default search action
Chengxiang Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Jiacheng Xu, Chengxiang Tan:
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks. Comput. Secur. 137: 103565 (2024) - [j15]Zhishuo Zhang, Chengxiang Tan, Xueyan Zhao, Min Yang:
Type-Enhanced Ensemble Triple Representation via Triple-Aware Attention for Cross-Lingual Entity Alignment. IEICE Trans. Inf. Syst. 107(9): 1182-1191 (2024) - [c13]Jianpeng Hu, Chengxiang Tan, Jiacheng Xu, Xiangyun Kong:
Continual Few-shot Relation Extraction via Adaptive Gradient Correction and Knowledge Decomposition. ACL (Findings) 2024: 11805-11816 - [c12]Chaoqun Jiang, Chengxiang Tan, Zhishuo Zhang:
3VFP: Three-View Feature Propagation Entity Alignment. ICMLC 2024: 347-354 - [c11]Jiacheng Xu, Jianpeng Hu, Chunqing Yu, Chengxiang Tan:
Optimizing Label-Only Membership Inference Attacks by Global Relative Decision Boundary Distances. ISC (1) 2024: 107-126 - 2023
- [i3]Zhishuo Zhang, Chengxiang Tan, Haihang Wang, Xueyan Zhao, Min Yang:
Type-enhanced Ensemble Triple Representation via Triple-aware Attention for Cross-lingual Entity Alignment. CoRR abs/2305.01556 (2023) - [i2]Zhishuo Zhang, Chengxiang Tan, Xueyan Zhao, Min Yang, Chaoqun Jiang:
OTIEA: Ontology-enhanced Triple Intrinsic-Correlation for Cross-lingual Entity Alignment. CoRR abs/2305.01561 (2023) - [i1]Jiacheng Xu, Chengxiang Tan:
Membership inference attack with relative decision boundary distance. CoRR abs/2306.04109 (2023) - 2021
- [j14]Zhijie Fan, Chengxiang Tan, Xin Li:
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps. Int. J. Inf. Comput. Secur. 14(3/4): 242-262 (2021) - [j13]Wenye Zhu, Chengxiang Tan, Qian Xu, Ya Xiao:
Heterogeneous identity trust management method based on risk assessment. J. Intell. Fuzzy Syst. 41(3): 4691-4704 (2021) - 2020
- [j12]Wenye Zhu, Chengxiang Tan, Qian Xu, Ya Xiao:
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress". J. Web Eng. 19(7-8): 284-302 (2020) - [c10]Ya Xiao, Chengxiang Tan, Zhijie Fan, Qian Xu, Wenye Zhu:
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model. AAAI 2020: 9314-9321
2010 – 2019
- 2019
- [j11]Ya Xiao, Zhijie Fan, Chengxiang Tan, Qian Xu, Wenye Zhu, Fujia Cheng:
Sense-Based Topic Word Embedding Model for Item Recommendation. IEEE Access 7: 44748-44760 (2019) - [j10]Qian Xu, Chengxiang Tan, Wenye Zhu, Ya Xiao, Zhijie Fan, Fujia Cheng:
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Future Gener. Comput. Syst. 97: 306-326 (2019) - [j9]Ya Xiao, Zhijie Fan, Amiya Nayak, Chengxiang Tan:
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model. Frontiers Inf. Technol. Electron. Eng. 20(9): 1195-1208 (2019) - [j8]Zhijie Fan, Ya Xiao, Amiya Nayak, Chengxiang Tan:
An improved network security situation assessment approach in software defined networks. Peer-to-Peer Netw. Appl. 12(2): 295-309 (2019) - 2018
- [j7]Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao, Fujia Cheng:
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption. IEEE Access 6: 34051-34074 (2018) - [j6]Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao, Fujia Cheng:
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation. Sensors 18(5): 1609 (2018) - [c9]Tianjie Wang, Yihui Wang, Chengxiang Tan:
Construction and Application of Knowledge Graph System in Computer Science. SPAC 2018: 169-172 - [c8]Shenhao Zhang, Yihui Wang, Chengxiang Tan:
Research on Text Classification for Identifying Fake News. SPAC 2018: 178-181 - [c7]Fujia Cheng, Chengxiang Tan:
SEDalvik: A Kernel-Level Android Behavior Forensic Method. SPAC 2018: 499-503 - 2017
- [j5]Bing Chen, Chengxiang Tan, Xiang Zou:
Cloud service platform of electronic identity in cyberspace. Clust. Comput. 20(1): 413-425 (2017) - 2015
- [j4]Qian Xu, Chengxiang Tan:
基于动态权限集的Android强制访问控制模型 (Mandatory Access Control Model for Android Based on Dynamic Privilege Set). 计算机科学 42(11): 191-196 (2015) - [j3]Dawei Li, Lihong Xu, Chengxiang Tan, Erik D. Goodman, Daichang Fu, Longjiao Xin:
Digitization and Visualization of Greenhouse Tomato Plants in Indoor Environments. Sensors 15(2): 4019-4051 (2015) - 2012
- [j2]Bing Chen, Chengxiang Tan, Bo Jin, Xiang Zou, Yuebo Dai:
RFID-based Electronic Identity Security Cloud Platform in Cyberspace. J. Networks 7(7): 1131-1138 (2012) - 2011
- [j1]Jian Yang, Haihang Wang, Jian Wang, Chengxiang Tan, Dingguo Yu:
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing. J. Networks 6(7): 1033-1040 (2011) - 2010
- [c6]Minglei Shu, Chengxiang Tan, Haihang Wang:
Mobile VPN Scheme Based on SOCKS V5. MVHI 2010: 792-795
2000 – 2009
- 2009
- [c5]Songyang Wu, Chengxiang Tan:
A High Security Framework for SMS. BMEI 2009: 1-6 - [c4]Minglei Shu, Chengxiang Tan, Haihang Wang:
Mobile Authentication Scheme Using SMS. SSME 2009: 161-164 - 2008
- [c3]Jian Wang, Haihang Wang, Chengxiang Tan:
Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'. APSCC 2008: 835-840 - [c2]Haiyan Wu, Chengxiang Tan, Haihang Wang:
Building a High-performance Communication Framework for Network Isolation System. ICNSC 2008: 1086-1091 - [c1]Haiyan Wu, Chengxiang Tan, Haihang Wang:
A Hybrid RBAC-PBAC Access Control Model for Network Isolation System. WKDD 2008: 503-508
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint