default search action
Bowen Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Bowen Tang, Yipeng Ding, Yiqun Peng, Jiaxuan Cao:
Target localization algorithm based on improved short-time Fourier transform. Digit. Signal Process. 155: 104734 (2024) - [j11]Yipeng Ding, Yiqun Peng, Bowen Tang, Jiaxuan Cao, Minhao Ding:
Improved Linear Chirplet Transform and Singular Value Decomposition Joint Algorithm for Motion Target Tracking. IEEE Internet Things J. 11(8): 13383-13392 (2024) - [j10]Minhao Ding, Yiqun Peng, Runjin Liu, Bowen Tang, Yipeng Ding:
Multicomponent WVD Spectrogram Enhancement Algorithm for Indoor Through-Wall Radar Target Tracking. IEEE Internet Things J. 11(22): 36720-36735 (2024) - [j9]Bowen Tang, Zhangming Niu, Xiaofeng Wang, Junjie Huang, Chao Ma, Jing Peng, Yinghui Jiang, Ruiquan Ge, Hongyu Hu, Luhao Lin, Guang Yang:
Automated molecular structure segmentation from documents using ChemSAM. J. Cheminformatics 16(1): 29 (2024) - [j8]Yanrui Zhan, Shuhua Xiong, Xiaohai He, Bowen Tang, Honggang Chen:
A channel-wise contextual module for learned intra video compression. J. Vis. Commun. Image Represent. 99: 104070 (2024) - [c11]Bowen Tang, Jing Zhang, Long Yan, Qian Yu, Lu Sheng, Dong Xu:
Data-Free Generalized Zero-Shot Learning. AAAI 2024: 5108-5117 - [c10]Duo Su, Junjie Hou, Weizhi Gao, Yingjie Tian, Bowen Tang:
D4M: Dataset Distillation via Disentangled Diffusion Model. CVPR 2024: 5809-5818 - [c9]Bowen Tang, Zheng Wang, Yi Bin, Qi Dou, Yang Yang, Heng Tao Shen:
Ensemble Diversity Facilitates Adversarial Transferability. CVPR 2024: 24377-24386 - [c8]Bowen Tang, Kaihao Zhang, Wenhan Luo, Wei Liu, Hongdong Li:
Prompting Future Driven Diffusion Model for Hand Motion Prediction. ECCV (7) 2024: 169-186 - [c7]Lichen Jia, Chenggang Wu, Bowen Tang, Peihua Zhang, Zihan Jiang, Yang Yang, Ning Liu, Jingfeng Zhang, Zhe Wang:
Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants. EMNLP (Findings) 2024: 11508-11518 - [c6]Zheng Wang, Bowen Tang, Yi Bin, Lei Zhu, Guoqing Wang, Yang Yang:
Shapley Ensemble Adversarial Attack. ICME 2024: 1-6 - [c5]Bowen Tang, Kiyofumi Tanaka:
An Efficient Real-Time Pitch Correction System via Field-Programmable Gate Array. IVSP 2024: 147-154 - [i7]Bowen Tang, Long Yan, Jing Zhang, Qian Yu, Lu Sheng, Dong Xu:
Data-Free Generalized Zero-Shot Learning. CoRR abs/2401.15657 (2024) - [i6]Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou:
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models. CoRR abs/2403.00878 (2024) - [i5]Duo Su, Junjie Hou, Weizhi Gao, Ying-jie Tian, Bowen Tang:
D4M: Dataset Distillation via Disentangled Diffusion Model. CoRR abs/2407.15138 (2024) - 2023
- [j7]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4477-4490 (2023) - [j6]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - [c4]Bowen Tang, Xinrong Yan, Ming Chu:
Balance Control for Inverted Pendulum System via SGCMG. ICIRA (8) 2023: 120-129 - [i4]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. CoRR abs/2302.00947 (2023) - 2022
- [j5]Bowen Tang, Xiaohai He, Xiaohong Wu, Honggang Chen, Shuhua Xiong:
Sequential Enhancement for Compressed Video Using Deep Convolutional Generative Adversarial Network. Neural Process. Lett. 54(6): 5351-5370 (2022) - [j4]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - [c3]Lili Sun, Chenggang Wu, Zhe Wang, Yan Kang, Bowen Tang:
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines. COMPSAC 2022: 757-766 - [i3]Xu Wang, Yi Jin, Yigang Cen, Tao Wang, Bowen Tang, Yidong Li:
LighTN: Light-weight Transformer Network for Performance-overhead Tradeoff in Point Cloud Downsampling. CoRR abs/2202.06263 (2022) - [i2]Lichen Jia, Bowen Tang, Chenggang Wu, Zhe Wang, Zihan Jiang, Yuanming Lai, Yan Kang, Ning Liu, Jingfeng Zhang:
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods. CoRR abs/2208.14191 (2022) - 2021
- [i1]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. CoRR abs/2107.08367 (2021) - 2020
- [j3]Bowen Tang, Skyler T. Kramer, Meijuan Fang, Yingkun Qiu, Zhen Wu, Dong Xu:
A self-attention based message passing neural network for predicting molecular lipophilicity and aqueous solubility. J. Cheminformatics 12(1): 15 (2020)
2010 – 2019
- 2019
- [j2]Bowen Tang, Ju Tang, Yilu Liu, Fuping Zeng:
Comprehensive Evaluation and Application of GIS Insulation Condition Part 1: Selection and Optimization of Insulation Condition Comprehensive Evaluation Index Based on Multi-Source Information Fusion. IEEE Access 7: 88254-88263 (2019) - [j1]Bowen Tang, Yuanzhang Sun, Siying Wu, Keli Gao, Xianglian Yan, Fuping Zeng:
Comprehensive Evaluation and Application of GIS Insulation Condition Part 2: Construction and Application of Comprehensive Evaluation Model Considering Universality and Economic Value. IEEE Access 7: 129127-129135 (2019) - [c2]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. USENIX Security Symposium 2019: 1239-1256 - 2017
- [c1]Zhiwen Wang, Pengtao Wang, Lianyuan Jiang, Bowen Tang, Canlong Zhang, Zhenghuan Hu:
Analysis of Influencing Factors of Shooting Rate Based on Trajectory Prediction of the Basketball. WISA 2017: 176-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint