogawa, S Yuen Formal Modeling and Analysis of Timed Systems: 11th International Conference …, 2013 | 26 | 2013 |
Double JPEG compression detection based on block statistics J Li, W Lu, J Weng, Y Mao, G Li Multimedia Tools and Applications 77 (24), 31895-31910, 2018 | 22 | 2018 |
Environmental simulation of real-time systems with nested interrupts G Li, S Yuen, M Adachi 2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009 | 17 | 2009 |
IoT-enabled service for crude-oil production systems against unpredictable disturbance Q Duan, D Sun, G Li, G Yang, WW Yan IEEE Transactions on Services Computing 13 (4), 759-768, 2020 | 11 | 2020 |
A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds X Tao, G Li, D Sun, H Cai Future Generation Computer Systems 76, 582-589, 2017 | 11 | 2017 |
Object Detection Boosting using Object Attributes in Detect and Describe Framework MJ Khan, A Zafar, V Tumanian, D Yue, G Li 2019 IEEE 31st International Conference on Tools with Artificial …, 2019 | 10 | 2019 |
Detect Triangle Attack on Blockchain by Trace Analysis Y Wang, G Li 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 10 | 2019 |
区块链的安全检测模型 叶聪聪, 李国强, 蔡鸿明, 顾永跟 软件学报 29 (5), 1348-1359, 2018 | 10 | 2018 |
Nested timed automata with frozen clocks G Li, M Ogawa, S Yuen International Conference on Formal Modeling and Analysis of Timed Systems …, 2015 | 10 | 2015 |
A population-based study to assess two convolutional neural networks for dental age estimation J Wang, J Dou, J Han, G Li, J Tao BMC Oral Health 23 (1), 109, 2023 | 9 | 2023 |
Verifying OSEK/VDX automotive applications: A Spin‐based model checking approach H Zhang, G Li, Z Cheng, J Xue Software Testing, Verification and Reliability 28 (3), e1662, 2018 | 9 | 2018 |