Liang Geng

ORCID: 0000-0002-6618-4338
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Planetary Science and Exploration
  • Astro and Planetary Science
  • Software Engineering Research
  • Space Exploration and Technology
  • Topic Modeling
  • Bacteriophages and microbial interactions
  • Software System Performance and Reliability
  • Multiple Myeloma Research and Treatments
  • Multimodal Machine Learning Applications
  • Human Pose and Action Recognition
  • Data Visualization and Analytics
  • 3D Shape Modeling and Analysis
  • Cancer Mechanisms and Therapy
  • Face recognition and analysis
  • Advanced Steganography and Watermarking Techniques
  • Complex Systems and Time Series Analysis
  • Optical Systems and Laser Technology
  • Dengue and Mosquito Control Research
  • Natural Language Processing Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Usability and User Interface Design
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Geochemistry and Elemental Analysis
  • Cryptographic Implementations and Security
  • Advanced Computational Techniques and Applications

Soochow University
2025

Beijing University of Posts and Telecommunications
2024-2025

Soochow University
2024

Ruijin Hospital
2024

Ningxia Medical University
2024

Institute of Software
2018-2022

Chinese Academy of Sciences
2003-2022

National Astronomical Observatories
2010-2016

Hefei University of Technology
2016

Shandong University of Technology
2014

Code review is one of the best practices as a powerful safeguard for software quality. In practice, senior or highly skilled reviewers inspect source code and provide constructive comments, consider- ing what authors may ignore, example, some special cases. The collaborative validation between contributors results in being qualified less chance bugs. However, since personal knowledge limited varies, efficiency effectiveness practice are worthy further improvement. fact, it still takes...

10.1145/3540250.3549099 article EN Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering 2022-11-07

Specific molecular mechanisms by which AURKA promoted LSCC metastasis were still unknown. Bioinformatic analysis was performed the relationship between TRIM28 and LSCC. Immunohistochemistry, Co-IP assay, Rt-PCR Western Blot used to examine expression of related molecular. Flow cytometry cell numbers G0/G1 phase. Plate colony formation, wound healing, migration, invasion tail vein injection in nude mice assays applied proliferation, movement, significantly correlated with highly expressed...

10.1186/s12935-024-03620-x article EN cc-by-nc-nd Cancer Cell International 2025-01-03

10.1109/tcsvt.2025.3547855 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

Chang'E-1 is the first lunar mission in China, which was successfully launched on Oct. 24th, 2007. It guided to crash Moon March 1, 2009, at 52.36ºE, 1.50ºS, north of Mare Fecunditatis. The total lasted 495 days, exceeding designed life-span about four months. 1.37 Terabytes raw data received from Chang'E-1. then processed into 4 science different levels. A series results have been achieved by analyzing and applicating these data, especially "global image China's exploration mission''. Four...

10.11728/cjss2010.05.392 article EN cc-by Chinese Journal of Space Science 2010-01-01

The release note is an essential software artifact of open-source that documents crucial information about changes, such as new features and bug fixes. With the help notes, both developers users could have a general understanding latest version without browsing source code. However, it daunting time-consuming job for to produce notes. Although prior studies provided some automatic approaches, they generate notes mainly by extracting from code changes. This will result in language-specific...

10.1109/apsec53868.2021.00018 article EN 2021-12-01

Pre-trained language models have been widely recognized and applied. While common pre-training representation models(PLMs) usually focus on grasping the co-occurrence of words or sentences in simple tasks, more researchers realize that external information, i.e., knowledge graph (KG) clear structured semantics, can be vital natural understanding tasks. Therefore, using information to enhance PLMs (such as BERT) has gradually become a popular direction. However, existing improvement methods...

10.1109/ccai50917.2021.9447453 article EN 2021-05-07

<title>Abstract</title> Background Specific molecular mechanisms by which AURKA promoted LSCC metastasis were still unknown. Methods Bioinformatic analysis was performed the relationship between TRIM28 and LSCC. Immunohistochemistry, Co-IP assay, Rt-PCR Western Blot used to examine expression of related molecular. Flow cytometry cell numbers G0/G1 phase. Plate colony formation, wound healing, migration, invasion tail vein injection in nude mice assays applied proliferation, movement, Results...

10.21203/rs.3.rs-3916325/v1 preprint EN cc-by Research Square (Research Square) 2024-02-05

10.1109/lra.2024.3426286 article EN IEEE Robotics and Automation Letters 2024-09-01

3D face reconstruction has long been a Research Focus and application hotsopt, in the field of from 2D image sequences, result is impeded by problems occlusion illumination or pose variations frequently. Different morphable model fitting algorithm, method based on feature points puts forward higher requirements to robustness accuracy. This paper propose fusing deep convolutional network for facial extraction factorization SFM(Structure Motion), we investigated way solving accurate sparse...

10.1109/icsp.2016.7877955 article EN 2016-11-01

Dengue as an acute infectious disease threatens global public health and has sparked broad research interest. However, existing studies generally ignore the spatial dependencies involved in dengue forecast, consideration of temporal periodicity is absent. In this work, we propose a spatiotemporal component fusion model (STCFM) to solve risk forecast issue. Considering that mosquitoes are important vector transmission, introduce feature factors involving mosquito abundance lags trends...

10.1155/2022/2515432 article EN Computational and Mathematical Methods in Medicine 2022-06-02

Crowdsourced software engineering (CSE) has be-come an increasingly popular way of development owing to its flexibility. There exist two types CSE participants: the requester, who posts a task including set requirements, and workers, developers testers, completing task. Due centralized architecture, traditional systems have raised concern untrustfulness since participants may collude with platforms behave maliciously grab illegitimate interests. Some researches utilized blockchain solve...

10.1109/compsac54236.2022.00135 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022-06-01

Products and systems developed based on WorldFIP technology are all above control level. No fully distributed intelligent system field nodes is implemented. Function block application (FBA) the kernel part in implementation of network. Concept user layer not proposed communication model specification presented so far. Based independently network developed, a practical general-purposed FBA proposed. Data storage segmentation orienting expounded detail. data for defined. The schedule...

10.1109/ccdc.2008.4597548 article EN Chinese Control and Decision Conference 2008-07-01

The blockchain technology is regarded as a significant trust-building and has attracted much attention from the public. longest chain rule been widely applied in systems to reach consensus on distributed ledger. However, cannot support higher transaction throughput due its lower security. As an alternative solution rule, GHOST proposed safer rule. Existing studies show that can suffer selfish mining attacks. it unclear how attacks perform GHOST. In this paper, we explore performance of We...

10.1109/trustcom53373.2021.00022 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021-10-01

Recent lightweight cryptographic algorithms are vulnerable to side channel attacks (SCA), requiring a careful design of implementations. In this paper, we carefully investigate the "Low-Entropy Masking Scheme" (LEMS) on block cipher LED in context resource-constrained environments. We propose an improved LEMS called "iM-LED", so as satisfy two different yet unified goals: maintain entropy masking at one bit, meanwhile, enhance first-order SCA-resistance against advanced SCAs such...

10.1109/asianhost.2017.8353994 article EN 2017-10-01
Coming Soon ...